Skip to content

ci: harden nightly integration workflow — drop artifact upload#3

Open
vrogojin wants to merge 1 commit intomainfrom
fix/nightly-artifact-hygiene
Open

ci: harden nightly integration workflow — drop artifact upload#3
vrogojin wants to merge 1 commit intomainfrom
fix/nightly-artifact-hygiene

Conversation

@vrogojin
Copy link
Copy Markdown
Contributor

Summary

Post-merge steelman finding: nightly workflow's on-failure artifact upload harvests secp256k1 testnet wallet material into 7-day GitHub storage. The integration helpers already shred those dirs on exit for the same hygiene reason — uploading them defeats that.

Changes

  • Drop artifact upload entirely — vitest stderr in the job log is enough for nightly triage; re-run locally via `npm run test:integration` for deeper investigation
  • `permissions: contents: read` — least-privilege default
  • `concurrency: group: integration-nightly` — prevent cron + workflow_dispatch from double-hammering public testnet infra
  • sphere-sdk SHA pin — aligned with `ci.yml` (was branch-pinned; branch pointers can be force-pushed)

Test plan

  • YAML valid (workflow file parses, GitHub Actions shows no errors)
  • No impact on main CI (`ci.yml` unchanged)
  • Nightly run fires at 03:07 UTC with the hardened config
  • Manual `workflow_dispatch` produces a clean run

Steelman warning from post-merge review: the on-failure upload-artifact
step harvested /tmp/sphere-cli-it-*/ into 7-day GitHub Actions storage.
Those dirs hold secp256k1 testnet wallet material (mnemonic + private
key) that the integration helpers explicitly shred on exit for hygiene
reasons — uploading the same material as an artifact defeats that.

Even though the keys are throwaway and hold no funds, harvesting them
fails principle-of-least-privilege and could leak into CI logs, Slack
paste-backs, or tickets.

Also while here:
  * permissions: contents: read — least-privilege default
  * concurrency: group:integration-nightly — prevent cron+dispatch
    double-hammering public testnet infra
  * sphere-sdk SHA pin — aligned with ci.yml (was branch-pinned)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant