super-productivity/.github/workflows/test-mac-dmg-build.yml
Johannes Millan 27630a59fe security: add Harden-Runner and fix remaining unpinned actions
Add StepSecurity Harden-Runner to production workflows for runtime monitoring
and fix all remaining unpinned GitHub Actions that were missed in initial pass.

Changes:
1. StepSecurity Harden-Runner (Phase 2.2.5)
   - Added to 4 production deployment workflows:
     * auto-publish-google-play-on-release.yml (Google Play)
     * publish-to-hub-docker.yml (Docker Hub)
     * build-update-web-app-on-release.yml (Web server)
     * build-publish-to-mac-store-on-release.yml (Mac App Store)
   - Configured with egress-policy: audit for network monitoring
   - Added allowed endpoints for each deployment target
   - Detects: unexpected network calls, DNS exfiltration, malicious downloads

2. Fixed Remaining Unpinned Actions
   - actions/setup-node@v6 → SHA (28 instances across 16 workflows)
   - actions/cache@v5 → SHA (13 instances across 11 workflows)
   - actions/checkout@v6 → SHA (3 instances)
   - actions/stale@v10 → SHA (1 instance)
   - actions/first-interaction@v3 → SHA (1 instance)

What Harden-Runner Detects:
- Compromised workflows making unexpected API calls
- Secret exfiltration via curl/wget to attacker domains
- Base64-encoded data exfiltration
- DNS tunneling attempts
- Suspicious binary downloads

Real-World Impact:
- Would have detected Azure Karpenter Provider compromise (Aug 2024)
- Would have alerted on tj-actions attack (Mar 2025) within 1 hour
- Provides audit trail of all network activity for incident response

All 22 workflows validated with YAML syntax checks.

Risk Score: 55/100 → 45/100 (runtime monitoring added)

Refs: StepSecurity Blog, CVE-2025-30066
2026-01-21 14:30:24 +01:00

125 lines
4.5 KiB
YAML

name: Test macOS DMG Build
on:
workflow_dispatch:
jobs:
build-and-verify-dmg:
runs-on: macos-latest
env:
UNSPLASH_KEY: ${{ secrets.UNSPLASH_KEY }}
UNSPLASH_CLIENT_ID: ${{ secrets.UNSPLASH_CLIENT_ID }}
steps:
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6
with:
persist-credentials: false
- name: Reconfigure git to use HTTP authentication
run: |
git config --global url."https://github.com/".insteadOf ssh://git@github.com/
- uses: actions/setup-node@6044e13b5dc448c55e2357c09f80417699197238 # v6
with:
node-version: 20
- name: Get npm cache directory
id: npm-cache-dir
run: echo "dir=$(npm config get cache)" >> "$GITHUB_OUTPUT"
- uses: actions/cache@8b402f58fbc84540c8b491a91e594a4576fec3d7 # v5
id: npm-cache
with:
path: ${{ steps.npm-cache-dir.outputs.dir }}
key: ${{ runner.os }}-node-${{ hashFiles('**/package-lock.json') }}
restore-keys: |
${{ runner.os }}-node-
- name: Install native helpers
run: npm install @nx/nx-darwin-arm64 dmg-license
- name: Install npm packages
run: npm i
- name: Decode provisioning profile
shell: bash
env:
PROVISION_PROFILE: ${{ secrets.dl_provision_profile }}
run: |
if [ -z "$PROVISION_PROFILE" ]; then
echo "dl_provision_profile secret is missing"
exit 1
fi
echo "$PROVISION_PROFILE" | base64 --decode > embedded.provisionprofile
- name: Configure macOS signing keychain
env:
MAC_CERTS: ${{ secrets.mac_certs }}
MAC_CERTS_PASSWORD: ${{ secrets.mac_certs_password }}
run: |
set -euo pipefail
CERT_PATH="$RUNNER_TEMP/mac-certs.p12"
echo "$MAC_CERTS" | base64 --decode > "$CERT_PATH"
KEYCHAIN_PATH="$HOME/Library/Keychains/build.keychain-db"
security create-keychain -p "" build.keychain
security set-keychain-settings -lut 21600 build.keychain
security unlock-keychain -p "" build.keychain
security import "$CERT_PATH" -k build.keychain -P "$MAC_CERTS_PASSWORD" -T /usr/bin/codesign -T /usr/bin/security
security list-keychains -s build.keychain login.keychain
security default-keychain -s build.keychain
security set-key-partition-list -S apple-tool:,apple: -k "" build.keychain
{
echo "CSC_KEYCHAIN=$KEYCHAIN_PATH"
echo "CSC_LINK=file://$CERT_PATH"
echo "CSC_KEY_PASSWORD=$MAC_CERTS_PASSWORD"
} >> "$GITHUB_ENV"
- name: Prepare for app notarization
run: |
mkdir -p ~/private_keys/
echo '${{ secrets.mac_api_key }}' > ~/private_keys/AuthKey_${{ secrets.mac_api_key_id }}.p8
- name: Generate environment & build sources
run: |
npm run env
npm run build
- name: Build Developer ID DMG
env:
API_KEY_ID: ${{ secrets.mac_api_key_id }}
API_KEY_ISSUER_ID: ${{ secrets.mac_api_key_issuer_id }}
APPLE_ID: ${{ secrets.APPLE_ID }}
APPLE_TEAM_ID: ${{ secrets.APPLE_TEAM_ID }}
APPLE_APP_SPECIFIC_PASSWORD: ${{ secrets.APPLE_APP_SPECIFIC_PASSWORD }}
run: npx electron-builder --mac --publish=never
- name: Verify DMG signature
run: |
set -euo pipefail
DMG_PATH=$(ls .tmp/app-builds/superProductivity-*.dmg | head -n 1)
if [ -z "$DMG_PATH" ]; then
echo "No DMG artefact found"
exit 1
fi
MOUNT_POINT="/Volumes/SuperProductivityTest"
hdiutil attach "$DMG_PATH" -mountpoint "$MOUNT_POINT" -nobrowse
trap 'hdiutil detach "$MOUNT_POINT" || true' EXIT
APP_PATH="$MOUNT_POINT/Super Productivity.app"
/usr/bin/codesign --verify --deep --strict --verbose=4 "$APP_PATH"
spctl --assess --verbose "$APP_PATH"
AUTHORITY_OUTPUT=$(/usr/bin/codesign -dv "$APP_PATH" 2>&1 | grep Authority || true)
if [ -n "$AUTHORITY_OUTPUT" ]; then
echo "$AUTHORITY_OUTPUT"
else
echo "No Authority lines found in codesign -dv output"
fi
- name: Upload DMG artifact
uses: actions/upload-artifact@b7c566a772e6b6bfb58ed0dc250532a479d7789f # v6
with:
name: mac-dmg-build
path: .tmp/app-builds/*.dmg
if-no-files-found: error