buildbuddy updates #2228
No reviewers
Labels
No labels
1week
2weeks
Failed compliance check
IP cameras
NATS
Possible security concern
Review effort 1/5
Review effort 2/5
Review effort 3/5
Review effort 4/5
Review effort 5/5
UI
aardvark
accessibility
amd64
api
arm64
auth
back-end
bgp
blog
bug
build
checkers
ci-cd
cleanup
cnpg
codex
core
dependencies
device-management
documentation
duplicate
dusk
ebpf
enhancement
eta 1d
eta 1hr
eta 3d
eta 3hr
feature
fieldsurvey
github_actions
go
good first issue
help wanted
invalid
javascript
k8s
log-collector
mapper
mtr
needs-triage
netflow
network-sweep
observability
oracle
otel
plug-in
proton
python
question
reddit
redhat
research
rperf
rperf-checker
rust
sdk
security
serviceradar-agent
serviceradar-agent-gateway
serviceradar-web
serviceradar-web-ng
siem
snmp
sysmon
topology
ubiquiti
wasm
wontfix
zen-engine
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
carverauto/serviceradar!2228
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "refs/pull/2228/head"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Imported from GitHub pull request.
Original GitHub pull request: #1648
Original author: @mfreeman451
Original URL: https://github.com/carverauto/serviceradar/pull/1648
Original created: 2025-09-19T02:27:13Z
Original updated: 2025-09-19T02:34:04Z
Original head: carverauto/serviceradar:updates/go_vendoring
Original base: main
Original merged: 2025-09-19T02:34:01Z by @mfreeman451
PR Type
Enhancement
Description
Add BuildBuddy remote execution configuration
Configure toolchain dependencies and overrides
Enable remote build capabilities with timeout settings
Diagram Walkthrough
File Walkthrough
.bazelrc
Configure BuildBuddy remote execution settings.bazelrc
MODULE.bazel
Add BuildBuddy toolchain dependenciesMODULE.bazel
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1648#issuecomment-3310287980
Original created: 2025-09-19T02:27:41Z
PR Reviewer Guide 🔍
Here are some key observations to aid the review process:
Sensitive information exposure:
The build metadata includes
git@github.com:carverauto/serviceradar.git. If BuildBuddy or other systems surface build metadata publicly or to multi-tenant logs, this could reveal internal repo location. Validate visibility settings or consider using a non-sensitive URL or omitting this metadata.Config Robustness
The remote execution settings hardcode BuildBuddy toolchain targets and Java 11; verify these align with all target platforms and do not conflict with existing toolchains or local builds when using --config=remote.
Pin Integrity
The archive_override pins a specific commit and integrity for BuildBuddy toolchains; ensure the sha256 and strip_prefix match the tarball and that repo_name mapping aligns with references in .bazelrc (e.g., @buildbuddy_toolchain).
Metadata Exposure
The build metadata embeds the repository SSH URL; confirm this is intended for all environments and won’t leak in publicly accessible build metadata or analytics.
Imported GitHub PR comment.
Original author: @qodo-code-review[bot]
Original URL: https://github.com/carverauto/serviceradar/pull/1648#issuecomment-3310289619
Original created: 2025-09-19T02:28:46Z
PR Code Suggestions ✨
Explore these optional code suggestions:
Add authentication to prevent data leaks
Add authentication to the BuildBuddy remote execution configuration to prevent
potential data leaks. Use an API key managed in a separate, git-ignored
.bazelrc.localfile..bazelrc [33-47]
Suggestion importance[1-10]: 10
__
Why: The suggestion correctly identifies a critical security vulnerability where builds are sent to a public endpoint without authentication, and provides a robust solution using best practices for secret management.
Evaluate security of using public service
The suggestion raises a security concern about using BuildBuddy's public remote
execution service, which sends source code to a third party. It recommends
confirming that this practice complies with the organization's security
policies.
Examples:
.bazelrc [34]
Solution Walkthrough:
Before:
After:
Suggestion importance[1-10]: 9
__
Why: This suggestion raises a critical security and policy concern by correctly identifying that using the public BuildBuddy service (
remote.buildbuddy.io) exposes proprietary source code to a third-party platform.Use HTTPS for repository URL
Change the
REPO_URLin the build metadata from an SSH URL to an HTTPS URL toimprove build portability and avoid potential authentication issues in CI/CD
environments.
.bazelrc [49]
Suggestion importance[1-10]: 5
__
Why: The suggestion improves build portability by replacing the SSH-based
REPO_URLwith an HTTPS URL, which is more robust across different environments like CI/CD systems.