Giter Site home page Giter Site logo

Comments (6)

gutzbenj avatar gutzbenj commented on June 12, 2024 1

Sorry for the late response: This was fixed with

if: ${{ ! startsWith(github.head_ref, '^dependabot/*') }} && ${{ ! github.event.pull_request.head.repo.fork }}

Same for the full version

from wetterdienst.

amotl avatar amotl commented on June 12, 2024

Hi Nico,

Skip the "push" step for Dependabot.

I've tried it on two other spots already, but haven't been successful so far.

With kind regards,
Andreas.

from wetterdienst.

amotl avatar amotl commented on June 12, 2024

@gutzbenj said at #945 (comment):

This is also effecting anyone who's not part of our organization and would open a PR from their fork e.g. max-mustermann/pr-to-wetterdienst. Ignoring would be fine but will have to figure the correct filter for PR branches.

from wetterdienst.

amotl avatar amotl commented on June 12, 2024

It does not happen so often, but it's true. I wonder how others are handling this.

One idea: Build up an allow-list of contributors who have the corresponding permissions, and add a condition to the build+push workflow step to run only if the contribution is coming from someone who is member of this allow-list, and skip it for all others?

The good thing with our OCI building workflow recipes is that the build_and_test job will already cover the building of the image thoroughly, otherwise this operation would be complete nonsense at all.

from wetterdienst.

gutzbenj avatar gutzbenj commented on June 12, 2024

I think the allow list wouldn't work because there's no way to leak our GCR secret to someone. This is simply not the idea organization secrets.

from wetterdienst.

amotl avatar amotl commented on June 12, 2024

I think the allow list wouldn't work because there's no way to leak our GCR secret to someone. This is simply not the idea organization secrets.

I don't understand this comment about the GCR secret and the organization secrets. Can you clarify?

My proposal was to only run the build&upload job based on an allow-list, so that it would only run when the patch originates from some of us who have the permissions, and skip it for all others.

Do you have a different solution in mind? We can also ask GitHub support for help, if we can't discover how others are doing it.

from wetterdienst.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.