-
Notifications
You must be signed in to change notification settings - Fork 4
chore: CCIE-3986 use persist-credentials: false in checkout #343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
ec45df8
to
f6932ba
Compare
@@ -51,6 +51,7 @@ runs: | |||
} | |||
- uses: actions/checkout@v4 | |||
with: | |||
persist-credentials: true # creds used in Update Argus Manifest step |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not sure if we just accept this risk or if we want to do something about this
in my experience, automation doesn't make commits against the repo. the name of the artifact is also not something baked into the repo that get constantly updated. it's usually an external system managing the mapping of git hash to docker img tag, and that system will also keep track of what's deployed in prd/staging. sounds like that should be all done in argus so I'm curious if that's something that's possible/something we've considered doing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll trust you if you test it out and everything works. I'm not exactly familiar with this feature, but would like to see more familiarity with this pattern if it does work.
f6932ba
to
dd98434
Compare
it's hard to test this out since this affects consumers of these actions. eg if someone is doing a it might make sense to break their workflow anyway and have them use GITHUB_TOKEN which lets them decide whether they want to grant write permissions |
I did a manual inspection of the files but no guarantees that this won't break something.
If anyone knows of a place where we run privileged git commands other than update manifest, please let me know.
If this PR doesn't end up breaking anything I'll open PRs for other repos using the same approach.