Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PR fails to upload coverage data #90

Closed
altendky opened this issue Dec 27, 2019 · 8 comments
Closed

PR fails to upload coverage data #90

altendky opened this issue Dec 27, 2019 · 8 comments

Comments

@altendky
Copy link
Collaborator

Maybe make the repository upload token available for PRs?

https://github.com/Julian/venvs/pull/48/checks?check_run_id=365463489#step:6:363

Error: Missing repository upload token
@Julian
Copy link
Owner

Julian commented Dec 27, 2019

Hummm let's see how you do that...

@Julian
Copy link
Owner

Julian commented Dec 28, 2019

Yeah I have no idea how to make this work I see nothing that'd let you do that, wat :/

@altendky
Copy link
Collaborator Author

How is it set up now? As an environment variable? Not at all because of codecov integration with github?

So there is https://github.com/codecov/codecov-action but sure, I would rather do CI agnostic activities with CI agnostic code.

@Julian
Copy link
Owner

Julian commented Dec 30, 2019

It's currently just using the codecov executable directly, because of yeah your second point, but I don't think it matters much, the issue is just whether GHA supports sharing secrets with PRs (without say, letting them change the workflow code to be able to steal them).

Even if I were using the "official" codecov-action GHA I think you'd have the same issue.

@Julian
Copy link
Owner

Julian commented Dec 30, 2019

Yeah it looks like that's the case, and that obviously this is already a known issue:

codecov/codecov-action#29

and

https://github.community/t5/GitHub-Actions/Make-secrets-available-to-builds-of-forks/m-p/30678/highlight/true#M508

Fun.

@Julian
Copy link
Owner

Julian commented Dec 30, 2019

Sigh, I guess for now just disabling running coverage for PRs.

@Julian Julian closed this as completed Dec 30, 2019
@altendky
Copy link
Collaborator Author

Trio anyways decided that submitting code coverage results was an unlikely attack vector with minimal damage and just made the code public. Granted that's assuming everything else in the security chain works...

@Julian
Copy link
Owner

Julian commented Dec 30, 2019 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants