-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot install git-cliff when ref action in self-hosted runners #33
Comments
Of course, it's possible to use installation via pip, but I would prefer not to add an additional step for installing Python and instead use a compiled release |
Hello, thanks for reporting and sorry for the delayed response!
I'm not sure if removing that would be a problem, but I presume it should be fine since we are executing from the GitHub context anyways. Or maybe we can support an option to disable it somehow. cc @M0NsTeRRR - what do you think? |
Hello, As mentioned in the script, the token is used to increase GitHub API limits: Lines 22 to 25 in 9f34d77
Source : https://docs.github.com/en/rest/using-the-rest-api/rate-limits-for-the-rest-api?apiVersion=2022-11-28#primary-rate-limit-for-unauthenticated-users For now, you can pass a GitHub token in your Gitea CI as
I'm not sure about this one, and I don't know if it would work with a self-hosted GitHub runner. We could add an option to disable the authorization header in cases where someone is using Gitea or an other CI compatible with Github action and doesn't need to worry about rate limits. |
Yup, sounds good. It should be disabled as default though. |
Maybe you should just make sure that the environment variable exists? Since there is no such variable in gitea act_runner and GITEA_TOKEN is used |
If Gitea CI doesn't use it we could yeah, I'm not familiar with it :) |
Actually yeah, that sounds more reasonable. |
@gdagil could you test with github action |
Would it be possible to supply the token via (non-required) input? I am trying to use this action on a on-premises enterprise github installation, so GITHUB_TOKEN exists but is obviously not authorized for github.com. I'd rather not use a token at all. |
Thanks for your feedback! I've adjusted my PR to address it. Could you please test with @orhun, I'll leave it up to you to decide whether to keep the default value, but I believe maintaining this configuration for GitHub Actions (which most users utilize) is the best approach. |
@M0NsTeRRR can confirm it works! Thx |
@M0NsTeRRR Yea, on gitea works too |
Perfect! Thanks a lot everyone, release coming out shortly 🚀 ⛰️ |
Hello!
Thank you for your product. I’ve been considering integrating it into my projects using GitHub Actions and encountered an issue.
I have my own act_runner for self-hosted Gitea. Since most of the environment variables here are the same as those on GitHub runners, an error occurs when running your action stating that the request cannot be executed - 401 response from api.github.com server.
I believe it would be better to exclude setting the authorization header when downloading the package in the line provided below.
git-cliff-action/install.sh
Line 27 in 9f34d77
Attaching the act_runner logs:
The text was updated successfully, but these errors were encountered: