-
Notifications
You must be signed in to change notification settings - Fork 66
Fix ci permissions #87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…ively Also set persist-credentials: false universally. This could cause problems for the releaser and rebuild actions if they take advantage of the default persist-credentials: true. Also note that rebuild does not clone recursively because it does not use submodules
A note about the way that CI is currently set up:
(so the "check" here is somewhat of a "false positive") Would it be preferable to set it up so that if there are changes to the Alternatively, we could just have it run CI on the chart every time... or only trigger the CI if changes are in the chart directory / the .github/workflows or .github/actions folder (i.e. remove the "change detection" since you just have a single chart). This latter approach seems like a cleaner solution to me. i.e. run "always" / remove conditional checks but only trigger the workflow, so it runs on every commit to
EDIT: I talked myself into it and added to the PR 😅 |
Instead of using chart-releaser heuristics, use GitHub actions to trigger the action. This cuts down on GitHub Action churn to "check for changes" and ensures tests run when action definitions change. This is particularly efficient because there is only one chart in this repository (i.e. no benefits gained from chart-releaser being selective)
It looks like CI is happy... although I'll defer to you if you think there is anything we should improve about the logs here before we move on: https://github.com/apache/couchdb-helm/runs/6947632474?check_suite_focus=true It seems like it succeeded... but I suspect there are some things that can be done long term to improve / ensure that we are picking up health of the service / etc. |
Agree this sounds cleaner. +1 |
Thanks for this follow up @colearendt. On |
@willholley |
What this PR does / why we need it:
The Apache Foundation has guidance that was missed on my first PR for GitHub Actions usage. This PR addresses that feedback.
Which issue this PR fixes
(optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close that issue when PR gets merged)Special notes for your reviewer:
A couple of questions:
Regarding the contention for GitHub Actions usage - did you see any concerning contention yet? I'm wondering if the "install" action should be:
lint
job so that it will cut down on "redundant" setup (i.e. installing helm, etc.)I used the
persist-credentials: false
convention recommended in those docs. Not sure if this will cause problems for therebuild
orrelease
workflows (i.e. if they make implicit use of that token cache)I'm also not sure if the
release
script requires access to writepackages
. I don't think so, so I left this off. There does not seem to be a great way to test these scripts from a branchOne more note for y'all's Apache docs. It is possible to set things within a repository to only trigger actions once approved by a maintainer. i.e. so changes to
workflows
files do not automatically get to run. This also cuts down on "duplicate" runs of workflows and could help alleviate any capacity issues that y'all have (if those are still a problem) at the cost of needing a maintainer to run the CI manually by approvingChecklist
[Place an '[x]' (no spaces) in all applicable fields. Please remove unrelated fields.