zlacker

[return to "Automating a Software Company with GitHub Actions"]
1. crooke+fo1[view] [source] 2021-08-19 21:08:58
>>marius+(OP)
At my company, the biggest pain points we've run into with GitHub Actions are all centered around the many lacking aspects of permission handling.

- You can't pull in private dependencies published from other repos (for example, packages published on repo A used as a dependency on repo B) without using a private access token.

- You can't use git pulls from other repos (for example, repo B using `orgname/repoA#123456` as a dependency in package.json) without using a private access token, and it's a pain in the ass to make it work across workflow steps.

- You can't allow Dependabot to run as a trusted user, which makes it impossible to actually use any of the workarounds for the above issues with it.

- You can't create PRs to publish changes across repos (such as automatically keeping some set of files in sync) without using a private access token.

There are other complications, but those are the biggest ones.

◧◩
2. Tainno+ry1[view] [source] 2021-08-19 22:16:03
>>crooke+fo1
The dependabot issue is insane, and the whole way this issue arose (it used to work before this limitation was introduced) indicates that the security team and the dependabot team at GitHub just didn't talk to each other.

(There's a workaround for the dependabot issue though, use pull_request_target instead and explicitly check out the sha of the branch. Then the run can access the secrets.)

I would also add "you can't rerun single jobs" and "actions can't call other actions" to the list of grievances.

[go to top]