-
Notifications
You must be signed in to change notification settings - Fork 140
Feature request: precheck more permissions needed by other steps in verify step #895
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Just jotting down what the next steps would be as I don't know when I'll have the time. If anyone else would like to go through these tests that'd be great! We need to verify the above query with both classic tokens and the new fine-grained tokens. And we need to test it in both a private and a public repository. We need to test if we can do the following
Classic tokens
Fine grained
|
@gr2m you mean |
@gr2m
I double checked and the Classic PAT docs say
I submitted an issue to GitHub Support (ticket 2935830) |
According to this there is a way to check the permissions of a classic PAT but not a fine-grained PAT. |
yes 🤣
Yes. Maybe we just start out with this, it's better than nothing, and do a follow up issue to add checks for installation access tokens / fine-grained user tokens? |
Related to #738, it would be good to try to verify that we have as many of the necessary GitHub permissions as possible before running other steps. For example, publish can succeed but then adding issue comments can fail during the
success
step; then adding those comments manually is the only option. But if we could detect the lack of permissions and error out on theverify
step, then the user can fix their token and rerun, and the issue comments will be created successfully after publish.As I mentioned in #738:
What I've found out so far is:
git push
with no changesMaybe we can check permission to update issues and releases by doing a no-op update on one (sending the title it already has in an update, etc), I will have to experiment. But we'd be able to avoid hacky workarounds if the GitHub API provided an explicit way to check if we have permissions to do a certain operation.
The text was updated successfully, but these errors were encountered: