-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(applicationset): reuse repo-creds for an existing GitHub App #10092
Conversation
abb2767
to
3b48148
Compare
Codecov Report
@@ Coverage Diff @@
## master #10092 +/- ##
==========================================
+ Coverage 45.92% 46.04% +0.11%
==========================================
Files 229 232 +3
Lines 28278 27908 -370
==========================================
- Hits 12987 12849 -138
+ Misses 13518 13321 -197
+ Partials 1773 1738 -35
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
3b48148
to
d7b1866
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
overall looks good to me.
I can wonder why there is almost no code reuse from the existing implementation for github app authentication or refactor of existing code.
Consider my comment nitpicking.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like this will be a pretty awesome enhancement!
I think you might have started down the path of auto-discovering the repo creds. Did that end up not being a viable option?
I went down this path and the answer is that after |
I thought better of it for a few reasons: 1. You might want a different app to checkout code than the one that scans for PRs or branches. 2. If you had a credential you didn't expect to be used this way, consuming some rate limit and making unexpected calls just seems like a good way to freak people out. |
d7b1866
to
8e3d01a
Compare
@iamnoah makes sense. Did you find that there's something acting as a hard barrier to auto-discovery, or simply that it was too involved to tackle in this PR? Just curious, in case someone decides to pick up auto-discovery in the future. |
Thanks for taking the time detailing it 👍 Makes sense. |
No, I had some code that would inject the argocddb, try each credential, and note if there was a 401 then stopping using it for one hour. But I realized that PRs need a separate permission and felt like the unintended consequences were too great. I would want auto-discovery to:
|
8e3d01a
to
02b70dc
Compare
@iamnoah do you have time to resolve conflicts? |
d9f5a61
to
a13f6a1
Compare
Closes argoproj#10079 Signed-off-by: Noah Perks Sloan <noah_sloan@securityjourney.com>
a13f6a1
to
ed3cc89
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm - thanks @iamnoah!
Closes #10079