Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using Scoop for private tools #4243

Closed
tylersuggs opened this issue Jan 26, 2021 · 7 comments · Fixed by #4896
Closed

Using Scoop for private tools #4243

tylersuggs opened this issue Jan 26, 2021 · 7 comments · Fixed by #4896

Comments

@tylersuggs
Copy link

I've searched around but have been unable to find a clear answer to this question. Can Scoop be configured to download artifacts from private (authenticated) URLs, such as a Github Release from a private repository)? Thanks!

@tylersuggs
Copy link
Author

Some sort of response here would be greatly appreciated. Thanks!

@sytone
Copy link

sytone commented Feb 4, 2021

Did you try to add a private repo bucket? I just made a private repo and added it without issue. Did you hit any issues while doing this?

scoop bucket add sytone-private https://github.com/sytone/scoop-private-bucket

Instructions on making buckets is in the wiki: https://github.com/lukesampson/scoop/wiki/Buckets

@dixonwille
Copy link

That is a private bucket. I think he wants where the URL in the JSON is to an authenticated endpoint (like Github releases).

@tylersuggs
Copy link
Author

Correct. Having a bucket in a private repo is one thing - this works. The problem I am trying to solve is downloading the tool defined by a Manifest from a Release asset who's repo is also private.

For example, Homebrew allows for this scenario with custom install strategies. Can I achieve the same or something similar with Scoop?

@rasa
Copy link
Member

rasa commented Feb 5, 2021

One solution might be to provide the needed Github credentials in environment variables, and/or a ~/.config/scoop/secrets.json file. For example:

set GITHUB_USER=rasa
set GITHUB_TOKEN=01234567890abcdef01234567890abcdef012345678

or

set GITHUB_USER_TOKEN=rasa:01234567890abcdef01234567890abcdef012345678

@sytone
Copy link

sytone commented Feb 6, 2021

If you can use the access token in the header for the call that would work as well. Not sure if that level of control is possible in the manifest for a app.

@tylersuggs
Copy link
Author

I assume you guys are talking hypothetical enhancements, not current abilities? Either way, thanks for the input!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants