Skip to content

fix(ci): configure git remote with token for authentication#26949

Merged
scidomino merged 3 commits into
mainfrom
tomm_release
May 12, 2026
Merged

fix(ci): configure git remote with token for authentication#26949
scidomino merged 3 commits into
mainfrom
tomm_release

Conversation

@scidomino
Copy link
Copy Markdown
Collaborator

@scidomino scidomino commented May 12, 2026

Summary

This PR fixes a critical CI failure where release workflows were failing to authenticate with GitHub during git push operations.

Details

The issue was introduced in #26897, which added persist-credentials: false to various workflows. This prevents actions/checkout from storing the GitHub token in the local git configuration, causing subsequent steps to fail when attempting remote operations.

By explicitly setting the remote URL to https://x-access-token:${TOKEN}@github.com/${REPOSITORY}.git, we ensure that these operations remain authenticated without needing to revert the security hardening of persist-credentials: false.

Related Issues

Fixes the release job failure in run 25760929873.

@scidomino scidomino requested review from a team as code owners May 12, 2026 21:17
@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request addresses CI failures in release workflows caused by recent security hardening. By explicitly setting the git remote URL with an access token, the workflows can now perform authenticated git operations without compromising the security posture of the repository.

Highlights

  • CI Authentication Fix: Explicitly configures the git remote URL with the GitHub token to restore authentication for push operations in release workflows.
  • Security Compliance: Maintains the security hardening of 'persist-credentials: false' while resolving the resulting authentication errors during git operations.
Ignored Files
  • Ignored by pattern: .github/workflows/** (2)
    • .github/workflows/release-promote.yml
    • .github/workflows/release-rollback.yml
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize the Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counterproductive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the GitHub Actions for creating pull requests and publishing releases by explicitly setting the git remote URL with a GitHub token. However, the review identified significant security concerns regarding the persistence of plain-text credentials in the local git configuration and the risk of command injection. It is recommended to use gh auth setup-git instead to securely manage authentication without storing tokens on disk.

Comment thread .github/actions/create-pull-request/action.yml Outdated
Comment thread .github/actions/publish-release/action.yml Outdated
@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 12, 2026

Size Change: -4 B (0%)

Total Size: 34.1 MB

Filename Size Change
./bundle/chunk-3IAB227I.js 0 B -49.2 kB (removed) 🏆
./bundle/chunk-DXONGXQB.js 0 B -2.78 MB (removed) 🏆
./bundle/chunk-HUDAPI6C.js 0 B -659 kB (removed) 🏆
./bundle/chunk-IGBISRPF.js 0 B -3.43 kB (removed) 🏆
./bundle/chunk-JLWU35AT.js 0 B -14.8 MB (removed) 🏆
./bundle/chunk-MBY6BYJ2.js 0 B -19.5 kB (removed) 🏆
./bundle/chunk-OVAIAOTD.js 0 B -12.5 kB (removed) 🏆
./bundle/chunk-XZ7CFLTK.js 0 B -3.8 kB (removed) 🏆
./bundle/core-WJQHZ3NU.js 0 B -49.3 kB (removed) 🏆
./bundle/devtoolsService-NIA5XDGU.js 0 B -28 kB (removed) 🏆
./bundle/gemini-5V4PSZY5.js 0 B -587 kB (removed) 🏆
./bundle/interactiveCli-RWNF6ACV.js 0 B -1.3 MB (removed) 🏆
./bundle/liteRtServerManager-BYGVHOHR.js 0 B -2.11 kB (removed) 🏆
./bundle/oauth2-provider-J4TDGASZ.js 0 B -9.16 kB (removed) 🏆
./bundle/chunk-3YKDWL7D.js 2.78 MB +2.78 MB (new file) 🆕
./bundle/chunk-APHCW242.js 3.8 kB +3.8 kB (new file) 🆕
./bundle/chunk-FAA2Y5UU.js 3.43 kB +3.43 kB (new file) 🆕
./bundle/chunk-FUZMJRWF.js 49.2 kB +49.2 kB (new file) 🆕
./bundle/chunk-GLOTLL6K.js 19.5 kB +19.5 kB (new file) 🆕
./bundle/chunk-IBEFW5Q7.js 659 kB +659 kB (new file) 🆕
./bundle/chunk-JTMM75V4.js 14.8 MB +14.8 MB (new file) 🆕
./bundle/chunk-LIL22LBG.js 12.5 kB +12.5 kB (new file) 🆕
./bundle/core-MDJ24M3D.js 49.3 kB +49.3 kB (new file) 🆕
./bundle/devtoolsService-IUYGLDIF.js 28 kB +28 kB (new file) 🆕
./bundle/gemini-ITNA7FDW.js 587 kB +587 kB (new file) 🆕
./bundle/interactiveCli-LNPCCSBO.js 1.3 MB +1.3 MB (new file) 🆕
./bundle/liteRtServerManager-PX4HI4XW.js 2.11 kB +2.11 kB (new file) 🆕
./bundle/oauth2-provider-DEBTVXHM.js 9.16 kB +9.16 kB (new file) 🆕
ℹ️ View Unchanged
Filename Size Change
./bundle/bundled/third_party/index.js 8 MB 0 B
./bundle/chunk-34MYV7JD.js 2.45 kB 0 B
./bundle/chunk-5AUYMPVF.js 858 B 0 B
./bundle/chunk-5PS3AYFU.js 1.18 kB 0 B
./bundle/chunk-664ZODQF.js 124 kB 0 B
./bundle/chunk-DAHVX5MI.js 206 kB 0 B
./bundle/chunk-IUUIT4SU.js 56.5 kB 0 B
./bundle/chunk-N6QYTC2T.js 1.97 MB 0 B
./bundle/chunk-RJTRUG2J.js 39.8 kB 0 B
./bundle/cleanup-X2X4PPNL.js 0 B -932 B (removed) 🏆
./bundle/devtools-36NN55EP.js 696 kB 0 B
./bundle/dist-T73EYRDX.js 356 B 0 B
./bundle/events-XB7DADIJ.js 418 B 0 B
./bundle/examples/hooks/scripts/on-start.js 188 B 0 B
./bundle/examples/mcp-server/example.js 1.43 kB 0 B
./bundle/gemini.js 5.1 kB 0 B
./bundle/getMachineId-bsd-TXG52NKR.js 1.55 kB 0 B
./bundle/getMachineId-darwin-7OE4DDZ6.js 1.55 kB 0 B
./bundle/getMachineId-linux-SHIFKOOX.js 1.34 kB 0 B
./bundle/getMachineId-unsupported-5U5DOEYY.js 1.06 kB 0 B
./bundle/getMachineId-win-6KLLGOI4.js 1.72 kB 0 B
./bundle/memoryDiscovery-SJ7P6RCN.js 980 B 0 B
./bundle/multipart-parser-KPBZEGQU.js 11.7 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/client/main.js 222 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/src/_client-assets.js 229 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/src/index.js 13.4 kB 0 B
./bundle/node_modules/@google/gemini-cli-devtools/dist/src/types.js 132 B 0 B
./bundle/sandbox-macos-permissive-open.sb 890 B 0 B
./bundle/sandbox-macos-permissive-proxied.sb 1.31 kB 0 B
./bundle/sandbox-macos-restrictive-open.sb 3.36 kB 0 B
./bundle/sandbox-macos-restrictive-proxied.sb 3.56 kB 0 B
./bundle/sandbox-macos-strict-open.sb 4.82 kB 0 B
./bundle/sandbox-macos-strict-proxied.sb 5.02 kB 0 B
./bundle/src-QVCVGIUX.js 47 kB 0 B
./bundle/start-TQWIPHRN.js 0 B -652 B (removed) 🏆
./bundle/tree-sitter-7U6MW5PS.js 274 kB 0 B
./bundle/tree-sitter-bash-34ZGLXVX.js 1.84 MB 0 B
./bundle/cleanup-IBGESHAO.js 932 B +932 B (new file) 🆕
./bundle/start-NMMQUZYE.js 652 B +652 B (new file) 🆕

compressed-size-action

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the GitHub Actions for creating pull requests and publishing releases by configuring the Git remote URL with an access token. However, the review feedback identifies a security risk where using git remote set-url persists credentials in the .git/config file on disk. It is recommended to either pass the authenticated URL directly to specific Git commands or use the GitHub CLI as a credential helper to maintain security hardening and avoid credential leakage.

Comment thread .github/actions/create-pull-request/action.yml Outdated
Comment thread .github/actions/publish-release/action.yml Outdated
Comment thread .github/workflows/release-promote.yml Outdated
Comment thread .github/workflows/release-rollback.yml Outdated
@scidomino scidomino enabled auto-merge May 12, 2026 22:15
@scidomino scidomino disabled auto-merge May 12, 2026 22:15
@scidomino scidomino merged commit 022e8ba into main May 12, 2026
24 of 26 checks passed
@scidomino scidomino deleted the tomm_release branch May 12, 2026 22:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants