-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Code coverage uploads sometimes fail #148
Comments
Right, I saw this yesterday. I could not find a definitive answer but it might be resolved by using a project specific token instead of tokenless authentication. To implement it, somebody in |
Thanks, I added the repository secret. |
This is an attempt at fixing 503 errors which occur sometimes during coverage uploads google#148.
I merged the PR for using the new token. I am not sure if it will resolve this issue. Let's monitor for several weeks and can resolve this if the pipeline is stable. |
Sounds good, thanks for looking into this so quickly! |
There was another failure. The error message is
According to this article, adding the token should improve the situation but will not guarantee 100% success rate. Researching this further, I found this comment which implies that tokens/secrets are not available for PR runners from forked repositories to prevent abuse/secret theft. Very surprising. From the last link, this article describes a way to use secrets. It is a bit verbose and requires creation of a separate workflow but doable. I will try to implement it this week. |
Oh nice! I think this could also be used to comment on Comprehensive Rust PRs with timing information like @djmitche tried to do recently: google/comprehensive-rust#1576. |
This addresses google#148. Codecov coverage report upload are not stable. The suggested solution is to use per project secret. This project have that enabled but it is not usable for pull request workflows triggered from forks. Due to Github's security restrictions, only PRs based on local branches have access to secrets. This PR amends the existing workflow by not pushing the reports to Codecov. The reports are instead uploaded to Github artifacts. The artifacts are stored for 90 days by default. Then a new workflow is introduced which executes after every successful execution of the existing workflow. It downloads the artifact and uploads the report to Codecov using the security token.
This addresses google#148. Codecov coverage report upload are not stable. The suggested solution is to use per project secret. This project have that enabled but it is not usable for pull request workflows triggered from forks. Due to Github's security restrictions, only PRs based on local branches have access to secrets. This PR amends the existing workflow by not pushing the reports to Codecov. The reports are instead uploaded to Github artifacts. The artifacts are stored for 90 days by default. Then a new workflow is introduced which executes after every successful execution of the existing workflow. It downloads the artifact and uploads the report to Codecov using the security token.
This addresses google#148. Codecov coverage report upload are not stable. The suggested solution is to use per project secret. This project have that enabled but it is not usable for pull request workflows triggered from forks. Due to Github's security restrictions, only PRs based on local branches have access to secrets. This PR amends the existing workflow by not pushing the reports to Codecov. The reports are instead uploaded to Github artifacts (the artifacts are stored for 90 days by default). Then a new workflow is introduced which executes after every successful execution of the existing workflow. It downloads the artifact and uploads the report to Codecov using the security token.
This addresses google#148. Codecov coverage report uploads are not stable. The suggested solution is to use per project secret. This project have that enabled but it is not usable for pull request workflows triggered from forks. Due to Github's security restrictions, only PRs based on local branches have access to secrets. This PR amends the existing workflow by not pushing the reports to Codecov. The reports are instead uploaded to Github artifacts (the artifacts are stored for 90 days by default). Then a new workflow is introduced which executes after every successful execution of the existing workflow. It downloads the artifact and uploads the report to Codecov using the security token.
This addresses google#148. Codecov coverage report uploads are not stable. The suggested solution is to use per project secret. This project have that enabled but it is not usable for pull request workflows triggered from forks. Due to Github's security restrictions, only PRs based on local branches have access to secrets. This PR amends the existing workflow by not pushing the reports to Codecov. The reports are instead uploaded to Github artifacts (the artifacts are stored for 90 days by default). Then a new workflow is introduced which executes after every successful execution of the existing workflow. It downloads the artifact and uploads the report to Codecov using the security token.
The PR I merged does not seem to work as expected - codecov reports are executed against the main branch instead of PR branch. Might be something wrong with env vars or I did not copy them properly. It was working for me on my own fork yesterday. I will take another look at this later today. |
Hi @kdarkhan, I've seen a few Codecov uploads fail. An example is in this run. The error is
Do you have any idea what could trigger this?
The text was updated successfully, but these errors were encountered: