-
Notifications
You must be signed in to change notification settings - Fork 144
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not working with PR from fork #25
Comments
Here are 2 commits where I tried to set this up: TYPO3-Documentation/TYPO3CMS-Reference-CoreApi@03f75bf The current name: Backport
on:
pull_request:
types:
- closed
- labeled
jobs:
backport:
runs-on: ubuntu-18.04
name: Backport
steps:
- name: Generate token
id: generate_token
uses: tibdex/github-app-token@v1
with:
app_id: ${{ secrets.BACKPORT_APP_ID }}
private_key: ${{ secrets.BACKPORT_APP_SECRET }}
- name: Backport
uses: tibdex/backport@v1
with:
github_token: ${{ steps.generate_token.outputs.token }} The The result: https://github.com/TYPO3-Documentation/TYPO3CMS-Reference-CoreApi/pull/1552/checks?check_run_id=3825926413
|
Same experience. APP_ID and APP_SECREt_KEY are set on the repo in the organization for me. If that helps at all. |
@tibdex Exactly, that's what I wrote already. ;-) So technically none of this is supposed to work for repositories which are updated by forks? Then this should be written clearly in https://github.com/tibdex/github-app-token and https://github.com/tibdex/backport. |
The issue is not intrisinc to |
tibdex/backport#33 recommends setting up this action job to work around the limitations of the
GITHUB_TOKEN
.However, it seems like the same limitation applies to an app ID and client secret if it is injected via (organisation) secrets:
So, how is this supposed to work exactly?
The text was updated successfully, but these errors were encountered: