Replies: 2 comments
-
When I provide a token for the checkout auth, I am able to clone the repo so it seems that the runners only have permission to clone the repo they were triggered from. Maybe someone can confirm, or comment if there is a workaround to enable runners to check out other repos without providing an auth token? |
Beta Was this translation helpful? Give feedback.
-
That's intended behaviour. Furthermore, it's not a limitation of the GitHub action runners deployed in Kubernetes but a general (security based) limitation by the GitHub actions itself. You can read about it in the documentation, in short:
If you want to access the contents of another repository (so, action is running in repo A and you want to checkout repo B), you either have to use a personal access token or, which is preferred security-wise, set up a GitHub App and then configure that to be able to access the other repository. For information on using a GitHub App for a similar use case, check out this archived docs link and this action. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello I'm trying to check out a repo "my-custom-action" on GHE on a runner in a runner group with the checkout action. The workflow runs in a different "workflow-repo" where I want to use this action.
The runner group has permission to access these two repositories. Can this still be a permission issue since the workflow is started in another repo?
Note, I'm not giving any additional auth to the checkout:
Beta Was this translation helpful? Give feedback.
All reactions