Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add comment to PR after benchmark runs #781

Closed
wants to merge 1 commit into from

Conversation

tjungblu
Copy link
Contributor

No description provided.

@tjungblu
Copy link
Contributor Author

tjungblu commented Jun 28, 2024

it seems I can't request the WRITE for issues/pullrequests from our workflow permissions:

GITHUB_TOKEN Permissions
  Actions: read
  Attestations: read
  Checks: read
  Contents: read
  Deployments: read
  Discussions: read
  Issues: read
  Metadata: read
  Packages: read
  Pages: read
  PullRequests: read
  RepositoryProjects: read
  SecurityEvents: read
  Statuses: read

even when I request "write-all".
see https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions

is there a repo/org setting that we need to tweak for this?
edit: seems there's a policy for this

https://docs.github.com/en/enterprise-cloud@latest/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-github-actions-in-your-enterprise#enforcing-a-policy-for-workflow-permissions-in-your-enterprise

@ivanvc
Copy link
Member

ivanvc commented Jun 29, 2024

It sounds to me like it's a similar issue from the discussion from this comment https://github.com/etcd-io/website/pull/845#issuecomment-2168851307https://github.com/etcd-io/website/pull/845#issuecomment-2168851307.

James suggested setting the org-level permissions could be a dead end in that case. In that case, maybe the only option would be to do it through a prow plugin, but the investment to build it is bigger.

@tjungblu
Copy link
Contributor Author

tjungblu commented Jul 1, 2024

@jmhbnz can we raise this again with the right people? It seems a bit ridiculous to not have this set on an org level...

@jmhbnz
Copy link
Member

jmhbnz commented Jul 1, 2024

@jmhbnz can we raise this again with the right people? It seems a bit ridiculous to not have this set on an org level...

Raised discussion with k8s #github-management here: https://kubernetes.slack.com/archives/C01672LSZL0/p1719825480464109

@ivanvc
Copy link
Member

ivanvc commented Jul 12, 2024

I wonder if we're missing something, as it seems like our measure-testgrid-flakiness can create new issues(?)

Refer to: https://github.com/etcd-io/etcd/blob/1bff41630e5ccfab638d01f55e3636c22c4bc36f/.github/workflows/measure-testgrid-flakiness.yaml

Otherwise, based on the response from #github-management, it seems like we hit a dead end.

@ahrtr
Copy link
Member

ahrtr commented Jul 22, 2024

The existing behavior is already good enough: the benchmark workflow will fail if there is any unexpected performance reduce. We don't have to necessarily spend too much effort to automatically add a comment.

@tjungblu
Copy link
Contributor Author

let's close, we can dig this up with Prow once more

@tjungblu tjungblu closed this Jul 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

Successfully merging this pull request may close these issues.

5 participants