Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support building private repos #179

Open
avsm opened this issue May 14, 2022 · 5 comments
Open

support building private repos #179

avsm opened this issue May 14, 2022 · 5 comments
Labels
enhancement New feature or request

Comments

@avsm
Copy link
Member

avsm commented May 14, 2022

Is it possible to plumb through private GitHub repo building using ocluster at the moment?

I tried modifying (a local) ocurrent-deployer with a GitHub app that has access to a private repository. That lets the deployer query the repository, but then the actual build when submitted to a ocluster pool fails to clone the repository.

As far as I can tell, the best way to do that is to pass the GH access token through to the git clone in the clone URL. This probably needs support in ocluster to hide the token from the logs...

@dra27
Copy link
Contributor

dra27 commented May 14, 2022

@tmcgilchrist - had you experimented with this a while back? The major concern - at least for the “main” cluster, is that the trust model for the workers changes as soon as we have them receiving secrets.

@tmcgilchrist
Copy link
Member

tmcgilchrist commented May 15, 2022 via email

@avsm
Copy link
Member Author

avsm commented May 15, 2022

My usecase is pretty straightforward: got a bunch of private repos that need building and deploying. The builds are pushed to the github container registry (which has the advantage that the access token used can both clone the repository and push to the ghcr.io container registry with the same access privs as the source repository).

The deployer works great; the only hitch is that I can't farm out the builds to an ocluster instance.

@tmcgilchrist
Copy link
Member

If you trust the ocluster instance then we could just plumb through the right information and get it working, however that is somewhat of a hack but perhaps is enough in this case. For my original use case, I just wanted to be able to build private GitHub repos and didn't care too much about whether the source was available on the cluster. The only security was not having the repo as a public repo on GitHub.

A better solution would be making the private git repos truely private, maybe by having a private git cache store per GH user or some other segregation of the repositories. We haven't really investigated this area of the design space.

@avsm
Copy link
Member Author

avsm commented May 21, 2022

Agreed that plumbing through the auth info would be enough in the first instance. Can do more sophisticated ocluster reservation later.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants