-
Notifications
You must be signed in to change notification settings - Fork 329
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change of behavior "Error: Resource not accessible by integration" #572
Comments
Thank you for your report! I wonder, could this be related to the following issue? #464 It looks to be the same error. Could it be that the permissions on your repo were changed recently? |
I'm getting the same error, but only for commits where Dependabot merged one of its PRs. These are showing the following error:
The highlighted part does not really help, because this affects pushes to |
@AlCalzone, check out the "analysis still failing on the default branch" section of #416. Apologies this information is not yet in the proper troubleshooting docs but that change is in progress and we'll update the error message to point there when done. |
@robertbrignull Unfortunately this is not a solution for me
I'm using an action to determine whether dependabot PRs should be merged automatically, based on the dependency type and version bump. The built-in auto-merge functionality is simply not granular enough for this. That action is using the |
I'm sorry it's a bit of a pain. It's an annoying consequence of various bits of valid behaviour. The core behaviour to understand is that code scanning analysis won't work on commits authored solely by dependabot, except when analysing a pull request. I hope you'll be able to jig your CI to prevent this case. Unfortunately the only alternative would be to manually restart any analyses that fail because of this reason, as they'll work on the second try because a non-dependabot actor has triggered them. |
Would it be possible to add a condition to the default CodeQL job to skip these impossible-to-build commits? Something like |
Uploading SARIF files started failing for me about 24 hours ago. Here is an example of the failure. Here and here are examples of the container uploading the SARIF file successfully a few days ago. I didn't touch the SARIF part, but I did change how I authenticate with AWS. I switched from using GitHub Secrets to using the Open ID connect and added the Could the |
Answering my own question:
|
@martinschaef you are correct that you have to configure the The minimal permissions that should be needed for a workflow to use the CodeQL Action are mentioned in the example workflow at https://github.com/github/codeql-action#usage: To address some earlier questions in the thread, Dependabot runs will now respect the |
Looking at
I think either |
There are two relevant mechanisms for masking secrets:
|
As long as the CodeQL Action uses the library it's probably safe to say that it logs something with Octokit.js on errors at least and depending on the version of the library it could be anything unless the library is pinned to particular SHAs and gets reviewed when it's updated (which almost never happens)
I don't think they are always redacted and that's probably why https://docs.github.com/en/actions/security-guides/encrypted-secrets#accessing-your-secrets says explicitly
I think it would be better if the action would fail silently like, for example, labeler, which fails with something like
https://github.com/evverx/systemd/runs/4199356475?check_suite_focus=true |
I have this in my YAML file from private repo: permissions:
id-token: write
actions: read
contents: read
pull-requests: read
security-events: write But i still have the error:
Any solution? |
@WaKeMaTTa Make sure to enable advanced security on your repository. The docs are here. If you are still seeing problems, please raise a new issue and include the relevant parts of the workflow. |
@aeisenberg I don't have this option in our private repo: |
Please take a look at Enabling Advanced Security Features. You will need an enterprise account to enable Advanced Security on private repositories. |
sarifファイルのアップロードにはsecurity-eventsのwrite権限が必要 - github/codeql-action#572 (comment) - https://efcl.info/2021/07/21/update-github-actions-permissions/
Hi, Kindly enable advance security using this Advance Github Security |
Fwiw, it is possible to make things friendlier to users... I intend to include sarif handling in check-spelling with code like this: Alternatively, if you want to actually take a full leap and just check to see if you go splat, you can do something like this: For an expected error, it's really cruel to force users to read through an http header dump instead of providing the information they need in an easy to digest format. I'd be willing to private a PR of either form to this repository if someone expresses a willingness to review it (sadly the actions/labeler repository appears to be a 👻 town, so I'm not going to allocate resources for things that are unlikely to be reviewed). |
It started to happen two days ago without any relevant change from our side in all PRs:
rizinorg/rizin#1222
Here is our CodeQL action configuration:
https://github.com/rizinorg/rizin/blob/dev/.github/workflows/code-analysis.yml
The error message is the following:
https://github.com/rizinorg/rizin/pull/1222/checks?check_run_id=2855028592#step:4:1
The text was updated successfully, but these errors were encountered: