question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Dependabot latest change renders this action unusable for public repos

See original GitHub issue

https://github.blog/changelog/2021-02-19-github-actions-workflows-triggered-by-dependabot-prs-will-run-with-read-only-permissions/

Starting March 1st, 2021 workflow runs that are triggered by a pull request from Dependabot will be treated as if they were opened from a repository fork. This means they will receive a read-only GITHUB_TOKEN and will not have access to any secrets available in the repository. This will cause any workflows that attempt to write to the repository to fail.

If your workflow needs to have a write token, you can use the pull_request_target event; however, this is not viable for public repositories due to security risks

I have not seen any success with pull_request_target simply because no dependabot PRs has landed on my private repos since I changed to using pull_request_target but will update this issue and the README if I can validate them working…

pull_request_target might be acceptable for private repos… but I don’t believe that will be good enough for public ones.

Issue Analytics

  • State:open
  • Created 3 years ago
  • Reactions:8
  • Comments:55 (14 by maintainers)

github_iconTop GitHub Comments

13reactions
ahmadnassricommented, Mar 11, 2021

PSA: I have to start my main work day, which will keep me occupied and away from further trying to debug and address this issue, I appreciate the community’s feedback and if ya’ll keep testing / trying things, would apprciate if you log them in this issue, so that I can circle back to it.

8reactions
steebchencommented, Jun 11, 2021

Also getting this for unknown reasons in private repositories.

EDIT: ah, seems like pull_request_target works. Would be nice to highlight this in the readme

Read more comments on GitHub >

github_iconTop Results From Across the Web

Tag: GitHub - somewhat abstract
Dependabot is a handy tool now owned and incorporated into GitHub that monitors your repositories dependencies and updates them, a chore that many...
Read more >
django - Is it possible to allow dependabot on GitHub to ...
Yes. You can use Github actions to do this. See the following blog post: Setting up Dependabot with GitHub actions to approve and...
Read more >
action-dependabot-auto-merge - Bountysource
Created 1 year ago in ahmadnassri/action-dependabot-auto-merge with 1 ... Dependabot latest change renders this action unusable for public repos $ 0.
Read more >
GitHub's dependabot is causing a ton of "spam" in our ...
1. The lack of a way to view all Dependabot security alerts/security PRs (across repos) in one place. · 2. Dependabot reporting `No...
Read more >
octokit/rest.js
Set the options.auth option to the token in new Octokit(options) . ... The level of permission to grant the access token to manage...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found