I'm testing YETUS-994 with a token with repo:status write access,
however, Yetus couldn't update the commit status as expected.
https://github.com/apache/hadoop/pull/2348

> Also discovered this morning that Jenkins doesn't always set the GIT_COMMIT 
> env variable which will mess things up too.

Is this the root cause of the failure?

> Maybe test-patch should complain if it has a token that lacks this permission?

AFAIK, GitHub returns 404 if the token lacks the permission, so
test-patch cannot complain about the permission of the token.

-Akira

On Tue, Sep 29, 2020 at 4:20 AM Allen Wittenauer
<a...@effectivemachines.com.invalid> wrote:
>
>
>
> > On Sep 28, 2020, at 12:08 PM, Nick Dimiduk <ndimi...@apache.org> wrote:
> >
> > Maybe test-patch should complain if it has a token that lacks this
> > permission?
>
>         I actually had some code to do that but yanked it.  On a few trial 
> runs with GitHub Actions when using the built-in token, /authorize wasn't 
> actually setting the X-OAuth-Header that tells what scopes that token has. :( 
> [This feels like a bug in GitHub but I want to verify it with a few different 
> scenarios--esp Jenkins using a GitHub App--before I pester GitHub about it.]
>
>         I do know that (usually) Jenkins itself complains about it because it 
> will also try to update repo status.
>
>         Also discovered this morning that Jenkins doesn't always set the 
> GIT_COMMIT env variable which will mess things up too.  That's easier to 
> fix/workaround though.
>
>

Reply via email to