-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checkout another private repo from the same Organization does not work on enterprise server #1382
Comments
I have also tried to add ref and ssh-known-hosts:
Unfortunately with the same results. |
Some additional Info: I just tested this with a PAT and with that it works nicely. I would however really like to avoid using a PAT. |
Any solution for this without using a PAT? |
Just a note that my organization would not function without the PAT workaround, which has necessitated creating a fake user so that its permissions can be narrowly scoped, despite most of our repositories being "internal" visibility (and hence declared as readable to all humans and bots). Golang relies on being able to clone repositories. Python relies heavily on it (and GitHub will never support Python with GitHub Packages, so Python is stuck with repository cloning). JavaScript may rely on it in some cases. Our CI workflows for all of these languages require a PAT as a workaround. We're stuck with an endless stream of workarounds and tweaks, wasting our own time and GitHub's bandwidth, and being subjected to API call rate limits and clone rate limits, all because we can't rely on internal repositories to do what they are supposed to do and be readable to every auth principle in the organization. Please give us a way out of this madness! |
This ticket is also giving me a headache. I would really expect that private repositories can be used within the same organization without PATs and other workarounds... |
I agree. But at the same time I think fine grained PAT's are now an okay solution. At least from a security point of view: |
Github, this is ridiculous. |
can this be fixed? having PAT is not a scalable solution |
Is there any progress on this issue? Is there a proposal for an official workaround from GitHub? |
Would also find it really useful if we could checkout repo's in the same organisation without a PAT! |
I am using this official Github actions package to checkout another private repo from the same organisation. |
@arunnambissan this is not any better than using a PAT. we need a solution that avoids the need for periodic rotation and is not tied to an individual |
@johanneszellinger could you please share how you solved it with a PAT? Thanks! |
Any updates? |
what a silly limitation |
Hey @christianbaumann , sorry for the late reply. |
I met same issue. Any solution by now? |
Would like to see this solved to! |
I have two repos
A
andB
in the same organization on our self-hosted Github enterprise instance. RepoB
is a dependency for the code in repoA
, so I want to create a workflow in repoA
, where both repos are checked out.Here is the workflow I tried so far:
ssh-keygen -t ed25519 -C "myemail@company.com"
.pub
for the public key and one for the private keyB
go to Settings->deploy keys->add deploy key and copy the contents of the public key as the value- In RepoA
go to Settings->Secrets and variables->Actions->New Repository Secret and copy the content of the private key as valueUnfortunately this does not work and I get the following errors:
I am not sure what the issue is here. I have also already tried to set the private key for the ssh agent as described here, but also without success. Any pointers would be much appreciated! The error only appears while checking out repo
B
. Checkout for repoA
works flawlessly. I am actually not sure, why there should be different access rights between the two repos.The text was updated successfully, but these errors were encountered: