Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update token used for scorecard #141

Merged

Conversation

mhutchinson
Copy link
Contributor

This was previously using a github secret that was per-repo. I've switched it over to an org-level secret, which should allow us to avoid copying and pasting the secret around a number of times. Added a note that we should switch over to branch protection rulesets instead, which should mean that this read permission isn't needed at all.

Motivation is that the original token is expiring within the week.

@mhutchinson mhutchinson requested a review from a team as a code owner August 7, 2024 09:36
@mhutchinson mhutchinson requested review from phbnf and patflynn August 7, 2024 09:36
@codecov-commenter
Copy link

codecov-commenter commented Aug 7, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 76.47%. Comparing base (fa00c16) to head (5f96d33).
Report is 57 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #141      +/-   ##
==========================================
- Coverage   82.57%   76.47%   -6.11%     
==========================================
  Files           5        6       +1     
  Lines         241      323      +82     
==========================================
+ Hits          199      247      +48     
- Misses         30       45      +15     
- Partials       12       31      +19     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@mhutchinson mhutchinson force-pushed the scorecard-updateToken branch from 018d7b2 to 17e8dfc Compare August 7, 2024 09:41
This was previously using a github secret that was per-repo. I've switched it over to an org-level secret, which should allow us to avoid copying and pasting the secret around a number of times. Added a note that we should switch over to branch protection rulesets instead, which should mean that this read permission isn't needed at all.

Motivation is that the original token is expiring within the week.
@mhutchinson mhutchinson force-pushed the scorecard-updateToken branch from 17e8dfc to 5f96d33 Compare August 7, 2024 09:42
@mhutchinson mhutchinson merged commit ea4c812 into transparency-dev:main Aug 7, 2024
8 checks passed
@mhutchinson mhutchinson deleted the scorecard-updateToken branch August 7, 2024 10:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants