Closed
Bug 1416054
Opened 7 years ago
Closed 7 years ago
Assess use of external addon Renovate in Mozilla's GitHub organization 'mozilla'
Categories
(mozilla.org :: Github: Administration, task)
mozilla.org
Github: Administration
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: emorley, Assigned: hwine)
References
Details
I want to use the Renovate addon in 'mozilla' for the following reasons:
So we can use it to keep javascript NPM dependencies up to date, like we use https://pyup.io to keep Python deps up to date. It's a superior alternative to Greenkeeper, since it has non-hacky support for Yarn lockfiles.
Below are my answers to your stock questions:
** Which repositories do you want to have access? (all or list)
https://github.com/mozilla/treeherder
** Are any of those repositories private?
No
** Provide link to vendor's description of permissions needed and why
https://renovateapp.com/
https://renovateapp.com/docs/all-other/data-security
Install here:
https://github.com/apps/renovate/installations/new
Many thanks!
Assignee | ||
Comment 1•7 years ago
|
||
[Being a bit verbose here, as we're trying to clarify our decision process.]
Since this is implemented as a GitHub App, there is no risk to other repositories in the organization.
I'm a bit surprised it requires code write access (I would have expected everything to be done via PRs). But if the repository admin is willing to assume that risk, that's not an org issue.
:gene - any concerns before we flip the switch?
Flags: needinfo?(gene)
Reporter | ||
Comment 2•7 years ago
|
||
(In reply to Hal Wine [:hwine] (use NI) from comment #1)
> I'm a bit surprised it requires code write access (I would have expected
> everything to be done via PRs).
If it's anything like https://pyup.io that we're already using, it will create branches for the PRs on the upstream repo rather than a fork (presumably to reduce the amount of state the tool has to track), which requires code write access.
Assignee | ||
Comment 3•7 years ago
|
||
TIL - makes sense. And I guess it would make for a huge account on GitHub to hold all those forks. With co-mingled private repos. That's ugly, too.
Comment 4•7 years ago
|
||
Any updates or ETA on this? I'd like to use this in the mozilla-services organization as well, but want to wait until we approve use in this bug here.
Assignee | ||
Comment 5•7 years ago
|
||
(In reply to Michael Kelly [:mkelly,:Osmose] from comment #4)
> Any updates or ETA on this? I'd like to use this in the mozilla-services
> organization as well, but want to wait until we approve use in this bug here.
Mozilla-services is handled by a different team -- go ahead and make the request there.
Assignee | ||
Comment 6•7 years ago
|
||
This has been enabled on the 'treeherder' repository.
(In reply to Hal Wine [:hwine] (use NI) from comment #1)
> [Being a bit verbose here, as we're trying to clarify our decision process.]
Off bug discussions have arrived at the decision that GitHub apps are up to each repository's admin team to decide on whether the risk is worth the reward.
I.e. any requests from a repo admin will be implemented.
> :gene - any concerns before we flip the switch?
We discussed offline.
Assignee: nobody → hwine
Flags: needinfo?(gene)
Assignee | ||
Updated•7 years ago
|
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Reporter | ||
Comment 7•7 years ago
|
||
Thank you :-)
Reporter | ||
Updated•7 years ago
|
Reporter | ||
Comment 8•7 years ago
|
||
In case this is of interest to anyone - there is also now another variant of the Renovate app, that creates PRs from it's own fork of repositories, so needs fewer permissions:
https://renovateapp.com/docs/all-other/data-security#github-permissions
https://github.com/apps/forking-renovate
...though it means:
(a) forgoing the auto-merge feature (should people want to use it for eg low risk linter updates that pass CI)
(b) making it harder to push your own changes to the PR, should a breaking version update need in-code changes for compatibility (even with the "allow maintainers to make edits" GitHub feature, this workflow is a pain given it requires HTTPS auth not SSH and manually creating remotes etc)
You need to log in
before you can comment on or make changes to this bug.
Description
•