-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for private submodules of private superprojects #924
Comments
I also have been trying to do the same thing and haven't figured it out. Either there is a way that I am just missing or this hasn't been implemented yet. I openned a discussion here. #928 |
Relates to #973 |
Any updates on this? |
I am also having the same error. Any update on this? |
I have Getting
Anybody knows how to solve? |
@carlspring @segunjkf @plakhin You can use
It works fine. |
See my solution here: #928 (reply in thread) |
Hi, I have noticed that this GitHub action supports checking out git submodules. I have also noticed that it supports configuring a private SSH key for accessing the repositories that are supposed to be checked out.
However, it seems like in such a scenario it is currently impossible to use only one SSH key that has access to a private submodule but does not have access to the superproject (the repository it is embedded in).
Consider a scenario where a private GitHub repository
org/A
has a private GitHub repositoryorg/B
as a submodule.User creates a Deploy key for
org/B
. And they attempt to use it in a workflow withinorg/A
for checking out theorg/B
submodule via this action. I am unsure how to achieve that.When the SSH key is not set up, then checkout of
org/A
succeeds. But checkout oforg/B
fails because the workflow runs on repositoryorg/A
and there is no private key for accessingorg/B
.If the SSH key is set up to the Deploy key of
org/B
, then the checkout oforg/B
might succeed. But the checkout oforg/A
fails due to the mentioned SSH key. It seems like it is used to check out all GitHub repositories, including the repository on which the workflow runs. And the configured Deploy key fororg/B
does not have access toorg/A
.Is there a way to configure this GitHub action to only use the provided SSH key to check out repositories that are different than the repository where the workflow runs? I would ideally like to avoid creating another Deploy key for
org/A
and then use it within a workflow on the same repository.The SSH keys I use as the Deploy keys already use the comment format
[email protected]:owner/repo.git
that is recommended by the webfactory/ssh-agent action. But it seems to have no effect within thecheckout
action.The text was updated successfully, but these errors were encountered: