ci: Enhance CI reusability #40
release-drafter.yml
on: pull_request
update_release_draft
5s
Ensure Proper Pull Request Labels
2s
Annotations
4 errors and 4 warnings
update_release_draft
Resource not accessible by integration
{
name: 'HttpError',
id: '13420992759',
status: 403,
response: {
url: 'https://api.github.com/repos/sandialabs/firewheel/issues/66/labels',
status: 403,
headers: {
'access-control-allow-origin': '*',
'access-control-expose-headers': 'ETag, Link, Location, Retry-After, X-GitHub-OTP, X-RateLimit-Limit, X-RateLimit-Remaining, X-RateLimit-Used, X-RateLimit-Resource, X-RateLimit-Reset, X-OAuth-Scopes, X-Accepted-OAuth-Scopes, X-Poll-Interval, X-GitHub-Media-Type, X-GitHub-SSO, X-GitHub-Request-Id, Deprecation, Sunset',
'content-encoding': 'gzip',
'content-security-policy': "default-src 'none'",
'content-type': 'application/json; charset=utf-8',
date: 'Wed, 19 Feb 2025 19:42:17 GMT',
'referrer-policy': 'origin-when-cross-origin, strict-origin-when-cross-origin',
server: 'github.com',
'strict-transport-security': 'max-age=31536000; includeSubdomains; preload',
'transfer-encoding': 'chunked',
vary: 'Accept-Encoding, Accept, X-Requested-With',
'x-accepted-github-permissions': 'issues=write; pull_requests=write',
'x-content-type-options': 'nosniff',
'x-frame-options': 'deny',
'x-github-api-version-selected': '2022-11-28',
'x-github-media-type': 'github.v3; format=json',
'x-github-request-id': '410A:28B284:BB2136:177D131:67B63419',
'x-ratelimit-limit': '5000',
'x-ratelimit-remaining': '4985',
'x-ratelimit-reset': '1739997608',
'x-ratelimit-resource': 'core',
'x-ratelimit-used': '15',
'x-xss-protection': '0'
},
data: {
message: 'Resource not accessible by integration',
documentation_url: 'https://docs.github.com/rest/issues/labels#add-labels-to-an-issue',
status: '403'
}
},
request: {
method: 'POST',
url: 'https://api.github.com/repos/sandialabs/firewheel/issues/66/labels',
headers: {
accept: 'application/vnd.github.v3+json',
'user-agent': 'probot/12.4.0 octokit-core.js/3.6.0 Node.js/20.18.0 (linux; x64)',
'x-github-delivery': '13420992759',
authorization: 'token [REDACTED]',
'content-type': 'application/json; charset=utf-8'
},
body: '{"labels":["documentation"]}',
request: {}
},
event: {
id: '13420992759',
name: 'pull_request',
payload: {
action: 'edited',
changes: {
body: {
from: 'CI pipelines for model component repos currently cannot access the composite actions that are called in the reusable workflows for this repo. It seems that this is because [GitHub actions defined in a called repo (e.g., `sandialabs/firewheel`) are executed as if they were defined in the caller repo (e.g., the MC repo)](https://docs.github.com/en/actions/sharing-automations/reusing-workflows#overview).\r\n' +
'\r\n' +
"An example of this failing behavior can be found in the recent CI pipeline for the `firewheel_repo_dns` repo](https://github.com/sandialabs/firewheel_repo_dns/actions/runs/13420030343/job/37490153500#step:4:1). That repo cannot find `.github/actions/prepare-tox` because it's looking for it in the `sandialabs/firewheel_repo_dns` repository rather than `sandialabs/firewheel` where it actually lives.\r\n" +
'\r\n' +
"I was hoping there might be a way to tell the caller repo to look for things in the called repo, but [the closest related info I've found so far is an issue suggesting this might not be possible](https://github.com/orgs/community/discussions/66094). There are many suggestions there, including those for choosing specific branches, but I think that it probably just makes the most sense for us to use the full path to the action (e.g., `sandialabs/firewheel/.github/actions/prepare-tox`) in our workflows until we need a more sophisticated system.\r\n" +
'\r\n' +
'I quote the link to that issue here as a place to go looking if we eventually need a more complete strategy, such as a new repo only containing actions and similar to the CodeQL Ac
|
update_release_draft
Resource not accessible by integration
{
name: 'HttpError',
id: '13420992759',
status: 403,
response: {
url: 'https://api.github.com/repos/sandialabs/firewheel/releases',
status: 403,
headers: {
'access-control-allow-origin': '*',
'access-control-expose-headers': 'ETag, Link, Location, Retry-After, X-GitHub-OTP, X-RateLimit-Limit, X-RateLimit-Remaining, X-RateLimit-Used, X-RateLimit-Resource, X-RateLimit-Reset, X-OAuth-Scopes, X-Accepted-OAuth-Scopes, X-Poll-Interval, X-GitHub-Media-Type, X-GitHub-SSO, X-GitHub-Request-Id, Deprecation, Sunset',
'content-encoding': 'gzip',
'content-security-policy': "default-src 'none'",
'content-type': 'application/json; charset=utf-8',
date: 'Wed, 19 Feb 2025 19:42:19 GMT',
'referrer-policy': 'origin-when-cross-origin, strict-origin-when-cross-origin',
server: 'github.com',
'strict-transport-security': 'max-age=31536000; includeSubdomains; preload',
'transfer-encoding': 'chunked',
vary: 'Accept-Encoding, Accept, X-Requested-With',
'x-accepted-github-permissions': 'contents=write; contents=write,workflows=write',
'x-content-type-options': 'nosniff',
'x-frame-options': 'deny',
'x-github-api-version-selected': '2022-11-28',
'x-github-media-type': 'github.v3; format=json',
'x-github-request-id': '410A:28B284:BB2936:177E14E:67B6341A',
'x-ratelimit-limit': '5000',
'x-ratelimit-remaining': '4984',
'x-ratelimit-reset': '1739997608',
'x-ratelimit-resource': 'core',
'x-ratelimit-used': '16',
'x-xss-protection': '0'
},
data: {
message: 'Resource not accessible by integration',
documentation_url: 'https://docs.github.com/rest/releases/releases#create-a-release',
status: '403'
}
},
request: {
method: 'POST',
url: 'https://api.github.com/repos/sandialabs/firewheel/releases',
headers: {
accept: 'application/vnd.github.v3+json',
'user-agent': 'probot/12.4.0 octokit-core.js/3.6.0 Node.js/20.18.0 (linux; x64)',
'x-github-delivery': '13420992759',
authorization: 'token [REDACTED]',
'content-type': 'application/json; charset=utf-8'
},
body: '{"target_commitish":"main","name":"v2.8.1","tag_name":"v2.8.1","body":"* No changes\\n\\n**Full Changelog**: https://github.com/sandialabs/firewheel/compare/v2.8.0...v2.8.1\\n","draft":true,"prerelease":false,"make_latest":"true"}',
request: { retryCount: 1 }
},
event: {
id: '13420992759',
name: 'pull_request',
payload: {
action: 'edited',
changes: {
body: {
from: 'CI pipelines for model component repos currently cannot access the composite actions that are called in the reusable workflows for this repo. It seems that this is because [GitHub actions defined in a called repo (e.g., `sandialabs/firewheel`) are executed as if they were defined in the caller repo (e.g., the MC repo)](https://docs.github.com/en/actions/sharing-automations/reusing-workflows#overview).\r\n' +
'\r\n' +
"An example of this failing behavior can be found in the recent CI pipeline for the `firewheel_repo_dns` repo](https://github.com/sandialabs/firewheel_repo_dns/actions/runs/13420030343/job/37490153500#step:4:1). That repo cannot find `.github/actions/prepare-tox` because it's looking for it in the `sandialabs/firewheel_repo_dns` repository rather than `sandialabs/firewheel` where it actually lives.\r\n" +
'\r\n' +
"I was hoping there might be a way to tell the caller repo to look for things in the called repo, but [the closest related info I've found so far is an issue suggesting this might not be possible](https://github.com/orgs/community/discussions/66094). There are many suggestions there, including those for choosing specific branches, but I think that it probably just makes the most sense for us to use the full path to the action (e.g., `sandialabs/firewheel/.github/actions/prepare-tox`) in our workflows until we need a more sophisticated system.\r\n" +
|
update_release_draft
HttpError: Resource not accessible by integration
at /home/runner/work/_actions/release-drafter/release-drafter/v6/dist/index.js:7146:21
at process.processTicksAndRejections (node:internal/process/task_queues:95:5)
at async Job.doExecute (/home/runner/work/_actions/release-drafter/release-drafter/v6/dist/index.js:61885:18)
HttpError: Resource not accessible by integration
at /home/runner/work/_actions/release-drafter/release-drafter/v6/dist/index.js:7146:21
at process.processTicksAndRejections (node:internal/process/task_queues:95:5)
at async Job.doExecute (/home/runner/work/_actions/release-drafter/release-drafter/v6/dist/index.js:61885:18)
{
name: 'AggregateError',
event: {
id: '13420992759',
name: 'pull_request',
payload: {
action: 'edited',
changes: {
body: {
from: 'CI pipelines for model component repos currently cannot access the composite actions that are called in the reusable workflows for this repo. It seems that this is because [GitHub actions defined in a called repo (e.g., `sandialabs/firewheel`) are executed as if they were defined in the caller repo (e.g., the MC repo)](https://docs.github.com/en/actions/sharing-automations/reusing-workflows#overview).\r\n' +
'\r\n' +
"An example of this failing behavior can be found in the recent CI pipeline for the `firewheel_repo_dns` repo](https://github.com/sandialabs/firewheel_repo_dns/actions/runs/13420030343/job/37490153500#step:4:1). That repo cannot find `.github/actions/prepare-tox` because it's looking for it in the `sandialabs/firewheel_repo_dns` repository rather than `sandialabs/firewheel` where it actually lives.\r\n" +
'\r\n' +
"I was hoping there might be a way to tell the caller repo to look for things in the called repo, but [the closest related info I've found so far is an issue suggesting this might not be possible](https://github.com/orgs/community/discussions/66094). There are many suggestions there, including those for choosing specific branches, but I think that it probably just makes the most sense for us to use the full path to the action (e.g., `sandialabs/firewheel/.github/actions/prepare-tox`) in our workflows until we need a more sophisticated system.\r\n" +
'\r\n' +
'I quote the link to that issue here as a place to go looking if we eventually need a more complete strategy, such as a new repo only containing actions and similar to the CodeQL Action repo that is linked there. '
}
},
number: 66,
organization: {
avatar_url: 'https://avatars.githubusercontent.com/u/4993680?v=4',
description: 'Exceptional service in the national interest.',
events_url: 'https://api.github.com/orgs/sandialabs/events',
hooks_url: 'https://api.github.com/orgs/sandialabs/hooks',
id: 4993680,
issues_url: 'https://api.github.com/orgs/sandialabs/issues',
login: 'sandialabs',
members_url: 'https://api.github.com/orgs/sandialabs/members{/member}',
node_id: 'MDEyOk9yZ2FuaXphdGlvbjQ5OTM2ODA=',
public_members_url: 'https://api.github.com/orgs/sandialabs/public_members{/member}',
repos_url: 'https://api.github.com/orgs/sandialabs/repos',
url: 'https://api.github.com/orgs/sandialabs'
},
pull_request: {
_links: {
comments: {
href: 'https://api.github.com/repos/sandialabs/firewheel/issues/66/comments'
},
commits: {
href: 'https://api.github.com/repos/sandialabs/firewheel/pulls/66/commits'
},
html: { href: 'https://github.com/sandialabs/firewheel/pull/66' },
issue: {
href: 'https://api.github.com/repos/sandialabs/firewheel/issues/66'
},
review_comment: {
href: 'https://api.github.com/repos/sandialabs/firewheel/pulls/comments{/number}'
},
review_comments: {
href: 'https://api.github.com/repos/sandialabs/firewheel/pul
|
Ensure Proper Pull Request Labels
No commit found for SHA: reusable-ci
|
update_release_draft
"pull_request_target.opened" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
update_release_draft
"pull_request_target.reopened" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
update_release_draft
"pull_request_target.synchronize" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|
update_release_draft
"pull_request_target.edited" is not a known webhook name (https://developer.github.com/v3/activity/events/types/)
|