-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Basic authentication configuration at the branch level #15
fix: Basic authentication configuration at the branch level #15
Conversation
Please review this, it would be really helpful! |
@sestrella can you please update base branch and I will look to get this merged |
/terratest |
@sestrella tests failing and readme is out of date, can you locally run |
3841159
to
a8230fd
Compare
@kevcube done. Would you mind taking a second look, please? |
/terratest |
@sestrella tests are still failing. It doesn't appear to be related to your PR but if you have time to investigate that would be appreciated. Otherwise I'll check it out when I'm able to. |
@kevcube After taking a closer look at the job log, I found the following relevant information:
I'm wondering if this is related to the fact that the amplify-test2 appears to be transferred from the cloudposse organization to the cloudposse-archives organization. I submitted a commit updating the URL for the repository found in the complete example. |
/terratest |
@kevcube I got a different error this time. Perhaps is related to the permissions associated with the GH token?
|
@sestrella not sure how to proceed with that one. for a shorter debug loop you can try just |
@kevcube I finally made it back to this PR. I made it work by creating a fork of https://github.com/cloudposse-archives/amplify-test2 to which I had write access; the following GH token permissions were required to make the On a side note, according to the official documentation, a token with write access is required to set up a webhook, so my guess is that the token used by the CI lacks the necessary permissions: Reference: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/amplify_app#access_token |
Hi @kevcube, I'm wondering if there is anything else I can do on my end to help get this PR move forward. Please let me know. |
/terratest |
/terratest |
@kevcube Thank you for triggering the CI again. I realized the check for the README was failing, so I re-ran |
/terratest |
I look closely at the error message:
However, it appears to be a little misleading because the GH status page has not revealed any recent issues. Based on my tests a few weeks ago, I continue to believe this is related to token permissions. I'm wondering if the token was revisited. |
@sestrella the repo has been moved from cloudposse-archives back to cloudposse, can you please update the reference in this PR and we will try tests again |
@kevcube done! Let's see how it goes 🤞🏼 |
Important Cloud Posse Engineering Team Review RequiredThis pull request modifies files that require Cloud Posse's review. Please be patient, and a core maintainer will review your changes. To expedite this process, reach out to us on Slack in the |
2cc5002
to
4738290
Compare
/terratest |
We have some work here to fix the tests. I cannot yet commit to an ETA. 🙏 for your understanding. We are tracking it internally. |
/terratest |
4738290
to
8a7de96
Compare
Hello, @goruha. I have rebased this PR with the latest commits in |
/terratest |
Hello, everyone! I see |
The hold up is we finally had switched/deprecated all our workflows in hundreds of repos from using PATs, but now this one repo needs a PAT. The terraform provider for amplify doesn't work with fine grained tokens. As a result we need to do a one off for this repo. We are still working on it, but it's in between other work. |
Got it! Thank you for your prompt response, @osterman! |
@sestrella can you pls update branch or rebase? |
8a7de96
to
a54107b
Compare
@goruha Done, I have rebased this branch |
/terratest |
These changes were released in v1.1.0. |
what
Module consumers cannot pass a custom
basic_auth_credentials
per branch using the existing variables. At the branch level, there is also a typo onenable_basic_auth
.why
The changes made in this PR allow consumers to configure different basic authentication credentials for each branch.