scorecard-action: githubv4.Query: Resource not accessible by integration
I’m using the default GitHub Action workflow, though with tags instead of commit hashes in https://github.com/brave/simplepadding/blob/master/.github/workflows/scorecards.yml and I’m seeing this error now that I’ve upgraded to v2:
Error: one or more checks had a runtime error: internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Is there a permission missing from the example workflow?
I see it’s also been reported in https://github.com/ossf/scorecard/issues/1097, but I’m not sure I’m seeing the same issue since it was working fine before I upgraded from v1.1.2 to v2.
About this issue
- Original URL
- State: closed
- Created 2 years ago
- Reactions: 2
- Comments: 25 (11 by maintainers)
Commits related to this issue
- update scorecard action ref https://github.com/ossf/scorecard-action/issues/856 Signed-off-by: Thomas Sjögren <konstruktoid@users.noreply.github.com> — committed to konstruktoid/hardening by konstruktoid 2 years ago
Yes, there should be a proper v2.0.4 tag soon. There’s a bit of a chicken-and-egg problem in the release procedure, you can read more here
It’s done as part of the cloudbuild workflows. There are two, but the tagged releases are handled by https://github.com/ossf/scorecard-action/blob/main/cloudbuild-tag.yaml
Yes. v2.0.3 should work. And now that #948 is merged, future releases will use a different fix. Please reopen if you have any issues.
Not fixed quite yet. Still need 1 PR on the scorecard-action side of things after a new scorecard release is cut.
Yes I made the change as part of https://github.com/ossf/scorecard/issues/2124, unaware it would spill over to scorecard-action. Fixing it would probably involve using a specific error here that we check for using
errors.Is
here and here (or better yet, doing something in the entrypoint to wrap it for all uses)I compared a the output from cosign (Ping @cpanato) and my and see following difference by same pipline file:
cosign:
the failed one:
Why is there a /policy.yaml?
Here are the branch protection settings I have enabled in the above repo: