FINERACT-2462: Add github action to enforce one commit per user in a PR#5437
FINERACT-2462: Add github action to enforce one commit per user in a PR#5437edk12564 wants to merge 1 commit intoapache:developfrom
Conversation
ee6574f to
65d1cba
Compare
| - name: Comment on PR | ||
| if: failure() | ||
| env: | ||
| GH_TOKEN: ${{ secrets.GITHUB_TOKEN }} |
There was a problem hiding this comment.
Is token is necessary in this?
There was a problem hiding this comment.
From my understanding that Github token isn't the same one we use to authenticate our accounts. It's a separate token created per workflow for using the Github API calls in your actions. I believe it is required to access .author.id.
More on this here:
https://docs.github.com/en/actions/tutorials/authenticate-with-github_token
There was a problem hiding this comment.
Seems Ok, Can you also check the workflow of stale.yml, i really like the way it checks prs. This will not run without workflow approval and stale is a cron based job.
There was a problem hiding this comment.
I'll take a look now!
There was a problem hiding this comment.
I did a bit of research, and I agree with your view. The Stale workflow has a lot of merits, and I will look into adding to what we have. To summarize though, this is what I found.
1 - The current implementation needs permissions for it to run properly. Stale.yml uses the main repo's context, which allows it to run without manual approval.
On this note, I found something we could use. If we use pull_request_target instead of pull_request, we could run our workflows with base repo permissions. I am reading about it here: https://docs.github.com/en/actions/reference/workflows-and-actions/events-that-trigger-workflows#pull_request_target.
The main issue for this seems to be that this raises security concerns about running code without prior approval. But I think this might be fine considering we are only looking at the commit repository, PR number, and userIds. We don't actually execute any foreign code. Let me know what you think on this one!
2 - I also see what you mean about running a cronjob. I think this is a good idea as well. However, if we want to run on a cronjob to handle older PRs, the issue is that we probably shouldn't spam comments in case of users abandoning their PR. I think we should implement something like checking the most recent comment, or maybe we won't produce warnings if the no one has committed in the past day or two? I will take a look and let you know what our options are here.
What do you think on those points?
There was a problem hiding this comment.
@Aman-Mittal Hey Aman! Thanks for posting that point. It was a direction I hadn't thought of. I agree that if the direction of the project is to sign all our commits to prove contribution, it's a concern that we can only sign one person. I also brought up the point of Github not recognizing contribution unless it's a commit or co-authorship as well. Let's see what everyone says!
There was a problem hiding this comment.
I dont think we need cron job. It will be executed alongside all other checks. When something got changed, it will be re-run. I see no issue here.
I think we are fine to have multiple commits if it came from different authors. The check should catch and handle the situation where:
Commit by Author A -> So far good
Commit by Author A -> Nope, it's a duplication!
or
Commit by Author A -> So far good
Commit by Author B -> So far good
Commit by Author A -> Nope, it's a duplication!
There was a problem hiding this comment.
Hi adam! Really sorry about this but I made a post in the dev mail list before I read this comment. That's completely my bad.
To summarize the post, I wrote on a potential improvement to One Commit per PR that might allow us to keep full credit for everyone involved. We can add co-contributors to Co-Authored-By and also the trailer they performed work in, like Designed-By or Tested-By. This gives them full contribution in Github's eyes without having multiple users in a commit. But the tradeoff is still that each person cannot sign their commit, like they can in One Commit per User as Aman mentioned.
Would you still like One Commit Per User here given the new information? I will say that the implementation works either way!
There was a problem hiding this comment.
I have read your recommendations on the mail list. Thank you for sharing there. Hopefully others will chime in. I am just 1 voice from the many ;)
There was a problem hiding this comment.
Sounds good to me! Thank you sir 👍
65d1cba to
eb3491a
Compare
705c0a9 to
c45fec9
Compare
|
Sorry about that. I'll fix this now! |
c45fec9 to
d101ab7
Compare
- added commit check - accounted for edge case where git and github emails don't match - accounted for edge case where wrong git account hasn't squashed DesignedBy: Edward Kang and Aman Mittal ReviewedBy: Aman Mittal ReportedBy: Aman Mittal
d101ab7 to
9c8fa98
Compare
| name: Fineract PR One Commit Per User Check | ||
|
|
||
|
|
||
| on: |
There was a problem hiding this comment.
This should be below no?
on:
pull_request:
types: [opened, synchronize, reopened]
There was a problem hiding this comment.
Hi adam! Thank you for the review. I took a look again, and realized I was responding to the wrong thing. I thought you were referring to the the types, not the pull_request_target.
I think pull_request_target was used here because it allows us to run this check in the main repo's context, which me and Aman figured was okay considered no foreign code is actually being executed. This would allow us to run the check without needing someone to approve the test first.
More on this here: https://docs.github.com/en/actions/reference/workflows-and-actions/events-that-trigger-workflows#pull_request_target. Do you think this is okay, or is it more policy to make sure everything is approved first?
There was a problem hiding this comment.
My concern is this newly added github actions were not executed on this PR which means it is targeting the wrong thing, no?
There was a problem hiding this comment.
I see what you mean with the target! To test this out, I did some investigating on my local fork where I submitted a PR into my own fork's develop branch.
My setup is: the develop branch has pr-one-commit-per-user.yml and the PR branch does not. I first tested with multiple commits at once, and it properly failed. I also tested the target by squashing my commits in the PR, and the test passed. From the results, it seems to properly target the PR branch, but runs the pull_request_target scripts that live in the develop branch. Some pictures below.
I think based on this, this one particular PR will not have checks applied. However, if it is merged into the develop branch, any future PR will still be checked, and target the actual PR branch, and not the apache/fineract repo. However, the problem of running without workflow permissions isn't a big issue, so I think we can definitely go either way. Please let me know what you think!
There was a problem hiding this comment.
Running this workflow on the target branch is incorrect. You should use the one i shared, imho:
on:
pull_request:
types: [opened, synchronize, reopened]



Description
JIRA: FINERACT-2462
Implemented a Github Action that runs on PR request changes, opens, and closes.
The Github Action checks for:
The action on failure is to comment in the PR thread with the type of error, as well as show in the error’s logs.
The feature allows for multiple users per PR, but only 1 commit per user.
Edge Cases and Behavior
Test Cases I have tried:
Edge Cases covered in code:
Failure Path (misconfigured git email):

Failure Path (multiple commits per user):

Checklist
Please make sure these boxes are checked before submitting your pull request - thanks!
Your assigned reviewer(s) will follow our guidelines for code reviews.