You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I think this is a limitation of the id-token: write permission when operating in a forked repo. There is some more information here which may be useful.
Personally, I wouldn't do this. I'd instead have another fork (possibly in a different organization) and have that one be responsible for building and attesting things from untrustworthy sources -- probably by adding an if to the very-dangerous job that skips my owner repository: if: github.repository_owner != 'my-source', and then when I get a PR to my-source/repo, I can make an equivalent PR to my-untrusted-source/repo and let people get artifacts from there.
I was looking to add attestations to jqlang/jq#3220 and it fails in the PR checks but works in the downstream repo.
The error seems to be the same as seen when not providing correct permissions, though they are present.
https://github.com/jqlang/jq/actions/runs/12267835999/job/34228631988?pr=3220
The changes
https://github.com/jqlang/jq/pull/3220/files
Am i overlooking something here? As in this in an intended or unintended outcome.
I did not see anything gin the readme to suggest a solution
https://github.com/actions/attest?tab=readme-ov-file#actionsattest
What is the correct way forward to allow attestations in a pr action check or should this be avoided?
Thanks in advance.
The text was updated successfully, but these errors were encountered: