-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't use module on SC platform #142
Comments
Excuse the very much internal reference in an open source issue - but given that this is likely installed on a number of projects in on the Silverstripe Cloud platform, I'm hoping we can use it to elicit some feedback from others. |
I count this module being used on 24 production environments on our own SC platform. |
I believe what I'm experiencing is related, just started happening for one of my SC sites. SS had a look and could trace it down to this module, but couldn't tell me why the permission error was happening. From SS
|
Hey @rafaeldsousa, what version of this module ( |
Hi @brynwhyman
|
Just to add - I've just seen this behaviour. It breaks all
|
@michalkleiner shared a theory in a duplicate issue, thinking the usage of the syntax in the prior fix might be off. |
Related issue with running some of the containing modules on SC: bringyourownideas/silverstripe-maintenance#142
I believe this should be closed - seems to be working fine now. |
@GuySartorelli doesn't work for us on CWP nor on AWS with private repos due to some permission issues. If this module is an umbrella module for the security checker and update checker, then the issues still exist. |
Is that to say that if you had no private repositories it works fine? If so that would be the difference I think - the project I saw it working with today doesn't have any private repositories. The other difference I guess being that I was testing the beta at the time, which uses the new major release of composer-update-checker. |
Actually not even private repos, but forks that have entries under |
Okay. So there are situations where it doesn't work. Does it work for you with the "happy path" i.e. no custom branches or repository replacements or anything, just 1:1 public packagist entries? |
I don't think we even have a project like that on SCPS/AWS, there's always something that requires a fork in the plethora of modules we use. |
Fair enough. I'll try make some time to do some experimentation. |
Any updates on this ? still happens a lot on SC. For now the only thing we've able to do was to ignore the error permanently so that our logs don't get flooded with entries of this. |
@andrewandante might get someone from his team to look into this maybe? :) |
Before I do... 😉 Just want to confirm exactly what the issue is that we are trying to validate. Seems that the point of this module is to tell the user when there are updates available for the composer packages installed. It's currently not working on SC boxes because neither Or have we now pivoted to "it doesn't work if there are private repos or we are using a fork"? In this case, what's the expected behaviour - for a private repo, it should simply skip it? For a fork, are we expecting notices about the main repo, or the fork, or just to skip it as well? It feels to me like these can be handled in the module code, rather than through server configuration - if it should work with the above two scenarios, but is relying on composer-based auth, then it's never going to work on SC, because we won't be adding Always open to discussions, let me know your thoughts. ❤️ |
@andrewandante Personally I've only experienced the |
Looks like the above is being attempted at #170 |
@GuySartorelli anyone looking at your PR above #170? Logging channels still keep being flooded with permission error messages, if not manually ignored. Would be good to have this merged and allow us to ignore the private repos. |
@rafaeldsousa Thanks for bringing this back to my attention. It's been added to our backlog to review. |
Background
It looks like the same issue was previously resolved for the CWP platform, and while there are notes explaining the fixes were tested on SC, we've had reports of issues
Related issues:
Further information
We've had an internal report of this here: https://silverstripeltd.slack.com/archives/CLXKD9X51/p1583114132100800
The text was updated successfully, but these errors were encountered: