-
-
Notifications
You must be signed in to change notification settings - Fork 362
Add incus bug command #2550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Add incus bug command #2550
Conversation
Signed-off-by: Benjamin Somers <[email protected]>
Signed-off-by: Benjamin Somers <[email protected]>
Signed-off-by: Benjamin Somers <[email protected]>
Signed-off-by: Benjamin Somers <[email protected]>
Signed-off-by: Benjamin Somers <[email protected]>
Signed-off-by: Benjamin Somers <[email protected]>
Signed-off-by: Benjamin Somers <[email protected]>
A future addition to this command would be to dump the current Markdown file if the issue can’t be created (e.g. network or auth issues), and allow to reimport it later on; I’ll probably have a look at it tomorrow. |
Signed-off-by: Benjamin Somers <[email protected]>
Not sure why this last commit is needed… |
The ability to directly report the issue on Github is interesting but I think is going to cause us more issues than it's worth :) The problems I'm seeing are:
I think that last point is the most problematic with this approach unfortunately. The user will have gone through the process of answering a bunch of questions on the CLI to then have to go through a page that basically says. "Authorize Incus Bug Reporter", "Make sure you trust this device as it will get access to your account." and it then requests access to
So I would effectively never use that feature myself as those permissions are extremely scary to the point I wouldn't trust any Those permissions are sufficient to completely delete all public repositories an account has access to, or worse, inject code, push tags and make releases on all such repositories. |
I think for something like this to be viable, Github would need to support a different API where we can anonymously push issue data, then the user can go to a URL we provide, review the issue and then post it. Launchpad has something like that in place for crash reports and that's been working pretty well. |
So as it stands, I think we're better off going back to the original idea of a hidden I think we could have that show an equivalent of:
As a safe but useful baseline. We can then add some useful subcommands, for example:
Or
Or
Basically We can also suggest running some of those directly in the bug template. |
Honestly, how many bug reporters actually check that before checking the box on GitHub? (I’m biased because I read all the issues as they come, so I think I/we can’t really answer this one)
Fair, albeit fixable by alerting the user or authenticating early.
Yeah, that one is pretty bad, but fixable by dumping the report and allowing to import it.
Oh yeah… The solution to make it less scary is an actual GitHub App (vs. OAuth App), but I think that that’d require a PKI infrastructure to sign each client, so… very bad.
I agree. I trust myself enough to use my own code; I would trust Debian packages; I would recompile and verify checksums for the rest.
Thanks GitHub I guess. Fine-grained tokens could work, outside of the OIDC dance.
I looked into it, and the only thing I found is auto-filling issues with URL parameters. Unfortunately, the character limit for URLs seems to be 2048, so it’s not enough for a server config dump. I’ll need some reflection time to react to your last message. |
Oh shoot, I’ve been trapped by GitHub’s UI into clicking the wrong button again… |
Closes: #2337
I thought that just stripping sensitive data was a bit weak for a whole new command, so I decided to go a bit wild.
@stgraber, please create an OAuth app called “Incus” or “Incus Client” (or the like) under the
lxc
org and give me itsclientID
. In the meantime, you can test it on my personal public repo hardcoded in this PR code.This PR doesn’t take any care about proxies, so additional patches may be needed (I’d like to be pointed to the right direction). Additionally, the issues generated by
incus bug report
don’t include a type, so you may need additional work on GitHub side to get them automatically typed asBug
.