-
Notifications
You must be signed in to change notification settings - Fork 1.2k
$GITHUB_TOKEN
should be consumed for ADD https://raw.githubusercontent.com/...
and ADD https://github.com/...
#5978
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Doesn't this already work? The default secrets https://github.com/moby/buildkit/blob/v0.22.0-rc2/client/llb/source.go#L234-L235 should be added automatically in llb. Need to be either that secret value directly of with the host suffix https://github.com/moby/buildkit/blob/v0.22.0-rc2/source/git/source.go#L238-L249 |
This still doesn't work for |
BTW https://docs.docker.com/build/building/secrets/ should cover GitHub as well as GitLab |
We have |
What's the difference? |
Are we ok with the overhead of checking cc @marxarelli |
The name is the only difference I see.
SGTM in the BuildKit level, but buildx should provide a human-friendly wrapper for |
Thanks for looping me in! I quite like the explicit |
Description
GitHub recently introduced the API rate limit to non-REST requests too
https://github.blog/changelog/2025-05-08-updated-rate-limits-for-unauthenticated-requests/
source/http
andsource/git
should be able to fetch the$GITHUB_TOKEN
secret from the client so as to relax the rate limit.Probably the existing secret API can be reused.
However, if we want to let
buildx
to automatically expose the token, probably it needs a new API that can be only accessed from SourceOp, not from ExecOp, to reduce security concerns.(So, probably
buildx
shouldn't expose the token by default?)The text was updated successfully, but these errors were encountered: