-
Notifications
You must be signed in to change notification settings - Fork 211
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: switch to self hosted runner #458
base: main
Are you sure you want to change the base?
Conversation
The only upside this has over the standard github runner is that the VM localcc is using is much more powerful, so the build should go a lot faster. I had a look at the standard github runner limits and even when linux port is done there's no way we'd ever even get close to the limits. Since the xmake merge, we have to manually rerun the release workflow 3-5 times just for it to get past the early EOF error. Using a self-hosted runner does not solve this issue. If this continues, it's going to be really annoying to constantly have to babysit the make release actions for 10-20 minutes just to push it past this stupid issue. Possible fixes:
|
You sure ?
2 (previous runs):
|
That was an issue in my runner setup, not the problem we're having with GitHub hosted. |
Okay but I'm not seeing any EOF errors here on github from this branch which I assume is self hosted. |
EOF errors occur regardless if it's a self hosted or a GitHub hosted runner |
But how do you know that this is the case if there's been no such error from your runner ? |
This bug has been reported a few times in the GitHub actions repo Anyway, can we please just try the org approved PAT and switch to https solution? |
I guess I just don't know how the self-hosted runner works. |
I think this is a good idea, but if it doesn't work then I think we should definitely move away from github actions because CI is too important to be failing like this. |
Lyrth tested the PAT idea on their fork and there are zero errors across 5 runs, so it seems to be the fix of the problem. The only thing to note is that the owner of the UEPseudo repo (https://github.com/Re-UE4SS) needs to be the one to make the PAT as needs access to the repo in the absence of the SSH key. So Narknon needs to do that. I think this PR should be closed as we don't have any need for a self hosted runner anymore, as it provides no extra benefit. |
We should maybe not have only one person with that kind of access to such an important repo, just in case, and didn't you say he was somewhat retired ? So he might be drifting in and out of this place kind of like me, not ideal for the only person with that kind access. |
Accidentally keyboard shortcutted this PR closed. |
We've tried all the other solutions found in various places and this is the only solution that actually works consistantly. So unless you'd prefer to stick with manually coaxing the shit through the pipe for every merge (which typically takes between 10 and 20 minutes) or try to find a better solution, I don't see how we have any choice, despite this choice being pretty shitty (thanks github). We can use classic PATs which can be set to never expire so theoretically once Narknon should never have to mess with it again. But if he does, it's not like he's so far retired (and I doubt he ever will be) that he won't do it. He's active enough that he's been reading all the PRs Security wise, the PAT has access to all private repos under the account, so will just have to treat it like an SSH key, i.e. only org admins can view it and have to treat it like a password. Meaning localcc, truman, narknon and you. |
I don't have a problem with your solution, I just didn't like the idea of only person having admin access to the UEPseudo repo as you implied when you said narknon has to do it. |
Ah I misunderstood you. Perhaps it would be a good idea for Narknon to give at least one other person the credentials for that account. |
No description provided.