1
0
mirror of https://github.com/kremalicious/metamask-extension.git synced 2024-12-23 09:52:26 +01:00
Commit Graph

15 Commits

Author SHA1 Message Date
legobeat
b744eab176
ci: temporarily downgrade ubuntu to 20.04 (#16320) 2022-11-01 09:56:35 -02:30
ricky
eb241ae68f
bump crowdin/github-action (#14475) 2022-04-20 15:46:53 -04:00
ricky
2b134a0c7f
Update crowdin/github-action (#14381)
* Use crowdin/github-action@1.4.7

* use SHA
2022-04-07 14:28:03 -04:00
ricky
405a3495b0
Update crowdin workflow config (#13494)
* Add metamaskbot GH_USERNAME and GH_EMAIL to env

* add additional config for token, github_user_name, github_user_email

* delete

* delete token

* add GITHUB_ACTOR

Co-authored-by: Alex Donesky <adonesky@gmail.com>
2022-02-04 13:51:11 -05:00
ricky
f58e2552c3
use PAT for GITHUB_TOKEN (#13307)
Use `secrets.METAMASKBOT_CROWDIN_TOKEN` for `GITHUB_TOKEN`

ref: https://docs.github.com/en/actions/security-guides/automatic-token-authentication#using-the-github_token-in-a-workflow

> When you use the repository's GITHUB_TOKEN to perform tasks on behalf of the GitHub Actions app, events triggered by the GITHUB_TOKEN will not create a new workflow run. This prevents you from accidentally creating recursive workflow runs. For example, if a workflow run pushes code using the repository's GITHUB_TOKEN, a new workflow will not run even when the repository contains a workflow configured to run when push events occur.
2022-01-13 17:45:07 -05:00
Alex Donesky
211c5afb7b
add crowdin-bot to the CLA allowlist (#13193) 2022-01-03 13:48:56 -06:00
ricky
163d472fdf
Add crowdin configuration and github action (#12552)
* add crowdin.yml

* add crowdin_action.yml

* remove comments

* test on this branch

* use SHA

* only run on develop
2021-12-09 16:53:58 -05:00
kumavis
0a8f94af81
Create codeql-analysis.yml (#12652) 2021-11-10 17:28:25 -10:00
Mark Stacey
fae857d1c0
Fix CLA Signature bot workflow (#11250)
In a recent PR (#11240) the workflow was updated to explicitly add the
required permissions. Unfortunately the "pull-requests" permission was
added with a space instead of a dash, which apparently breaks the
workflow. It now has a dash, as shown in the example in the docs [1].

[1]: https://docs.github.com/en/actions/reference/authentication-in-a-workflow#example-1-passing-the-github_token-as-an-input
2021-06-07 18:13:31 -02:30
Mark Stacey
a58c66af1f
Restore CLA bot permissions (#11240)
The CLA bot had its write permissions revoked recently when our
organization-wide settings were updated to restrict actions to read
access by default. This PR restores write access to PRs and to the
repository itself for the CLA bot. It needs PR write access to leave
comments, and needs write access to the repo itself to commit new
signatures.
2021-06-07 11:27:15 -02:30
Mark Stacey
0c627fa4f3
Update the CLA Signature bot to v3.0.2 (#10947)
This update includes support for PRs with >100 commits.
2021-04-28 20:15:47 -02:30
Whymarrh Whitby
bffa035bc7
Add MetaMask Bot to the CLA allow list (#9426) 2020-09-16 17:42:16 -02:30
Whymarrh Whitby
cd7a3a687b
Update allow list for CLA, fix Dependabot (#9400)
This change updates the Dependabot name in the allow list of the CLA workflow.
2020-09-14 14:59:15 -02:30
Mark Stacey
7ba2310726
Update CLA bot (#9389)
The `cla-signature-bot` has been updated to `v3.0.1`. This update
includes a bug fix for PRs that have over 100 comments.
2020-09-10 13:35:03 -03:00
Mark Stacey
885bd13160
Add CLA Signature bot (#9310)
The CLA signature bot will check the authors of each PR to ensure they
have all signed the CLA. If any authors still need to sign the CLA, it
will leave a comment explaining how it can be signed, and will check
back upon each comment to see if it has been signed.

The bot used is `MetaMask/cla-signature-bot`, which is a fork of
`Roblox/cla-signature-bot`. The fork has a couple of improvements, and
it updated the PR comment text to be more appropriate for our usage.

Currently the only user on the `allowlist` is `dependabot`, but any public
members of the MetaMask organization will also be exempt from needing
to sign the CLA due to the `allow-organization-members` setting.

The signatures are stored in `cla.json` on the `cla-signatures` branch,
which is in this repository as a distinct root. We can consider moving
this to a separate repository in the future - this was just easier to
setup.
2020-08-26 13:48:35 -03:00