-
Notifications
You must be signed in to change notification settings - Fork 60.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mention that "Allow specified actors to bypass required pull requests" only applies to repo admins #24726
Conversation
…" only applies to repo admins
Thanks for opening this pull request! A GitHub docs team member should be by to give feedback soon. In the meantime, please check out the contributing guidelines. |
I'm just trying to start a conversation and figured this PR (+ issue) would be a good place to start. From looking at the feature, it appears the goal is for it to work for non-admin users. So maybe it's actually a bug in GitHub. Some potential bugs with the product that might be issued:
|
Automatically generated comment ℹ️This comment is automatically generated and will be overwritten every time changes are committed to this branch. The table contains an overview of files in the Content directory changesYou may find it useful to copy this table into the pull request summary. There you can edit it to share links to important articles or changes and to give a high-level overview of how the changes in your pull request support the overall goals of the pull request.
fpt: Free, Pro, Team |
@dhermes Thank you for opening a PR and linking it to your issue! ✨ We will take a look at the docs update, but if you have any suggestions or feedback for the feature, that conversation would best fit over at community discussions. 💖 |
Thanks @cmwilson21, I started https://github.com/orgs/community/discussions/51495 as well with my "potential bug" comment. |
I would like to emphasize that the "Allow specified actors to bypass required pull requests" feature appears to be intended to grant bypassing privileges to accounts that aren't otherwise admins in the repo, particularly for apps like the Azure Pipelines app, which is the scenario I need and what I'm currently blocked on. If the purpose was simply to grant bypass privileges to admins, they already have that by default unless the "Do not allow bypassing the above settings" setting is turned on. So someone needs to check with the product team about what the design intent actually is. :-) |
Hi @dhermes, thanks for the issue and linked PR! Could you share more context about the issue you're experiencing and how we'd reproduce it? From a quick test, I was able to add a user with just The only problem I found was that I had to enter almost the entirety of the user's name before they come up in the list of suggestions. Is the specific issue here:
|
Hi @dhermes, I will look closer, but the restriction there looks to be to do with the required code owner review? I believe selecting the bypass option should allow the selected user to push to the protected branch without creating a pull request at all. I don't believe it's meant to exempt them from the rest of the rules once a pull request is created. As far as I know the bypass option on a pull request is just tied to your repo admin rights, and you don't need to add a user to the list specifically. |
I got confirmation on this: #24726 (comment) @elee-msft, was the problem you were having the same thing |
@isaacmbrown My issue was a little different. I'm trying to configure things so that the GitHub “Azure Pipelines” app can push directly to main, bypassing the branch rules that would normally forbid that. (The pipeline is attempting to sync code between an ADO repo and a GitHub repo). I opened a feedback item on this and they pointed me to this docs issue, saying that the bypass option is applied to the “repository admin users” instead of “actors”. That doesn't make sense to me from the plain reading of the UI, but if that's indeed supposed to be the desired design, then the docs should be updated to clarify that. But I still think the current behavior is actually a bug and I'm hoping someone can confirm that with the product team. |
Hi @elee-msft, thanks for getting back to me! I got confirmation from product that the feature is intended to work as described. Therefore I'd suggest contacting GitHub support -- but first, just want to check one thing with you: In the thread you linked, you listed your branch protection rules:
Is the Azure Pipeline app also given permission to push to the protected branch in |
Based on the discussion above I don't think a docs update is required here, so I'm closing this PR. |
Why:
Closes: #24725
What's being changed (if available, include any code snippets, screenshots, or gifs):
Phrasing a user reference as "repository admin users" instead of "actors"
Check off the following: