-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Branch Protection bypass_pull_request_allowances #249
Comments
Thanks, will add this in the coming weeks. |
Any progress on this @decyjphr ? |
I would also be interested to know when this is coming out :) |
@decyjphr any update on this would be appreciated. Thanks |
Aren't the attributes out of the box available in safe-settings? Also should actually all the boolean parameters available in the API (https://docs.github.com/en/rest/branches/branch-protection#update-branch-protection) be added to the reformat function? (e.g. allow_force_pushes, block_creations, lock_branch, allow_fork_syncing) |
@mike-stewart @dan-ih @viks-confluent It seems @decyjphr has already implemented this 😄!
under the required_pull_request_reviews section Only tested it with users but it should work with teams and apps arrays as well
|
related PR #419 |
@martinm82 Ah! So that may be the reason why |
I haven't checked that but the reason why all these params work out of the box is because we use the REST API format of the payload which gets used 1:1. P.S. We will run soon into limitations with the REST API. For example one cannot create branch protection rules and use wildcards in the branch pattern which is only supported by GraphQL API. |
I found the logic behind some of what happened here hard to follow and updated the comments to try to make it easier to follow.
I found the logic behind some of what happened here hard to follow and updated the comments to try to make it easier to follow.
I found the logic behind some of what happened here hard to follow and updated the comments to try to make it easier to follow.
* update comments from #249 I found the logic behind some of what happened here hard to follow and updated the comments to try to make it easier to follow. * fix environments updating global array The environments plugin was changing `MergeDeep.NAME_FIELDS`, which is a global object. The reason was to avoid environments being filtered out from the change list if they only have a name field. However, the environments plugin has it's own overriden sync method, and thus we can simply drop the whole filtering from that method. Fixes #108 * remove repeating line This has to be a "typo" from 9a74e05 calling the same assignment twice. Removing to clean up. --------- Co-authored-by: Torgeir S. hos Sykehuspartner <[email protected]>
* update comments from #249 I found the logic behind some of what happened here hard to follow and updated the comments to try to make it easier to follow. * fix environments updating global array The environments plugin was changing `MergeDeep.NAME_FIELDS`, which is a global object. The reason was to avoid environments being filtered out from the change list if they only have a name field. However, the environments plugin has it's own overriden sync method, and thus we can simply drop the whole filtering from that method. Fixes #108 * remove repeating line This has to be a "typo" from 9a74e05 calling the same assignment twice. Removing to clean up.
New Feature
Can safe-settings add support for the "Allow specified actors to bypass required pull requests" feature of required pull request reviews for branch protection?
Available in the UI as:
Available in the API as "bypass_pull_request_allowances".
The text was updated successfully, but these errors were encountered: