-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add back broad push access to multicodec #67
Conversation
Before merge, verify that all the following plans are correct. They will be applied as-is after the merge. Terraform plansmultiformats
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
new much stricter master protection
I don't see any changes to branch protection being done here. Were they performed through the UI?
Otherwise, the change is correct 👍
@galargh - is there more that needs to happen for branch protection than what you referred to in #53 (comment) ? |
The mentioned comment is just an information that the branch protection config is now available (and modifiable) through GitHub Management. I didn't change the branch protection settings. I think it should be up to the repo owners to decide. |
@galargh : I assume we need to do something similar for protecting master/main like we did in ipld/github-mgmt#51 for go-car. Is that right? |
Can we merge this? and figure out branch protections in a follow-up? Proposed the change and got agreement of relevant stakeholders both in #53 (comment) and in slack a week ago.
|
That's one way to do it. It could look something like this: #68 However, personally, I don't have a strong opinion on this. It should be up to the maintainers to decide what setup they want there.
I'm happy to merge this myself as soon as we get approval from @darobin and/or @rvagg. Personally, given the conversations both in #53 and in Slack, I'm uncomfortable merging it without their sign-off.
The repo is public so one thing I could suggest to unblock would be to create a PR from a fork. |
@galargh : Thanks for the help. I was in conversation with @rvagg yesterday during IPLD triage (which is what triggered my comment above). We want to keep master/main protected and we want to ensure that codeowners have looked at a PR before merges. We don't want to allow others who have admin permissions in this organization to be able to accidentally bypass these checks on master. As a result, I think lets do the combination of this PR as it currently stands AND branch protection (ipld/github-mgmt#51 ) AND require codeowner review (#68 ). (That can all be in this PR.) The one thing that isn't clear for me is whether we should be authoriting CODEOWNER files in github-mgmt or in the repo itself. I can see the value of authoring in github-mgmt so it's clear when trying to think about permissions, but we should add a comment in CODEOWNERS pointing people back to github-mgmt so they know not to make any changes in the repo itself. Given @rvagg is Australian time, if you can prepare this earlier, I can review. |
That's the cool thing about file support in GitHub Management - it's completely fine with the files being change in the target repos. So, for example, we can author the CODEOWNERS file here. Once we merge the PR, a CODEOWNERS file will be created in the repo. Then, we can keep modifying it through GitHub Management. Or, we can modify it in the repo. If we do the latter, GitHub Management's Sync will notice that the file state drifted and will update the file's content in tf state and in the GitHub Management's config YAML. Given the comments, I marked #68 as ready for review. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I merged #68 here.
I think this PR is good to go now.
@galargh : I think you're expertise will be needed here. It looks like this failed because one of the CODEOWNERS didn't approve it: https://github.com/multiformats/github-mgmt/actions/runs/4565781828/jobs/8057386933#step:6:32. I assume may just need to do this in two steps? |
Yikes, that's because we don't allow bypassing branch protection rules in the target repo 🤦 To unblock, I allowed bypassing branch protection rules, recreated a plan in https://github.com/multiformats/github-mgmt/actions/runs/4567564588 and applied it in https://github.com/multiformats/github-mgmt/actions/runs/4567577215. All the changes have been introduced now. |
Thanks @galargh ! |
Ref: #53
I think this gets us back to where we were but with the new much stricter master protection.