-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Peribolos does not support new Github team repo permissions #14325
Comments
This happens because GitHub API calls on I couldn't find any v3 API calls that returns the beta new roles on a repository, but v4, i.e. graphql endpoint, does seem to report Peribolos does not currently use graphql endpoint, but perhaps it can be updated to do so. This could also mean fewer, ideally a single, calls to get the organisation structure, thus saving tokens. I'd be happy to submit a patch if this sounds like a good approach. |
That sounds like it would require a full rewrite of how |
Hey @stevekuznetsov! I've passed this feedback on to the PM that owns this part of the product - I agree that it would be great to expose this to the v3 API, and I'll follow up to see if it's on their schedule and, if so, when to expect it. |
Thanks, @nickvanw! Appreciate your help here :) |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
What happened:
When dumping the Peribolos config skeleton for a Github org that contains a team with the beta Triage or Maintain permissions on a repo, the repo is dumped with permission
none
, which is invalid.e.g.
What you expected to happen:
The repo is listed with the correct permission (presumably
triage
ormaintain
)How to reproduce it (as minimally and precisely as possible):
Please provide links to example occurrences, if any:
Anything else we need to know?:
I don't know whether it's necessary to only fix the dump code, or whether there's also other code needed when Peribolos attempts to apply these permissions.
And also it may be useful to make Peribolos more robust in the event that future team permissions are added by Github, by erroring out if it encounters a permission it does not recognize.
The text was updated successfully, but these errors were encountered: