You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I want to make sure certain excavator changes can merge without human intervention in every single repo in foundry. The problem is that I need to generate a policy.yml that is appropriate for each repo, taking into account all their different collaborators and admins.
Proposal
Allow the values 'admins' and 'collaborators' in policy.yml files, e.g.:
policy:
approval:
- or:
- maintainer approval
- excavator only touched gradle filesapproval_rules:
- name: maintainer approvalrequires:
count: 1github:
- admins # <--- policy-bot would expand this to all users & teams with admin access
- collaborators
- name: excavator only touched gradle filesrequires:
count: 0if:
has_author_in:
users: [ "svc-excavator" ]only_changed_files:
paths:
- "^.*gradle$"
This ensures there's one source of truth for who is in control of a repository and for the moment it's the github settings tab.
The text was updated successfully, but these errors were encountered:
I want to make sure certain excavator changes can merge without human intervention in every single repo in foundry. The problem is that I need to generate a policy.yml that is appropriate for each repo, taking into account all their different collaborators and admins.
Proposal
Allow the values 'admins' and 'collaborators' in policy.yml files, e.g.:
This ensures there's one source of truth for who is in control of a repository and for the moment it's the github settings tab.
The text was updated successfully, but these errors were encountered: