Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Migrate from branch protection to ruleset for OSPO GitHub Actions and App #108

Closed
7 tasks done
jmeridth opened this issue Apr 29, 2024 · 3 comments
Closed
7 tasks done
Labels
enhancement New feature or request

Comments

@jmeridth
Copy link
Member

jmeridth commented Apr 29, 2024

Is your feature request related to a problem?

Not really. The OSSF GitHub Action Issue states if we use a ruleset instead of a branch protection we can use the base/given GH_TOKEN instead of a custom PAT that needs additional permissions.

We should also use GitHub's newer tooling on our repositories to be an example of usage.

Related OSPO Tool

  • automatic-contrib-prs GitHub Action
  • cleanowners GitHub Action
  • contributors GitHub Action
  • evergreen GitHub Action
  • internal-contribution-forks GitHub App
  • issues-metrics GitHub Action
  • stale-repos GitHub Action

Describe the solution you'd like

Migrate from branch protection rule to ruleset

We will want the permissions to initially match 1 to 1.

Describe alternatives you've considered

N/A

Additional context

N/A

@jmeridth jmeridth added the enhancement New feature or request label Apr 29, 2024
@zkoppert
Copy link
Member

we can use the base/given GH_TOKEN instead of a custom PAT

Oh cool!

@jmeridth
Copy link
Member Author

jmeridth commented May 6, 2024

@ajhenry will need your help on ICF to do this since I don't have permissions.

@jmeridth
Copy link
Member Author

jmeridth commented May 6, 2024

This has been completed.

@jmeridth jmeridth closed this as completed May 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants