-
Notifications
You must be signed in to change notification settings - Fork 130
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potentially breaking change introduced in #897 - clarification needed #914
Comments
@babblebey @jedwards1211 let's get this change reverted and regroup to consider if there is a safer way to accomplish this goal |
oof, sorry about that, sure wish the GitHub API just gave us a method to check that the token has the exact permissions we need |
🎉 This issue has been resolved in version 10.3.3 🎉 The release is available on: Your semantic-release bot 📦🚀 |
@travi @babblebey it should work if we keep everything in the PR except the check for
I got confused because the Get a repository method lists:
I mistakenly assumed Do you want me to make a new PR with everything but the @gr2m I wish the Get a repository API method had explicit documentation about the |
@dominykas I just reread this more carefully:
From what I can see, there are just a few limits that can be configured for repository roles in an organization -- it doesn't look like it's possible to remove permission to push commits, edit issues, releases, or pull requests from the |
I'll admit that I haven't looked into this in detail - I just know that it's possible to make some changes there. Thanks for looking into this! |
#897 introduces a requirement for the token to be associated with a user that has
maintain
permission.That was not necessary in the past, and should probably be considered a breaking change?
Moreover, we've never had issues with just the
push
permissions - not sure if there was any specific rationale around it? This was picked up in the review, and noted as "probably can't write issues, releases and pull requests" - but I'm not sure that's the case - the standardpush
permissions gives most of that access?I'm also not 100% certain how that maps to the concept of roles and actual permissions in Github - it is possible to set things up in such a way that roles have different permissions, so quite possibly the naive
maintain
check is not enough and needs explicit checks for specific API access?When the user does not have the
maintain
permission, it then performs the check toHEAD /installation/repositories
- however that is only necessary when running as an app. Ifsemantic-release
is running inside e.g. Jenkins - then this check does not make sense, as generallysemantic-release
does not need to "List repositories accessible to the app installation" anyways to perform a release?The text was updated successfully, but these errors were encountered: