Replies: 5 comments 3 replies
-
Did you find any solution for same ? @Roms1383 . I am facing same issue |
Beta Was this translation helpful? Give feedback.
-
Hi @Roms1383 👋 - the authentication used for A If you set the relevant PAT to the
|
Beta Was this translation helpful? Give feedback.
-
Do you have required status checks enabled? If you enable required status checks, then even users/apps that you add to your list won't be able to bypass directly pushing without creating a pull request. What you can do is have that user create a pull request and then they can use the fact that they are added to the list to override the merge. |
Beta Was this translation helpful? Give feedback.
-
For me a way to make this work was to use a Ruleset feature instead of classic branch protection rule. You can make ruleset with the same options as classic branch protection rule, but in the bypass list, you must select Write role. Now all collaborators will be able to force push (your bot in this case), even if they don't meet the requirements for the push. |
Beta Was this translation helpful? Give feedback.
-
Select Topic Area
Bug
Body
Hi ! It seems branch protection rules cannot be bypassed when they are supposed to, or did I miss something ?
context
as you can see I require a PR with approval but also set my personal bot Bender to be allowed to both bypass protection rule and to force push. I also set his Personal Access Token both in the organization's Secrets and as an env var in the failing workflow job
but as you can see from my latest Actions runs, it doesn't get allowed.
I have done a search for a similar discussion and tried the solutions suggested there (e.g.
[skip ci]
) but it didn't solve.Is there any way to fix this ?
Beta Was this translation helpful? Give feedback.
All reactions