Repository Rules Public Beta Feedback #52652
Replies: 146 comments 486 replies
-
Is this enabled for Enterprise? The help page 404s, and the feature isn't visible yet in repo settings. |
Beta Was this translation helpful? Give feedback.
-
I'd love for there to be an option to limit merging methods per branch; for example, require linear history on one branch, and prevent squash merging on another branch. This is for the use case where you want linear history on the default branch, and then no squashes on a second long-lived branch used for production deployments. The only option currently is "require linear history", as far as I can tell. |
Beta Was this translation helpful? Give feedback.
-
It would be nice to show in Branch Protections if a ruleset is already applied to a branch. So that someone who may not have full admin rights (and may not know about rulesets) can see that there is already a ruleset. And possibly show if its an Org level and/or Repo level
|
Beta Was this translation helpful? Give feedback.
-
Nice UI, congrats for the work ! Is there a way to add bypass to Github Actions Bot ? Or still not ? Thanks :) |
Beta Was this translation helpful? Give feedback.
-
are dynamic required workflows also something which this will enable? |
Beta Was this translation helpful? Give feedback.
-
Are there any plans to automatically convert branch protection rules into repository rules?This would significantly help with surfacing this information to repository contributors as branch protection information is not available while repository rules are. Thank you! |
Beta Was this translation helpful? Give feedback.
-
How do you setup status checks on branch protections that can be added to Organization level rulesets? I tried creating a test ruleset and then enabling Require status checks to pass before merging but when I do no checks show up to select (No status checks found appears). Note I tried this at both the Org and Repo level. This is a very useful new set of features. So excited to try it out. -Thanks |
Beta Was this translation helpful? Give feedback.
-
This is awesome to see natively from GitHub! A few things:
Super excited to see this functionality grow, this solves many headaches we have in our organization. |
Beta Was this translation helpful? Give feedback.
-
This is much nicer than the existing branch protections, especially with the increased flexibility around selected branches, the rules applying to tags, and the public visibility into applicable restrictions. I'd like to be able to view the restrictions implied by other rulesets applicable to the chosen branches while editing/creating another one. |
Beta Was this translation helpful? Give feedback.
-
Are you planning on integrating merge queues? Currently it seems like merge queues can only be activated through branch protection rules but it would make sense for repository rules too. |
Beta Was this translation helpful? Give feedback.
-
Nice work on the new repository rules. Very useful! 🏅 However, the functionality "Dismiss stale pull request approvals when new commits are pushed" doesn't work well with Feature RequestDuring a PR review, the PR author will often add 1-2 fixup commits to address reviewer concerns. The purpose for using fixup commits is that the reviewer can easily see what's changed since the last review. The reviewer will typically approve the PR after the fixup commits addressing concerns have been added. It would be good if the PR approval wasn't dismissed in the scenario where commits are squashed, but no actual files has changed. I.e. there are no code changes, only commits being moved around or merged. Example Scenario
Solution: Would be great if a SHA-hash of the entire diff (or each individual touched file in PR) was compared instead, and if they are identical the existing approval is not considered stale, even if commits have changed. More background and discussionhttps://github.com/orgs/community/discussions/12876 (this issue already have a 65 upvotes, so I'm not the only one who find this annoying) |
Beta Was this translation helpful? Give feedback.
-
I am trying to implement repository rules at org level. |
Beta Was this translation helpful? Give feedback.
-
I'm not sure about the behavior of the "Require linear history" rule. If this ruleset is disabled (or bypassing it is allowed), I can bypass the remaining rules as a repository admin: However, if I enable it and disable bypassing, this is no longer possible: I'm aware that the rule then applies to admins as well. The intention is that admins may push directly to As an aside: It would be nice to see directly that the "Require linear history" rule is preventing the merge. |
Beta Was this translation helpful? Give feedback.
-
Enabling |
Beta Was this translation helpful? Give feedback.
-
Awesome features! For the metadata restrictions I think it would be useful if the value which breaks the rule(s) is shown on the insights page or to the user that breaks the rule. |
Beta Was this translation helpful? Give feedback.
-
@patrick-knight We tried this feature and it's really wonderful! I'd like to ask if there's a solution for our case (if it doesn't exist, can use this chance to provide a feedback). Is there a way to NOT allow PR owner to bypass the rules but others in the team can? In our case, with the existing branch protection rule, we have many status checks required for any PR targeting to the default branch. Usually, devs in the team don't have Admin permission so they cannot merge the PR until all checks pass and PR approvals is obtained. However, occasionally it's okay to bypass the checks for some PRs when someone approves the change and we don't want to ask Admin to do it every time. We can have an "override" button for devs by leveraging this new ruleset feature, but PR owner also have it, meaning one person can merge the PR w/o any approval or status check, which we want to avoid. |
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
I am trying to implement a ruleset for author/commit email that check for emails ending with multiple domain like I have tried the below but none of them work 😢
|
Beta Was this translation helpful? Give feedback.
This comment was marked as off-topic.
This comment was marked as off-topic.
-
@patrick-knight Setup:
Problem: Use case:
Workaround is questionable:
then you need developers or admins with bypass permission for all protected branches (release/, master, support/). Feature request: |
Beta Was this translation helpful? Give feedback.
-
Beta Release - Requiring workflows with Repository Rulesets!
|
Beta Was this translation helpful? Give feedback.
-
Unable to find a reference at the moment, but I have a protected Ruleset with the syntax targeting This occurs from the Github.com UI and from git push. |
Beta Was this translation helpful? Give feedback.
-
Hey @patrick-knight |
Beta Was this translation helpful? Give feedback.
-
Not sure if you're still collecting feedback, but using an organisation ruleset I tried to allow a certain team to bypass branch protection rules set in the repo. The team member however wasn't able to push directly to main, even though the rule was enabled and the team added to the bypass list |
Beta Was this translation helpful? Give feedback.
-
I'd like to add my feedback on the ruleset feature, even though i realize it's no longer in beta. Our dev teams work with branches, and we have a few "special" branch types we'd like to manage access to:
Bypass PR requirement (if merging from a protected branch) For 1-2, there's no real need to keep up to date with the default branch, but for a long lived (epic) branch - there is the need to do so. As the develop branch contains only work that was already approved via PRs, there's no point in forcing a PR when syncing an epic branch with develop. It could be nice to be able to do that in some way. Same goes the other way around - Would be great to somehow be able to avoid this enforcement. |
Beta Was this translation helpful? Give feedback.
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
In the issue github/roadmap#644 I saw the possibility of configuring ruleset for commit message for GitHub Entreprise. |
Beta Was this translation helpful? Give feedback.
-
Perhaps too late, but I have a usecase for protecting custom git refs. I'm developing a plugin that uses custom references to track special information under a custom prefix ( |
Beta Was this translation helpful? Give feedback.
-
Some feedback and a feature request from me. The Rulesets have the following options:
Now, it's hard to me to understand the difference between those options. I can think of scenarios when those two options are not the same scenario but it's not obvious at a glance - maybe some re-wording is needed? And a feature request: I am missing an option to "Block pushes to a branch in case it is outdated". This is a common scenario when a PR1 is merged to the default branch and another PR2 becomes outdated. When a developer pushes new commits to that second PR without looking at the UI or doing a On top of that, it would be very cool to have an option to do automaic rebasing of feature branches if possible (but I guess this is a better job for a GHA workflow because of potential conflicts). |
Beta Was this translation helpful? Give feedback.
-
Hi team, I tried to achieve these goals with rulesets,
Everything works fine except the bypassing for PR created by @dependabot seems not working, it still needs 2 approvals. Is there any solution for this? Thanks! 🙏 |
Beta Was this translation helpful? Give feedback.
-
Note
Please move new discussion topics to the GA post! Thanks!
We want to hear from you on how we can improve repository rules!
Repository rules are GitHub's next evolution of branch protections to help make your repositories more secure and compliant at scale.
Rules allow you to easily define protections for branches and tags in your repositories and, if you are a GitHub Enterprise Cloud customer, to enforce them across your organization. It is also easier for everyone collaborating on your repositories to know what rules are in place. There is also an
evaluate
status where you can run rules in a "dry run" mode to help understand the impact of adopting new rules before they areactive
and enforced.If you’ve had a chance to try out the repo rules that are now in public beta, we’re curious to know your thoughts and how we can make this feature work better for you!
🐛 Known issues
Some of the more common or noteworthy issues we are tracking:
🚀 Top feature requests
- Collapse “Bypass Mode” and “Bypass List” into single bypass experience- Enhance repository targeting options- Support for Apps and Bots to bypass Org RulesetsUpdate June 27th 2023
Changelog
Beta Was this translation helpful? Give feedback.
All reactions