-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: add instructions about applying rulesets #30
Conversation
Co-authored-by: Natasha <[email protected]>
Co-authored-by: Natasha <[email protected]>
Thanks for this! I do have a few points:
|
We (me and @tjsilver ) tried this out a few days ago to no avail. To set up a status/CI check on a ruleset you need to pass in the exact name of the workflow(s). Most of the time, this is just I'm hoping that GitHub improves this story over time, or that maybe there's something I've missed, but based on what I've found so far, I don't think it's possible at the moment. |
Yeah, that makes sense - I guess to an extent standardisation would help here - like, maybe teams should just standardise on having a CI workflow called 'CI'? RepoCop could check for the presence of a 'CI' workflow, and if one exists, set the ruleset up, and if it doesn't, perhaps warn teams that it would be good to standardise on 'CI' - though there may be legitimate cases where complex projects have multiple CI jobs and there is no obvious single test to look at. |
@rtyley I have moved the instructions to a new page in the recommendations repo PR, and just added an extra point to the guardian instructions - hope this is ok? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, brilliant! Sorry it took me so long to get back to you, this is great 👍
What does this change?
Adds some instructions on how to apply rulesets for branch protection and status checks for Guardian developers, once they have disabled branch protection when applying this workflow to a repo.
This allows repos to keep the same level of protection as before, but allows for the Scala release app to bypass and run successfully.
Update: the instructions now link out to a page on the guardian/recommendations repo.