Protected Tags #5529
-
|
In case this is the "right place" for these sort of feature requests, I'd like to start a discussion here about Protected Tags. This is something that has been on github.community for 2+ years and before that on issacs/github since 2017 Per @jeffnappi:
I for one would love to protect all |
Beta Was this translation helpful? Give feedback.
Replies: 8 comments 6 replies
-
|
+1 a nice workflow is to push to production when a v*.. semantic version is pushed. If anyone can push such a tag, anyone can deploy to production... |
Beta Was this translation helpful? Give feedback.
-
|
We have a need for this, too. It would be nice to have some pattern matching for protected tags, or even configurability allowing different people/teams to manage tags with certain patterns. |
Beta Was this translation helpful? Give feedback.
-
|
+1 even if we just had the option to restrict tag creation to a group of users or the higher Maintain role over just basic Write that would be useful. |
Beta Was this translation helpful? Give feedback.
-
|
Absolute +1, but also would add that it would be great if this would also affect whoever had rights to manipulate releases (add/remove files, change release details, etc). This is the main reason that our team hasn't been able to fully utilize releases yet because the ability to change those is just too broad. |
Beta Was this translation helpful? Give feedback.
-
|
This would be quite helpful for us at VS Code 🙂 microsoft/vscode#140207 |
Beta Was this translation helpful? Give feedback.
-
|
👋 Just dropping in as we currently have some APIs that will allow repo admins to protect tags on their repos. Details of how this works below - it's currently behind a feature flag but if anyone here wants me to enable this for their organization or their user, please do let me know. We expect this to be a starting point rather than the final solution, so we'd love your thoughts on how we can improve it! What we've built To set up and manage these tag protections, we’ve introduced three endpoints, which any repo admin should be able to use: GET /repos/{owner/{repo}/tags/protection Returns a list of tag protection rules. POST /repos/{owner}/{repo}/tags/protection Creates a new tag protection rule. Payload must include a curl -" "Authorization: token $GITHUB_TOK"N" { DELETE /repos/{owner}/{repo}/tags/protection/{tag_protection_id} Deletes a tag protection rule. |
Beta Was this translation helpful? Give feedback.
-
|
Sorry for the delayed response. Unfortunately, we may be limited in our testing of this particular beta feature until it’s made available in the on-premise instance since that’s all we use at this time. That said, I’m very glad to hear that this is making progress! I do have a couple of small questions though. Does this keep from tags being altered only, or does it also keep unapproved individuals from altering the files associated with a release? |
Beta Was this translation helpful? Give feedback.
-
|
Hey everyone👋🏼 - Noting our Private Beta Opportunity over here. Locking this thread for now, so we can centralize feedback in #10906 |
Beta Was this translation helpful? Give feedback.
Hey everyone👋🏼 - Noting our Private Beta Opportunity over here. Locking this thread for now, so we can centralize feedback in #10906