It would only work If you want "All" your PRs to be "approved". => It would only work If you want "All" your PRs to be "approved" by the GH Actions.
On Tue, Feb 8, 2022 at 4:00 PM Jarek Potiuk <ja...@potiuk.com> wrote: > Depends on the scheme you choose. > It would only work If you want "All" your PRs to be "approved". > > But it makes little sense to use "approvals" for that because GitHub > Actions have "Checks" which are handling this case (and which Can be done > by GitHub Actions). > > See the difference here: https://pasteboard.co/RoaA64wv4NvH.png > > > > J. > > > On Tue, Feb 8, 2022 at 3:42 PM Chesnay Schepler <ches...@apache.org> > wrote: > >> If GA does not approve the PR wouldn't you not want to merge it in the >> first place? >> Requiring a second committer in that case doesn't sound like such a bad >> idea. >> >> On 08/02/2022 15:29, Jarek Potiuk wrote: >> > Yes it is. But you are not able to distinguish commiters vs. GA. So if >> you >> > set +2 you will need +2 approval from committers when GA does not >> approve >> > it - which is pretty useless if you do not intend to have 2 approvals >> from >> > committers. >> > >> > On Tue, Feb 8, 2022 at 3:27 PM Chesnay Schepler <ches...@apache.org> >> wrote: >> > >> >> Is it not possible to control the number of approvals that are >> required? >> >> >> >> So if a project has N github actions that verify stuff, then the >> project >> >> configures this to N+1. >> >> >> >> Admittedly this would mean that every project has use this properly. >> >> >> >> On 08/02/2022 15:14, Jarek Potiuk wrote: >> >>> In short - just to explain why: >> >>> >> >>> The "protected branches" feature is the way how to make sure that the >> >> code >> >>> is looked at and approved by at least 1 commiter in order to be >> merged. >> >>> This is a strong protection - not only from UI but also prevents you >> from >> >>> fast-forward the "prtected branch" to the tip of the branch that has >> not >> >>> been approved. >> >>> Currently, you could write a github workflow (like the one that >> Michael >> >>> pointed at) where you have no human in the loop to approve such >> change. >> >>> GitHub actions run acts as a "commiter" and approval counts as an >> >> approval >> >>> from committer. Once approved, merge can also happen using the >> workflow. >> >>> This means that even if you have "protected branch" you could have a >> >>> workflow that allows to merge a code that no human looked at in the >> >>> "protected branch". >> >>> >> >>> The settings mentioned by Gavin means that the workflow can still >> perform >> >>> the approval (this wil continue to work) but it will be equivalent to >> >>> non-committer approval (which does not unblock the PR from merging). >> >>> >> >>> J. >> >>> >> >>> On Tue, Feb 8, 2022 at 2:40 PM Michael A. Smith <mich...@smith-li.com >> > >> >>> wrote: >> >>> >> >>>> Not sure if you're asking for in-Apache examples, but GitHub has an >> >> example >> >>>> here: >> >>>> >> >>>> >> >>>> >> >> >> https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/automating-dependabot-with-github-actions?learn=dependency_version_updates&learnProduct=code-security#approve-a-pull-request >> >>>> >> >>>> On Tue, Feb 8, 2022 at 07:34 Gary Gregory <garydgreg...@gmail.com> >> >> wrote: >> >>>>> Do you have an example of such a GH Action? >> >>>>> >> >>>>> Gary >> >>>>> >> >>>>> On Tue, Feb 8, 2022, 07:25 Gavin McDonald <gmcdon...@apache.org> >> >> wrote: >> >>>>>> Hi All, >> >>>>>> >> >>>>>> A recent feature pointed out by Jarek : >> >>>>>> >> >>>>>> >> >>>>>> >> >> >> https://github.blog/changelog/2022-01-14-github-actions-prevent-github-actions-from-approving-pull-requests/ >> >>>>>> is to be able to disable GH Actions from approving PRs. >> >>>>>> >> >>>>>> Infra intends to untick this box and disable this feature. >> >>>>>> >> >>>>>> Any concerns? >> >>>>>> >> >>>>>> Anyone uses this feature? If so why. >> >>>>>> >> >>>>>> -- >> >>>>>> >> >>>>>> *Gavin McDonald* >> >>>>>> Systems Administrator >> >>>>>> ASF Infrastructure Team >> >>>>>> >> >> >> >>