-
Notifications
You must be signed in to change notification settings - Fork 110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Option to require all changed files be evaluated by a rule #547
Comments
In some sense, Policy Bot already implements this behavior. If every rule in your policy has a file predicate (either One limitation here is that this doesn't work if you're trying to combine the file-based rules with other rules (like having teams own files while giving one team permission to approve any change.) If the existing skipped rule behavior doesn't meet your needs, could share some more details about how you envision this working? That would help me understand if there's a way to do it with existing features and if not, what a new feature might look like. |
I would really appreciate a way to tell Policy Bot about the break-glass rule (along the lines of what you mentioned about giving one team permission to approve any change) so that it doesn't prevent the existing file change behavior from working. It's also worth noting that we had a rule like approval_rules:
- name: fallback
requires:
count: 0 to explicitly get around the ownership requirement behavior before. To that end, I wonder if it wouldn't make sense to make this behavior be explicitly configurable somehow, and give config authors the option as to how skipping should work ( Alternatively, if we were given a new conjunction that allows us to determine whether some or all of the rules in the block were skipped (e.g. |
Hi folks, is there a way to / would y'all consider an option to require all changed files be evaluated by at least one rule? We think something like this would make for a great forcing function to encourage all teams to own the files they're changing, and it would help if the tool that ensured review policy is met for every PR could also help us determine a definitive owner or set of owners for every file.
We could probably make this work with some sort of post-processing but that might require reimplementing some of Policy Bot elsewhere, which we'd rather not do.
The text was updated successfully, but these errors were encountered: