Getting repository ruleset bypass actors shouldn't require write access to that ruleset #152059
Replies: 1 comment
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
Select Topic Area
Product Feedback
Body
https://docs.github.com/en/rest/repos/rules?apiVersion=2022-11-28#get-a-repository-ruleset
I have a terraform
plan
credentials (from a GitHub app) that has Administration (read-only) privilege in a repository. It cannot get thebypass_actors
because it does not have write access to the ruleset, which causes permanent drift where terraform constantly tries to add thebypass_actors
onto the ruleset that already has them:The GET ruleset API should return the
bypass_actors
when the token has Administration (read-only) permissions. "Leaking sensitive information" about a ruleset is not a security concern when the user is an administrator. Otherwise, I simply can't manage rulesets with terraform due to the volume of noise this would create, as it is a security concern to give the app write permissions or switch to a classic token.Beta Was this translation helpful? Give feedback.
All reactions