fix: check if organization and requires sign off commits#2896
fix: check if organization and requires sign off commits#2896steveteuber wants to merge 5 commits intointegrations:mainfrom
Conversation
|
Hi @steveteuber, I was reading into this issue and was wondering the following: |
|
@ArlonAntonius Yes, correct. After #2763 was merged, this issue now occurs only when updating a repository. |
nickfloyd
left a comment
There was a problem hiding this comment.
Let me know what you think about my comment and thank you for this change ❤️
|
@nickfloyd Did you read my comment in the discussion above? It seems like you might have missed it. |
|
currently I have to play around lifecycle{ ignore_changes = all} or reimporting updated repo. So this PR would greatly imrove workflow. So it would be great go with proposed patch instead of waiting v7 |
|
@steveteuber And for the changes to Could you add a testcase which fails with the current code and works with your code? Edit: Once you have a testcase, could you change the logic to use |
|
@deiga Thanks for the feedback. Regarding the changes to To clarify the behavior, here are some scenarios:
|
|
@deiga I've created a new PR #3165 for an alternative approach that only sets the I'll close this PR here because the alternative approach doesn't modifying the Owner struct, and it's more in line with making the provider more explicit. |
This is a follow-up pull request to fix the issue described in #2077.
Before the change?
There is a bug in the GitHub API 2022-11-28 version that causes a 422 error when updating a repository within an organization that has "Require sign off on web-based commits" enabled.
After the change?
On a repository update, we check if the organization has "Require sign off on web-based commits" enabled.
If it's enabled, we do not send the web_commit_signoff_required field in the update request to avoid the 422 error.
Pull request checklist
Does this introduce a breaking change?
Please see our docs on breaking changes to help!