Privileged Requester Action
Перейти к файлу
Grant Birkinbine 1f63276872
Merge pull request #175 from github/dependabot/github_actions/github-actions-8a3b30e1aa
Bump actions/upload-artifact from 4.3.6 to 4.4.0 in the github-actions group
2024-10-08 11:15:19 -07:00
__tests__
.github
config
dist
script
src
.babelrc
.eslintignore
.eslintrc.json
.gitattributes
.gitignore
.node-version
CODE_OF_CONDUCT.md
CONTRIBUTING.md
LICENSE
README.md
SECURITY.md
SUPPORT.md
action.yml
index.js
package-lock.json
package.json

README.md

Privileged Requester

CodeQL package-check units-test

This GitHub Action will automatically approve pull requests based off of requester criteria defined in the target repository.

Use Case

Let's say you have a repository with a lot of dependabot PRs that are safe to automatically merge because you have a super duper robust test suite. You can use this Action to automatically approve pull requests from the dependabot user (or any other user you want).

Here are some bonus use cases:

  • Automatically approve pull requests that were created by some automation that your team wrote
  • Automatically approve pull requests that were created by a bot user that you have created
  • Automatically approve pull requests that were created by a bot user that you have created and that have a specific label
  • Automatically approve pull requests that were created by an admin/priviliged user for your project

Workflow Configuration

Here is an example of how to use this Action in its simplest form:

Where vX.X.X is the latest release version found on the releases page

name: privileged-requester
on:
  pull_request:
    types: [opened, synchronize, reopened, labeled, unlabeled]

permissions:
  pull-requests: write
  contents: read

jobs:
  check:
    runs-on: ubuntu-latest
    steps:
      - uses: github/privileged-requester@vX.X.X
        with:
          path: config/privileged-requester.yaml # the path on the repo's default branch where the privileged requester config can be found
          checkCommits: "true" # check to ensure all commits are made by the requester
          checkDiff: "true" # check to ensure the diff is only removals (no additions) - set to "false" to disable
          checkLabels: "true" # check to ensure the labels on the PR match those defined in the privileged requester config

Note: The config/privileged-requester.yaml file should be added to the default branch of the target repository before this workflow is run. Otherwise, the workflow will fail since it cannot find the configuration file.

See the example in the workflow folder

Requester Configuration

In the target repo, the privileged requester functionality should be configured like so:

---
requesters:
  dependabot[bot]:
    labels:
      - dependencies
      - github_actions

See the example in the config folder.

The location of this file in the target repo should be the path used in the workflow configuration path

Reviewer

This Action runs, by default, with the built-in GITHUB_TOKEN and so approves the PRs as the github-actions[bot] user.

However, you can configure the Action to run with a different repo scoped token - a bot user of your own - by defining the Workflow configuration option github_token pointing to the repo secret for that token.

Configuration

Here are the configuration options for this Action:

Inputs 📥

Input Required? Default Description
github_token yes ${{ github.token }} The GitHub token used to create an authenticated client - Provided for you by default! - You can use the default provided token or you can provide a PAT as an alternative robot user token. Make sure this is a repository scoped token
handle yes 'github-actions[bot]' When using the default ${{ github.token }} (as seen above), the "handle" is fetched from this input since the token is repository scoped and it cannot even read its own handle. You should not need to change this input.
path yes config/privileged-requester.yaml Path where the privileged requester configuration can be found
prCreator yes ${{ github.event.pull_request.user.login }} The creator of the PR for this pull request event
prNumber yes ${{ github.event.pull_request.number }} The number of the PR for this pull request event
checkCommits yes "true" An option to check that every commit in the PR is made from the privileged requester
checkDiff yes "true" An option to check that the PR diff only has a removal diff, with no additions - This option defaults to "true" but it can be disabled by setting it to "false"
checkLabels yes "true" An option to check that the labels on the PR match those defined in the privileged requester config
commitVerification yes "false" Whether or not to validate all commits have proper verification via GPG signed commits

Outputs 📤

Output Description
approved The string "true" if the privileged-requester approved the pull request
commits_verified The string "true" if all commits in the PR are signed/verified

First Time Setup

It should be noted that this Action looks at the default branch for its configuration file. This means that if you add this Action through a pull request, it will look at the default branch and fail because it cannot find the config file that has not landed on main / master yet. After merging the pull request that adds this Action to your repository, it should work as expected.

GitHub App Permissions

If you are using a GitHub app with this Action, you will need to grant the following permissions:

  • Checks: Read and write
  • Contents: Read and write
  • Metadata: Read-only
  • Pull requests: Read and write

Subscribe to Events

This GitHub App will subscribe to the following events:

  • Check suite
  • Check run
  • Pull request

Known Issues

Duplicate Approvals

There is logic built into this Action to try and prevent duplicate approvals from taking place. However, if you subscribe to many pull_request events in your Actions workflow you may see duplicate approvals. Here is an example of the workflow configuration that could cause this and why:

on:
  pull_request:
    types: [opened, synchronize, reopened, labeled, unlabeled]

Now if you were to open a pull request and apply labels to it during the creation process, you would likely see two approvals from this workflow (assuming you pass the privileged requester criteria). This is because the pull_request event is triggered twice - once for the opened event and once for the labeled event. If you want to avoid this, you can remove the labeled event from the workflow configuration or the opened event.