You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix GitOps Command Issue on Pushed Commit by Unautorized User
Issue: when an unautorized user sends GitOps comment on a pushed commit,
PAC is triggering CI since access check is done only for pull_request
event in verifyRepoAndUser func of controller.
Solution: added a check for push event and Ops comment event
type in verifyRepoAndUser func.
https://issues.redhat.com/browse/SRVKP-7110
Signed-off-by: Zaki Shaikh <[email protected]>
topts.Regexp=regexp.MustCompile(fmt.Sprintf(".*User %s is not allowed to trigger CI via pull_request on this repo.", normalUser.UserName))
145
+
topts.Regexp=regexp.MustCompile(fmt.Sprintf(".*User %s is not allowed to trigger CI via pull_request in this repo.", normalUser.UserName))
146
146
tgitea.WaitForPullRequestCommentMatch(t, topts)
147
147
148
148
topts.ParamsRun.Clients.Log.Infof("Sending a /retest comment as a user not belonging to an allowed team in Repo CR policy but part of the organization")
0 commit comments