-
-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Potential breaking change in GitHub permissions: Command is not configured for the user's permission level 'none' #128
Comments
Hi @aaron-lane Thank you for this report. I think you are right that this is GitHub making changes to the permissions model. I already have an open ticket with GitHub support about this issue, which I imagine is related. I'll try and find out from GitHub what changes have been made and what I can do to align this action to the new changes. Just a couple of questions:
It's possible that they have increased the permission level requirement for the user that owns the PAT. If you wanted to experiment you could try giving the user that owns the PAT |
Thanks for the fast response, @peter-evans! The user that owns the PAT has The PAT has the I tried removing the redundant roles for the admin testers and added the PAT owner directly as an admin; no change in the permission detection occurred. The only workaround seems to be that the testers are directly assigned maintainer or greater permissions, as per the |
Is there any news on this as we are experiencing the same problem? |
The support ticket I made with GitHub is still open with no new response. I'll follow-up. I think they made changes to the permissions model and I was hoping GitHub would be more forthcoming about what the change was so that I could work around it. It looks like I might need to go digging to figure it out myself. I just haven't found time to do it yet. |
I have a response from GitHub.
The solution for the user account on which the PAT has been created:
@aaron-lane @PSchnurbus24 Please let me know if adding the |
Hi, |
I've updated the docs: I think we can close this now. |
Hello! In the middle of yesterday (2021-09-21), our dispatch actions across multiple repositories suddenly started refusing to run when triggered by members of the repositories' admin teams, citing a permission level of
none
. There were no changes to our action configurations and no change to the teams as far as I can tell, but the solution was to directly add individual members of the admin team as admins on the repositories. As there were no changes tov2
of this action for the last 20 days, I'm guessing that GitHub quietly changed their permissions model yesterday, but I thought I would open this issue in for awareness or in case some one knows what is going on.Failing action output from a member of the admin team running
/destroy
on a pull request:Passing action output from the same member added directly as an admin running
/destroy
on the same pull request:The text was updated successfully, but these errors were encountered: