Command Restriction
Set limitations on who can execute specific Mergify commands.
Mergify commands can be a powerful tool to control and manage pull requests. However, in some scenarios, you might want to restrict who can use these commands to ensure they’re executed only by authorized individuals. The command restrictions feature allows you to define a set of users or teams who are permitted to use specific Mergify commands.
How Restrictions Work
Section titled How Restrictions WorkWith command restrictions, you can leverage conditions to define the valid context that are authorized to run a specific command. This could be a list of allowed users or teams, or even attributes related to the pull request itself.
The restrictions are configured with the top-level key commands_restrictions
which can specify restrictions for each commands.
Examples
Section titled ExamplesTo limit backport commands for pull requests coming from the main
branch:
commands_restrictions:
backport:
conditions:
- base = main
To limit backport commands usage to a specific team (or user):
commands_restrictions:
backport:
conditions:
- sender = @team
To limit backport commands for users with a specific permission on the repository.
commands_restrictions:
backport:
conditions:
- sender-permission >= write
Default Restrictions
Section titled Default RestrictionsKey name | Value type | Default |
---|---|---|
backport | Command Restrictions |
|
copy | Command Restrictions |
|
dequeue | Command Restrictions |
|
queue | Command Restrictions |
|
rebase | Command Restrictions |
|
refresh | Command Restrictions |
|
requeue | Command Restrictions |
|
squash | Command Restrictions |
|
unqueue | Command Restrictions |
|
update | Command Restrictions |
|
Command Restriction Format
Section titled Command Restriction FormatKey name | Value type |
---|---|
conditions | List of conditions |