You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When the Extractor creates a Pull Request and that PR gets completed, the option to delete that branch is disabled by the default branch policies.
We get the message: Cannot delete the source branch without force push permission
It would be nice if branch policies could be added to the extractor's Powershell Script so that the branch allows delete permissions for default Azure Devops groups like Contributors.
Is this something you guys are aware of, have considered or know a workaround for?
Because over time, these branches get cluttered and only administrators can delete them. Which is a cumbersome task..
It would be great that any developer that completes the PR, could check out the option to automatically delete the branch when completing the PR.
The text was updated successfully, but these errors were encountered:
Thank you for opening this issue! Please be patient while we will look into it and get back to you as this is an open source project. In the meantime make sure you take a look at the [closed issues](https://github.com/Azure/apiops/issues?q=is%3Aissue+is%3Aclosed) in case your question has already been answered. Don't forget to provide any additional information if needed (e.g. scrubbed logs, detailed feature requests,etc.).
Whenever it's feasible, please don't hesitate to send a Pull Request (PR) our way. We'd greatly appreciate it, and we'll gladly assess and incorporate your changes.
This is a permission issue on the Azure Devops level and has nothing to do with apiops. Extractor creates the PR. It doesn't deal with source branch deletion.
Please describe the feature.
When the Extractor creates a Pull Request and that PR gets completed, the option to delete that branch is disabled by the default branch policies.
We get the message:
Cannot delete the source branch without force push permission
It would be nice if branch policies could be added to the extractor's Powershell Script so that the branch allows delete permissions for default Azure Devops groups like Contributors.
Is this something you guys are aware of, have considered or know a workaround for?
Because over time, these branches get cluttered and only administrators can delete them. Which is a cumbersome task..
It would be great that any developer that completes the PR, could check out the option to automatically delete the branch when completing the PR.
The text was updated successfully, but these errors were encountered: