ipfs / github-mgmt

10 stars 25 forks source link

Remvoing biglep's maintainer permissions in various repos #209

Closed BigLep closed 4 months ago

BigLep commented 4 months ago

Summary

Remvoing biglep's maintainer permissions in various repos

Why do you need this?

Reducing permissions since I'm not actively involved in the project currently.

Reviewer's Checklist

github-actions[bot] commented 4 months ago

The following access changes will be introduced as a result of applying the plan:

Access Changes ``` User biglep: - will lose admin permission to 2019.ipfs.camp - will lose admin permission to aegir - will lose admin permission to aegir-typedoc-theme - will lose admin permission to apps - will lose admin permission to artwork - will lose admin permission to awesome-ipfs - will lose admin permission to bbloom - will lose admin permission to benchmarks - will lose admin permission to boxo - will lose admin permission to browser-design-guidelines - will lose admin permission to camp - will lose admin permission to ci-helpers - will have the permission to community change from admin to triage - will have the permission to devgrants change from admin to push - will have the permission to distributed-wikipedia-mirror change from admin to pull - will lose admin permission to distributions - will lose admin permission to download-ipfs-distribution-action - will lose admin permission to ecosystem-directory - will lose admin permission to eslint-config-ipfs - will lose admin permission to fs-repo-migrations - will lose admin permission to gateway-conformance - will lose admin permission to gh-issue-form-test - will lose admin permission to go-bitfield - will lose admin permission to go-bitswap-priv - will lose admin permission to go-block-format - will lose admin permission to go-bs-sqlite3 - will lose admin permission to go-cid - will lose admin permission to go-cidutil - will have the permission to go-dag-store change from admin to pull - will lose admin permission to go-datastore - will lose admin permission to go-detect-race - will lose admin permission to go-dnslink - will lose admin permission to go-ds-badger - will lose admin permission to go-ds-badger2 - will lose admin permission to go-ds-bitcask - will lose admin permission to go-ds-crdt - will lose maintain permission to go-ds-dynamodb - will lose admin permission to go-ds-flatfs - will lose admin permission to go-ds-leveldb - will lose admin permission to go-ds-measure - will lose admin permission to go-ds-pebble - will lose admin permission to go-ds-redis - will lose admin permission to go-ds-s3 - will lose admin permission to go-ds-sql - will lose admin permission to go-ds-swift - will lose admin permission to go-fs-lock - will lose admin permission to go-graphsync - will lose admin permission to go-ipfs-archived - will lose admin permission to go-ipfs-blocksutil - will lose admin permission to go-ipfs-cmds - will lose admin permission to go-ipfs-delay - will lose admin permission to go-ipfs-example-plugin - will lose admin permission to go-ipfs-pq - will lose admin permission to go-ipfs-priv - will lose pull permission to go-ipfs-redirects-file - will lose admin permission to go-ipld-cbor - will lose admin permission to go-ipld-eth-import - will lose admin permission to go-ipld-format - will lose admin permission to go-ipld-git - will lose admin permission to go-ipld-legacy - will lose admin permission to go-ipld-zcash - will lose admin permission to go-libipfs-rapide - will lose admin permission to go-libp2p-dns-router - will lose admin permission to go-log - will lose admin permission to go-merkledag - will lose admin permission to go-metrics-interface - will lose admin permission to go-metrics-prometheus - will lose admin permission to go-peertaskqueue - will lose admin permission to go-qringbuf - will lose admin permission to go-test - will lose admin permission to go-todocounter - will lose admin permission to go-unixfsnode - will lose admin permission to gomod - will lose pull permission to gs-priv - will lose admin permission to hang-fds - will lose admin permission to helia - will lose admin permission to helia-delegated-routing-v1-http-api - will lose admin permission to helia-verified-fetch - will have the permission to in-web-browsers change from admin to pull - will have the permission to ipfs change from admin to pull - will lose admin permission to ipfs-blog - will lose admin permission to ipfs-companion - will lose admin permission to ipfs-desktop - will lose maintain permission to ipfs-docs - will lose admin permission to ipfs-ds-convert - will lose admin permission to ipfs-ds-postgres - will lose admin permission to ipfs-gui - will lose admin permission to ipfs-repository-template - will lose admin permission to ipfs-update - will lose admin permission to ipfs-website - will lose admin permission to ipfs-webui - will lose admin permission to ipget - will lose admin permission to ipld-explorer-components - will lose admin permission to iptb - will lose admin permission to iptb-plugins - will lose admin permission to js-blockstore-datastore-adapter - will lose admin permission to js-dag-service - will lose admin permission to js-datastore-pubsub - will lose admin permission to js-fs-pull-blob-store - will lose admin permission to js-hamt-sharding - will lose admin permission to js-idb-pull-blob-store - will lose admin permission to js-ipfs-bitswap - will lose admin permission to js-ipfs-merkle-dag - will lose admin permission to js-ipfs-repo - will lose admin permission to js-ipfs-unixfs - will lose admin permission to js-ipfs-utils - will lose admin permission to js-ipfsd-ctl - will lose admin permission to js-ipns - will have the permission to js-kubo-rpc-client change from admin to pull - will lose admin permission to js-level-pull-blob-store - will lose admin permission to js-stores - will have the permission to kubo change from admin to pull - will lose admin permission to local-offline-collab - will lose admin permission to metrics - will lose admin permission to mobile-design-guidelines - will lose admin permission to newsletter - will lose admin permission to npm-kubo - will lose admin permission to pinbot-irc - will lose admin permission to pinning-services-api-spec - will lose admin permission to protons - will lose admin permission to public-gateway-checker - will lose admin permission to rainbow - will have the permission to roadmap change from admin to pull - will lose pull permission to sharness - will lose admin permission to someguy - will lose admin permission to spec-generator - will lose admin permission to specs - will lose admin permission to start-ipfs-daemon-action ```
github-actions[bot] commented 4 months ago

Before merge, verify that all the following plans are correct. They will be applied as-is after the merge.

Terraform plans

ipfs ``` Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: - destroy Terraform will perform the following actions: # github_team_membership.this["go-ipfs-priv:biglep"] will be destroyed # (because key ["go-ipfs-priv:biglep"] is not in for_each map) - resource "github_team_membership" "this" { - etag = "W/\"366bd3c2886dd12af57b69c914f382918dae4c89a4b7c85381c23f7acd0f4f8c\"" -> null - id = "5789902:BigLep" -> null - role = "member" -> null - team_id = "5789902" -> null - username = "BigLep" -> null } # github_team_membership.this["kubo maintainers:biglep"] will be destroyed # (because key ["kubo maintainers:biglep"] is not in for_each map) - resource "github_team_membership" "this" { - etag = "W/\"9c7c10cf517c49fb901412c632c875284cac2f6196e93b4b8ca9fb6b22c962db\"" -> null - id = "6744049:BigLep" -> null - role = "member" -> null - team_id = "6744049" -> null - username = "BigLep" -> null } # github_team_membership.this["maintainers:biglep"] will be destroyed # (because key ["maintainers:biglep"] is not in for_each map) - resource "github_team_membership" "this" { - etag = "W/\"49c440244fdad33bf222d2ad3210587a26e8ce53394bc43d88c7407b4c03a49c\"" -> null - id = "3729031:BigLep" -> null - role = "member" -> null - team_id = "3729031" -> null - username = "BigLep" -> null } # github_team_membership.this["specs stewards:biglep"] will be destroyed # (because key ["specs stewards:biglep"] is not in for_each map) - resource "github_team_membership" "this" { - etag = "W/\"2b5f317f876e53fa5ae0a76cf6ecf82ad61e692b411b652789cf2fca5bfda65c\"" -> null - id = "6237620:BigLep" -> null - role = "member" -> null - team_id = "6237620" -> null - username = "BigLep" -> null } # github_team_membership.this["w3dt-stewards:biglep"] will be destroyed # (because key ["w3dt-stewards:biglep"] is not in for_each map) - resource "github_team_membership" "this" { - etag = "W/\"0285a3aebab8569293406f66a7942d6713d69b97c8bd95b89ed04ccf711649be\"" -> null - id = "4656983:BigLep" -> null - role = "maintainer" -> null - team_id = "4656983" -> null - username = "BigLep" -> null } Plan: 0 to add, 0 to change, 5 to destroy. ```