Skip to main content

此版本的 GitHub Enterprise Server 将于以下日期停止服务 2026-03-17. 即使针对重大安全问题,也不会发布补丁。 为了获得更好的性能、更高的安全性和新功能,请升级到最新版本的 GitHub Enterprise。 如需升级帮助,请联系 GitHub Enterprise 支持

关于推送保护的委派绕过

你可以控制组织或存储库中哪些团队或角色有权绕过推送保护。

谁可以使用此功能?

推送保护的委派绕过适用于以下存储库类型:

本文内容

注意

Delegated bypass for push protection is currently in beta and subject to change.

About delegated bypass for push protection

When push protection is enabled for a repository, users with write access can bypass push protection and push a secret if they provide a reason and the bypass is approved.

With delegated bypass for push protection, you can:

  • Choose which individuals, roles, and teams can bypass push protection.
  • Introduce a review and approval cycle for pushes containing secrets from all other contributors.

To set up delegated bypass, organization owners or repository administrators create a list of users with bypass privileges. This designated list of users can then:

  • Bypass push protection, by specifying a reason for bypassing the block.
  • Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the Security tab of the repository, and will expire after 7 days. For more information about bypass requests, see About bypass requests for push protection.

The following types of users can always bypass push protection without having to request bypass privileges:

  • Organization owners
  • Security managers
  • Users in teams, default roles, or custom roles that have been added to the bypass list.

Next steps