You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -157,13 +157,24 @@ Now we need to create a `keys/` directory that contains our public/private key p
157
157
158
158
> Please ensure the `keys/` dir has 700 permissions and your public/private keys have 600 permissions
159
159
160
-
We also need to create a `creds.env` file which contains a GitHub PAT that is scoped to allow `read` access to `deployments` since our configuration is specifically looking for GitHub deployments. You may also need `repo` permissions on the token as well if your repository is private.
160
+
We also need to create a `creds.env` file which contains a GitHub PAT for using the `github_deployment` event type. This file should be in the same directory as your `docker-compose.yml` file.
161
161
162
162
```ini
163
163
# creds.env
164
164
GITHUB_TOKEN=ghp_abcdefg
165
165
```
166
166
167
+
At a bare minimum, the PAT will need the following permissions:
168
+
169
+
- Deployments: **read and write**
170
+
171
+
However, to unlock the full potential of runway, you will need to give the PAT the following permissions:
172
+
173
+
- Deployments: **read and write**
174
+
- Pull Requests: **read and write** (for usage with [`github/branch-deploy`](https://github.com/github/branch-deploy))
175
+
176
+
You should be using fine-grained GitHub Access Tokens as you can apply granular permissions to them.
0 commit comments