Skip to content

Update TF Templates with Cosmos Role assignment at Account level#601

Closed
geabdluca wants to merge 4 commits into
microsoft-foundry:mainfrom
geabdluca:main
Closed

Update TF Templates with Cosmos Role assignment at Account level#601
geabdluca wants to merge 4 commits into
microsoft-foundry:mainfrom
geabdluca:main

Conversation

@geabdluca
Copy link
Copy Markdown
Contributor

nextgen foundry needs sql roles at account level

@github-actions
Copy link
Copy Markdown

👋 Thanks for your interest in contributing, @geabdluca!

This repository does not accept pull requests directly. If you'd like to report a bug, suggest an improvement, or propose a new sample, please open an issue instead.

See CONTRIBUTING.md for more details.

@github-actions github-actions Bot closed this Mar 16, 2026
brandom-msft added a commit that referenced this pull request Mar 17, 2026
…embers

Users like geabdluca (#601) who are Microsoft employees but have private
microsoft org membership and are not in the microsoft-foundry org slip
through all three signals in the current cascade.

This adds support for an optional ORG_READ_TOKEN repository secret — a
PAT with read:org scope from a microsoft org member. When configured,
Signal 3 uses this token to see all microsoft org members (including
private). Without the secret, behavior is unchanged (falls back to
GITHUB_TOKEN which only sees public members).

To activate: create a classic PAT with read:org scope, then add it as a
repository secret named ORG_READ_TOKEN.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
brandom-msft added a commit that referenced this pull request Mar 17, 2026
…soft

The GITHUB_TOKEN cannot read org membership for ANY org (even the repo's
own org) — it only sees public members. This caused geabdluca (#601) to
be misidentified despite being a member of both microsoft-foundry and
microsoft orgs (with private membership in both).

Now the ORG_READ_TOKEN is used for both the microsoft-foundry and
microsoft org checks. The collaborator check remains on GITHUB_TOKEN
since that's a repo-level API that doesn't need org permissions.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant