Azure DevOps branch policy path filter to detect changes in the project root folder
up vote
0
down vote
favorite
I have a path structure like /a/b.
I want to enforce branch policies based on which files have changed as follows:
Policy 1. When a file has changed in the root folder or folder a.
Policy 2. When no files have changed in the root folder or folder a.
How can I do this with path filters?
(I tried "./*;./a/*" and "./*.*;./a/*.*" but it seems like the wildcards match files at any level. ie. It would apply even if there was a file change in folder b.)
azure-devops
add a comment |
up vote
0
down vote
favorite
I have a path structure like /a/b.
I want to enforce branch policies based on which files have changed as follows:
Policy 1. When a file has changed in the root folder or folder a.
Policy 2. When no files have changed in the root folder or folder a.
How can I do this with path filters?
(I tried "./*;./a/*" and "./*.*;./a/*.*" but it seems like the wildcards match files at any level. ie. It would apply even if there was a file change in folder b.)
azure-devops
Why don't you try only/a/*
for policy 1?
– Jayendran
Nov 9 at 2:53
add a comment |
up vote
0
down vote
favorite
up vote
0
down vote
favorite
I have a path structure like /a/b.
I want to enforce branch policies based on which files have changed as follows:
Policy 1. When a file has changed in the root folder or folder a.
Policy 2. When no files have changed in the root folder or folder a.
How can I do this with path filters?
(I tried "./*;./a/*" and "./*.*;./a/*.*" but it seems like the wildcards match files at any level. ie. It would apply even if there was a file change in folder b.)
azure-devops
I have a path structure like /a/b.
I want to enforce branch policies based on which files have changed as follows:
Policy 1. When a file has changed in the root folder or folder a.
Policy 2. When no files have changed in the root folder or folder a.
How can I do this with path filters?
(I tried "./*;./a/*" and "./*.*;./a/*.*" but it seems like the wildcards match files at any level. ie. It would apply even if there was a file change in folder b.)
azure-devops
azure-devops
asked Nov 8 at 22:47
Chris Mohr
2,169188
2,169188
Why don't you try only/a/*
for policy 1?
– Jayendran
Nov 9 at 2:53
add a comment |
Why don't you try only/a/*
for policy 1?
– Jayendran
Nov 9 at 2:53
Why don't you try only
/a/*
for policy 1?– Jayendran
Nov 9 at 2:53
Why don't you try only
/a/*
for policy 1?– Jayendran
Nov 9 at 2:53
add a comment |
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53217305%2fazure-devops-branch-policy-path-filter-to-detect-changes-in-the-project-root-fol%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Why don't you try only
/a/*
for policy 1?– Jayendran
Nov 9 at 2:53