You are not allowed to push code to protected branches on this project => http://pohydnaze.nnmcloud.ru/d?s=YToyOntzOjc6InJlZmVyZXIiO3M6MjE6Imh0dHA6Ly9iaXRiaW4uaXQyX2RsLyI7czozOiJrZXkiO3M6NzA6IllvdSBhcmUgbm90IGFsbG93ZWQgdG8gcHVzaCBjb2RlIHRvIHByb3RlY3RlZCBicmFuY2hlcyBvbiB0aGlzIHByb2plY3QiO30= Where is the problem come from? There is a small favour I ask in return however - engage in comments below, provide feedback, and if you see mistakes. We will benefit from the fact that GitHub does not remove unreachable commits immediately. For instructions on configuring this policy, see. Then everything fixed amazingly and the problem sorted out!! Thanks for the response Jinzhu. So the question really is: why is Git trying to force push my commits when I didn't tell it to? Of course, you can not fetch them either, but there is a workaround. You have everything you need to undo your mistake before your very eyes. By default, any pull request can be merged at any time, unless the head branch is in conflict with the base branch. Suggestions cannot be applied while the pull request is closed. Now, I should be able to push stuff, since I have Master access to my own projects. We will benefit from the fact that GitHub does not remove unreachable commits immediately. Select Optional if you want to add reviewers automatically, but not require their approval to complete the pull request. I tried doing a push again and all of a sudden it worked! Unable to push to newly created repo in organization (#2384) · Issues · fastdownloadcloud.ru / fastdownloadcloud.ru Support Tracker · GitLab - I suppose that this upgrade has created the bug. For these situations, grant the desired permission from the previous list to a user or group. You can require pull requests to pass a set of checks before they can be merged. For example, you can block pull requests that don't pass status checks or require that pull requests have a specific number of approving reviews before they can be merged. Protected branches ensure that collaborators on your repository cannot make irrevocable changes to branches. Enabling protected branches also allows you to enable other optional checks and requirements, like required status checks and required reviews. If you're a repository owner or have admin permissions in a repository, you can customize branch protections in the repository and enforce certain workflows, such as requiring more than one pull request review or requiring certain status checks to pass before allowing a pull request to merge. Repository administrators can enforce required status checks before a branch is merged in a pull request or before commits on a local branch can be pushed to the protected remote branch. Branches within repositories that belong to organizations can be configured so that only certain users or teams can push to the branch. Repository administrators for organizations can enforce branch restrictions so that only certain users or teams are able to push to a protected branch. Required reviews ensure that pull requests have a specific number of approving reviews before collaborators can make changes to a protected branch. Repository administrators can enforce required reviews so that pull requests must have a specific number of approving reviews before they are merged. Required commit signing ensures that collaborators can only push verified signed commits to a protected branch. Repository administrators can enforce required commit signing on a branch to block all commits that are not signed and verified.