diff --git a/content/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale.md b/content/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale.md index 0959178d321c..6741362694c7 100644 --- a/content/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale.md +++ b/content/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale.md @@ -45,6 +45,12 @@ For more information on purchasing {% data variables.product.prodname_GH_cs_or_s To learn how to create {% data variables.product.prodname_custom_security_configurations %}, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration). {% endif %} +### After you apply a configuration + +When you apply a {% data variables.product.prodname_security_configuration %} to repositories, each repository enters a managed relationship with that configuration. That relationship can change over time. For example, if a repository admin overrides a security setting on an unenforced configuration, if an organization or enterprise admin detaches the configuration, if enforcement is enabled, or if the initial attachment fails. Each change is reflected in the repository's configuration status. + +For the full list of configuration statuses and recommended actions, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-statuses). + ## About {% data variables.product.prodname_global_settings %} While {% data variables.product.prodname_security_configurations %} determine repository-level security settings, {% data variables.product.prodname_global_settings %} determine your organization-level security settings, which are then inherited by all repositories. With {% data variables.product.prodname_global_settings %}, you can customize how security features analyze your organization. diff --git a/content/code-security/how-tos/secure-at-scale/configure-enterprise-security/establish-complete-coverage/applying-a-custom-security-configuration-to-your-enterprise.md b/content/code-security/how-tos/secure-at-scale/configure-enterprise-security/establish-complete-coverage/applying-a-custom-security-configuration-to-your-enterprise.md index 400590ba9059..aba2a1037404 100644 --- a/content/code-security/how-tos/secure-at-scale/configure-enterprise-security/establish-complete-coverage/applying-a-custom-security-configuration-to-your-enterprise.md +++ b/content/code-security/how-tos/secure-at-scale/configure-enterprise-security/establish-complete-coverage/applying-a-custom-security-configuration-to-your-enterprise.md @@ -16,6 +16,8 @@ category: After you create a {% data variables.product.prodname_custom_security_configuration %}, you need to apply it to repositories in your enterprise to enable the configuration's settings on those repositories. +The repository list displays each repository's configuration status. For the full list of statuses and recommended actions, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-statuses). + {% data reusables.security-configurations.security-features-use-actions %} ## Applying your {% data variables.product.prodname_custom_security_configuration %} to repositories in your enterprise diff --git a/content/code-security/how-tos/secure-at-scale/configure-organization-security/establish-complete-coverage/applying-a-custom-security-configuration.md b/content/code-security/how-tos/secure-at-scale/configure-organization-security/establish-complete-coverage/applying-a-custom-security-configuration.md index 61e83368aabc..89580f96d7b4 100644 --- a/content/code-security/how-tos/secure-at-scale/configure-organization-security/establish-complete-coverage/applying-a-custom-security-configuration.md +++ b/content/code-security/how-tos/secure-at-scale/configure-organization-security/establish-complete-coverage/applying-a-custom-security-configuration.md @@ -15,9 +15,7 @@ category: - Secure at scale --- -## About applying a {% data variables.product.prodname_custom_security_configuration %} - -After you create a {% data variables.product.prodname_custom_security_configuration %}, you need to apply it to repositories in your organization to enable the configuration's settings on those repositories. To learn how to create a {% data variables.product.prodname_custom_security_configuration %}, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration). +To learn how to create a {% data variables.product.prodname_custom_security_configuration %}, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration). ## Applying your {% data variables.product.prodname_custom_security_configuration %} to repositories in your organization @@ -36,6 +34,8 @@ After you create a {% data variables.product.prodname_custom_security_configurat >[!NOTE] > If you apply an enforced configuration, this information is reported in the list of repositories. An enforced configuration means that repository owners are blocked from changing features that have been enabled or disabled in the configuration, but features that are not set aren't enforced. +After you apply a configuration, each repository's configuration status reflects the result of the operation—for example, `attached`, `attaching`, or `failed`. For the full list of statuses and recommended actions, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-statuses). + ## Next steps To learn how to monitor security alerts in your organization, see [AUTOTITLE](/code-security/how-tos/view-and-interpret-data/analyze-organization-data/find-insecure-repositories). diff --git a/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/detaching-repositories-from-their-security-configurations.md b/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/detaching-repositories-from-their-security-configurations.md index aa6d33d3d1cd..b04f30e32889 100644 --- a/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/detaching-repositories-from-their-security-configurations.md +++ b/content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/detaching-repositories-from-their-security-configurations.md @@ -22,6 +22,8 @@ Alternatively, if you want to apply a {% data variables.product.prodname_securit ## Detaching repositories from linked {% data variables.product.prodname_security_configurations %} +Detached repositories show a status of "No configuration" in the repository table on the {% data variables.product.prodname_security_configurations %} settings page. For more information about all configuration statuses, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-statuses). + {% data reusables.profile.access_org %} {% data reusables.organizations.org_settings %} {% data reusables.security-configurations.view-configurations-page %} diff --git a/content/code-security/reference/security-at-scale/index.md b/content/code-security/reference/security-at-scale/index.md index 07c3ab214988..d6b7d2bc92e9 100644 --- a/content/code-security/reference/security-at-scale/index.md +++ b/content/code-security/reference/security-at-scale/index.md @@ -11,5 +11,6 @@ children: - /security-overview-dashboard-metrics - /available-filters-for-security-overview - /security-configuration-enforcement + - /security-configuration-statuses - /troubleshoot-security-configurations --- diff --git a/content/code-security/reference/security-at-scale/security-configuration-statuses.md b/content/code-security/reference/security-at-scale/security-configuration-statuses.md new file mode 100644 index 000000000000..aecf6444f1f1 --- /dev/null +++ b/content/code-security/reference/security-at-scale/security-configuration-statuses.md @@ -0,0 +1,52 @@ +--- +title: Security configuration statuses +shortTitle: Configuration statuses +intro: 'Each repository that has a {% data variables.product.prodname_security_configuration %} applied to it has a configuration status that reflects the current state of the relationship between the repository and the configuration.' +versions: + fpt: '*' + ghec: '*' + ghes: '*' +contentType: reference +category: + - Secure at scale +--- + +A repository's configuration status tells you the current state of its relationship with the applied {% data variables.product.prodname_security_configuration %}. That relationship can change over time—for example, when a repository admin overrides a setting, an admin enables enforcement, or an attachment fails. For more about how configurations and repositories interact, see [AUTOTITLE](/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale). + +You can view configuration statuses in the repository table on your organization's {% data variables.product.prodname_security_configurations %} settings page, or retrieve them with the REST API. For more information, see [AUTOTITLE](/code-security/how-tos/secure-at-scale/configure-organization-security/manage-your-coverage/filtering-repositories-in-your-organization-using-the-repository-table) and [AUTOTITLE](/rest/code-security/configurations). + +## Configuration status reference + +The following table describes all configuration statuses, what causes each status, how each appears in the organization settings repository table, and the recommended action. + +In the repository table, the "Configuration status" filter supports "Attached," "Removed," "Failed," "Enforced," and "Removed by enterprise." Repositories with a `detached` status appear as "No configuration" and are not filterable by configuration status in the UI. However, the REST API's `status` parameter does accept `detached` when listing repositories for an organization-level configuration. + +| Status | Description | Cause | UI display | Recommended action | +|---|---|---|---|---| +| `attached` | The configuration is actively applied. The repository inherits all settings from the configuration. | An organization or enterprise admin applied the configuration to the repository. | The configuration name (for example, "My config") | No action needed. | +| `attaching` | The configuration is being applied. This is a transient state. | An organization or enterprise admin just applied the configuration. | {% octicon "clock" aria-label="Applying" %} Applying CONFIGURATION-NAME | Wait for the operation to complete. If the status does not change, check for attachment failures. | +| `updating` | The configuration is being updated on the repository. | An organization or enterprise admin changed a setting in the configuration. | {% octicon "clock" aria-label="Updating" %} Updating CONFIGURATION-NAME | Wait for the update to complete. | +| `enforced` | The configuration is actively applied and enforced. Repository admins cannot change the enablement status of features controlled by the configuration. | An organization or enterprise admin enabled enforcement on the configuration. | {% octicon "shield" aria-label="Enforced" %} Enforced CONFIGURATION-NAME | No action needed. For more information, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-enforcement). | +| `removed` | A repository-level setting was changed that conflicts with the configuration. The configuration is still associated with the repository, but the repository no longer inherits all settings. | A repository admin changed a security setting on an unenforced configuration. | {% octicon "alert" aria-label="Removed" %} Removed CONFIGURATION-NAME | To restore the intended settings, re-apply the configuration in the "{% data variables.product.prodname_AS %}" page of the repository. To prevent future overrides, consider enabling enforcement. | +| `removed_by_enterprise` | An enterprise-level configuration change caused a conflict with the repository's settings. | An enterprise admin changed a setting that conflicts with the organization-level configuration applied to the repository. | {% octicon "alert" aria-label="Removed" %} Removed CONFIGURATION-NAME | Coordinate with your enterprise admin to resolve the conflict. Re-apply the configuration at the organization or enterprise level. | +| `failed` | The configuration could not be attached to the repository. | A conflict between existing repository settings and the configuration prevented attachment. | {% octicon "alert" aria-label="Failed" %} Failed REASON | Filter by `config-status:failed` in the repository table, then follow the remediation guidance for the specific repository. For more information, see [AUTOTITLE](/code-security/reference/security-at-scale/troubleshoot-security-configurations/diagnosing-security-configuration-issues). | +| `detached` | No configuration is applied. The repository's security settings are managed individually. | An organization admin detached the configuration, or the repository was never attached to a configuration. | No configuration | Apply a configuration if you want the repository to inherit centrally managed settings. For more information, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-a-custom-security-configuration). | + +## Understanding `removed` vs. `detached` + +These statuses reflect different situations: + +* **`removed`**: A repository admin changed a security setting that conflicts with an unenforced configuration. The configuration is still associated with the repository, but the repository no longer counts toward your organization's coverage metrics for that configuration. Re-applying the configuration restores the relationship. +* **`detached`**: The configuration is fully disconnected from the repository. The repository's existing security settings are unchanged, but no configuration manages them. To restore centrally managed settings, apply a new configuration. + +To prevent repositories from reaching a `removed` status, enable enforcement on the configuration. For more information, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-enforcement). + +## Tracking configuration status changes with the audit log + +Your organization's audit log records `repository_security_configuration` events whenever a configuration status changes. You can search for these events using the `action:repository_security_configuration` filter. For more information, see [AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/audit-log-events-for-your-organization#repository_security_configuration){% ifversion ghec or ghes %} and [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/searching-the-audit-log-for-your-enterprise){% endif %}. + +## Further reading + +* [AUTOTITLE](/code-security/concepts/security-at-scale/about-enabling-security-features-at-scale) +* [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-enforcement) +* [AUTOTITLE](/code-security/reference/security-at-scale/troubleshoot-security-configurations/diagnosing-security-configuration-issues) diff --git a/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/diagnosing-security-configuration-issues.md b/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/diagnosing-security-configuration-issues.md new file mode 100644 index 000000000000..7dfb7aeca0cc --- /dev/null +++ b/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/diagnosing-security-configuration-issues.md @@ -0,0 +1,60 @@ +--- +title: Diagnosing security configuration issues +shortTitle: Diagnose configuration issues +intro: Identify repositories where the security configuration could not be attached, or where the configuration relationship has changed, and follow guidance to remediate the problem. +permissions: '{% data reusables.permissions.security-org-enable %}' +versions: + fpt: '*' + ghec: '*' + ghes: '*' +redirect_from: + - /code-security/securing-your-organization/managing-the-security-of-your-organization/finding-repositories-with-attachment-failures + - /code-security/how-tos/secure-at-scale/troubleshoot-security-configurations/finding-repositories-with-attachment-failures + - /code-security/reference/security-at-scale/troubleshoot-security-configurations/finding-repositories-with-attachment-failures +contentType: reference +category: + - Troubleshoot security tools +--- + +## Finding and remediating attachment failures + +When you apply a configuration to a group of repositories, some repositories may fail to attach, typically because of a conflict between existing repository settings and the configuration you applied. When this happens, only some settings are applied to the affected repositories, and those repositories won't inherit future changes to the configuration. + +On the security configuration settings page, in the **Repositories** tab under "Apply configurations", a banner shows how many repositories have an attachment failure and summarizes the reason. Click the link in the banner, or filter the repository list by `config-status:failed`, to see affected repositories and guidance on how to remediate each failure. + +{% data reusables.profile.access_org %} +{% data reusables.organizations.org_settings %} +{% data reusables.security-configurations.view-configurations-page %} +1. Click the **Repositories** tab. +1. In the "Apply configurations" section, filter by `config-status:failed`. +1. From the results list, for the repository you're interested in, click **{% octicon "alert" aria-hidden="true" aria-label="alert" %} Failed REASON**. +1. In the dialog box, review the information and follow the remediation guidance. + +## Finding and remediating removed configurations + +A repository's configuration status changes to `removed` when a repository admin changes a security setting that conflicts with the applied configuration. The configuration is still associated with the repository, but the repository no longer inherits all settings from the configuration. + +To find and remediate repositories with a `removed` status: + +{% data reusables.profile.access_org %} +{% data reusables.organizations.org_settings %} +{% data reusables.security-configurations.view-configurations-page %} +1. Filter the repository list using the "Configuration status" filter and select "Removed." +1. To restore the intended settings, re-apply the configuration to the affected repositories. +1. To prevent future overrides, consider enabling enforcement on the configuration. See [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-enforcement). + +## Finding and remediating enterprise-removed configurations + +A repository's configuration status changes to `removed_by_enterprise` when an enterprise-level change conflicts with the organization-level configuration applied to the repository. + +To find and remediate repositories with a `removed_by_enterprise` status: + +{% data reusables.profile.access_org %} +{% data reusables.organizations.org_settings %} +{% data reusables.security-configurations.view-configurations-page %} +1. Filter the repository list using the "Configuration status" filter and select "Removed by enterprise." +1. Coordinate with your enterprise admin to resolve the conflict between the enterprise-level and organization-level configurations. +1. Re-apply the configuration at the organization or enterprise level. + +For more information about all configuration statuses, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-statuses). + diff --git a/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/finding-repositories-with-attachment-failures.md b/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/finding-repositories-with-attachment-failures.md deleted file mode 100644 index 10a3b05cd5b0..000000000000 --- a/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/finding-repositories-with-attachment-failures.md +++ /dev/null @@ -1,42 +0,0 @@ ---- -title: Finding and fixing configuration attachment failures -shortTitle: Find attachment failures -allowTitleToDifferFromFilename: true -intro: You can identify any repositories where the security configuration could not be attached, and follow guidance to remediate the problem. -permissions: '{% data reusables.permissions.security-org-enable %}' -versions: - fpt: '*' - ghec: '*' - ghes: '*' -redirect_from: - - /code-security/securing-your-organization/managing-the-security-of-your-organization/finding-repositories-with-attachment-failures - - /code-security/how-tos/secure-at-scale/troubleshoot-security-configurations/finding-repositories-with-attachment-failures -contentType: reference -category: - - Troubleshoot security tools ---- - -## Finding and remediating attachment failures - -When you apply a configuration to a group of repositories, you may see a banner reporting that there was an attachment failure for some repositories. This happens when there is a conflict between the existing repository settings and the configuration that you applied. - -When an attachment failure happens: -* Only some of the settings in the security configuration are applied to affected repositories. -* Any changes you later make to the security configuration will not be inherited by the affected repositories. - -On the security configuration settings page, in the **Repositories** tab under "Apply configurations", you will see a banner advising how many repositories in your organization have an attachment failure, and an overview of the reason(s) for the failure. - -Click the link in the banner display, or alternatively, filter the list of repositories by `config-status:failed`, to see the list of affected repositories and to source additional guidance on how to remediate the attachment failure for a specific repository. - -{% data reusables.profile.access_org %} -{% data reusables.organizations.org_settings %} -{% data reusables.security-configurations.view-configurations-page %} -1. Click the **Repositories** tab. -1. In the "Apply configurations" section, filter by `config-status:failed`. -1. From the results list, for the repository you're interested in, click **{% octicon "alert" aria-hidden="true" aria-label="alert" %} Failed REASON**. -1. In the dialog box, review the information and follow the remediation guidance. - -## Further reading - -* [AUTOTITLE](/code-security/securing-your-organization/troubleshooting-security-configurations/a-repository-is-using-advanced-setup-for-code-scanning) -* [AUTOTITLE](/code-security/securing-your-organization/troubleshooting-security-configurations/not-enough-github-advanced-security-licenses) diff --git a/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/index.md b/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/index.md index e8ac4972121d..0a52d2d26841 100644 --- a/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/index.md +++ b/content/code-security/reference/security-at-scale/troubleshoot-security-configurations/index.md @@ -10,7 +10,7 @@ children: - /a-repository-is-using-advanced-setup-for-code-scanning - /feature-disappears - /unexpected-default-setup - - /finding-repositories-with-attachment-failures + - /diagnosing-security-configuration-issues - /not-enough-github-advanced-security-licenses redirect_from: - /code-security/securing-your-organization/troubleshooting-security-configurations diff --git a/content/code-security/tutorials/trialing-github-advanced-security/enable-security-features-trial.md b/content/code-security/tutorials/trialing-github-advanced-security/enable-security-features-trial.md index 10b917a0985a..262afeace947 100644 --- a/content/code-security/tutorials/trialing-github-advanced-security/enable-security-features-trial.md +++ b/content/code-security/tutorials/trialing-github-advanced-security/enable-security-features-trial.md @@ -67,6 +67,8 @@ You may find it helpful to apply an enterprise security configuration to all rep For more information, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-a-custom-security-configuration). +After you apply a configuration, each repository's configuration status reflects the result. For example, a repository may show as `attached`, `attaching`, or `failed`. For a full list of statuses and recommended actions, see [AUTOTITLE](/code-security/reference/security-at-scale/security-configuration-statuses). + ## Next steps Now that you have enabled the security features you want to test, you are ready to look more deeply into how {% data variables.product.prodname_GH_secret_protection %} and {% data variables.product.prodname_GH_code_security %} protect your code. diff --git a/content/copilot/reference/ai-models/model-comparison.md b/content/copilot/reference/ai-models/model-comparison.md index 861d6534c3ab..c59705b5c299 100644 --- a/content/copilot/reference/ai-models/model-comparison.md +++ b/content/copilot/reference/ai-models/model-comparison.md @@ -40,7 +40,6 @@ Use these models for common development tasks that require a balance of quality, |---------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------| | {% data variables.copilot.copilot_gpt_53_codex %} | Delivers higher-quality code on complex engineering tasks like features, tests, debugging, refactors, and reviews without lengthy instructions. | | {% data variables.copilot.copilot_gpt_5_mini %} | Reliable default for most coding and writing tasks. Fast, accurate, and works well across languages and frameworks. | -| {% data variables.copilot.copilot_grok_code %} | Specialized for coding tasks. Performs well on code generation, and debugging across multiple languages. | | {% data variables.copilot.copilot_raptor_mini %} | Specialized for fast, accurate inline suggestions and explanations. | ### When to use these models diff --git a/content/copilot/reference/ai-models/model-hosting.md b/content/copilot/reference/ai-models/model-hosting.md index 239728812fc7..968b5e552d04 100644 --- a/content/copilot/reference/ai-models/model-hosting.md +++ b/content/copilot/reference/ai-models/model-hosting.md @@ -85,24 +85,6 @@ To provide better service quality and reduce latency, {% data variables.product. When using {% data variables.copilot.copilot_gemini %} models, input prompts and output completions continue to run through {% data variables.product.prodname_copilot %}'s content filters for public code matching, when applied, along with those for harmful or offensive content. -## xAI models - -These models are hosted on xAI. xAI operates {% data variables.copilot.copilot_grok_code %} in {% data variables.product.prodname_copilot %} under a zero data retention API policy. This means xAI commits that user content (both inputs sent to the model and outputs generated by the model): - -Will **not** be: -* Logged for any purpose, including human review -* Saved to disk or retained in any form, including as metadata -* Accessible by xAI personnel -* Used for model training - -Will **only**: -* Exist temporarily in RAM for the minimum time required to process and respond to each request -* Be immediately deleted from memory once the response is delivered - -When using xAI, input prompts and output completions continue to run through {% data variables.product.prodname_copilot %}'s content filters for public code matching, when applied, along with those for harmful or offensive content. - -For more information, see [xAI's enterprise terms of service](https://x.ai/legal/terms-of-service-enterprise) on the xAI website. - ## Inline suggestions Inline suggestions, including ghost text and next edit suggestions, are powered by models hosted on Azure for {% data variables.copilot.copilot_business_short %} and {% data variables.copilot.copilot_enterprise_short %} plans. {% data variables.copilot.copilot_free_short %} and {% data variables.copilot.copilot_student_short %} user models are hosted on Fireworks AI. diff --git a/content/rest/copilot/copilot-cloud-agent-management.md b/content/rest/copilot/copilot-cloud-agent-management.md new file mode 100644 index 000000000000..38967e028b6a --- /dev/null +++ b/content/rest/copilot/copilot-cloud-agent-management.md @@ -0,0 +1,12 @@ +--- +title: REST API endpoints for Copilot cloud agent repository management +shortTitle: Cloud agent repository management +intro: 'Use the REST API to manage repository-level settings for {% data variables.copilot.copilot_cloud_agent %}.' +versions: # DO NOT MANUALLY EDIT. CHANGES WILL BE OVERWRITTEN BY A 🤖 + fpt: '*' + ghec: '*' +autogenerated: rest +allowTitleToDifferFromFilename: true +--- + + diff --git a/content/rest/copilot/index.md b/content/rest/copilot/index.md index 50a88be6e54c..4b5ee51fb5d5 100644 --- a/content/rest/copilot/index.md +++ b/content/rest/copilot/index.md @@ -7,6 +7,7 @@ intro: >- autogenerated: rest allowTitleToDifferFromFilename: true children: + - /copilot-cloud-agent-management - /copilot-coding-agent-management - /copilot-content-exclusion-management - /copilot-custom-agents diff --git a/data/tables/copilot/annual-subscriber-model-multipliers.yml b/data/tables/copilot/annual-subscriber-model-multipliers.yml index 8023e41f994b..169802e4040b 100644 --- a/data/tables/copilot/annual-subscriber-model-multipliers.yml +++ b/data/tables/copilot/annual-subscriber-model-multipliers.yml @@ -102,10 +102,6 @@ current_multiplier: '0' new_multiplier: '0.33' -- model: 'Grok Code Fast 1' - current_multiplier: '0.25' - new_multiplier: '0.33' - - model: 'Raptor mini' current_multiplier: '0' new_multiplier: '0.33' diff --git a/data/tables/copilot/auto-model-selection.yml b/data/tables/copilot/auto-model-selection.yml index 98afef2016fd..cd2c5c1407c5 100644 --- a/data/tables/copilot/auto-model-selection.yml +++ b/data/tables/copilot/auto-model-selection.yml @@ -54,12 +54,6 @@ chat: true cli: true -# xAI -- name: Grok Code Fast 1 - cloud_agent: false - chat: true - cli: false - # Fine-tuned OAI models - name: Raptor mini cloud_agent: false diff --git a/data/tables/copilot/model-comparison.yml b/data/tables/copilot/model-comparison.yml index e5206ef2ac24..2e221282e4e5 100644 --- a/data/tables/copilot/model-comparison.yml +++ b/data/tables/copilot/model-comparison.yml @@ -89,12 +89,6 @@ excels_at: Effective and efficient edit-then-test loops with high tool precision further_reading: 'not applicable' -# xAI -- name: Grok Code Fast 1 - task_area: General-purpose coding and writing - excels_at: Fast, accurate code completions and explanations - further_reading: '[Grok Code Fast 1 model card](https://data.x.ai/2025-08-20-grok-4-model-card.pdf)' - # Other providers (alphabetized by model name) - name: Qwen2.5 task_area: General-purpose coding and writing diff --git a/data/tables/copilot/model-deprecation-history.yml b/data/tables/copilot/model-deprecation-history.yml index 461a7bae014d..098080f4c291 100644 --- a/data/tables/copilot/model-deprecation-history.yml +++ b/data/tables/copilot/model-deprecation-history.yml @@ -11,6 +11,10 @@ # - retirement_date: The official retirement date for the model (YYYY-MM-DD). # - suggested_alternative: The model recommended for migration. +- name: 'Grok Code Fast 1' + retirement_date: '2026-05-15' + suggested_alternative: 'GPT-5 mini' + - name: 'Claude Sonnet 4' retirement_date: '2026-05-01' suggested_alternative: 'Claude Sonnet 4.6' diff --git a/data/tables/copilot/model-multipliers.yml b/data/tables/copilot/model-multipliers.yml index 394044f932ff..21b62600d84b 100644 --- a/data/tables/copilot/model-multipliers.yml +++ b/data/tables/copilot/model-multipliers.yml @@ -89,10 +89,6 @@ multiplier_paid: 7.5 multiplier_free: Not applicable -- name: Grok Code Fast 1 - multiplier_paid: 0.25 - multiplier_free: 1 - - name: Raptor mini multiplier_paid: 0 multiplier_free: 1 diff --git a/data/tables/copilot/model-release-status.yml b/data/tables/copilot/model-release-status.yml index df258636396c..cdc260a984bf 100644 --- a/data/tables/copilot/model-release-status.yml +++ b/data/tables/copilot/model-release-status.yml @@ -154,14 +154,6 @@ ask_mode: true edit_mode: true -# xAI models -- name: 'Grok Code Fast 1' - provider: 'xAI' - release_status: 'GA' - agent_mode: true - ask_mode: true - edit_mode: true - # Fine-tuned OAI models - name: 'Raptor mini' provider: 'Fine-tuned GPT-5 mini' diff --git a/data/tables/copilot/model-supported-clients.yml b/data/tables/copilot/model-supported-clients.yml index 6f80a462fc0b..ce6bb9521e09 100644 --- a/data/tables/copilot/model-supported-clients.yml +++ b/data/tables/copilot/model-supported-clients.yml @@ -185,15 +185,6 @@ xcode: true jetbrains: true -- name: Grok Code Fast 1 - dotcom: true - cli: false - vscode: true - vs: true - eclipse: true - xcode: true - jetbrains: true - - name: Raptor mini dotcom: false cli: false diff --git a/data/tables/copilot/model-supported-plans.yml b/data/tables/copilot/model-supported-plans.yml index 795dc1122ff4..96da18e5c107 100644 --- a/data/tables/copilot/model-supported-plans.yml +++ b/data/tables/copilot/model-supported-plans.yml @@ -165,14 +165,6 @@ business: true enterprise: true -- name: Grok Code Fast 1 - free: true - student: true - pro: true - pro_plus: true - business: true - enterprise: true - - name: Raptor mini free: true student: true diff --git a/data/tables/copilot/models-and-pricing.yml b/data/tables/copilot/models-and-pricing.yml index 9756639c0981..edb549bbeafe 100644 --- a/data/tables/copilot/models-and-pricing.yml +++ b/data/tables/copilot/models-and-pricing.yml @@ -181,15 +181,6 @@ output: $12.00 notes: "Prompts \u2264200K tokens" -# xAI -- model: Grok Code Fast 1 - provider: xai - release_status: GA - category: Lightweight - input: $0.20 - cached_input: $0.02 - output: $1.50 - # Fine-tuned (GitHub) - model: 'Raptor mini[^7]' provider: github diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json index 642d1fe2e282..693dfd462bb1 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json @@ -2424,6 +2424,15 @@ "additional-permissions": false, "access": "read" }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "additional-permissions": false, + "access": "read" + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -6402,7 +6411,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6461,6 +6479,21 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "additional-permissions": false, + "access": "read" + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -8115,24 +8148,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -8717,6 +8732,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json index cca1c85e181c..864e56173094 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json @@ -2434,6 +2434,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2457,6 +2463,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -4390,18 +4402,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json index 5f46984f9ec7..138af8f049ac 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json @@ -25,6 +25,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-users-usage-metrics-for-a-specific-day", @@ -3181,6 +3192,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -8274,7 +8296,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -8344,6 +8377,23 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -10376,28 +10426,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -11104,6 +11132,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json index de0d8c392998..55ca88ecf8d8 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json @@ -2332,6 +2332,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2446,6 +2452,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2469,6 +2481,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -4666,18 +4684,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json index 868baa4408ac..2dd6a77998a5 100644 --- a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json @@ -2598,6 +2598,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2712,6 +2718,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2735,6 +2747,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -5128,18 +5146,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json index 642d1fe2e282..693dfd462bb1 100644 --- a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json @@ -2424,6 +2424,15 @@ "additional-permissions": false, "access": "read" }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "additional-permissions": false, + "access": "read" + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -6402,7 +6411,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6461,6 +6479,21 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "additional-permissions": false, + "access": "read" + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -8115,24 +8148,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -8717,6 +8732,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json index cca1c85e181c..864e56173094 100644 --- a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json @@ -2434,6 +2434,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2457,6 +2463,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -4390,18 +4402,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json b/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json index 5f46984f9ec7..138af8f049ac 100644 --- a/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json @@ -25,6 +25,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-users-usage-metrics-for-a-specific-day", @@ -3181,6 +3192,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -8274,7 +8296,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -8344,6 +8377,23 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -10376,28 +10426,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -11104,6 +11132,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json b/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json index de0d8c392998..55ca88ecf8d8 100644 --- a/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json @@ -2332,6 +2332,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2446,6 +2452,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2469,6 +2481,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -4666,18 +4684,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json b/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json index 868baa4408ac..2dd6a77998a5 100644 --- a/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json @@ -2598,6 +2598,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2712,6 +2718,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2735,6 +2747,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -5128,18 +5146,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index 897187a7a0e4..016cd88e9e4c 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -2778,6 +2778,15 @@ "additional-permissions": false, "access": "read" }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "additional-permissions": false, + "access": "read" + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -7029,7 +7038,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -7088,6 +7106,21 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "additional-permissions": false, + "access": "read" + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -8787,24 +8820,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -9554,6 +9569,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json index effe1542474a..95815d29d8c3 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json @@ -2442,6 +2442,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2465,6 +2471,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -4566,18 +4578,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index aa459ff6123d..a1c9cf9036e5 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -285,6 +285,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-users-usage-metrics-for-a-specific-day", @@ -4286,6 +4297,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -9706,7 +9728,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -9776,6 +9809,23 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -11863,28 +11913,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -12790,6 +12818,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json index a9745deb84af..3c4c87b209c0 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json @@ -2406,6 +2406,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2520,6 +2526,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2543,6 +2555,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -5234,18 +5252,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index 031339938fcb..1c3573756b77 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -2654,6 +2654,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2768,6 +2774,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2791,6 +2803,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -5678,18 +5696,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json index 897187a7a0e4..016cd88e9e4c 100644 --- a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json @@ -2778,6 +2778,15 @@ "additional-permissions": false, "access": "read" }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "additional-permissions": false, + "access": "read" + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -7029,7 +7038,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -7088,6 +7106,21 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "additional-permissions": false, + "access": "read" + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -8787,24 +8820,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "additional-permissions": false, - "access": "write" - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -9554,6 +9569,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json index effe1542474a..95815d29d8c3 100644 --- a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json @@ -2442,6 +2442,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2465,6 +2471,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -4566,18 +4578,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json b/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json index aa459ff6123d..a1c9cf9036e5 100644 --- a/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json @@ -285,6 +285,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-users-usage-metrics-for-a-specific-day", @@ -4286,6 +4297,17 @@ "server-to-server": true, "additional-permissions": false }, + { + "category": "copilot", + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "copilot", "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", @@ -9706,7 +9728,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -9776,6 +9809,23 @@ } ] }, + "copilot_agent_settings": { + "title": "Copilot agent settings", + "displayTitle": "Repository permissions for \"Copilot agent settings\"", + "permissions": [ + { + "category": "copilot", + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "repository_custom_properties": { "title": "Custom properties", "displayTitle": "Repository permissions for \"Custom properties\"", @@ -11863,28 +11913,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "pulls", - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "pulls", - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "pulls", "slug": "list-review-comments-on-a-pull-request", @@ -12790,6 +12818,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json b/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json index a9745deb84af..3c4c87b209c0 100644 --- a/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json @@ -2406,6 +2406,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2520,6 +2526,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2543,6 +2555,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -5234,18 +5252,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json b/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json index 031339938fcb..1c3573756b77 100644 --- a/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json @@ -2654,6 +2654,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/enterprise-28-day/latest" }, + { + "slug": "get-copilot-enterprise-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2768,6 +2774,12 @@ "verb": "get", "requestPath": "/orgs/{org}/copilot/metrics/reports/organization-28-day/latest" }, + { + "slug": "get-copilot-organization-user-teams-report-for-a-specific-day", + "subcategory": "copilot-usage-metrics", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day" + }, { "slug": "get-copilot-organization-users-usage-metrics-for-a-specific-day", "subcategory": "copilot-usage-metrics", @@ -2791,6 +2803,12 @@ "subcategory": "copilot-metrics", "verb": "get", "requestPath": "/orgs/{org}/team/{team_slug}/copilot/metrics" + }, + { + "slug": "get-copilot-cloud-agent-configuration-for-a-repository", + "subcategory": "copilot-cloud-agent-management", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration" } ], "copilot-spaces": [ @@ -5678,18 +5696,6 @@ "verb": "patch", "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}" }, - { - "slug": "archive-a-pull-request", - "subcategory": "pulls", - "verb": "put", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, - { - "slug": "unarchive-a-pull-request", - "subcategory": "pulls", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive" - }, { "slug": "list-review-comments-on-a-pull-request", "subcategory": "comments", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json index 81f4a37291e8..200e4b8cd4c6 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json @@ -3834,7 +3834,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -5924,6 +5933,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json index ffb9918564c0..d91176fa5421 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json @@ -5061,7 +5061,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -7616,6 +7627,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json index 32d6688eef73..fbdbac05d3ed 100644 --- a/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json @@ -3903,7 +3903,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6080,6 +6089,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json index 8f0f449c2889..8b8b12d32264 100644 --- a/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json @@ -5144,7 +5144,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -7804,6 +7815,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json index e5b4f5a92947..0370130f7afd 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json @@ -4017,7 +4017,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6272,6 +6281,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json index c32bcdfb19de..4a949a1af339 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json @@ -5354,7 +5354,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -8108,6 +8119,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json index 366933861482..69e252c64712 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json @@ -4326,7 +4326,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6644,6 +6653,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json index 727fb525d0cd..78ef5238ec82 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json @@ -5895,7 +5895,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -8726,6 +8737,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json index 4a8d7e9010ec..584425e0761f 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json @@ -4539,7 +4539,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6875,6 +6884,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json index 53504e34adef..02d8c0e65e55 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json @@ -6336,7 +6336,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -9189,6 +9200,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghes-3.21-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.21-2022-11-28/fine-grained-pat-permissions.json index e76fbd5bb33c..48e589d9a7a8 100644 --- a/src/github-apps/data/ghes-3.21-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.21-2022-11-28/fine-grained-pat-permissions.json @@ -4563,7 +4563,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6917,6 +6926,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.21-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.21-2022-11-28/server-to-server-permissions.json index 6edac73b17bc..b8ab7270551a 100644 --- a/src/github-apps/data/ghes-3.21-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.21-2022-11-28/server-to-server-permissions.json @@ -6447,7 +6447,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -9322,6 +9333,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/data/ghes-3.21-2026-03-10/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.21-2026-03-10/fine-grained-pat-permissions.json index e76fbd5bb33c..48e589d9a7a8 100644 --- a/src/github-apps/data/ghes-3.21-2026-03-10/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.21-2026-03-10/fine-grained-pat-permissions.json @@ -4563,7 +4563,16 @@ "subcategory": "releases", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", - "additional-permissions": false, + "additional-permissions": true, + "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, "access": "write" }, { @@ -6917,6 +6926,15 @@ "requestPath": "/repos/{owner}/{repo}/releases", "additional-permissions": true, "access": "write" + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "additional-permissions": true, + "access": "write" } ] }, diff --git a/src/github-apps/data/ghes-3.21-2026-03-10/server-to-server-permissions.json b/src/github-apps/data/ghes-3.21-2026-03-10/server-to-server-permissions.json index 6edac73b17bc..b8ab7270551a 100644 --- a/src/github-apps/data/ghes-3.21-2026-03-10/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.21-2026-03-10/server-to-server-permissions.json @@ -6447,7 +6447,18 @@ "access": "write", "user-to-server": true, "server-to-server": true, - "additional-permissions": false + "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true }, { "category": "releases", @@ -9322,6 +9333,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": true + }, + { + "category": "releases", + "slug": "update-a-release", + "subcategory": "releases", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/releases/{release_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": true } ] }, diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index ac6f9ce94c8d..3e84c07f65ef 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "6637ddbdc15cc0f1ffbc9b923679d3a88c8c4342" + "sha": "f5d3342150d3748e7307c81639635706f8338a12" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/activity.json b/src/rest/data/fpt-2022-11-28/activity.json index f6afa8ca52d1..57832064d97c 100644 --- a/src/rest/data/fpt-2022-11-28/activity.json +++ b/src/rest/data/fpt-2022-11-28/activity.json @@ -1638,7 +1638,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4790,7 +4790,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -11619,7 +11619,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -14771,7 +14771,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -21608,7 +21608,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -24760,7 +24760,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -31577,7 +31577,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -34729,7 +34729,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41540,7 +41540,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -44692,7 +44692,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -51528,7 +51528,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -54680,7 +54680,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -61490,7 +61490,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -64642,7 +64642,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -71454,7 +71454,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74606,7 +74606,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -81418,7 +81418,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -84570,7 +84570,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/fpt-2022-11-28/copilot-spaces.json b/src/rest/data/fpt-2022-11-28/copilot-spaces.json index c66dd40eb303..0f232a8e3c2d 100644 --- a/src/rest/data/fpt-2022-11-28/copilot-spaces.json +++ b/src/rest/data/fpt-2022-11-28/copilot-spaces.json @@ -46,7 +46,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "
Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in a space; spaces with inaccessible resources are omitted from the response.
", "codeExamples": [ { "request": { @@ -775,7 +775,7 @@ ] } ], - "descriptionHTML": "Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by the submitted resources.
", "codeExamples": [ { "request": { @@ -1406,7 +1406,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -2092,7 +2092,7 @@ ] } ], - "descriptionHTML": "Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including any being added or updated.
", "codeExamples": [ { "request": { @@ -2729,7 +2729,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5525,7 +5525,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5940,7 +5940,7 @@ ] } ], - "descriptionHTML": "Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -6593,7 +6593,7 @@ ] } ], - "descriptionHTML": "Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -7237,7 +7237,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8548,7 +8548,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8730,7 +8730,7 @@ "isRequired": true } ], - "descriptionHTML": "Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being created.
", "codeExamples": [], "statusCodes": [ { @@ -8803,7 +8803,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8955,7 +8955,7 @@ "description": "Updated resource-specific metadata.
" } ], - "descriptionHTML": "Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being updated.
", "codeExamples": [ { "request": { @@ -9112,7 +9112,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { diff --git a/src/rest/data/fpt-2022-11-28/copilot.json b/src/rest/data/fpt-2022-11-28/copilot.json index 747369a41ae2..22e573042e6b 100644 --- a/src/rest/data/fpt-2022-11-28/copilot.json +++ b/src/rest/data/fpt-2022-11-28/copilot.json @@ -1,4 +1,287 @@ { + "copilot-cloud-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "title": "Get Copilot cloud agent configuration for a repository", + "category": "copilot", + "subcategory": "copilot-cloud-agent-management", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the Copilot cloud agent configuration for a repository, including MCP server\nconfiguration, enabled review tools, Actions workflow approval settings, and firewall\nconfiguration.
\nOAuth app tokens and personal access tokens (classic) need the repo scope to use this endpoint.
Default configuration
", + "example": { + "mcp_configuration": null, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": true, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + }, + { + "request": { + "description": "Example 2: Status Code 200", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Configuration with an MCP server and a custom firewall allowlist
", + "example": { + "mcp_configuration": { + "mcpServers": { + "sentry": { + "type": "local", + "command": "npx", + "args": [ + "@sentry/mcp-server@latest", + "--host=$SENTRY_HOST" + ], + "env": { + "SENTRY_HOST": "https://octo-org.sentry.io", + "SENTRY_ACCESS_TOKEN": "$COPILOT_MCP_SENTRY_ACCESS_TOKEN" + }, + "tools": [ + "search_issues", + "get_issue_details" + ] + } + } + }, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": false, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [ + "sentry.io", + "https://api.example.com" + ] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "401", + "description": "Requires authentication
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Copilot agent settings\" repository permissions": "read" + } + ] + } + } + ], "copilot-coding-agent-management": [ { "serverUrl": "https://api.github.com", @@ -3419,6 +3702,117 @@ "disabledForPatV2": true } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot enterprise user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot enterprise user-teams report for a specific day. The report provides user-team join data for Copilot across the enterprise, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing enterprise user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nEnterprise owners, billing managers, and authorized users with fine-grained \"View Enterprise Copilot Metrics\" permission can retrieve Copilot metrics reports for the enterprise. OAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:enterprise scopes to use this endpoint.
Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": false, + "permissions": [ + { + "\"Enterprise Copilot metrics\" enterprise permissions": "read" + } + ], + "disabledForPatV2": true + } + }, { "serverUrl": "https://api.github.com", "verb": "get", @@ -3853,6 +4247,120 @@ ] } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot organization user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "org", + "description": "The organization name. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot organization user-teams report for a specific day. The report provides user-team join data for Copilot across the organization, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing organization user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nOrganization owners and authorized users with fine-grained \"View Organization Copilot Metrics\" permission can retrieve Copilot metrics reports for the organization. OAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
For more information about organization metrics attribution, see How are metrics attributed across organizations.
", + "codeExamples": [ + { + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "org": "ORG" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Organization Copilot metrics\" organization permissions": "read" + } + ] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/fpt-2022-11-28/dependency-graph.json b/src/rest/data/fpt-2022-11-28/dependency-graph.json index 90607a62640a..58c1956fd826 100644 --- a/src/rest/data/fpt-2022-11-28/dependency-graph.json +++ b/src/rest/data/fpt-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/fpt-2022-11-28/issues.json b/src/rest/data/fpt-2022-11-28/issues.json index dfe49614179f..ab5fb6a6c281 100644 --- a/src/rest/data/fpt-2022-11-28/issues.json +++ b/src/rest/data/fpt-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Archives a pull request. Closes, locks, and marks the pull request as archived.\nOnly repository admins can archive pull requests.\nArchived pull requests are hidden from non-admin users.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, - { - "serverUrl": "https://api.github.com", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "title": "Unarchive a pull request", - "category": "pulls", - "subcategory": "pulls", - "parameters": [ - { - "name": "owner", - "description": "The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Unarchives a pull request. Removes the archived flag from the pull request.\nDoes not automatically reopen or unlock the pull request.\nOnly repository admins can unarchive pull requests.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/fpt-2022-11-28/releases.json b/src/rest/data/fpt-2022-11-28/releases.json index 889eb523b3ef..b61c1cb2d049 100644 --- a/src/rest/data/fpt-2022-11-28/releases.json +++ b/src/rest/data/fpt-2022-11-28/releases.json @@ -4076,6 +4076,10 @@ "permissions": [ { "\"Contents\" repository permissions": "write" + }, + { + "\"Contents\" repository permissions": "write", + "\"Workflows\" repository permissions": "write" } ] } diff --git a/src/rest/data/fpt-2022-11-28/repos.json b/src/rest/data/fpt-2022-11-28/repos.json index 6a02d968bdce..4fd4c9d4749e 100644 --- a/src/rest/data/fpt-2022-11-28/repos.json +++ b/src/rest/data/fpt-2022-11-28/repos.json @@ -36818,8 +36818,8 @@ { "allOf": [ { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -36828,22 +36828,50 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } @@ -36875,8 +36903,8 @@ { "allOf": [ { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -36885,21 +36913,56 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } @@ -36931,8 +36994,8 @@ { "allOf": [ { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -36941,23 +37004,21 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, @@ -36988,8 +37049,8 @@ { "allOf": [ { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -36998,21 +37059,22 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } @@ -37044,8 +37106,8 @@ { "allOf": [ { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -37054,50 +37116,21 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } @@ -37129,8 +37162,8 @@ { "allOf": [ { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -37139,56 +37172,22 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", + "description": "The file extensions that are restricted from being pushed to the commit graph.", "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } @@ -37220,8 +37219,8 @@ { "allOf": [ { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -37230,21 +37229,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } }, @@ -38455,128 +38455,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -38729,6 +38607,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } @@ -39518,8 +39518,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -39527,7 +39527,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -39536,10 +39536,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -39547,8 +39576,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -39556,7 +39585,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -39565,10 +39594,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -39576,8 +39638,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -39585,7 +39647,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -39594,10 +39656,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -39605,8 +39671,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -39614,7 +39680,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -39623,9 +39689,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -39634,8 +39700,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39643,7 +39709,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -39652,39 +39718,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -39692,8 +39729,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39701,52 +39738,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -39754,8 +39758,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39763,7 +39767,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -39772,14 +39776,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40919,8 +40919,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40929,29 +40929,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40960,28 +40988,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40990,29 +41053,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -41021,28 +41082,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41051,57 +41113,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41110,63 +41143,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41175,21 +41174,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42383,128 +42383,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -42624,14 +42502,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42640,21 +42639,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -43451,8 +43451,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -43460,7 +43460,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -43469,10 +43469,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -43480,8 +43509,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -43489,7 +43518,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -43498,10 +43527,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -43509,8 +43571,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -43518,7 +43580,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -43527,10 +43589,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -43538,8 +43604,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -43547,7 +43613,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -43556,9 +43622,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -43567,8 +43633,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43576,7 +43642,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -43585,39 +43651,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -43625,8 +43662,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43634,7 +43671,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -43643,43 +43680,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -43687,8 +43691,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43696,7 +43700,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -43705,14 +43709,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -44852,128 +44852,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -45126,6 +45004,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/fpt-2022-11-28/search.json b/src/rest/data/fpt-2022-11-28/search.json index cc203ac2e2f0..e1fbb3c1342e 100644 --- a/src/rest/data/fpt-2022-11-28/search.json +++ b/src/rest/data/fpt-2022-11-28/search.json @@ -2457,6 +2457,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4167,7 +4177,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5292,7 +5302,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6944,7 +6955,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -8069,7 +8080,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/fpt-2026-03-10/activity.json b/src/rest/data/fpt-2026-03-10/activity.json index f6da111b7b62..dbdee5cdf8c1 100644 --- a/src/rest/data/fpt-2026-03-10/activity.json +++ b/src/rest/data/fpt-2026-03-10/activity.json @@ -1525,7 +1525,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4547,7 +4547,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -11246,7 +11246,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -14268,7 +14268,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -20975,7 +20975,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -23997,7 +23997,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -30684,7 +30684,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -33706,7 +33706,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -40387,7 +40387,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -43409,7 +43409,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -50115,7 +50115,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -53137,7 +53137,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59817,7 +59817,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -62839,7 +62839,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -69521,7 +69521,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -72543,7 +72543,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -79225,7 +79225,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -82247,7 +82247,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/fpt-2026-03-10/copilot-spaces.json b/src/rest/data/fpt-2026-03-10/copilot-spaces.json index c66dd40eb303..0f232a8e3c2d 100644 --- a/src/rest/data/fpt-2026-03-10/copilot-spaces.json +++ b/src/rest/data/fpt-2026-03-10/copilot-spaces.json @@ -46,7 +46,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in a space; spaces with inaccessible resources are omitted from the response.
", "codeExamples": [ { "request": { @@ -775,7 +775,7 @@ ] } ], - "descriptionHTML": "Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by the submitted resources.
", "codeExamples": [ { "request": { @@ -1406,7 +1406,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -2092,7 +2092,7 @@ ] } ], - "descriptionHTML": "Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including any being added or updated.
", "codeExamples": [ { "request": { @@ -2729,7 +2729,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5525,7 +5525,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5940,7 +5940,7 @@ ] } ], - "descriptionHTML": "Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -6593,7 +6593,7 @@ ] } ], - "descriptionHTML": "Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -7237,7 +7237,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8548,7 +8548,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8730,7 +8730,7 @@ "isRequired": true } ], - "descriptionHTML": "Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being created.
", "codeExamples": [], "statusCodes": [ { @@ -8803,7 +8803,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8955,7 +8955,7 @@ "description": "Updated resource-specific metadata.
" } ], - "descriptionHTML": "Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being updated.
", "codeExamples": [ { "request": { @@ -9112,7 +9112,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { diff --git a/src/rest/data/fpt-2026-03-10/copilot.json b/src/rest/data/fpt-2026-03-10/copilot.json index e35e9e834699..03f04f4bf97f 100644 --- a/src/rest/data/fpt-2026-03-10/copilot.json +++ b/src/rest/data/fpt-2026-03-10/copilot.json @@ -1,4 +1,287 @@ { + "copilot-cloud-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "title": "Get Copilot cloud agent configuration for a repository", + "category": "copilot", + "subcategory": "copilot-cloud-agent-management", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the Copilot cloud agent configuration for a repository, including MCP server\nconfiguration, enabled review tools, Actions workflow approval settings, and firewall\nconfiguration.
\nOAuth app tokens and personal access tokens (classic) need the repo scope to use this endpoint.
Default configuration
", + "example": { + "mcp_configuration": null, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": true, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + }, + { + "request": { + "description": "Example 2: Status Code 200", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Configuration with an MCP server and a custom firewall allowlist
", + "example": { + "mcp_configuration": { + "mcpServers": { + "sentry": { + "type": "local", + "command": "npx", + "args": [ + "@sentry/mcp-server@latest", + "--host=$SENTRY_HOST" + ], + "env": { + "SENTRY_HOST": "https://octo-org.sentry.io", + "SENTRY_ACCESS_TOKEN": "$COPILOT_MCP_SENTRY_ACCESS_TOKEN" + }, + "tools": [ + "search_issues", + "get_issue_details" + ] + } + } + }, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": false, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [ + "sentry.io", + "https://api.example.com" + ] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "401", + "description": "Requires authentication
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Copilot agent settings\" repository permissions": "read" + } + ] + } + } + ], "copilot-coding-agent-management": [ { "serverUrl": "https://api.github.com", @@ -3416,6 +3699,117 @@ "disabledForPatV2": true } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot enterprise user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot enterprise user-teams report for a specific day. The report provides user-team join data for Copilot across the enterprise, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing enterprise user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nEnterprise owners, billing managers, and authorized users with fine-grained \"View Enterprise Copilot Metrics\" permission can retrieve Copilot metrics reports for the enterprise. OAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:enterprise scopes to use this endpoint.
Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": false, + "permissions": [ + { + "\"Enterprise Copilot metrics\" enterprise permissions": "read" + } + ], + "disabledForPatV2": true + } + }, { "serverUrl": "https://api.github.com", "verb": "get", @@ -3850,6 +4244,120 @@ ] } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot organization user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "org", + "description": "The organization name. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot organization user-teams report for a specific day. The report provides user-team join data for Copilot across the organization, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing organization user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nOrganization owners and authorized users with fine-grained \"View Organization Copilot Metrics\" permission can retrieve Copilot metrics reports for the organization. OAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
For more information about organization metrics attribution, see How are metrics attributed across organizations.
", + "codeExamples": [ + { + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "org": "ORG" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Organization Copilot metrics\" organization permissions": "read" + } + ] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/fpt-2026-03-10/dependency-graph.json b/src/rest/data/fpt-2026-03-10/dependency-graph.json index 90607a62640a..58c1956fd826 100644 --- a/src/rest/data/fpt-2026-03-10/dependency-graph.json +++ b/src/rest/data/fpt-2026-03-10/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/fpt-2026-03-10/issues.json b/src/rest/data/fpt-2026-03-10/issues.json index 34c33e04f6f7..04e21a4ffaf4 100644 --- a/src/rest/data/fpt-2026-03-10/issues.json +++ b/src/rest/data/fpt-2026-03-10/issues.json @@ -1196,7 +1196,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4317,7 +4317,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6335,6 +6335,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Archives a pull request. Closes, locks, and marks the pull request as archived.\nOnly repository admins can archive pull requests.\nArchived pull requests are hidden from non-admin users.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, - { - "serverUrl": "https://api.github.com", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "title": "Unarchive a pull request", - "category": "pulls", - "subcategory": "pulls", - "parameters": [ - { - "name": "owner", - "description": "The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Unarchives a pull request. Removes the archived flag from the pull request.\nDoes not automatically reopen or unlock the pull request.\nOnly repository admins can unarchive pull requests.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/fpt-2026-03-10/releases.json b/src/rest/data/fpt-2026-03-10/releases.json index 889eb523b3ef..b61c1cb2d049 100644 --- a/src/rest/data/fpt-2026-03-10/releases.json +++ b/src/rest/data/fpt-2026-03-10/releases.json @@ -4076,6 +4076,10 @@ "permissions": [ { "\"Contents\" repository permissions": "write" + }, + { + "\"Contents\" repository permissions": "write", + "\"Workflows\" repository permissions": "write" } ] } diff --git a/src/rest/data/fpt-2026-03-10/repos.json b/src/rest/data/fpt-2026-03-10/repos.json index 41d057683bf0..8fc54c88ec44 100644 --- a/src/rest/data/fpt-2026-03-10/repos.json +++ b/src/rest/data/fpt-2026-03-10/repos.json @@ -36445,8 +36445,8 @@ { "allOf": [ { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -36455,22 +36455,50 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } @@ -36502,8 +36530,8 @@ { "allOf": [ { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -36512,21 +36540,56 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } @@ -36558,8 +36621,8 @@ { "allOf": [ { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -36568,23 +36631,21 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, @@ -36615,8 +36676,8 @@ { "allOf": [ { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -36625,21 +36686,22 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } @@ -36671,8 +36733,8 @@ { "allOf": [ { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -36681,50 +36743,21 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } @@ -36756,8 +36789,8 @@ { "allOf": [ { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -36766,56 +36799,22 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", + "description": "The file extensions that are restricted from being pushed to the commit graph.", "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } @@ -36847,8 +36846,8 @@ { "allOf": [ { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -36857,21 +36856,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } }, @@ -38082,128 +38082,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -38356,6 +38234,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } @@ -39145,8 +39145,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -39154,7 +39154,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -39163,10 +39163,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -39174,8 +39203,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -39183,7 +39212,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -39192,10 +39221,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -39203,8 +39265,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -39212,7 +39274,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -39221,10 +39283,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -39232,8 +39298,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -39241,7 +39307,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -39250,9 +39316,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -39261,8 +39327,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39270,7 +39336,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -39279,39 +39345,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -39319,8 +39356,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39328,52 +39365,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -39381,8 +39385,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39390,7 +39394,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -39399,14 +39403,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40546,8 +40546,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40556,29 +40556,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40587,28 +40615,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40617,29 +40680,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -40648,28 +40709,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40678,57 +40740,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40737,63 +40770,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40802,21 +40801,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42010,128 +42010,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -42251,14 +42129,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42267,21 +42266,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -43078,8 +43078,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -43087,7 +43087,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -43096,10 +43096,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -43107,8 +43136,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -43116,7 +43145,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -43125,10 +43154,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -43136,8 +43198,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -43145,7 +43207,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -43154,10 +43216,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -43165,8 +43231,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -43174,7 +43240,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -43183,9 +43249,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -43194,8 +43260,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43203,7 +43269,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -43212,39 +43278,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -43252,8 +43289,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43261,7 +43298,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -43270,43 +43307,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -43314,8 +43318,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43323,7 +43327,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -43332,14 +43336,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -44479,128 +44479,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -44753,6 +44631,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/fpt-2026-03-10/search.json b/src/rest/data/fpt-2026-03-10/search.json index b3ae2bd9acd3..52c428fb24cc 100644 --- a/src/rest/data/fpt-2026-03-10/search.json +++ b/src/rest/data/fpt-2026-03-10/search.json @@ -2451,6 +2451,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4026,7 +4036,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5150,7 +5160,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6668,7 +6679,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7792,7 +7803,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghec-2022-11-28/activity.json b/src/rest/data/ghec-2022-11-28/activity.json index 4bfde5f297bc..545c1dcba9ad 100644 --- a/src/rest/data/ghec-2022-11-28/activity.json +++ b/src/rest/data/ghec-2022-11-28/activity.json @@ -1638,7 +1638,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4790,7 +4790,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -11619,7 +11619,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -14771,7 +14771,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -21608,7 +21608,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -24760,7 +24760,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -31577,7 +31577,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -34729,7 +34729,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41540,7 +41540,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -44692,7 +44692,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -51528,7 +51528,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -54680,7 +54680,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -61490,7 +61490,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -64642,7 +64642,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -71454,7 +71454,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74606,7 +74606,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -81418,7 +81418,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -84570,7 +84570,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghec-2022-11-28/copilot-spaces.json b/src/rest/data/ghec-2022-11-28/copilot-spaces.json index e26d08da25f6..509c6d7d83b2 100644 --- a/src/rest/data/ghec-2022-11-28/copilot-spaces.json +++ b/src/rest/data/ghec-2022-11-28/copilot-spaces.json @@ -46,7 +46,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in a space; spaces with inaccessible resources are omitted from the response.
", "codeExamples": [ { "request": { @@ -775,7 +775,7 @@ ] } ], - "descriptionHTML": "Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by the submitted resources.
", "codeExamples": [ { "request": { @@ -1406,7 +1406,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -2092,7 +2092,7 @@ ] } ], - "descriptionHTML": "Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including any being added or updated.
", "codeExamples": [ { "request": { @@ -2729,7 +2729,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5525,7 +5525,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5940,7 +5940,7 @@ ] } ], - "descriptionHTML": "Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -6593,7 +6593,7 @@ ] } ], - "descriptionHTML": "Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -7237,7 +7237,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8548,7 +8548,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8730,7 +8730,7 @@ "isRequired": true } ], - "descriptionHTML": "Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being created.
", "codeExamples": [], "statusCodes": [ { @@ -8803,7 +8803,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8955,7 +8955,7 @@ "description": "Updated resource-specific metadata.
" } ], - "descriptionHTML": "Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being updated.
", "codeExamples": [ { "request": { @@ -9112,7 +9112,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { diff --git a/src/rest/data/ghec-2022-11-28/copilot.json b/src/rest/data/ghec-2022-11-28/copilot.json index b225cca98f6f..a57d71f0790b 100644 --- a/src/rest/data/ghec-2022-11-28/copilot.json +++ b/src/rest/data/ghec-2022-11-28/copilot.json @@ -1,4 +1,287 @@ { + "copilot-cloud-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "title": "Get Copilot cloud agent configuration for a repository", + "category": "copilot", + "subcategory": "copilot-cloud-agent-management", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the Copilot cloud agent configuration for a repository, including MCP server\nconfiguration, enabled review tools, Actions workflow approval settings, and firewall\nconfiguration.
\nOAuth app tokens and personal access tokens (classic) need the repo scope to use this endpoint.
Default configuration
", + "example": { + "mcp_configuration": null, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": true, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + }, + { + "request": { + "description": "Example 2: Status Code 200", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Configuration with an MCP server and a custom firewall allowlist
", + "example": { + "mcp_configuration": { + "mcpServers": { + "sentry": { + "type": "local", + "command": "npx", + "args": [ + "@sentry/mcp-server@latest", + "--host=$SENTRY_HOST" + ], + "env": { + "SENTRY_HOST": "https://octo-org.sentry.io", + "SENTRY_ACCESS_TOKEN": "$COPILOT_MCP_SENTRY_ACCESS_TOKEN" + }, + "tools": [ + "search_issues", + "get_issue_details" + ] + } + } + }, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": false, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [ + "sentry.io", + "https://api.example.com" + ] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "401", + "description": "Requires authentication
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Copilot agent settings\" repository permissions": "read" + } + ] + } + } + ], "copilot-coding-agent-management": [ { "serverUrl": "https://api.github.com", @@ -5311,6 +5594,117 @@ "disabledForPatV2": true } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot enterprise user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot enterprise user-teams report for a specific day. The report provides user-team join data for Copilot across the enterprise, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing enterprise user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nEnterprise owners, billing managers, and authorized users with fine-grained \"View Enterprise Copilot Metrics\" permission can retrieve Copilot metrics reports for the enterprise. OAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:enterprise scopes to use this endpoint.
Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": false, + "permissions": [ + { + "\"Enterprise Copilot metrics\" enterprise permissions": "read" + } + ], + "disabledForPatV2": true + } + }, { "serverUrl": "https://api.github.com", "verb": "get", @@ -5745,6 +6139,120 @@ ] } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot organization user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "org", + "description": "The organization name. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot organization user-teams report for a specific day. The report provides user-team join data for Copilot across the organization, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing organization user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nOrganization owners and authorized users with fine-grained \"View Organization Copilot Metrics\" permission can retrieve Copilot metrics reports for the organization. OAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
For more information about organization metrics attribution, see How are metrics attributed across organizations.
", + "codeExamples": [ + { + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "org": "ORG" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Organization Copilot metrics\" organization permissions": "read" + } + ] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/ghec-2022-11-28/dependency-graph.json b/src/rest/data/ghec-2022-11-28/dependency-graph.json index 90607a62640a..58c1956fd826 100644 --- a/src/rest/data/ghec-2022-11-28/dependency-graph.json +++ b/src/rest/data/ghec-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghec-2022-11-28/enterprise-admin.json b/src/rest/data/ghec-2022-11-28/enterprise-admin.json index 639ea691cc2d..65f26426a31c 100644 --- a/src/rest/data/ghec-2022-11-28/enterprise-admin.json +++ b/src/rest/data/ghec-2022-11-28/enterprise-admin.json @@ -14333,128 +14333,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -14607,6 +14485,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } @@ -15767,128 +15767,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -16038,7 +15916,129 @@ "type": "boolean", "description": "Copilot automatically reviews each new push to the pull request." } - } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] } } } @@ -18685,128 +18685,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -18959,6 +18837,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghec-2022-11-28/issues.json b/src/rest/data/ghec-2022-11-28/issues.json index f16986045357..d6a4654197b6 100644 --- a/src/rest/data/ghec-2022-11-28/issues.json +++ b/src/rest/data/ghec-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Archives a pull request. Closes, locks, and marks the pull request as archived.\nOnly repository admins can archive pull requests.\nArchived pull requests are hidden from non-admin users.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, - { - "serverUrl": "https://api.github.com", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "title": "Unarchive a pull request", - "category": "pulls", - "subcategory": "pulls", - "parameters": [ - { - "name": "owner", - "description": "The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Unarchives a pull request. Removes the archived flag from the pull request.\nDoes not automatically reopen or unlock the pull request.\nOnly repository admins can unarchive pull requests.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/ghec-2022-11-28/releases.json b/src/rest/data/ghec-2022-11-28/releases.json index ba5404e608c7..12e280f16742 100644 --- a/src/rest/data/ghec-2022-11-28/releases.json +++ b/src/rest/data/ghec-2022-11-28/releases.json @@ -4076,6 +4076,10 @@ "permissions": [ { "\"Contents\" repository permissions": "write" + }, + { + "\"Contents\" repository permissions": "write", + "\"Workflows\" repository permissions": "write" } ] } diff --git a/src/rest/data/ghec-2022-11-28/repos.json b/src/rest/data/ghec-2022-11-28/repos.json index 7a1c98e47aed..404017656fcd 100644 --- a/src/rest/data/ghec-2022-11-28/repos.json +++ b/src/rest/data/ghec-2022-11-28/repos.json @@ -37858,8 +37858,8 @@ { "allOf": [ { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -37868,22 +37868,50 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } @@ -37915,8 +37943,8 @@ { "allOf": [ { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -37925,21 +37953,56 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } @@ -37971,8 +38034,8 @@ { "allOf": [ { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -37981,23 +38044,21 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, @@ -38028,8 +38089,8 @@ { "allOf": [ { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -38038,21 +38099,22 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } @@ -38084,8 +38146,8 @@ { "allOf": [ { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -38094,50 +38156,21 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } @@ -38169,8 +38202,8 @@ { "allOf": [ { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -38179,56 +38212,22 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", + "description": "The file extensions that are restricted from being pushed to the commit graph.", "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } @@ -38260,8 +38259,8 @@ { "allOf": [ { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -38270,21 +38269,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } }, @@ -39497,128 +39497,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -39771,6 +39649,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } @@ -40562,8 +40562,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -40571,7 +40571,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -40580,10 +40580,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -40591,8 +40620,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -40600,7 +40629,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -40609,10 +40638,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -40620,8 +40682,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -40629,7 +40691,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -40638,10 +40700,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -40649,8 +40715,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -40658,7 +40724,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -40667,9 +40733,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -40678,8 +40744,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -40687,7 +40753,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -40696,39 +40762,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -40736,8 +40773,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -40745,52 +40782,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -40798,8 +40802,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -40807,7 +40811,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -40816,14 +40820,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -41965,8 +41965,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -41975,29 +41975,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -42006,28 +42034,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -42036,29 +42099,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -42067,28 +42128,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42097,57 +42159,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42156,63 +42189,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42221,21 +42220,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -43431,128 +43431,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -43672,14 +43550,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -43688,21 +43687,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -44501,8 +44501,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -44510,7 +44510,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -44519,10 +44519,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -44530,8 +44559,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -44539,7 +44568,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -44548,10 +44577,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -44559,8 +44621,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -44568,7 +44630,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -44577,10 +44639,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -44588,8 +44654,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -44597,7 +44663,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -44606,9 +44672,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -44617,8 +44683,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -44626,7 +44692,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -44635,39 +44701,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -44675,8 +44712,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -44684,7 +44721,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -44693,43 +44730,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -44737,8 +44741,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -44746,7 +44750,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -44755,14 +44759,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -45904,128 +45904,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -46178,6 +46056,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghec-2022-11-28/search.json b/src/rest/data/ghec-2022-11-28/search.json index 1cd38f0738f4..470bc7012c45 100644 --- a/src/rest/data/ghec-2022-11-28/search.json +++ b/src/rest/data/ghec-2022-11-28/search.json @@ -2481,6 +2481,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4191,7 +4201,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5316,7 +5326,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6968,7 +6979,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -8093,7 +8104,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghec-2026-03-10/activity.json b/src/rest/data/ghec-2026-03-10/activity.json index 6d72778497a6..31e45cb2d2d6 100644 --- a/src/rest/data/ghec-2026-03-10/activity.json +++ b/src/rest/data/ghec-2026-03-10/activity.json @@ -1525,7 +1525,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4547,7 +4547,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -11246,7 +11246,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -14268,7 +14268,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -20975,7 +20975,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -23997,7 +23997,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -30684,7 +30684,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -33706,7 +33706,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -40387,7 +40387,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -43409,7 +43409,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -50115,7 +50115,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -53137,7 +53137,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59817,7 +59817,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -62839,7 +62839,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -69521,7 +69521,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -72543,7 +72543,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -79225,7 +79225,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -82247,7 +82247,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghec-2026-03-10/copilot-spaces.json b/src/rest/data/ghec-2026-03-10/copilot-spaces.json index e26d08da25f6..509c6d7d83b2 100644 --- a/src/rest/data/ghec-2026-03-10/copilot-spaces.json +++ b/src/rest/data/ghec-2026-03-10/copilot-spaces.json @@ -46,7 +46,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists Copilot Spaces owned by an organization. The authenticated user must have read access to the organization's Copilot Spaces.
\nOnly Spaces that are readable by the authenticated user are returned. This includes public Spaces and internal Spaces if the user is a member of the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in a space; spaces with inaccessible resources are omitted from the response.
", "codeExamples": [ { "request": { @@ -775,7 +775,7 @@ ] } ], - "descriptionHTML": "Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Creates a new Copilot Space owned by an organization. The authenticated user must have permissions to create spaces in the organization.
\nOrganization members with appropriate permissions can create Copilot Spaces to be shared within their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by the submitted resources.
", "codeExamples": [ { "request": { @@ -1406,7 +1406,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets details about a specific Copilot Space owned by an organization. The authenticated user must have read access to the Space.
\nInternal Spaces require the authenticated user to be a member of the organization or have been granted read permissions.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -2092,7 +2092,7 @@ ] } ], - "descriptionHTML": "Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Updates a Copilot Space owned by an organization. The authenticated user must have permissions to update spaces in the organization.
\nOrganization members with appropriate permissions can update Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including any being added or updated.
", "codeExamples": [ { "request": { @@ -2729,7 +2729,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Deletes a Copilot Space owned by an organization. The authenticated user must have permissions to delete spaces in the organization.
\nWarning: This action is permanent and cannot be undone. Deleting a Copilot Space will remove all associated resources and configurations.
\nOrganization members with appropriate permissions can delete Copilot Spaces owned by their organization.
\nOAuth app tokens and personal access tokens (classic) need both the read:org and repo scopes to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5525,7 +5525,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all collaborators for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to view collaborators.
\nEach collaborator entry specifies which user or team has access to the space and at what level (reader, writer, or admin). The space owner (organization) is excluded from this list.
\nNote: Team collaborators listed here are teams that are defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -5940,7 +5940,7 @@ ] } ], - "descriptionHTML": "Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Adds a collaborator (user or team) to a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nNote: When adding users as collaborators, they must already be members of the organization.\nWhen adding teams as collaborators, they must be defined in the organization.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -6593,7 +6593,7 @@ ] } ], - "descriptionHTML": "Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the role of a collaborator for a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -7237,7 +7237,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Removes a collaborator from a specific Copilot Space owned by an organization. The authenticated user must have appropriate permissions to manage collaborators.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8548,7 +8548,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Lists all resources attached to a specific Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8730,7 +8730,7 @@ "isRequired": true } ], - "descriptionHTML": "Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Creates a new resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nThe following resource types are supported: repository, github_file, free_text, github_issue, github_pull_request.\nThe uploaded_text_file and media_content types are not supported via this endpoint.
For github_file resources, if a resource with the same repository, file path, and SHA already exists, the existing resource is returned with a 200 status.
OAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being created.
", "codeExamples": [], "statusCodes": [ { @@ -8803,7 +8803,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Gets a specific resource attached to a Copilot Space owned by an organization.\nThe authenticated user must have appropriate permissions to view the space.
\nOAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { @@ -8955,7 +8955,7 @@ "description": "Updated resource-specific metadata.
" } ], - "descriptionHTML": "Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Updates the metadata of a resource in a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space, including the resource being updated.
", "codeExamples": [ { "request": { @@ -9112,7 +9112,7 @@ } ], "bodyParameters": [], - "descriptionHTML": "Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Deletes a resource from a specific Copilot Space owned by an organization.\nThe authenticated user must have write permissions on the space.
\nOAuth app tokens and personal access tokens (classic) need the write:org scope to use this endpoint.
Fine-grained tokens and GitHub App user access tokens must have been granted access to the organization that owns the space. They must also have been granted access to every repository referenced by resources in the space.
", "codeExamples": [ { "request": { diff --git a/src/rest/data/ghec-2026-03-10/copilot.json b/src/rest/data/ghec-2026-03-10/copilot.json index cf8673b68a8e..ddb4b042d81c 100644 --- a/src/rest/data/ghec-2026-03-10/copilot.json +++ b/src/rest/data/ghec-2026-03-10/copilot.json @@ -1,4 +1,287 @@ { + "copilot-cloud-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/copilot/cloud-agent/configuration", + "title": "Get Copilot cloud agent configuration for a repository", + "category": "copilot", + "subcategory": "copilot-cloud-agent-management", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the Copilot cloud agent configuration for a repository, including MCP server\nconfiguration, enabled review tools, Actions workflow approval settings, and firewall\nconfiguration.
\nOAuth app tokens and personal access tokens (classic) need the repo scope to use this endpoint.
Default configuration
", + "example": { + "mcp_configuration": null, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": true, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + }, + { + "request": { + "description": "Example 2: Status Code 200", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Configuration with an MCP server and a custom firewall allowlist
", + "example": { + "mcp_configuration": { + "mcpServers": { + "sentry": { + "type": "local", + "command": "npx", + "args": [ + "@sentry/mcp-server@latest", + "--host=$SENTRY_HOST" + ], + "env": { + "SENTRY_HOST": "https://octo-org.sentry.io", + "SENTRY_ACCESS_TOKEN": "$COPILOT_MCP_SENTRY_ACCESS_TOKEN" + }, + "tools": [ + "search_issues", + "get_issue_details" + ] + } + } + }, + "enabled_tools": { + "codeql": true, + "copilot_code_review": true, + "secret_scanning": true, + "dependency_vulnerability_checks": true + }, + "require_actions_workflow_approval": false, + "is_firewall_enabled": true, + "is_firewall_recommended_allowlist_enabled": true, + "custom_allowlist": [ + "sentry.io", + "https://api.example.com" + ] + }, + "schema": { + "type": "object", + "properties": { + "mcp_configuration": { + "description": "The user-supplied MCP server configuration for the repository, as a free-form JSON object. This will be set to `null` if no configuration has been set.\n\nThe shape of a valid MCP configuration may evolve over time, so this property is intentionally not strictly typed. Clients should not assume a fixed schema.", + "type": [ + "object", + "null" + ], + "additionalProperties": true + }, + "enabled_tools": { + "type": "object", + "description": "The enabled review tools for Copilot cloud agent.", + "properties": { + "codeql": { + "type": "boolean", + "description": "Whether the CodeQL tool is enabled for the Copilot cloud agent." + }, + "copilot_code_review": { + "type": "boolean", + "description": "Whether the Copilot code review tool is enabled for the Copilot cloud agent." + }, + "secret_scanning": { + "type": "boolean", + "description": "Whether the secret scanning tool is enabled for the Copilot cloud agent." + }, + "dependency_vulnerability_checks": { + "type": "boolean", + "description": "Whether the dependency vulnerability checks tool is enabled for the Copilot cloud agent." + } + }, + "required": [ + "codeql", + "copilot_code_review", + "secret_scanning", + "dependency_vulnerability_checks" + ] + }, + "require_actions_workflow_approval": { + "type": "boolean", + "description": "Whether Actions workflow approval is required for Copilot cloud agent pull requests." + }, + "is_firewall_enabled": { + "type": "boolean", + "description": "Whether the firewall is enabled." + }, + "is_firewall_recommended_allowlist_enabled": { + "type": "boolean", + "description": "Whether the firewall recommended allowlist is enabled." + }, + "custom_allowlist": { + "type": "array", + "description": "A list of custom allowlist entries, as hosts or URLs, that the firewall will allow the Copilot cloud agent to access.", + "items": { + "type": "string", + "description": "A custom allowlist entry, as a host or URL, that the firewall will allow the Copilot cloud agent to access." + } + } + }, + "required": [ + "mcp_configuration", + "enabled_tools", + "require_actions_workflow_approval", + "is_firewall_enabled", + "is_firewall_recommended_allowlist_enabled", + "custom_allowlist" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "401", + "description": "Requires authentication
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Copilot agent settings\" repository permissions": "read" + } + ] + } + } + ], "copilot-coding-agent-management": [ { "serverUrl": "https://api.github.com", @@ -5308,6 +5591,117 @@ "disabledForPatV2": true } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/enterprises/{enterprise}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot enterprise user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot enterprise user-teams report for a specific day. The report provides user-team join data for Copilot across the enterprise, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing enterprise user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nEnterprise owners, billing managers, and authorized users with fine-grained \"View Enterprise Copilot Metrics\" permission can retrieve Copilot metrics reports for the enterprise. OAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:enterprise scopes to use this endpoint.
Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": false, + "permissions": [ + { + "\"Enterprise Copilot metrics\" enterprise permissions": "read" + } + ], + "disabledForPatV2": true + } + }, { "serverUrl": "https://api.github.com", "verb": "get", @@ -5742,6 +6136,120 @@ ] } }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/orgs/{org}/copilot/metrics/reports/user-teams-1-day", + "title": "Get Copilot organization user-teams report for a specific day", + "category": "copilot", + "subcategory": "copilot-usage-metrics", + "parameters": [ + { + "name": "org", + "description": "The organization name. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "day", + "description": "The day to request data for, in YYYY-MM-DD format.
Use this endpoint to retrieve download links for the Copilot organization user-teams report for a specific day. The report provides user-team join data for Copilot across the organization, with one entry per user-team pair.
\nThe report contains user-team membership data for the specified day, enabling consumers to join with the existing organization user reports to compute team-level usage metrics. Reports are generated daily and made available for download through signed URLs with a limited expiration time.
\nThe response includes download links to the report files, along with the specific date of the report. The report covers a complete day for which data has been processed.
\nOrganization owners and authorized users with fine-grained \"View Organization Copilot Metrics\" permission can retrieve Copilot metrics reports for the organization. OAuth app tokens and personal access tokens (classic) need the read:org scope to use this endpoint.
For more information about organization metrics attribution, see How are metrics attributed across organizations.
", + "codeExamples": [ + { + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "org": "ORG" + } + }, + "response": { + "statusCode": "200", + "contentType": "application/json", + "description": "Response
", + "example": { + "download_links": [ + "https://example.com/copilot-usage-report-1.json", + "https://example.com/copilot-usage-report-2.json" + ], + "report_day": "2025-07-01" + }, + "schema": { + "type": "object", + "title": "Copilot Metrics 1 Day Report", + "description": "Links to download the Copilot usage metrics report for an enterprise/organization for a specific day.", + "properties": { + "download_links": { + "type": "array", + "items": { + "type": "string", + "format": "uri" + }, + "description": "The URLs to download the Copilot usage metrics report for the enterprise/organization for the specified day." + }, + "report_day": { + "type": "string", + "format": "date", + "description": "The day of the report in `YYYY-MM-DD` format." + } + }, + "required": [ + "download_links", + "report_day" + ] + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "OK
" + }, + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": true, + "permissions": [ + { + "\"Organization Copilot metrics\" organization permissions": "read" + } + ] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/ghec-2026-03-10/dependency-graph.json b/src/rest/data/ghec-2026-03-10/dependency-graph.json index 90607a62640a..58c1956fd826 100644 --- a/src/rest/data/ghec-2026-03-10/dependency-graph.json +++ b/src/rest/data/ghec-2026-03-10/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghec-2026-03-10/enterprise-admin.json b/src/rest/data/ghec-2026-03-10/enterprise-admin.json index 639ea691cc2d..65f26426a31c 100644 --- a/src/rest/data/ghec-2026-03-10/enterprise-admin.json +++ b/src/rest/data/ghec-2026-03-10/enterprise-admin.json @@ -14333,128 +14333,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -14607,6 +14485,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } @@ -15767,128 +15767,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -16038,7 +15916,129 @@ "type": "boolean", "description": "Copilot automatically reviews each new push to the pull request." } - } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] } } } @@ -18685,128 +18685,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -18959,6 +18837,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghec-2026-03-10/issues.json b/src/rest/data/ghec-2026-03-10/issues.json index 6ded01c4c697..30367528dcd0 100644 --- a/src/rest/data/ghec-2026-03-10/issues.json +++ b/src/rest/data/ghec-2026-03-10/issues.json @@ -1196,7 +1196,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4317,7 +4317,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6335,6 +6335,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Archives a pull request. Closes, locks, and marks the pull request as archived.\nOnly repository admins can archive pull requests.\nArchived pull requests are hidden from non-admin users.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, - { - "serverUrl": "https://api.github.com", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pulls/{pull_number}/archive", - "title": "Unarchive a pull request", - "category": "pulls", - "subcategory": "pulls", - "parameters": [ - { - "name": "owner", - "description": "The account owner of the repository. The name is not case sensitive.
", - "in": "path", - "required": true, - "schema": { - "type": "string" - } - }, - { - "name": "repo", - "description": "The name of the repository without the .git extension. The name is not case sensitive.
The number that identifies the pull request.
", - "in": "path", - "required": true, - "schema": { - "type": "integer" - } - } - ], - "bodyParameters": [], - "descriptionHTML": "Unarchives a pull request. Removes the archived flag from the pull request.\nDoes not automatically reopen or unlock the pull request.\nOnly repository admins can unarchive pull requests.
", - "codeExamples": [ - { - "request": { - "description": "Example", - "acceptHeader": "application/vnd.github.v3+json", - "parameters": { - "owner": "OWNER", - "repo": "REPO", - "pull_number": "PULL_NUMBER" - } - }, - "response": { - "statusCode": "204", - "description": "Response
" - } - } - ], - "statusCodes": [ - { - "httpStatusCode": "204", - "description": "No Content
" - }, - { - "httpStatusCode": "403", - "description": "Forbidden
" - }, - { - "httpStatusCode": "404", - "description": "Resource not found
" - }, - { - "httpStatusCode": "422", - "description": "Validation failed, or the endpoint has been spammed.
" - } - ], - "previews": [], - "progAccess": { - "userToServerRest": true, - "serverToServer": true, - "fineGrainedPat": true, - "permissions": [ - { - "\"Pull requests\" repository permissions": "write" - } - ] - } - }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/ghec-2026-03-10/releases.json b/src/rest/data/ghec-2026-03-10/releases.json index ba5404e608c7..12e280f16742 100644 --- a/src/rest/data/ghec-2026-03-10/releases.json +++ b/src/rest/data/ghec-2026-03-10/releases.json @@ -4076,6 +4076,10 @@ "permissions": [ { "\"Contents\" repository permissions": "write" + }, + { + "\"Contents\" repository permissions": "write", + "\"Workflows\" repository permissions": "write" } ] } diff --git a/src/rest/data/ghec-2026-03-10/repos.json b/src/rest/data/ghec-2026-03-10/repos.json index aa5fba8d5f5a..b7963bcab16e 100644 --- a/src/rest/data/ghec-2026-03-10/repos.json +++ b/src/rest/data/ghec-2026-03-10/repos.json @@ -37485,8 +37485,8 @@ { "allOf": [ { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -37495,22 +37495,50 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } @@ -37542,8 +37570,8 @@ { "allOf": [ { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -37552,21 +37580,56 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } @@ -37598,8 +37661,8 @@ { "allOf": [ { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -37608,23 +37671,21 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, @@ -37655,8 +37716,8 @@ { "allOf": [ { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -37665,21 +37726,22 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } @@ -37711,8 +37773,8 @@ { "allOf": [ { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -37721,50 +37783,21 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } @@ -37796,8 +37829,8 @@ { "allOf": [ { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -37806,56 +37839,22 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", + "description": "The file extensions that are restricted from being pushed to the commit graph.", "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } @@ -37887,8 +37886,8 @@ { "allOf": [ { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -37897,21 +37896,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } }, @@ -39124,128 +39124,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -39398,6 +39276,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } @@ -40189,8 +40189,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -40198,7 +40198,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -40207,10 +40207,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -40218,8 +40247,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -40227,7 +40256,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -40236,10 +40265,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -40247,8 +40309,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -40256,7 +40318,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -40265,10 +40327,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -40276,8 +40342,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -40285,7 +40351,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -40294,9 +40360,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -40305,8 +40371,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -40314,7 +40380,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -40323,39 +40389,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -40363,8 +40400,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -40372,52 +40409,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -40425,8 +40429,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -40434,7 +40438,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -40443,14 +40447,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -41592,8 +41592,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -41602,29 +41602,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -41633,28 +41661,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -41663,29 +41726,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -41694,28 +41755,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41724,57 +41786,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41783,63 +41816,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-cloud@latest/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41848,21 +41847,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -43058,128 +43058,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -43299,14 +43177,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -43315,21 +43314,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -44128,8 +44128,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -44137,7 +44137,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -44146,10 +44146,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -44157,8 +44186,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -44166,7 +44195,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -44175,10 +44204,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -44186,8 +44248,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -44195,7 +44257,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -44204,10 +44266,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -44215,8 +44281,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -44224,7 +44290,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -44233,9 +44299,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -44244,8 +44310,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -44253,7 +44319,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -44262,39 +44328,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -44302,8 +44339,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -44311,7 +44348,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -44320,43 +44357,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -44364,8 +44368,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -44373,7 +44377,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -44382,14 +44386,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -45531,128 +45531,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -45805,6 +45683,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghec-2026-03-10/search.json b/src/rest/data/ghec-2026-03-10/search.json index ea879f06730d..a3fa3963462c 100644 --- a/src/rest/data/ghec-2026-03-10/search.json +++ b/src/rest/data/ghec-2026-03-10/search.json @@ -2475,6 +2475,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4050,7 +4060,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5174,7 +5184,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6692,7 +6703,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7816,7 +7827,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghes-3.16-2022-11-28/activity.json b/src/rest/data/ghes-3.16-2022-11-28/activity.json index 05a07c6820d1..fa27a4d8e812 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/activity.json +++ b/src/rest/data/ghes-3.16-2022-11-28/activity.json @@ -1161,7 +1161,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4313,7 +4313,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -19546,7 +19546,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -22698,7 +22698,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -37939,7 +37939,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41091,7 +41091,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -56312,7 +56312,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59464,7 +59464,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74679,7 +74679,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -77831,7 +77831,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -93070,7 +93070,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -96222,7 +96222,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -111436,7 +111436,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -114588,7 +114588,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -129803,7 +129803,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -132955,7 +132955,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -148170,7 +148170,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -151322,7 +151322,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghes-3.16-2022-11-28/dependency-graph.json b/src/rest/data/ghes-3.16-2022-11-28/dependency-graph.json index e5486f87acbd..4309bc05084c 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/dependency-graph.json +++ b/src/rest/data/ghes-3.16-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.16-2022-11-28/issues.json b/src/rest/data/ghes-3.16-2022-11-28/issues.json index 74e0b1f79fa1..a75a484cc2ea 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.16-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.17-2022-11-28/issues.json b/src/rest/data/ghes-3.17-2022-11-28/issues.json index 685409249928..8ac408da003d 100644 --- a/src/rest/data/ghes-3.17-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.17-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -38632,7 +38632,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -38641,10 +38641,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -38652,8 +38681,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -38661,7 +38690,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -38670,10 +38699,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -38681,8 +38743,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -38690,7 +38752,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -38699,10 +38761,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -38710,8 +38776,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -38719,7 +38785,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -38728,9 +38794,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -38739,8 +38805,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38748,7 +38814,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -38757,39 +38823,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -38797,8 +38834,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38806,52 +38843,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -38859,8 +38863,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38868,7 +38872,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -38877,14 +38881,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40020,8 +40020,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40030,29 +40030,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40061,28 +40089,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.17/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.17/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40091,29 +40154,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -40122,28 +40183,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40152,57 +40214,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40211,63 +40244,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.17/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.17/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40276,21 +40275,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -41476,128 +41476,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -41717,14 +41595,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41733,21 +41732,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42543,8 +42543,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -42552,7 +42552,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -42561,10 +42561,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -42572,8 +42601,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -42581,7 +42610,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -42590,10 +42619,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -42601,8 +42663,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -42610,7 +42672,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -42619,10 +42681,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -42630,8 +42696,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -42639,7 +42705,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -42648,9 +42714,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -42659,8 +42725,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42668,7 +42734,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -42677,39 +42743,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -42717,8 +42754,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42726,7 +42763,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -42735,43 +42772,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -42779,8 +42783,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42788,7 +42792,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -42797,14 +42801,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -43940,128 +43940,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -44214,6 +44092,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghes-3.17-2022-11-28/search.json b/src/rest/data/ghes-3.17-2022-11-28/search.json index 131c44ff064b..83d48cc10128 100644 --- a/src/rest/data/ghes-3.17-2022-11-28/search.json +++ b/src/rest/data/ghes-3.17-2022-11-28/search.json @@ -2297,6 +2297,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4007,7 +4017,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5132,7 +5142,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6784,7 +6795,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7909,7 +7920,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghes-3.18-2022-11-28/activity.json b/src/rest/data/ghes-3.18-2022-11-28/activity.json index a2cebc067fd9..65d022797ff3 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/activity.json +++ b/src/rest/data/ghes-3.18-2022-11-28/activity.json @@ -1161,7 +1161,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4313,7 +4313,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -19546,7 +19546,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -22698,7 +22698,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -37939,7 +37939,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41091,7 +41091,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -56312,7 +56312,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59464,7 +59464,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74679,7 +74679,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -77831,7 +77831,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -93070,7 +93070,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -96222,7 +96222,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -111436,7 +111436,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -114588,7 +114588,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -129803,7 +129803,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -132955,7 +132955,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -148170,7 +148170,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -151322,7 +151322,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghes-3.18-2022-11-28/dependency-graph.json b/src/rest/data/ghes-3.18-2022-11-28/dependency-graph.json index e5486f87acbd..4309bc05084c 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/dependency-graph.json +++ b/src/rest/data/ghes-3.18-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.18-2022-11-28/issues.json b/src/rest/data/ghes-3.18-2022-11-28/issues.json index 76ccde7bbc12..d03bf983bdc1 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.18-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -38657,7 +38657,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -38666,10 +38666,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -38677,8 +38706,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -38686,7 +38715,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -38695,10 +38724,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -38706,8 +38768,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -38715,7 +38777,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -38724,10 +38786,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -38735,8 +38801,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -38744,7 +38810,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -38753,9 +38819,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -38764,8 +38830,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38773,7 +38839,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -38782,39 +38848,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -38822,8 +38859,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38831,52 +38868,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -38884,8 +38888,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38893,7 +38897,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -38902,14 +38906,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40045,8 +40045,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40055,29 +40055,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40086,28 +40114,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.18/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.18/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40116,29 +40179,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -40147,28 +40208,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40177,57 +40239,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40236,63 +40269,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.18/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.18/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40301,21 +40300,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -41501,128 +41501,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -41742,14 +41620,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41758,21 +41757,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42568,8 +42568,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -42577,7 +42577,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -42586,10 +42586,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -42597,8 +42626,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -42606,7 +42635,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -42615,10 +42644,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -42626,8 +42688,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -42635,7 +42697,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -42644,10 +42706,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -42655,8 +42721,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -42664,7 +42730,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -42673,9 +42739,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -42684,8 +42750,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42693,7 +42759,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -42702,39 +42768,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -42742,8 +42779,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42751,7 +42788,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -42760,43 +42797,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -42804,8 +42808,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42813,7 +42817,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -42822,14 +42826,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -43965,128 +43965,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -44239,6 +44117,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghes-3.18-2022-11-28/search.json b/src/rest/data/ghes-3.18-2022-11-28/search.json index ed3d28e0e41d..f31b5a107557 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/search.json +++ b/src/rest/data/ghes-3.18-2022-11-28/search.json @@ -2307,6 +2307,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4017,7 +4027,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5142,7 +5152,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6794,7 +6805,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7919,7 +7930,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghes-3.19-2022-11-28/activity.json b/src/rest/data/ghes-3.19-2022-11-28/activity.json index 6b8238cf6954..7a79ec14fa38 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/activity.json +++ b/src/rest/data/ghes-3.19-2022-11-28/activity.json @@ -1161,7 +1161,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4313,7 +4313,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -19546,7 +19546,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -22698,7 +22698,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -37939,7 +37939,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41091,7 +41091,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -56312,7 +56312,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59464,7 +59464,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74679,7 +74679,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -77831,7 +77831,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -93070,7 +93070,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -96222,7 +96222,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -111436,7 +111436,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -114588,7 +114588,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -129803,7 +129803,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -132955,7 +132955,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -148170,7 +148170,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -151322,7 +151322,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghes-3.19-2022-11-28/code-security.json b/src/rest/data/ghes-3.19-2022-11-28/code-security.json index 99b928b55960..ffb0b3d09e94 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.19-2022-11-28/code-security.json @@ -1778,7 +1778,7 @@ ] }, { - "type": "object or null", + "type": "object", "name": "code_scanning_default_setup_options", "description": "Feature options for code scanning default setup
", "childParamsGroups": [ @@ -1796,6 +1796,11 @@ "type": "string or null", "name": "runner_label", "description": "The label of the runner to use for code scanning default setup when runner_type is 'labeled'.
" + }, + { + "type": "boolean or null", + "name": "allow_advanced", + "description": "Whether to allow repos which use advanced setup
" } ] }, @@ -5306,7 +5311,7 @@ ] }, { - "type": "object or null", + "type": "object", "name": "code_scanning_default_setup_options", "description": "Feature options for code scanning default setup
", "childParamsGroups": [ @@ -5324,6 +5329,11 @@ "type": "string or null", "name": "runner_label", "description": "The label of the runner to use for code scanning default setup when runner_type is 'labeled'.
" + }, + { + "type": "boolean or null", + "name": "allow_advanced", + "description": "Whether to allow repos which use advanced setup
" } ] }, diff --git a/src/rest/data/ghes-3.19-2022-11-28/dependency-graph.json b/src/rest/data/ghes-3.19-2022-11-28/dependency-graph.json index e5486f87acbd..4309bc05084c 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/dependency-graph.json +++ b/src/rest/data/ghes-3.19-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.19-2022-11-28/issues.json b/src/rest/data/ghes-3.19-2022-11-28/issues.json index 504fb5248d64..a932fcacd5ee 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.19-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -38657,7 +38657,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -38666,10 +38666,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -38677,8 +38706,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -38686,7 +38715,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -38695,10 +38724,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -38706,8 +38768,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -38715,7 +38777,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -38724,10 +38786,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -38735,8 +38801,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -38744,7 +38810,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -38753,9 +38819,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -38764,8 +38830,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38773,7 +38839,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -38782,39 +38848,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -38822,8 +38859,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38831,52 +38868,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -38884,8 +38888,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -38893,7 +38897,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -38902,14 +38906,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40045,8 +40045,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40055,29 +40055,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40086,28 +40114,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.19/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.19/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40116,29 +40179,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -40147,28 +40208,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40177,57 +40239,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40236,63 +40269,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.19/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.19/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40301,21 +40300,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -41501,128 +41501,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -41742,14 +41620,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41758,21 +41757,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42568,8 +42568,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -42577,7 +42577,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -42586,10 +42586,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -42597,8 +42626,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -42606,7 +42635,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -42615,10 +42644,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -42626,8 +42688,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -42635,7 +42697,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -42644,10 +42706,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -42655,8 +42721,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -42664,7 +42730,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -42673,9 +42739,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -42684,8 +42750,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42693,7 +42759,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -42702,39 +42768,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -42742,8 +42779,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42751,7 +42788,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -42760,43 +42797,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -42804,8 +42808,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42813,7 +42817,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -42822,14 +42826,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -43965,128 +43965,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -44239,6 +44117,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghes-3.19-2022-11-28/search.json b/src/rest/data/ghes-3.19-2022-11-28/search.json index f6c22267e9f2..b7826b197844 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/search.json +++ b/src/rest/data/ghes-3.19-2022-11-28/search.json @@ -2307,6 +2307,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4017,7 +4027,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5142,7 +5152,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6794,7 +6805,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7919,7 +7930,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghes-3.20-2022-11-28/activity.json b/src/rest/data/ghes-3.20-2022-11-28/activity.json index bd28e3717fa1..01dcc267e190 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/activity.json +++ b/src/rest/data/ghes-3.20-2022-11-28/activity.json @@ -1161,7 +1161,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4313,7 +4313,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -19546,7 +19546,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -22698,7 +22698,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -37939,7 +37939,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41091,7 +41091,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -56312,7 +56312,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59464,7 +59464,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74679,7 +74679,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -77831,7 +77831,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -93070,7 +93070,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -96222,7 +96222,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -111436,7 +111436,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -114588,7 +114588,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -129803,7 +129803,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -132955,7 +132955,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -148170,7 +148170,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -151322,7 +151322,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghes-3.20-2022-11-28/code-security.json b/src/rest/data/ghes-3.20-2022-11-28/code-security.json index 3e45483efa07..5019ca365abb 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.20-2022-11-28/code-security.json @@ -1778,7 +1778,7 @@ ] }, { - "type": "object or null", + "type": "object", "name": "code_scanning_default_setup_options", "description": "Feature options for code scanning default setup
", "childParamsGroups": [ @@ -1796,6 +1796,11 @@ "type": "string or null", "name": "runner_label", "description": "The label of the runner to use for code scanning default setup when runner_type is 'labeled'.
" + }, + { + "type": "boolean or null", + "name": "allow_advanced", + "description": "Whether to allow repos which use advanced setup
" } ] }, @@ -5306,7 +5311,7 @@ ] }, { - "type": "object or null", + "type": "object", "name": "code_scanning_default_setup_options", "description": "Feature options for code scanning default setup
", "childParamsGroups": [ @@ -5324,6 +5329,11 @@ "type": "string or null", "name": "runner_label", "description": "The label of the runner to use for code scanning default setup when runner_type is 'labeled'.
" + }, + { + "type": "boolean or null", + "name": "allow_advanced", + "description": "Whether to allow repos which use advanced setup
" } ] }, diff --git a/src/rest/data/ghes-3.20-2022-11-28/dependency-graph.json b/src/rest/data/ghes-3.20-2022-11-28/dependency-graph.json index e5486f87acbd..4309bc05084c 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/dependency-graph.json +++ b/src/rest/data/ghes-3.20-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.20-2022-11-28/issues.json b/src/rest/data/ghes-3.20-2022-11-28/issues.json index 1918ea1d3636..f9b3353010fb 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.20-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -38885,7 +38885,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -38894,10 +38894,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -38905,8 +38934,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -38914,7 +38943,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -38923,10 +38952,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -38934,8 +38996,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -38943,7 +39005,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -38952,10 +39014,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -38963,8 +39029,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -38972,7 +39038,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -38981,9 +39047,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -38992,8 +39058,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39001,7 +39067,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -39010,39 +39076,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -39050,8 +39087,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39059,52 +39096,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -39112,8 +39116,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39121,7 +39125,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -39130,14 +39134,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40275,8 +40275,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40285,29 +40285,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40316,28 +40344,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.20/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.20/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40346,29 +40409,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -40377,28 +40438,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40407,57 +40469,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40466,63 +40499,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.20/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.20/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40531,21 +40530,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -41733,128 +41733,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -41974,14 +41852,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41990,21 +41989,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42801,8 +42801,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -42810,7 +42810,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -42819,10 +42819,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -42830,8 +42859,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -42839,7 +42868,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -42848,10 +42877,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -42859,8 +42921,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -42868,7 +42930,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -42877,10 +42939,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -42888,8 +42954,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -42897,7 +42963,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -42906,9 +42972,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -42917,8 +42983,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42926,7 +42992,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -42935,39 +43001,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -42975,8 +43012,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -42984,7 +43021,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -42993,43 +43030,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -43037,8 +43041,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43046,7 +43050,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -43055,14 +43059,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -44200,128 +44200,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -44474,6 +44352,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghes-3.20-2022-11-28/search.json b/src/rest/data/ghes-3.20-2022-11-28/search.json index 330d8e57c9f9..17c1553dc253 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/search.json +++ b/src/rest/data/ghes-3.20-2022-11-28/search.json @@ -2307,6 +2307,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4017,7 +4027,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5142,7 +5152,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6794,7 +6805,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7919,7 +7930,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghes-3.21-2022-11-28/activity.json b/src/rest/data/ghes-3.21-2022-11-28/activity.json index cd29b10b876e..93080faa1047 100644 --- a/src/rest/data/ghes-3.21-2022-11-28/activity.json +++ b/src/rest/data/ghes-3.21-2022-11-28/activity.json @@ -1161,7 +1161,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4313,7 +4313,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -19546,7 +19546,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -22698,7 +22698,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -37939,7 +37939,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -41091,7 +41091,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -56312,7 +56312,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -59464,7 +59464,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74679,7 +74679,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -77831,7 +77831,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -93070,7 +93070,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -96222,7 +96222,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -111436,7 +111436,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -114588,7 +114588,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -129803,7 +129803,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -132955,7 +132955,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -148170,7 +148170,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -151322,7 +151322,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghes-3.21-2022-11-28/dependency-graph.json b/src/rest/data/ghes-3.21-2022-11-28/dependency-graph.json index e5486f87acbd..4309bc05084c 100644 --- a/src/rest/data/ghes-3.21-2022-11-28/dependency-graph.json +++ b/src/rest/data/ghes-3.21-2022-11-28/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.21-2022-11-28/issues.json b/src/rest/data/ghes-3.21-2022-11-28/issues.json index f0e79ed72f1c..f0a312d77412 100644 --- a/src/rest/data/ghes-3.21-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.21-2022-11-28/issues.json @@ -1309,7 +1309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4560,7 +4560,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6595,6 +6595,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -39547,7 +39547,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -39556,10 +39556,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -39567,8 +39596,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -39576,7 +39605,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -39585,10 +39614,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -39596,8 +39658,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -39605,7 +39667,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -39614,10 +39676,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -39625,8 +39691,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -39634,7 +39700,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -39643,9 +39709,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -39654,8 +39720,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39663,7 +39729,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -39672,39 +39738,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -39712,8 +39749,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39721,52 +39758,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -39774,8 +39778,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39783,7 +39787,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -39792,14 +39796,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40938,8 +40938,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40948,29 +40948,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40979,28 +41007,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -41009,29 +41072,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -41040,28 +41101,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41070,57 +41132,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41129,63 +41162,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -41194,21 +41193,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42401,128 +42401,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -42642,14 +42520,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42658,21 +42657,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -43470,8 +43470,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -43479,7 +43479,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -43488,10 +43488,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -43499,8 +43528,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -43508,7 +43537,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -43517,10 +43546,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -43528,8 +43590,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -43537,7 +43599,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -43546,10 +43608,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -43557,8 +43623,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -43566,7 +43632,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -43575,9 +43641,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -43586,8 +43652,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43595,7 +43661,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -43604,39 +43670,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -43644,8 +43681,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43653,7 +43690,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -43662,43 +43699,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -43706,8 +43710,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43715,7 +43719,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -43724,14 +43728,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -44870,128 +44870,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -45144,6 +45022,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghes-3.21-2022-11-28/search.json b/src/rest/data/ghes-3.21-2022-11-28/search.json index fc5b3d7d9106..e94ca6cc68ad 100644 --- a/src/rest/data/ghes-3.21-2022-11-28/search.json +++ b/src/rest/data/ghes-3.21-2022-11-28/search.json @@ -2415,6 +2415,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -4125,7 +4135,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5250,7 +5260,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6902,7 +6913,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -8027,7 +8038,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/data/ghes-3.21-2026-03-10/activity.json b/src/rest/data/ghes-3.21-2026-03-10/activity.json index f147d802cf78..6ff2444878a8 100644 --- a/src/rest/data/ghes-3.21-2026-03-10/activity.json +++ b/src/rest/data/ghes-3.21-2026-03-10/activity.json @@ -1048,7 +1048,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4070,7 +4070,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -18699,7 +18699,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -21721,7 +21721,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -36358,7 +36358,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -39380,7 +39380,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -53997,7 +53997,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -57019,7 +57019,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -71630,7 +71630,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -74652,7 +74652,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -89287,7 +89287,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -92309,7 +92309,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -106919,7 +106919,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -109941,7 +109941,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -124552,7 +124552,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -127574,7 +127574,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -142185,7 +142185,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -145207,7 +145207,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" diff --git a/src/rest/data/ghes-3.21-2026-03-10/dependency-graph.json b/src/rest/data/ghes-3.21-2026-03-10/dependency-graph.json index e5486f87acbd..4309bc05084c 100644 --- a/src/rest/data/ghes-3.21-2026-03-10/dependency-graph.json +++ b/src/rest/data/ghes-3.21-2026-03-10/dependency-graph.json @@ -206,6 +206,10 @@ "httpStatusCode": "200", "description": "OK
" }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, { "httpStatusCode": "403", "description": "Response for a private repository when GitHub Advanced Security is not enabled, or if used against a fork
" @@ -213,6 +217,14 @@ { "httpStatusCode": "404", "description": "Resource not found
" + }, + { + "httpStatusCode": "500", + "description": "Internal Error
" + }, + { + "httpStatusCode": "503", + "description": "Service unavailable
" } ], "previews": [], diff --git a/src/rest/data/ghes-3.21-2026-03-10/issues.json b/src/rest/data/ghes-3.21-2026-03-10/issues.json index 2e3e8587ddc2..74380e1d7ca3 100644 --- a/src/rest/data/ghes-3.21-2026-03-10/issues.json +++ b/src/rest/data/ghes-3.21-2026-03-10/issues.json @@ -1196,7 +1196,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -4317,7 +4317,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -6335,6 +6335,15 @@ "type": "string" } }, + { + "name": "issue_field_values", + "description": "A comma-separated list of issue field filters in field_slug:value format.\nOnly issues matching all specified field values are returned.\nRequires issue fields to be enabled for the repository. Issue fields are\nnot available for user-owned repositories, and field availability for\norganization-owned public repositories depends on the organization's\nvisibility settings. For example, priority:Urgent,severity:High filters\nissues where the priority field is Urgent AND the severity field is\nHigh.
A list of comma separated label names. Example: bug,ui,@high
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -39193,7 +39193,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -39202,10 +39202,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -39213,8 +39242,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -39222,7 +39251,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -39231,10 +39260,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -39242,8 +39304,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -39251,7 +39313,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -39260,10 +39322,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -39271,8 +39337,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -39280,7 +39346,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -39289,9 +39355,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -39300,8 +39366,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39309,7 +39375,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -39318,39 +39384,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -39358,8 +39395,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39367,52 +39404,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -39420,8 +39424,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -39429,7 +39433,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -39438,14 +39442,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -40584,8 +40584,8 @@ } }, { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "title": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", "type": "object", "required": [ "type" @@ -40594,29 +40594,57 @@ "type": { "type": "string", "enum": [ - "file_path_restriction" + "workflows" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_paths": { + "do_not_enforce_on_create": { + "type": "boolean", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." + }, + "workflows": { "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", + "description": "Workflows that must pass for this rule to pass.", "items": { - "type": "string" + "title": "WorkflowFileReference", + "description": "A workflow that must run for this rule to pass", + "type": "object", + "properties": { + "path": { + "type": "string", + "description": "The path to the workflow file" + }, + "ref": { + "type": "string", + "description": "The ref (branch or tag) of the workflow file to use" + }, + "repository_id": { + "type": "integer", + "description": "The ID of the repository where the workflow is defined" + }, + "sha": { + "type": "string", + "description": "The commit SHA of the workflow file to use" + } + }, + "required": [ + "path", + "repository_id" + ] } } }, "required": [ - "restricted_file_paths" + "workflows" ] } } }, { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "title": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", "type": "object", "required": [ "type" @@ -40625,28 +40653,63 @@ "type": { "type": "string", "enum": [ - "max_file_path_length" + "code_scanning" ] }, "parameters": { "type": "object", "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 + "code_scanning_tools": { + "type": "array", + "description": "Tools that must provide code scanning results for this rule to pass.", + "items": { + "title": "CodeScanningTool", + "description": "A tool that must provide code scanning results for this rule to pass.", + "type": "object", + "properties": { + "alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + "security_alerts_threshold": { + "type": "string", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + "tool": { + "type": "string", + "description": "The name of a code scanning tool" + } + }, + "required": [ + "alerts_threshold", + "security_alerts_threshold", + "tool" + ] + } } }, "required": [ - "max_file_path_length" + "code_scanning_tools" ] } } }, { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", "type": "object", "required": [ "type" @@ -40655,29 +40718,27 @@ "type": { "type": "string", "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, "parameters": { "type": "object", "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." } - }, - "required": [ - "restricted_file_extensions" - ] + } } } }, { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", "type": "object", "required": [ "type" @@ -40686,28 +40747,29 @@ "type": { "type": "string", "enum": [ - "max_file_size" + "file_path_restriction" ] }, "parameters": { "type": "object", "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } } }, "required": [ - "max_file_size" + "restricted_file_paths" ] } } }, { - "title": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40716,57 +40778,28 @@ "type": { "type": "string", "enum": [ - "workflows" + "max_file_path_length" ] }, "parameters": { "type": "object", "properties": { - "do_not_enforce_on_create": { - "type": "boolean", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it." - }, - "workflows": { - "type": "array", - "description": "Workflows that must pass for this rule to pass.", - "items": { - "title": "WorkflowFileReference", - "description": "A workflow that must run for this rule to pass", - "type": "object", - "properties": { - "path": { - "type": "string", - "description": "The path to the workflow file" - }, - "ref": { - "type": "string", - "description": "The ref (branch or tag) of the workflow file to use" - }, - "repository_id": { - "type": "integer", - "description": "The ID of the repository where the workflow is defined" - }, - "sha": { - "type": "string", - "description": "The commit SHA of the workflow file to use" - } - }, - "required": [ - "path", - "repository_id" - ] - } + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 } }, "required": [ - "workflows" + "max_file_path_length" ] } } }, { - "title": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.", + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40775,63 +40808,29 @@ "type": { "type": "string", "enum": [ - "code_scanning" + "file_extension_restriction" ] }, "parameters": { "type": "object", "properties": { - "code_scanning_tools": { + "restricted_file_extensions": { "type": "array", - "description": "Tools that must provide code scanning results for this rule to pass.", - "items": { - "title": "CodeScanningTool", - "description": "A tool that must provide code scanning results for this rule to pass.", - "type": "object", - "properties": { - "alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - "security_alerts_threshold": { - "type": "string", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"[About code scanning alerts](https://docs.github.com/enterprise-server@3.21/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels).\"", - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - "tool": { - "type": "string", - "description": "The name of a code scanning tool" - } - }, - "required": [ - "alerts_threshold", - "security_alerts_threshold", - "tool" - ] + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" } } }, "required": [ - "code_scanning_tools" + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -40840,21 +40839,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -42047,128 +42047,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -42288,14 +42166,135 @@ } }, "required": [ - "code_scanning_tools" + "code_scanning_tools" + ] + } + } + }, + { + "title": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "copilot_code_review" + ] + }, + "parameters": { + "type": "object", + "properties": { + "review_draft_pull_requests": { + "type": "boolean", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." + }, + "review_on_push": { + "type": "boolean", + "description": "Copilot automatically reviews each new push to the pull request." + } + } + } + } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" ] } } }, { - "title": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.", + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", "type": "object", "required": [ "type" @@ -42304,21 +42303,22 @@ "type": { "type": "string", "enum": [ - "copilot_code_review" + "max_file_size" ] }, "parameters": { "type": "object", "properties": { - "review_draft_pull_requests": { - "type": "boolean", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review." - }, - "review_on_push": { - "type": "boolean", - "description": "Copilot automatically reviews each new push to the pull request." + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 } - } + }, + "required": [ + "max_file_size" + ] } } } @@ -43116,8 +43116,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -43125,7 +43125,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -43134,10 +43134,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -43145,8 +43174,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -43154,7 +43183,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -43163,10 +43192,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -43174,8 +43236,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -43183,7 +43245,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -43192,10 +43254,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -43203,8 +43269,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -43212,7 +43278,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -43221,9 +43287,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -43232,8 +43298,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43241,7 +43307,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -43250,39 +43316,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -43290,8 +43327,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43299,7 +43336,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -43308,43 +43345,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -43352,8 +43356,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -43361,7 +43365,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -43370,14 +43374,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -44516,128 +44516,6 @@ } } }, - { - "title": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_path_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_paths": { - "type": "array", - "description": "The file paths that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_paths" - ] - } - } - }, - { - "title": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_path_length" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_path_length": { - "type": "integer", - "description": "The maximum amount of characters allowed in file paths.", - "minimum": 1, - "maximum": 32767 - } - }, - "required": [ - "max_file_path_length" - ] - } - } - }, - { - "title": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "file_extension_restriction" - ] - }, - "parameters": { - "type": "object", - "properties": { - "restricted_file_extensions": { - "type": "array", - "description": "The file extensions that are restricted from being pushed to the commit graph.", - "items": { - "type": "string" - } - } - }, - "required": [ - "restricted_file_extensions" - ] - } - } - }, - { - "title": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", - "type": "object", - "required": [ - "type" - ], - "properties": { - "type": { - "type": "string", - "enum": [ - "max_file_size" - ] - }, - "parameters": { - "type": "object", - "properties": { - "max_file_size": { - "type": "integer", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", - "minimum": 1, - "maximum": 100 - } - }, - "required": [ - "max_file_size" - ] - } - } - }, { "title": "workflows", "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.", @@ -44790,6 +44668,128 @@ } } } + }, + { + "title": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_path_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_paths": { + "type": "array", + "description": "The file paths that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_paths" + ] + } + } + }, + { + "title": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_path_length" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_path_length": { + "type": "integer", + "description": "The maximum amount of characters allowed in file paths.", + "minimum": 1, + "maximum": 32767 + } + }, + "required": [ + "max_file_path_length" + ] + } + } + }, + { + "title": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "file_extension_restriction" + ] + }, + "parameters": { + "type": "object", + "properties": { + "restricted_file_extensions": { + "type": "array", + "description": "The file extensions that are restricted from being pushed to the commit graph.", + "items": { + "type": "string" + } + } + }, + "required": [ + "restricted_file_extensions" + ] + } + } + }, + { + "title": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.", + "type": "object", + "required": [ + "type" + ], + "properties": { + "type": { + "type": "string", + "enum": [ + "max_file_size" + ] + }, + "parameters": { + "type": "object", + "properties": { + "max_file_size": { + "type": "integer", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).", + "minimum": 1, + "maximum": 100 + } + }, + "required": [ + "max_file_size" + ] + } + } } ] } diff --git a/src/rest/data/ghes-3.21-2026-03-10/search.json b/src/rest/data/ghes-3.21-2026-03-10/search.json index 61728e1cf3af..0467244f3692 100644 --- a/src/rest/data/ghes-3.21-2026-03-10/search.json +++ b/src/rest/data/ghes-3.21-2026-03-10/search.json @@ -2409,6 +2409,16 @@ "node_id": "MDU6SXNzdWUzNTgwMg==", "number": 132, "title": "Line Number Indexes Beyond 20 Not Displayed", + "type": { + "id": 1, + "node_id": "IT_kwDNJr9H", + "name": "Bug", + "description": "An unexpected problem or behavior", + "color": "red", + "created_at": "2023-10-09T13:30:49Z", + "updated_at": "2024-05-30T18:20:53Z", + "is_enabled": true + }, "user": { "login": "Nick3C", "id": 90254, @@ -3984,7 +3994,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -5108,7 +5118,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } @@ -6626,7 +6637,7 @@ }, "type": { "title": "Issue Type", - "description": "The type of issue.", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.", "type": [ "object", "null" @@ -7750,7 +7761,8 @@ "or_boolean_not_supported", "no_accessible_repos", "server_error", - "only_non_semantic_fields_requested" + "only_non_semantic_fields_requested", + "service_unavailable" ] } } diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 6a2f2347aad4..795f8ed8f228 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -53,5 +53,5 @@ ] } }, - "sha": "6637ddbdc15cc0f1ffbc9b923679d3a88c8c4342" + "sha": "f5d3342150d3748e7307c81639635706f8338a12" } \ No newline at end of file diff --git a/src/webhooks/data/fpt/issue_comment.json b/src/webhooks/data/fpt/issue_comment.json index 2ca93727d98d..6e6999acb44d 100644 --- a/src/webhooks/data/fpt/issue_comment.json +++ b/src/webhooks/data/fpt/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3708,7 +3708,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -4687,7 +4687,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/fpt/issue_dependencies.json b/src/webhooks/data/fpt/issue_dependencies.json index 9d0253a6265f..d852ac7a110c 100644 --- a/src/webhooks/data/fpt/issue_dependencies.json +++ b/src/webhooks/data/fpt/issue_dependencies.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3487,7 +3487,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6856,7 +6856,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9356,7 +9356,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12725,7 +12725,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16044,7 +16044,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18594,7 +18594,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21913,7 +21913,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/fpt/issues.json b/src/webhooks/data/fpt/issues.json index eee08b7a5a3e..0ef9dc62a7b8 100644 --- a/src/webhooks/data/fpt/issues.json +++ b/src/webhooks/data/fpt/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11280,7 +11280,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13392,7 +13392,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15433,7 +15433,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17404,7 +17404,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19324,7 +19324,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21624,7 +21624,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -23726,7 +23726,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -26123,7 +26123,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28177,7 +28177,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -29995,7 +29995,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32670,7 +32670,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34634,7 +34634,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34836,7 +34836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "isRequired": true, "childParamsGroups": [ { @@ -36787,7 +36787,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -38752,7 +38752,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -40723,7 +40723,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -42684,7 +42684,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -44648,7 +44648,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -44850,7 +44850,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "isRequired": true, "childParamsGroups": [ { diff --git a/src/webhooks/data/fpt/repository_ruleset.json b/src/webhooks/data/fpt/repository_ruleset.json index 102a4889bb83..22287961c1e2 100644 --- a/src/webhooks/data/fpt/repository_ruleset.json +++ b/src/webhooks/data/fpt/repository_ruleset.json @@ -809,8 +809,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -818,7 +818,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -827,10 +827,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -838,8 +867,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -847,7 +876,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -856,10 +885,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -867,8 +929,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -876,7 +938,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -885,10 +947,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -896,8 +962,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -905,7 +971,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -914,9 +980,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -925,8 +991,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -934,7 +1000,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -943,39 +1009,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -983,8 +1020,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -992,7 +1029,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -1001,43 +1038,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1045,8 +1049,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1054,7 +1058,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1063,14 +1067,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1917,8 +1917,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1926,123 +1926,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2183,6 +2067,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3025,8 +3025,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3034,7 +3034,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3043,10 +3043,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3054,16 +3083,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3072,10 +3101,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3083,8 +3145,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3092,7 +3154,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3101,10 +3163,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3112,8 +3178,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3121,7 +3187,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3130,9 +3196,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3141,8 +3207,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3150,7 +3216,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3159,39 +3225,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3199,8 +3236,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3208,7 +3245,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3217,43 +3254,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3261,8 +3265,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3270,7 +3274,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3279,14 +3283,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4109,8 +4109,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4118,7 +4118,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4127,10 +4127,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4138,8 +4167,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4147,7 +4176,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4156,39 +4185,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4196,8 +4262,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4205,7 +4271,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4214,9 +4280,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4225,8 +4291,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4234,7 +4300,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4243,39 +4309,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4283,8 +4320,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4292,7 +4329,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4301,43 +4338,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4345,8 +4349,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4354,7 +4358,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4363,14 +4367,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5006,8 +5006,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5015,7 +5015,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5024,10 +5024,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5035,8 +5064,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5044,7 +5073,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5053,10 +5082,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5064,8 +5126,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5073,7 +5135,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5082,10 +5144,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5093,8 +5159,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5102,7 +5168,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5111,9 +5177,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5122,8 +5188,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5131,7 +5197,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5140,39 +5206,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5180,8 +5217,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5189,52 +5226,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5242,8 +5246,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5251,7 +5255,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5260,14 +5264,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5908,8 +5908,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5917,7 +5917,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5926,10 +5926,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5937,8 +5966,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5946,7 +5975,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5955,10 +5984,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5966,8 +6028,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5975,7 +6037,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5984,10 +6046,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5995,8 +6061,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -6004,7 +6070,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6013,9 +6079,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6024,8 +6090,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6033,7 +6099,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6042,39 +6108,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6082,8 +6119,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6091,7 +6128,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6100,43 +6137,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6144,8 +6148,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6153,7 +6157,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6162,14 +6166,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/data/fpt/sub_issues.json b/src/webhooks/data/fpt/sub_issues.json index 137cda46232f..c13deca941ed 100644 --- a/src/webhooks/data/fpt/sub_issues.json +++ b/src/webhooks/data/fpt/sub_issues.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -4308,7 +4308,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6857,7 +6857,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -10178,7 +10178,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12727,7 +12727,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16048,7 +16048,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18597,7 +18597,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21918,7 +21918,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghec/issue_comment.json b/src/webhooks/data/ghec/issue_comment.json index 68f404ece0c7..b746c87bccf4 100644 --- a/src/webhooks/data/ghec/issue_comment.json +++ b/src/webhooks/data/ghec/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3708,7 +3708,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -4687,7 +4687,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghec/issue_dependencies.json b/src/webhooks/data/ghec/issue_dependencies.json index f3ab5debff1b..594e15d62632 100644 --- a/src/webhooks/data/ghec/issue_dependencies.json +++ b/src/webhooks/data/ghec/issue_dependencies.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3487,7 +3487,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6856,7 +6856,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9356,7 +9356,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12725,7 +12725,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16044,7 +16044,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18594,7 +18594,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21913,7 +21913,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghec/issues.json b/src/webhooks/data/ghec/issues.json index c1e6ce575ba6..3327207a9933 100644 --- a/src/webhooks/data/ghec/issues.json +++ b/src/webhooks/data/ghec/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11280,7 +11280,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13392,7 +13392,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15433,7 +15433,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17404,7 +17404,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19324,7 +19324,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21624,7 +21624,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -23726,7 +23726,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -26123,7 +26123,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28177,7 +28177,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -29995,7 +29995,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32670,7 +32670,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34634,7 +34634,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34836,7 +34836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "isRequired": true, "childParamsGroups": [ { @@ -36787,7 +36787,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -38752,7 +38752,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -40723,7 +40723,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -42684,7 +42684,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -44648,7 +44648,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -44850,7 +44850,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "isRequired": true, "childParamsGroups": [ { diff --git a/src/webhooks/data/ghec/repository_ruleset.json b/src/webhooks/data/ghec/repository_ruleset.json index d4073a26720f..b301527104b6 100644 --- a/src/webhooks/data/ghec/repository_ruleset.json +++ b/src/webhooks/data/ghec/repository_ruleset.json @@ -811,8 +811,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -820,7 +820,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -829,10 +829,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -840,8 +869,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -849,7 +878,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -858,10 +887,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -869,8 +931,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -878,7 +940,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -887,10 +949,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -898,8 +964,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -907,7 +973,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -916,9 +982,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -927,8 +993,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -936,7 +1002,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -945,39 +1011,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -985,8 +1022,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -994,7 +1031,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -1003,43 +1040,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1047,8 +1051,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1056,7 +1060,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1065,14 +1069,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1921,8 +1921,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1930,123 +1930,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2187,6 +2071,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3031,8 +3031,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3040,7 +3040,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3049,10 +3049,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3060,16 +3089,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3078,10 +3107,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3089,8 +3151,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3098,7 +3160,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3107,10 +3169,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3118,8 +3184,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3127,7 +3193,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3136,9 +3202,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3147,8 +3213,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3156,7 +3222,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3165,39 +3231,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3205,8 +3242,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3214,7 +3251,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3223,43 +3260,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3267,8 +3271,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3276,7 +3280,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3285,14 +3289,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4115,8 +4115,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4124,7 +4124,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4133,10 +4133,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4144,8 +4173,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4153,7 +4182,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4162,39 +4191,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4202,8 +4268,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4211,7 +4277,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4220,9 +4286,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4231,8 +4297,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4240,7 +4306,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4249,39 +4315,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4289,8 +4326,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4298,7 +4335,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4307,43 +4344,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4351,8 +4355,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4360,7 +4364,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4369,14 +4373,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5012,8 +5012,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5021,7 +5021,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5030,10 +5030,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5041,8 +5070,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5050,7 +5079,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5059,10 +5088,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5070,8 +5132,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5079,7 +5141,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5088,10 +5150,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5099,8 +5165,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5108,7 +5174,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5117,9 +5183,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5128,8 +5194,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5137,7 +5203,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5146,39 +5212,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5186,8 +5223,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5195,52 +5232,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5248,8 +5252,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5257,7 +5261,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5266,14 +5270,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5914,8 +5914,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5923,7 +5923,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5932,10 +5932,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5943,8 +5972,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5952,7 +5981,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5961,10 +5990,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5972,8 +6034,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5981,7 +6043,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5990,10 +6052,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -6001,8 +6067,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -6010,7 +6076,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6019,9 +6085,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6030,8 +6096,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6039,7 +6105,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6048,39 +6114,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6088,8 +6125,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6097,7 +6134,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6106,43 +6143,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6150,8 +6154,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6159,7 +6163,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6168,14 +6172,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/data/ghec/sub_issues.json b/src/webhooks/data/ghec/sub_issues.json index 609b1da4c460..675b8dbddfc9 100644 --- a/src/webhooks/data/ghec/sub_issues.json +++ b/src/webhooks/data/ghec/sub_issues.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -4308,7 +4308,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6857,7 +6857,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -10178,7 +10178,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12727,7 +12727,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16048,7 +16048,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18597,7 +18597,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21918,7 +21918,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.16/issue_comment.json b/src/webhooks/data/ghes-3.16/issue_comment.json index a954e7fb999e..82a798e6cd6f 100644 --- a/src/webhooks/data/ghes-3.16/issue_comment.json +++ b/src/webhooks/data/ghes-3.16/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.16/issues.json b/src/webhooks/data/ghes-3.16/issues.json index 67a139aca2d0..c14cc336b688 100644 --- a/src/webhooks/data/ghes-3.16/issues.json +++ b/src/webhooks/data/ghes-3.16/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11274,7 +11274,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13245,7 +13245,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15165,7 +15165,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17465,7 +17465,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19567,7 +19567,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21964,7 +21964,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -24018,7 +24018,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -25836,7 +25836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28511,7 +28511,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -30600,7 +30600,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32565,7 +32565,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34536,7 +34536,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -36497,7 +36497,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.17/issue_comment.json b/src/webhooks/data/ghes-3.17/issue_comment.json index db0e8b062025..871e4e7f7c0a 100644 --- a/src/webhooks/data/ghes-3.17/issue_comment.json +++ b/src/webhooks/data/ghes-3.17/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.17/issues.json b/src/webhooks/data/ghes-3.17/issues.json index 05d46ac987d3..dec942158175 100644 --- a/src/webhooks/data/ghes-3.17/issues.json +++ b/src/webhooks/data/ghes-3.17/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11274,7 +11274,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13245,7 +13245,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15165,7 +15165,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17465,7 +17465,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19567,7 +19567,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21964,7 +21964,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -24018,7 +24018,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -25836,7 +25836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28511,7 +28511,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -30600,7 +30600,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32565,7 +32565,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34536,7 +34536,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -36497,7 +36497,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.17/repository_ruleset.json b/src/webhooks/data/ghes-3.17/repository_ruleset.json index 1d8ab482703f..a05e4877a64f 100644 --- a/src/webhooks/data/ghes-3.17/repository_ruleset.json +++ b/src/webhooks/data/ghes-3.17/repository_ruleset.json @@ -805,8 +805,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -814,7 +814,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -823,10 +823,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -834,8 +863,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -843,7 +872,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -852,10 +881,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -863,8 +925,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -872,7 +934,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -881,10 +943,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -892,8 +958,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -901,7 +967,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -910,9 +976,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -921,8 +987,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -930,7 +996,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -939,39 +1005,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -979,8 +1016,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -988,7 +1025,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -997,43 +1034,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1041,8 +1045,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1050,7 +1054,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1059,14 +1063,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1909,8 +1909,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1918,123 +1918,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2175,6 +2059,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3013,8 +3013,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3022,7 +3022,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3031,10 +3031,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3042,16 +3071,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3060,10 +3089,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3071,8 +3133,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3080,7 +3142,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3089,10 +3151,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3100,8 +3166,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3109,7 +3175,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3118,9 +3184,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3129,8 +3195,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3138,7 +3204,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3147,39 +3213,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3187,8 +3224,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3196,7 +3233,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3205,43 +3242,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3249,8 +3253,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3258,7 +3262,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3267,14 +3271,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4097,8 +4097,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4106,7 +4106,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4115,10 +4115,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4126,8 +4155,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4135,7 +4164,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4144,39 +4173,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4184,8 +4250,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4193,7 +4259,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4202,9 +4268,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4213,8 +4279,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4222,7 +4288,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4231,39 +4297,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4271,8 +4308,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4280,7 +4317,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4289,43 +4326,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4333,8 +4337,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4342,7 +4346,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4351,14 +4355,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4994,8 +4994,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5003,7 +5003,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5012,10 +5012,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5023,8 +5052,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5032,7 +5061,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5041,10 +5070,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5052,8 +5114,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5061,7 +5123,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5070,10 +5132,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5081,8 +5147,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5090,7 +5156,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5099,9 +5165,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5110,8 +5176,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5119,7 +5185,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5128,39 +5194,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5168,8 +5205,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5177,52 +5214,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5230,8 +5234,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5239,7 +5243,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5248,14 +5252,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5896,8 +5896,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5905,7 +5905,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5914,10 +5914,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5925,8 +5954,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5934,7 +5963,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5943,10 +5972,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5954,8 +6016,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5963,7 +6025,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5972,10 +6034,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5983,8 +6049,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5992,7 +6058,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6001,9 +6067,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6012,8 +6078,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6021,7 +6087,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6030,39 +6096,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6070,8 +6107,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6079,7 +6116,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6088,43 +6125,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6132,8 +6136,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6141,7 +6145,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6150,14 +6154,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/data/ghes-3.18/issue_comment.json b/src/webhooks/data/ghes-3.18/issue_comment.json index a1a741195c5b..25a4d5cb1542 100644 --- a/src/webhooks/data/ghes-3.18/issue_comment.json +++ b/src/webhooks/data/ghes-3.18/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.18/issues.json b/src/webhooks/data/ghes-3.18/issues.json index cd7b997e79f1..ba7151c6eac5 100644 --- a/src/webhooks/data/ghes-3.18/issues.json +++ b/src/webhooks/data/ghes-3.18/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11274,7 +11274,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13245,7 +13245,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15165,7 +15165,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17465,7 +17465,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19567,7 +19567,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21964,7 +21964,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -24018,7 +24018,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -25836,7 +25836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28511,7 +28511,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -30600,7 +30600,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32565,7 +32565,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34536,7 +34536,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -36497,7 +36497,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.18/repository_ruleset.json b/src/webhooks/data/ghes-3.18/repository_ruleset.json index aeeb7407ec60..7cb24a932cbb 100644 --- a/src/webhooks/data/ghes-3.18/repository_ruleset.json +++ b/src/webhooks/data/ghes-3.18/repository_ruleset.json @@ -805,8 +805,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -814,7 +814,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -823,10 +823,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -834,8 +863,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -843,7 +872,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -852,10 +881,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -863,8 +925,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -872,7 +934,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -881,10 +943,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -892,8 +958,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -901,7 +967,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -910,9 +976,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -921,8 +987,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -930,7 +996,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -939,39 +1005,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -979,8 +1016,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -988,7 +1025,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -997,43 +1034,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1041,8 +1045,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1050,7 +1054,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1059,14 +1063,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1909,8 +1909,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1918,123 +1918,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2175,6 +2059,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3013,8 +3013,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3022,7 +3022,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3031,10 +3031,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3042,16 +3071,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3060,10 +3089,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3071,8 +3133,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3080,7 +3142,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3089,10 +3151,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3100,8 +3166,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3109,7 +3175,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3118,9 +3184,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3129,8 +3195,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3138,7 +3204,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3147,39 +3213,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3187,8 +3224,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3196,7 +3233,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3205,43 +3242,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3249,8 +3253,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3258,7 +3262,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3267,14 +3271,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4097,8 +4097,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4106,7 +4106,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4115,10 +4115,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4126,8 +4155,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4135,7 +4164,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4144,39 +4173,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4184,8 +4250,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4193,7 +4259,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4202,9 +4268,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4213,8 +4279,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4222,7 +4288,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4231,39 +4297,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4271,8 +4308,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4280,7 +4317,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4289,43 +4326,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4333,8 +4337,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4342,7 +4346,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4351,14 +4355,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4994,8 +4994,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5003,7 +5003,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5012,10 +5012,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5023,8 +5052,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5032,7 +5061,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5041,10 +5070,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5052,8 +5114,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5061,7 +5123,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5070,10 +5132,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5081,8 +5147,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5090,7 +5156,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5099,9 +5165,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5110,8 +5176,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5119,7 +5185,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5128,39 +5194,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5168,8 +5205,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5177,52 +5214,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5230,8 +5234,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5239,7 +5243,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5248,14 +5252,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5896,8 +5896,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5905,7 +5905,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5914,10 +5914,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5925,8 +5954,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5934,7 +5963,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5943,10 +5972,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5954,8 +6016,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5963,7 +6025,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5972,10 +6034,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5983,8 +6049,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5992,7 +6058,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6001,9 +6067,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6012,8 +6078,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6021,7 +6087,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6030,39 +6096,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6070,8 +6107,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6079,7 +6116,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6088,43 +6125,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6132,8 +6136,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6141,7 +6145,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6150,14 +6154,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/data/ghes-3.19/issue_comment.json b/src/webhooks/data/ghes-3.19/issue_comment.json index 9e562d9e31cd..eb7c8f83d3b5 100644 --- a/src/webhooks/data/ghes-3.19/issue_comment.json +++ b/src/webhooks/data/ghes-3.19/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.19/issue_dependencies.json b/src/webhooks/data/ghes-3.19/issue_dependencies.json index dac9d18b3816..9d0af086695d 100644 --- a/src/webhooks/data/ghes-3.19/issue_dependencies.json +++ b/src/webhooks/data/ghes-3.19/issue_dependencies.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3487,7 +3487,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6856,7 +6856,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9356,7 +9356,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12725,7 +12725,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16044,7 +16044,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18594,7 +18594,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21913,7 +21913,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.19/issues.json b/src/webhooks/data/ghes-3.19/issues.json index 1305739d926d..688d2850854d 100644 --- a/src/webhooks/data/ghes-3.19/issues.json +++ b/src/webhooks/data/ghes-3.19/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11274,7 +11274,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13245,7 +13245,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15165,7 +15165,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17465,7 +17465,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19567,7 +19567,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21964,7 +21964,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -24018,7 +24018,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -25836,7 +25836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28511,7 +28511,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -30600,7 +30600,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32565,7 +32565,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34536,7 +34536,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -36497,7 +36497,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.19/repository_ruleset.json b/src/webhooks/data/ghes-3.19/repository_ruleset.json index fb63af37c5cc..9bbcb361624d 100644 --- a/src/webhooks/data/ghes-3.19/repository_ruleset.json +++ b/src/webhooks/data/ghes-3.19/repository_ruleset.json @@ -805,8 +805,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -814,7 +814,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -823,10 +823,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -834,8 +863,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -843,7 +872,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -852,10 +881,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -863,8 +925,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -872,7 +934,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -881,10 +943,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -892,8 +958,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -901,7 +967,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -910,9 +976,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -921,8 +987,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -930,7 +996,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -939,39 +1005,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -979,8 +1016,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -988,7 +1025,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -997,43 +1034,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1041,8 +1045,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1050,7 +1054,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1059,14 +1063,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1909,8 +1909,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1918,123 +1918,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2175,6 +2059,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3013,8 +3013,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3022,7 +3022,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3031,10 +3031,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3042,16 +3071,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3060,10 +3089,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3071,8 +3133,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3080,7 +3142,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3089,10 +3151,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3100,8 +3166,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3109,7 +3175,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3118,9 +3184,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3129,8 +3195,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3138,7 +3204,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3147,39 +3213,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3187,8 +3224,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3196,7 +3233,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3205,43 +3242,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3249,8 +3253,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3258,7 +3262,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3267,14 +3271,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4097,8 +4097,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4106,7 +4106,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4115,10 +4115,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4126,8 +4155,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4135,7 +4164,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4144,39 +4173,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4184,8 +4250,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4193,7 +4259,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4202,9 +4268,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4213,8 +4279,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4222,7 +4288,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4231,39 +4297,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4271,8 +4308,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4280,7 +4317,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4289,43 +4326,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4333,8 +4337,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4342,7 +4346,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4351,14 +4355,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4994,8 +4994,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5003,7 +5003,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5012,10 +5012,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5023,8 +5052,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5032,7 +5061,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5041,10 +5070,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5052,8 +5114,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5061,7 +5123,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5070,10 +5132,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5081,8 +5147,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5090,7 +5156,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5099,9 +5165,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5110,8 +5176,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5119,7 +5185,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5128,39 +5194,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5168,8 +5205,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5177,52 +5214,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5230,8 +5234,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5239,7 +5243,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5248,14 +5252,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5896,8 +5896,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5905,7 +5905,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5914,10 +5914,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5925,8 +5954,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5934,7 +5963,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5943,10 +5972,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5954,8 +6016,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5963,7 +6025,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5972,10 +6034,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5983,8 +6049,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5992,7 +6058,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6001,9 +6067,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6012,8 +6078,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6021,7 +6087,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6030,39 +6096,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6070,8 +6107,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6079,7 +6116,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6088,43 +6125,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6132,8 +6136,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6141,7 +6145,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6150,14 +6154,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/data/ghes-3.20/issue_comment.json b/src/webhooks/data/ghes-3.20/issue_comment.json index f5318deef47f..5b587af82d9f 100644 --- a/src/webhooks/data/ghes-3.20/issue_comment.json +++ b/src/webhooks/data/ghes-3.20/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.20/issue_dependencies.json b/src/webhooks/data/ghes-3.20/issue_dependencies.json index 0717cd2ef9d9..f43dfd7041d6 100644 --- a/src/webhooks/data/ghes-3.20/issue_dependencies.json +++ b/src/webhooks/data/ghes-3.20/issue_dependencies.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3487,7 +3487,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6856,7 +6856,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9356,7 +9356,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12725,7 +12725,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16044,7 +16044,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18594,7 +18594,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21913,7 +21913,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.20/issues.json b/src/webhooks/data/ghes-3.20/issues.json index 5d099f705246..3fc49a3f2d8c 100644 --- a/src/webhooks/data/ghes-3.20/issues.json +++ b/src/webhooks/data/ghes-3.20/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11274,7 +11274,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13245,7 +13245,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15165,7 +15165,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17465,7 +17465,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19567,7 +19567,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21964,7 +21964,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -24018,7 +24018,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -25836,7 +25836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28511,7 +28511,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -30600,7 +30600,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32565,7 +32565,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34536,7 +34536,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -36497,7 +36497,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.20/repository_ruleset.json b/src/webhooks/data/ghes-3.20/repository_ruleset.json index 5ec9fddd0940..8fa4f2e92804 100644 --- a/src/webhooks/data/ghes-3.20/repository_ruleset.json +++ b/src/webhooks/data/ghes-3.20/repository_ruleset.json @@ -807,8 +807,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -816,7 +816,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -825,10 +825,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -836,8 +865,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -845,7 +874,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -854,10 +883,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -865,8 +927,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -874,7 +936,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -883,10 +945,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -894,8 +960,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -903,7 +969,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -912,9 +978,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -923,8 +989,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -932,7 +998,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -941,39 +1007,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -981,8 +1018,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -990,7 +1027,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -999,43 +1036,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1043,8 +1047,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1052,7 +1056,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1061,14 +1065,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1913,8 +1913,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1922,123 +1922,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2179,6 +2063,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3019,8 +3019,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3028,7 +3028,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3037,10 +3037,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3048,16 +3077,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3066,10 +3095,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3077,8 +3139,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3086,7 +3148,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3095,10 +3157,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3106,8 +3172,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3115,7 +3181,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3124,9 +3190,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3135,8 +3201,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3144,7 +3210,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3153,39 +3219,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3193,8 +3230,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3202,7 +3239,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3211,43 +3248,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3255,8 +3259,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3264,7 +3268,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3273,14 +3277,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4103,8 +4103,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4112,7 +4112,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4121,10 +4121,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4132,8 +4161,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4141,7 +4170,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4150,39 +4179,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4190,8 +4256,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4199,7 +4265,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4208,9 +4274,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4219,8 +4285,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4228,7 +4294,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4237,39 +4303,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4277,8 +4314,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4286,7 +4323,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4295,43 +4332,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4339,8 +4343,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4348,7 +4352,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4357,14 +4361,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5000,8 +5000,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5009,7 +5009,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5018,10 +5018,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5029,8 +5058,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5038,7 +5067,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5047,10 +5076,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5058,8 +5120,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5067,7 +5129,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5076,10 +5138,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5087,8 +5153,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5096,7 +5162,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5105,9 +5171,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5116,8 +5182,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5125,7 +5191,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5134,39 +5200,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5174,8 +5211,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5183,52 +5220,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5236,8 +5240,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5245,7 +5249,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5254,14 +5258,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5902,8 +5902,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5911,7 +5911,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5920,10 +5920,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5931,8 +5960,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5940,7 +5969,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5949,10 +5978,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5960,8 +6022,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5969,7 +6031,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5978,10 +6040,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5989,8 +6055,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5998,7 +6064,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6007,9 +6073,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6018,8 +6084,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6027,7 +6093,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6036,39 +6102,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6076,8 +6113,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6085,7 +6122,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6094,43 +6131,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6138,8 +6142,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6147,7 +6151,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6156,14 +6160,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/data/ghes-3.21/issue_comment.json b/src/webhooks/data/ghes-3.21/issue_comment.json index 476612e74d77..00fb816095f0 100644 --- a/src/webhooks/data/ghes-3.21/issue_comment.json +++ b/src/webhooks/data/ghes-3.21/issue_comment.json @@ -750,7 +750,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -1729,7 +1729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -2729,7 +2729,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3708,7 +3708,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -4687,7 +4687,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.21/issue_dependencies.json b/src/webhooks/data/ghes-3.21/issue_dependencies.json index 5a9df48e24c4..a648b8fa58af 100644 --- a/src/webhooks/data/ghes-3.21/issue_dependencies.json +++ b/src/webhooks/data/ghes-3.21/issue_dependencies.json @@ -987,7 +987,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3487,7 +3487,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -6856,7 +6856,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9356,7 +9356,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -12725,7 +12725,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -16044,7 +16044,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -18594,7 +18594,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21913,7 +21913,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.21/issues.json b/src/webhooks/data/ghes-3.21/issues.json index 5d28d17dcb41..8280fc0de134 100644 --- a/src/webhooks/data/ghes-3.21/issues.json +++ b/src/webhooks/data/ghes-3.21/issues.json @@ -1860,7 +1860,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -3163,7 +3163,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -5125,7 +5125,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -7040,7 +7040,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -9260,7 +9260,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -11274,7 +11274,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -13245,7 +13245,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -15165,7 +15165,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -17465,7 +17465,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -19567,7 +19567,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -21964,7 +21964,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -24018,7 +24018,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -25836,7 +25836,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -28511,7 +28511,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -30600,7 +30600,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -32565,7 +32565,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -34536,7 +34536,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", @@ -36497,7 +36497,7 @@ { "type": "object or null", "name": "type", - "description": "The type of issue.
", + "description": "The type assigned to the issue. This is only present for issues in repositories where issue types are supported.
", "childParamsGroups": [ { "type": "integer", diff --git a/src/webhooks/data/ghes-3.21/repository_ruleset.json b/src/webhooks/data/ghes-3.21/repository_ruleset.json index e0df84cb615d..2e3d2b93c57f 100644 --- a/src/webhooks/data/ghes-3.21/repository_ruleset.json +++ b/src/webhooks/data/ghes-3.21/repository_ruleset.json @@ -808,8 +808,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -817,7 +817,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -826,10 +826,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -837,8 +866,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -846,7 +875,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -855,10 +884,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -866,8 +928,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -875,7 +937,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -884,10 +946,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -895,8 +961,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -904,7 +970,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -913,9 +979,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -924,8 +990,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -933,7 +999,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -942,39 +1008,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -982,8 +1019,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -991,7 +1028,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -1000,43 +1037,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -1044,8 +1048,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -1053,7 +1057,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -1062,14 +1066,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -1915,8 +1915,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -1924,123 +1924,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_path_length" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "max_file_size" - ] - }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "workflows" + "workflows" ] }, { @@ -2181,6 +2065,122 @@ ] } ] + }, + { + "type": "object", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_path_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_path_length" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "file_extension_restriction" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true + } + ] + } + ] + }, + { + "type": "object", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "max_file_size" + ] + }, + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true + } + ] + } + ] } ], "oneOfObject": true @@ -3022,8 +3022,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -3031,7 +3031,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -3040,10 +3040,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -3051,16 +3080,16 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", - "childParamsGroups": [ + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "childParamsGroups": [ { "type": "string", "name": "type", "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -3069,10 +3098,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -3080,8 +3142,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -3089,7 +3151,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -3098,10 +3160,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -3109,8 +3175,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -3118,7 +3184,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -3127,9 +3193,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -3138,8 +3204,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3147,7 +3213,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -3156,39 +3222,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -3196,8 +3233,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3205,7 +3242,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -3214,43 +3251,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -3258,8 +3262,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -3267,7 +3271,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -3276,14 +3280,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -4106,8 +4106,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -4115,7 +4115,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -4124,10 +4124,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -4135,8 +4164,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -4144,7 +4173,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -4153,39 +4182,76 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true - } - ] - } - ] - }, - { - "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", - "childParamsGroups": [ - { - "type": "string", - "name": "type", - "description": "", - "isRequired": true, - "enum": [ - "file_extension_restriction" - ] - }, + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] + } + ] + } + ] + }, + { + "type": "object", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "childParamsGroups": [ + { + "type": "string", + "name": "type", + "description": "", + "isRequired": true, + "enum": [ + "copilot_code_review" + ] + }, { "type": "object", "name": "parameters", "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -4193,8 +4259,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -4202,7 +4268,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -4211,9 +4277,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -4222,8 +4288,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4231,7 +4297,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -4240,39 +4306,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -4280,8 +4317,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4289,7 +4326,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -4298,43 +4335,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -4342,8 +4346,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -4351,7 +4355,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -4360,14 +4364,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5003,8 +5003,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5012,7 +5012,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5021,10 +5021,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5032,8 +5061,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5041,7 +5070,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5050,10 +5079,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5061,8 +5123,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5070,7 +5132,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5079,10 +5141,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5090,8 +5156,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -5099,7 +5165,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -5108,9 +5174,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -5119,8 +5185,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5128,7 +5194,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -5137,39 +5203,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -5177,8 +5214,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5186,52 +5223,19 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, - { - "type": "object", - "name": "parameters", - "description": "", - "childParamsGroups": [ - { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + { + "type": "object", + "name": "parameters", + "description": "", + "childParamsGroups": [ + { + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -5239,8 +5243,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -5248,7 +5252,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -5257,14 +5261,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } @@ -5905,8 +5905,8 @@ }, { "type": "object", - "name": "file_path_restriction", - "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", + "name": "workflows", + "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", "childParamsGroups": [ { "type": "string", @@ -5914,7 +5914,7 @@ "description": "", "isRequired": true, "enum": [ - "file_path_restriction" + "workflows" ] }, { @@ -5923,10 +5923,39 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_paths", - "description": "The file paths that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "do_not_enforce_on_create", + "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" + }, + { + "type": "array of objects", + "name": "workflows", + "description": "Workflows that must pass for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "path", + "description": "The path to the workflow file
", + "isRequired": true + }, + { + "type": "string", + "name": "ref", + "description": "The ref (branch or tag) of the workflow file to use
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository where the workflow is defined
", + "isRequired": true + }, + { + "type": "string", + "name": "sha", + "description": "The commit SHA of the workflow file to use
" + } + ] } ] } @@ -5934,8 +5963,8 @@ }, { "type": "object", - "name": "max_file_path_length", - "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", + "name": "code_scanning", + "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", "childParamsGroups": [ { "type": "string", @@ -5943,7 +5972,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_path_length" + "code_scanning" ] }, { @@ -5952,10 +5981,43 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_path_length", - "description": "The maximum amount of characters allowed in file paths.
", - "isRequired": true + "type": "array of objects", + "name": "code_scanning_tools", + "description": "Tools that must provide code scanning results for this rule to pass.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "alerts_threshold", + "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "errors", + "errors_and_warnings", + "all" + ] + }, + { + "type": "string", + "name": "security_alerts_threshold", + "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", + "isRequired": true, + "enum": [ + "none", + "critical", + "high_or_higher", + "medium_or_higher", + "all" + ] + }, + { + "type": "string", + "name": "tool", + "description": "The name of a code scanning tool
", + "isRequired": true + } + ] } ] } @@ -5963,8 +6025,8 @@ }, { "type": "object", - "name": "file_extension_restriction", - "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", + "name": "copilot_code_review", + "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", "childParamsGroups": [ { "type": "string", @@ -5972,7 +6034,7 @@ "description": "", "isRequired": true, "enum": [ - "file_extension_restriction" + "copilot_code_review" ] }, { @@ -5981,10 +6043,14 @@ "description": "", "childParamsGroups": [ { - "type": "array of strings", - "name": "restricted_file_extensions", - "description": "The file extensions that are restricted from being pushed to the commit graph.
", - "isRequired": true + "type": "boolean", + "name": "review_draft_pull_requests", + "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" + }, + { + "type": "boolean", + "name": "review_on_push", + "description": "Copilot automatically reviews each new push to the pull request.
" } ] } @@ -5992,8 +6058,8 @@ }, { "type": "object", - "name": "max_file_size", - "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", + "name": "file_path_restriction", + "description": "Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
", "childParamsGroups": [ { "type": "string", @@ -6001,7 +6067,7 @@ "description": "", "isRequired": true, "enum": [ - "max_file_size" + "file_path_restriction" ] }, { @@ -6010,9 +6076,9 @@ "description": "", "childParamsGroups": [ { - "type": "integer", - "name": "max_file_size", - "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "type": "array of strings", + "name": "restricted_file_paths", + "description": "The file paths that are restricted from being pushed to the commit graph.
", "isRequired": true } ] @@ -6021,8 +6087,8 @@ }, { "type": "object", - "name": "workflows", - "description": "Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
", + "name": "max_file_path_length", + "description": "Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6030,7 +6096,7 @@ "description": "", "isRequired": true, "enum": [ - "workflows" + "max_file_path_length" ] }, { @@ -6039,39 +6105,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "do_not_enforce_on_create", - "description": "Allow repositories and branches to be created if a check would otherwise prohibit it.
" - }, - { - "type": "array of objects", - "name": "workflows", - "description": "Workflows that must pass for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "path", - "description": "The path to the workflow file
", - "isRequired": true - }, - { - "type": "string", - "name": "ref", - "description": "The ref (branch or tag) of the workflow file to use
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository where the workflow is defined
", - "isRequired": true - }, - { - "type": "string", - "name": "sha", - "description": "The commit SHA of the workflow file to use
" - } - ] + "type": "integer", + "name": "max_file_path_length", + "description": "The maximum amount of characters allowed in file paths.
", + "isRequired": true } ] } @@ -6079,8 +6116,8 @@ }, { "type": "object", - "name": "code_scanning", - "description": "Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
", + "name": "file_extension_restriction", + "description": "Prevent commits that include files with specified file extensions from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6088,7 +6125,7 @@ "description": "", "isRequired": true, "enum": [ - "code_scanning" + "file_extension_restriction" ] }, { @@ -6097,43 +6134,10 @@ "description": "", "childParamsGroups": [ { - "type": "array of objects", - "name": "code_scanning_tools", - "description": "Tools that must provide code scanning results for this rule to pass.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "alerts_threshold", - "description": "The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "errors", - "errors_and_warnings", - "all" - ] - }, - { - "type": "string", - "name": "security_alerts_threshold", - "description": "The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see \"About code scanning alerts.\"
", - "isRequired": true, - "enum": [ - "none", - "critical", - "high_or_higher", - "medium_or_higher", - "all" - ] - }, - { - "type": "string", - "name": "tool", - "description": "The name of a code scanning tool
", - "isRequired": true - } - ] + "type": "array of strings", + "name": "restricted_file_extensions", + "description": "The file extensions that are restricted from being pushed to the commit graph.
", + "isRequired": true } ] } @@ -6141,8 +6145,8 @@ }, { "type": "object", - "name": "copilot_code_review", - "description": "Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
", + "name": "max_file_size", + "description": "Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
", "childParamsGroups": [ { "type": "string", @@ -6150,7 +6154,7 @@ "description": "", "isRequired": true, "enum": [ - "copilot_code_review" + "max_file_size" ] }, { @@ -6159,14 +6163,10 @@ "description": "", "childParamsGroups": [ { - "type": "boolean", - "name": "review_draft_pull_requests", - "description": "Copilot automatically reviews draft pull requests before they are marked as ready for review.
" - }, - { - "type": "boolean", - "name": "review_on_push", - "description": "Copilot automatically reviews each new push to the pull request.
" + "type": "integer", + "name": "max_file_size", + "description": "The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).
", + "isRequired": true } ] } diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index fb7ae651a563..567faa8cf880 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "6637ddbdc15cc0f1ffbc9b923679d3a88c8c4342" + "sha": "f5d3342150d3748e7307c81639635706f8338a12" } \ No newline at end of file