Merge pull request #35266 from github/repo-sync

Repo sync
This commit is contained in:
docs-bot 2024-11-12 16:32:09 -05:00 коммит произвёл GitHub
Родитель 732c1d23b8 970b66a956
Коммит b7bbf37088
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
84 изменённых файлов: 935932 добавлений и 311 удалений

Просмотреть файл

@ -45,8 +45,8 @@ ARC consists of a set of resources, some of which are created specifically for A
Each resource that is deployed by ARC is given a name composed of:
* an installation name, which is the installation name you specify when you install the Helm chart.
* a resource identification suffix, which is a string that identifies the resource type. This value is not configurable.
* An installation name, which is the installation name you specify when you install the Helm chart.
* A resource identification suffix, which is a string that identifies the resource type. This value is not configurable.
> [!NOTE]
> Different versions of Kubernetes have different length limits for names of resources. The length limit for the resource name is calculated by adding the length of the installation name and the length of the resource identification suffix. If the resource name is longer than the reserved length, you will receive an error.

Просмотреть файл

@ -137,9 +137,7 @@ $ ghe-config app.github.rate-limiting-exempt-users "hubot github-actions[bot]"
### ghe-config-apply
This utility applies {% data variables.enterprise.management_console %} settings, reloads system services, prepares a storage device, reloads application services, and runs any pending database migrations. It is equivalent to clicking **Save settings** in the {% data variables.enterprise.management_console %}'s web UI or to sending a POST request to [the `/setup/api/configure` endpoint](/rest/enterprise-admin/management-console).
You will probably never need to run this manually, but it's available if you want to automate the process of saving your settings via SSH.
This utility applies {% data variables.enterprise.management_console %} settings, reloads system services, prepares a storage device, reloads application services, and runs any pending database migrations. It is equivalent to clicking **Save settings** in the {% data variables.enterprise.management_console %}'s web UI or to sending a POST request to {% ifversion management-console-manage-ghes-parity %}[the `/manage/v1/config/apply` endpoint](/rest/enterprise-admin/manage-ghes#trigger-a-ghe-config-apply-run){% else %}[the `/setup/api/configure` endpoint](/rest/enterprise-admin/management-console){% endif %}.
```shell
ghe-config-apply

Просмотреть файл

@ -52,6 +52,7 @@ If you run analysis in an external CI system, we recommend using the same versio
| {% data variables.product.product_name %} version | Recommended {% data variables.product.prodname_codeql_cli %} version |
| ------------------------------------------------- | ---------------------- |
| 3.15 | 2.18.4 ([changelog](https://codeql.github.com/docs/codeql-overview/codeql-changelog/codeql-cli-2.18.4/)) |
| 3.14 | 2.17.6 ([changelog](https://codeql.github.com/docs/codeql-overview/codeql-changelog/codeql-cli-2.17.6/)) |
| 3.13 | 2.16.5 ([changelog](https://codeql.github.com/docs/codeql-overview/codeql-changelog/codeql-cli-2.16.5/)) |
| 3.12 | 2.15.5 ([changelog](https://codeql.github.com/docs/codeql-overview/codeql-changelog/codeql-cli-2.15.5/)) |
@ -68,6 +69,7 @@ For instances with {% data variables.product.prodname_actions %} enabled, self-h
| {% data variables.product.product_name %} version | Minimum Runner version |
| ------------------------------------------------- | ---------------------- |
| 3.15 | 2.319.1 ([release notes](https://github.com/actions/runner/releases/tag/v2.319.1)) |
| 3.14 | 2.317.0 ([release notes](https://github.com/actions/runner/releases/tag/v2.317.0)) |
| 3.13 | 2.314.1 ([release notes](https://github.com/actions/runner/releases/tag/v2.314.1)) |
| 3.12 | 2.311.0 ([release notes](https://github.com/actions/runner/releases/tag/v2.311.0)) |

Просмотреть файл

@ -18,10 +18,19 @@ redirect_from:
## About management of {% data variables.product.prodname_advanced_security %} features
You can use {% data variables.product.prodname_advanced_security %} features to harden security for the organizations in your enterprise. {% ifversion security-configurations %}{% data reusables.security-configurations.enable-security-features-with-gh-config %}
You can use {% data variables.product.prodname_advanced_security %} features to harden security for the organizations in your enterprise.
{% ifversion security-configurations %}{% data reusables.security-configurations.enable-security-features-with-gh-config %}
To manage individual {% data variables.product.prodname_GH_advanced_security %} features, {% else %}To streamline management of {% data variables.product.prodname_advanced_security %}, {% endif %}you can enable or disable each feature for all existing and/or new repositories within the organizations owned by your enterprise.
{% ifversion security-configurations-ghes-only %}
> [!WARNING]
> You should communicate any changes you plan to make to existing feature enablement settings to organization owners before making them, so as not to impact existing security configurations that have been rolled out by organizations in your enterprise.
{% endif %}
{% ifversion secret-scanning-enterprise-level-api %}{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}{% endif %}
{% ifversion ghes %}For information about buying a license for {% data variables.product.prodname_GH_advanced_security %}, see "[AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/about-billing-for-github-advanced-security)."{% elsif ghec %}For information about buying a license for {% data variables.product.prodname_GH_advanced_security %}, see "[AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/signing-up-for-github-advanced-security)."{% endif %}

Просмотреть файл

@ -207,6 +207,14 @@ If your appliance averages more than 70% CPU utilization, {% data variables.prod
As part of upgrading GitHub Enterprise Server to version 3.13 or later, the Elasticsearch service will be upgraded. {% data variables.product.company_short %} strongly recommends following the guidance in "[AUTOTITLE](/admin/upgrading-your-instance/performing-an-upgrade/preparing-for-the-elasticsearch-upgrade)."
{% endif %}
{% ifversion ghes > 3.14 and ghes < 3.17 %}
## Required root disk size increased to 400GB
New installations of 3.15 or later, or upgrades to 3.15 or later require root disk size of at least 400GB. This capacity is an enforced requirement for the system to boot successfully. {% data variables.product.company_short %} strongly recommends following the guidance in "[AUTOTITLE](/admin/monitoring-and-managing-your-instance/updating-the-virtual-machine-and-physical-resources/increasing-storage-capacity)."
{% endif %}
{% ifversion ghes > 3.12 and ghes < 3.15 %}
## Undecryptable records

Просмотреть файл

@ -80,7 +80,15 @@ To enable secret scanning for your {% data variables.product.prodname_ghe_server
{% ifversion security-configurations %}
You need to enable {% data variables.product.prodname_secret_scanning %} and push protection for each pilot project. You can do this with the {% data variables.product.prodname_github_security_configuration %}, or you can create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
{% ifversion security-configurations-cloud %}
You need to enable {% data variables.product.prodname_secret_scanning %} and push protection for each pilot project. You can do this with the {% data variables.product.prodname_github_security_configuration %}, or you can create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% elsif security-configurations-ghes-only %}
You need to enable {% data variables.product.prodname_secret_scanning %} and push protection for each pilot project. You can do this with a {% data variables.product.prodname_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% endif %}
{% else %}

Просмотреть файл

@ -74,7 +74,7 @@ If the code in a repository changes to include {% ifversion code-scanning-defaul
## Configuring default setup for all eligible repositories in an organization
{% ifversion security-configurations %} You can enable default setup for all eligible repositories in your organization. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)."
{% ifversion security-configurations %} You can enable default setup for all eligible repositories in your organization. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
{% else %}
Through the "Code security and analysis" page of your organization's settings, you can enable default setup for all eligible repositories in your organization. For more information on repository eligibility, see "[Eligible repositories for {% data variables.product.prodname_codeql %} default setup at scale](#eligible-repositories-default-setup)."
@ -109,7 +109,7 @@ Through your organization's security settings page, you can extend coverage in d
{% ifversion security-configurations %}
You can filter for specific repositories you would like to configure default setup for. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/applying-a-custom-security-configuration)."
You can filter for specific repositories you would like to configure default setup for. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-a-custom-security-configuration)."
{% endif %}

Просмотреть файл

@ -84,7 +84,7 @@ An enterprise owner must first set up {% data variables.product.prodname_dependa
## Managing {% data variables.product.prodname_dependabot_alerts %} for your organization
{% ifversion security-configurations %} You can enable {% data variables.product.prodname_dependabot_alerts %} for all eligible repositories in your organization. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)."
{% ifversion security-configurations %} You can enable {% data variables.product.prodname_dependabot_alerts %} for all eligible repositories in your organization. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
{% else %}

Просмотреть файл

@ -24,7 +24,15 @@ You can additionally enable push protection for your own personal account, which
{% endif %}
If you're an organization owner, you can enable push protection for multiple repositories at a time{% ifversion security-configurations %} using the {% data variables.product.prodname_github_security_configuration %}{% endif %}. For more information, see {% ifversion security-configurations %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization){% else %}"[AUTOTITLE](/code-security/getting-started/quickstart-for-securing-your-organization#enabling-security-features-in-your-organization){% endif %}."
{% ifversion security-configurations %}
If you're an organization owner, you can enable push protection for multiple repositories at a time using {% data variables.product.prodname_security_configurations %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
{% else %}
If you're an organization owner, you can enable push protection for multiple repositories at a time. For more information, see "[AUTOTITLE](/code-security/getting-started/quickstart-for-securing-your-organization#enabling-security-features-in-your-organization)."
{% endif %}
Organization owners, security managers, and repository administrators can also enable push protection for {% data variables.product.prodname_secret_scanning %} via the API. For more information, see "[AUTOTITLE](/rest/repos#update-a-repository)" and expand the "Properties of the `security_and_analysis` object" section.

Просмотреть файл

@ -26,7 +26,15 @@ topics:
{% endif %}
If you're an organization owner, you can enable {% data variables.product.prodname_secret_scanning %} for multiple repositories at the same time{% ifversion security-configurations %} using the {% data variables.product.prodname_github_security_configuration %}{% endif %}. For more information, see {% ifversion security-configurations %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization){% else %}"[AUTOTITLE](/code-security/getting-started/quickstart-for-securing-your-organization#enabling-security-features-in-your-organization)"{% endif %}."
{% ifversion security-configurations %}
If you're an organization owner, you can enable {% data variables.product.prodname_secret_scanning %} for multiple repositories at a time using {% data variables.product.prodname_security_configurations %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
{% else %}
If you're an organization owner, you can enable {% data variables.product.prodname_secret_scanning %} for multiple repositories at a time. For more information, see "[AUTOTITLE](/code-security/getting-started/quickstart-for-securing-your-organization#enabling-security-features-in-your-organization)."
{% endif %}
{% ifversion secret-scanning-enterprise-level %}

Просмотреть файл

@ -42,7 +42,7 @@ For more information on using validity checks, see "[AUTOTITLE](/code-security/s
You can also use the REST API to enable validity checks for partner patterns for your repository. For more information, see "[AUTOTITLE](/rest/repos/repos#update-a-repository)."
Alternatively, organization owners and enterprise administrators can enable the feature for all repositories in the organization or enterprise settings. For more information on enabling at the organization-level, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)." For more information on enabling at the enterprise-level, see "[AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise)" and "[AUTOTITLE](/rest/enterprise-admin/code-security-and-analysis#update-code-security-and-analysis-features-for-an-enterprise)."
Alternatively, organization owners and enterprise administrators can enable the feature for all repositories in the organization or enterprise settings. For more information on enabling at the organization-level, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)." For more information on enabling at the enterprise-level, see "[AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise)" and "[AUTOTITLE](/rest/enterprise-admin/code-security-and-analysis#update-code-security-and-analysis-features-for-an-enterprise)."
## Further reading

Просмотреть файл

@ -107,7 +107,7 @@ aAAAe9
## Defining a custom pattern for an organization
Before defining a custom pattern, you must ensure that you enable {% data variables.product.prodname_secret_scanning %} for the repositories that you want to scan in your organization. {% ifversion security-configurations %} You can use {% data variables.product.prodname_security_configurations %} to enable {% data variables.product.prodname_secret_scanning %} on all repositories in your organization using the {% data variables.product.prodname_github_security_configuration %}, or you can create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."{% else %}
Before defining a custom pattern, you must ensure that you enable {% data variables.product.prodname_secret_scanning %} for the repositories that you want to scan in your organization. {% ifversion security-configurations %} You can use {% data variables.product.prodname_security_configurations %} to enable {% data variables.product.prodname_secret_scanning %} on all repositories in your organization. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."{% else %}
To enable {% data variables.product.prodname_secret_scanning %} on all repositories in your organization, see "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization)."
{% endif %}

Просмотреть файл

@ -49,7 +49,7 @@ When you enable this feature, you will create a bypass list of roles and teams w
You must configure delegated bypass for your organization using a custom security configuration. You can then apply the security configuration to all (or selected) repositories in your organization.
1. Create a new custom security configuration, or edit an existing one. See "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration#creating-a-custom-security-configuration)."
1. Create a new custom security configuration, or edit an existing one. See "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration#creating-a-custom-security-configuration)."
1. When creating the custom security configuration, under "{% data variables.product.prodname_secret_scanning_caps %}", ensure that the dropdown menus for "Alerts" and "Push protection" are set to **Enabled**.
1. Under "Push protection", to the right of "Bypass privileges", select the dropdown menu, then click **Specific actors**.
@ -64,7 +64,7 @@ You must configure delegated bypass for your organization using a custom securit
> In addition to assigning bypass privileges to roles and teams, you can also grant _individual_ organization members the ability to review and manage bypass requests using fine-grained permissions. See "[Using fine-grained permissions to control who can review and manage bypass requests](#using-fine-grained-permissions-to-control-who-can-review-and-manage-bypass-requests)."
1. Click **Save configuration**.
1. Apply the security configuration to all (or selected) repositories in your organization. See "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/applying-a-custom-security-configuration)."
1. Apply the security configuration to all (or selected) repositories in your organization. See "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-a-custom-security-configuration)."
To learn more about security configurations, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."

Просмотреть файл

@ -38,7 +38,7 @@ For more information about non-provider patterns, see "{% ifversion fpt or ghec
### Enabling detection of non-provider patterns for an organization
You can enable scanning for non-provider patterns at the organization level{% ifversion org-npp-enablement-security-configurations %} using the {% data variables.product.prodname_github_security_configuration %} or by applying a custom security configuration{% endif %}. For more information, see {% ifversion org-npp-enablement-security-configurations %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration){% elsif ghes < 3.15 %}"[Configuring global secret scanning settings](/code-security/securing-your-organization/enabling-security-features-in-your-organization/configuring-global-security-settings-for-your-organization#configuring-global-secret-scanning-settings){% endif %}."
You can enable scanning for non-provider patterns at the organization level {% ifversion security-configurations-cloud %}using the {% data variables.product.prodname_github_security_configuration %} or {% endif %}by applying a custom security configuration. For more information, see {% ifversion security-configurations-cloud %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and {% endif %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% endif %}

Просмотреть файл

@ -9,11 +9,13 @@ topics:
- Advanced Security
- Organizations
- Security
redirect_from:
- /code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/applying-a-custom-security-configuration
---
## About applying a {% data variables.product.prodname_custom_security_configuration %}
After you create a {% data variables.product.prodname_custom_security_configuration %}, you need to apply it to repositories in your organization to enable the configuration's settings on those repositories. To learn how to create a {% data variables.product.prodname_custom_security_configuration %}, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
After you create a {% data variables.product.prodname_custom_security_configuration %}, you need to apply it to repositories in your organization to enable the configuration's settings on those repositories. To learn how to create a {% data variables.product.prodname_custom_security_configuration %}, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
## Applying your {% data variables.product.prodname_custom_security_configuration %} to repositories in your organization

Просмотреть файл

@ -4,7 +4,7 @@ shortTitle: Apply recommended configuration
intro: 'Secure your code with the security enablement settings created, managed, and recommended by {% data variables.product.company_short %}.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: security-configurations
feature: security-configurations-cloud
topics:
- Advanced Security
- Organizations

Просмотреть файл

@ -103,22 +103,11 @@ You can choose the severity levels at which {% data variables.product.prodname_c
You can customize several {% data variables.product.prodname_global_settings %} for {% data variables.product.prodname_secret_scanning %}:
{% ifversion ghes < 3.15 %}
* [Scanning for non-provider patterns](#scanning-for-non-provider-patterns){% endif %}{% ifversion secret-scanning-ai-generic-secret-detection %}
{% ifversion secret-scanning-ai-generic-secret-detection %}
* [Generic secret detection with {% data variables.secret-scanning.copilot-secret-scanning %}](#generic-secret-detection-with-copilot-secret-scanning){% endif %}
* [Adding a resource link for blocked commits](#adding-a-resource-link-for-blocked-commits){% ifversion ghec or ghes %}
* [Defining custom patterns](#defining-custom-patterns){% endif %}
{% ifversion ghes < 3.15 %}
### Scanning for non-provider patterns
You can choose to scan for non-provider patterns, such as private keys, to detect non-provider secrets before they are leaked. To enable these scans, select **Scan for non-provider patterns**. Be aware that non-provider tokens often have a higher rate of false positives. To learn more about non-provider patterns, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#non-provider-patterns)" and "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/viewing-alerts#other-alerts-list)."
{% data reusables.secret-scanning.non-provider-patterns-beta %}
{% endif %}
{% ifversion secret-scanning-ai-generic-secret-detection %}
### {% data variables.secret-scanning.generic-secret-detection-caps %} with {% data variables.secret-scanning.copilot-secret-scanning %}

Просмотреть файл

@ -9,17 +9,35 @@ topics:
- Advanced Security
- Organizations
- Security
redirect_from:
- /code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration
---
## About {% data variables.product.prodname_custom_security_configurations %}
{% ifversion security-configurations-cloud %}
We recommend securing your organization with the {% data variables.product.prodname_github_security_configuration %}, then evaluating the security findings on your repositories before configuring {% data variables.product.prodname_custom_security_configurations %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)."
{% endif %}
With {% data variables.product.prodname_custom_security_configurations %}, you can create collections of enablement settings for {% data variables.product.company_short %}'s security products to meet the specific security needs of your organization. For example, you can create a different {% data variables.product.prodname_custom_security_configuration %} for each group of repositories to reflect their different levels of visibility, risk tolerance, and impact.
{% ifversion security-configurations-ghes-only %}
When creating a security configuration, keep in mind that:
* Only features installed by a site administrator on your {% data variables.product.prodname_ghe_server %} instance will appear in the UI.
* {% data variables.product.prodname_GH_advanced_security %} features will only be visible if your organization or {% data variables.product.prodname_ghe_server %} instance holds a {% data variables.product.prodname_GH_advanced_security %} license.
* Certain features, like {% data variables.product.prodname_dependabot_security_updates %} and {% data variables.product.prodname_code_scanning %} default setup, also require that {% data variables.product.prodname_actions %} is installed on the {% data variables.product.prodname_ghe_server %} instance.
{% endif %}
## Creating a {% data variables.product.prodname_custom_security_configuration %}
> [!NOTE]
{% ifversion security-configurations-cloud %}
<!-- Note: this article has two entirely separate procedures for cloud and server users. -->
>[!NOTE]
> The enablement status of some security features is dependent on other, higher-level security features. For example, disabling dependency graph will also disable {% data variables.product.prodname_dependabot %}, vulnerability exposure analysis, and security updates. For {% data variables.product.prodname_security_configurations %}, dependent security features are indicated with indentation and {% octicon "reply" aria-hidden="true" %}.
{% data reusables.profile.access_org %}
@ -46,9 +64,7 @@ With {% data variables.product.prodname_custom_security_configurations %}, you c
{% ifversion push-protection-delegated-bypass-configurations %}
1. Optionally, under "Push protection", choose whether you want to assign bypass privileges to selected actors in your organization. By assigning bypass privileges, selected organization members can bypass push protection, and there is a review and approval process for all other contributors. For further guidance on how to configure this setting, see "[AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/delegated-bypass-for-push-protection/enabling-delegated-bypass-for-push-protection#configuring-delegated-bypass-for-an-organization)."
{% endif %}
{% ifversion fpt or ghec %}
1. In the "Private vulnerability reporting" section of the security settings table, choose whether you want to enable, disable, or keep the existing settings for private vulnerability reporting. To learn about private vulnerability reporting, see "[AUTOTITLE](/code-security/security-advisories/working-with-repository-security-advisories/configuring-private-vulnerability-reporting-for-a-repository)."
{% endif %}
1. Optionally, in the "Policy" section, you can choose to automatically apply the {% data variables.product.prodname_security_configuration %} to newly created repositories depending on their visibility. Select the **None** {% octicon "triangle-down" aria-hidden="true" %} dropdown menu, then click **Public**, or **Private and internal**, or both.
{% data reusables.security-configurations.default-configuration-exception-repo-transfers %}
@ -59,8 +75,44 @@ With {% data variables.product.prodname_custom_security_configurations %}, you c
1. To finish creating your {% data variables.product.prodname_custom_security_configuration %}, click **Save configuration**.
{% elsif security-configurations-ghes-only %}
>[!NOTE]
> The enablement status of some security features is dependent on other, higher-level security features. For example, disabling {% data variables.secret-scanning.alerts %} will also disable non-provider patterns and push protection.
{% data reusables.profile.access_org %}
{% data reusables.organizations.org_settings %}
{% data reusables.security-configurations.view-configurations-page %}
1. In the "Code security configurations" section, click **New configuration**.
1. To help identify your {% data variables.product.prodname_custom_security_configuration %} and clarify its purpose on the "Code {% data variables.product.prodname_security_configurations %}" page, name your configuration and create a description.
1. In the "{% data variables.product.prodname_GH_advanced_security %} features" row, choose whether to include or exclude {% data variables.product.prodname_GH_advanced_security %} (GHAS) features. If you plan to apply a {% data variables.product.prodname_custom_security_configuration %} with GHAS features to private repositories, you must have available GHAS licenses for each active unique committer to those repositories, or the features will not be enabled. See "[AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/about-billing-for-github-advanced-security)."
1. In the "Dependency graph and Dependabot" section of the security settings table, choose whether you want to enable, disable, or keep the existing settings for the following security features:
* {% data variables.product.prodname_dependabot_alerts %}. To learn about {% data variables.product.prodname_dependabot %}, see "[AUTOTITLE](/code-security/dependabot/dependabot-alerts/about-dependabot-alerts)."
* Security updates. To learn about security updates, see "[AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates)."
> [!NOTE]
> You cannot manually change the enablement setting for the dependency graph. This setting is installed and managed by a site administrator at the instance level.
1. In the "{% data variables.product.prodname_code_scanning_caps %}" section of the security settings table, choose whether you want to enable, disable, or keep the existing settings for {% data variables.product.prodname_code_scanning %} default setup. To learn about default setup, see "[AUTOTITLE](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning#about-default-setup)."
1. In the "{% data variables.product.prodname_secret_scanning_caps %}" section of the security settings table, choose whether you want to enable, disable, or keep the existing settings for the following security features:
* Alerts. To learn about {% data variables.secret-scanning.alerts %}, see "[AUTOTITLE](/code-security/secret-scanning/introduction/about-secret-scanning)."{% ifversion org-npp-enablement-security-configurations %}
* Non-provider patterns. To learn more about scanning for non-provider patterns, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#non-provider-patterns)" and "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/viewing-alerts)."{% endif %}
* Push protection. To learn about push protection, see "[AUTOTITLE](/code-security/secret-scanning/introduction/about-push-protection)."
{% ifversion push-protection-delegated-bypass-configurations %}
1. Optionally, under "Push protection", choose whether you want to assign bypass privileges to selected actors in your organization. By assigning bypass privileges, selected organization members can bypass push protection, and there is a review and approval process for all other contributors. For further guidance on how to configure this setting, see "[AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/delegated-bypass-for-push-protection/enabling-delegated-bypass-for-push-protection#configuring-delegated-bypass-for-an-organization)."
{% endif %}
1. Optionally, in the "Policy" section, you can choose to automatically apply the {% data variables.product.prodname_security_configuration %} to newly created repositories depending on their visibility. Select the **None** {% octicon "triangle-down" aria-hidden="true" %} dropdown menu, then click **Public**, or **Private and internal**, or **All repositories**.
{% data reusables.security-configurations.default-configuration-exception-repo-transfers %}
1. Optionally, in the "Policy" section, you can enforce the configuration and block repository owners from changing features that are enabled or disabled by the configuration (features that are not set aren't enforced). Next to "Enforce configuration", select **Enforce** from the dropdown menu.
>[!NOTE]
{% data reusables.code-scanning.custom-security-configuration-enforcement-edge-cases %}
1. To finish creating your {% data variables.product.prodname_custom_security_configuration %}, click **Save configuration**.
{% endif %}
## Next steps
To apply your {% data variables.product.prodname_custom_security_configuration %} to repositories in your organization, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/applying-a-custom-security-configuration)."
To apply your {% data variables.product.prodname_custom_security_configuration %} to repositories in your organization, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-a-custom-security-configuration)."
{% data reusables.security-configurations.edit-configuration-next-step %}

Просмотреть файл

@ -1,7 +1,7 @@
---
title: Enabling security features in your organization
shortTitle: Enable security features
intro: 'Enable the {% data variables.product.prodname_github_security_configuration %} and customize your {% data variables.product.prodname_global_settings %} to quickly secure your organization.'
intro: '{% ifversion security-configurations-cloud %}Enable the {% data variables.product.prodname_github_security_configuration %} or c{% elsif security-configurations-ghes-only %}C{% endif %}reate and apply {% data variables.product.prodname_custom_security_configurations %} to quickly secure your organization.'
versions:
feature: security-configurations
topics:
@ -10,5 +10,10 @@ topics:
- Security
children:
- /applying-the-github-recommended-security-configuration-in-your-organization
- /creating-a-custom-security-configuration
- /applying-a-custom-security-configuration
- /configuring-global-security-settings-for-your-organization
redirect_from:
- /code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations
---

Просмотреть файл

@ -11,7 +11,6 @@ topics:
children:
- /introduction-to-securing-your-organization-at-scale
- /enabling-security-features-in-your-organization
- /meeting-your-specific-security-needs-with-custom-security-configurations
- /managing-the-security-of-your-organization
- /fixing-security-alerts-at-scale
- /troubleshooting-security-configurations

Просмотреть файл

@ -18,15 +18,29 @@ You can easily enable and manage {% data variables.product.company_short %}'s se
## About {% data variables.product.prodname_security_configurations %}
{% data reusables.security-configurations.define-security-configurations %} There are two types of {% data variables.product.prodname_security_configuration %}:
{% data reusables.security-configurations.define-security-configurations %}
{% ifversion security-configurations-cloud %}
There are two types of {% data variables.product.prodname_security_configuration %}:
* **The {% data variables.product.prodname_github_security_configuration %}**. This configuration is a collection of enablement settings created and managed by subject matter experts at {% data variables.product.company_short %}. The {% data variables.product.prodname_github_security_configuration %} is designed to adequately secure any repository, and can easily be applied to all repositories in your organization.
* **{% data variables.product.prodname_custom_security_configurations_caps %}**. These are configurations you can create and edit yourself, allowing you to choose different enablement settings for groups of repositories with specific security needs.
{% endif %}
{% ifversion security-configurations-ghes-only %}
You can customize {% data variables.product.prodname_security_configurations %}, allowing you to choose different enablement settings for groups of repositories with specific security needs.
You will only ever see enablement settings for features that have been installed on your {% data variables.product.prodname_ghe_server %} instance by an enterprise administrator.
{% endif %}
>[!NOTE]
{% data reusables.code-scanning.custom-security-configuration-enforcement-edge-cases %}
Each repository can only have one {% data variables.product.prodname_security_configuration %} applied to it. To find out how you should get started with {% data variables.product.prodname_security_configurations %}, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/choosing-a-security-configuration-for-your-repositories)."
Each repository can only have one {% data variables.product.prodname_security_configuration %} applied to it. {% ifversion security-configurations-cloud %}To find out how you should get started with {% data variables.product.prodname_security_configurations %}, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/choosing-a-security-configuration-for-your-repositories)."{% endif %}
{% ifversion security-configurations-api %}
You can also create and manage security configurations using the REST API. For more information, see "[AUTOTITLE](/rest/code-security/configurations)."
@ -38,4 +52,12 @@ While {% data variables.product.prodname_security_configurations %} determine re
## Next steps
{% ifversion security-configurations-cloud %}
To determine which {% data variables.product.prodname_security_configurations %} are right for the repositories in your organization, see "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/choosing-a-security-configuration-for-your-repositories)."
{% elsif security-configurations-ghes-only %}
To get started with creating a {% data variables.product.prodname_security_configuration %} for your organization, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% endif %}

Просмотреть файл

@ -4,7 +4,7 @@ shortTitle: Choose security configuration
intro: 'Find out which type of {% data variables.product.prodname_security_configuration %} will meet the security needs of the repositories in your organization.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: security-configurations
feature: security-configurations-cloud
topics:
- Advanced Security
- Organizations
@ -38,4 +38,4 @@ If you are familiar with {% data variables.product.company_short %}'s security p
* Create several configurations for repositories with different security needs
* Manage your {% data variables.product.prodname_GH_advanced_security %} licensing by including or excluding {% data variables.product.prodname_GH_advanced_security %} features for a particular configuration
To start securing repositories in your organization with {% data variables.product.prodname_custom_security_configurations %}, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
To start securing repositories in your organization with {% data variables.product.prodname_custom_security_configurations %}, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."

Просмотреть файл

@ -15,7 +15,7 @@ topics:
If you decide that the security needs of a repository are too specific for a {% data variables.product.prodname_security_configuration %} to be useful, you can detach that repository from the linked configuration and instead manage security enablement settings at the repository level. Detaching a repository from a {% data variables.product.prodname_security_configuration %} will not change the existing security enablement settings for that repository. For an introduction to securing your repository at the repository level, see "[AUTOTITLE](/code-security/getting-started/securing-your-repository)."
Alternatively, if you want to apply a {% data variables.product.prodname_security_configuration %} to a repository that's already attached to a different configuration, you can apply the configuration as normal, and you do not need to detach the current configuration. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/applying-a-custom-security-configuration)."
Alternatively, if you want to apply a {% data variables.product.prodname_security_configuration %} to a repository that's already attached to a different configuration, you can apply the configuration as normal, and you do not need to detach the current configuration. For more information, see {% ifversion security-configurations-cloud %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and {% endif %}"[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-a-custom-security-configuration)."
## Detaching repositories from linked {% data variables.product.prodname_security_configurations %}

Просмотреть файл

@ -17,8 +17,12 @@ After creating and applying a {% data variables.product.prodname_custom_security
To determine if your {% data variables.product.prodname_custom_security_configuration %} is meeting your security needs, see "[AUTOTITLE](/code-security/securing-your-organization/managing-the-security-of-your-organization/interpreting-security-findings)."
{% ifversion security-configurations-cloud %}
> [!NOTE]
> The {% data variables.product.prodname_github_security_configuration %} is managed by {% data variables.product.company_short %} and cannot be edited. If you would like to customize your security enablement settings, you need to create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
> The {% data variables.product.prodname_github_security_configuration %} is managed by {% data variables.product.company_short %} and cannot be edited. If you would like to customize your security enablement settings, you need to create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% endif %}
## Modifying your {% data variables.product.prodname_custom_security_configuration %}

Просмотреть файл

@ -0,0 +1,37 @@
---
title: Finding and fixing configuration attachment failures
shortTitle: Find attachment failures
allowTitleToDifferFromFilename: true
intro: 'You can identify any repositories where the security configuration could not be attached, and follow guidance to remediate the problem.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: security-configurations
topics:
- Advanced Security
- Organizations
- Security
---
## Finding and remediating attachment failures
When you apply a configuration to a group of repositories, you may see a banner reporting that there was an attachment failure for some repositories. This happens when there is a conflict between the existing repository settings and the configuration that you applied.
When an attachment failure happens:
* Only some of the settings in the security configuration are applied to affected repositories.
* Any changes you later make to the security configuration will not be inherited by the affected repositories.
On the security configuration settings page, under "Apply configurations", you will see a banner advising how many repositories in your organization have an attachment failure, and an overview of the reason(s) for the failure.
Click the link in the banner display, or alternatively, filter the list of repositories by `config-status:failed`, to see the list of affected repositories and to source additional guidance on how to remediate the attachment failure for a specific repository.
{% data reusables.profile.access_org %}
{% data reusables.organizations.org_settings %}
{% data reusables.security-configurations.view-configurations-page %}
1. In the "Apply configurations" section, filter by `config-status:failed`.
1. From the results list, for the repository you're interested in, click **{% octicon "alert" aria-hidden="true" %} Failed REASON**.
1. In the dialog box, review the information and follow the remediation guidance.
## Further reading
* "[AUTOTITLE](/code-security/securing-your-organization/troubleshooting-security-configurations/a-repository-is-using-advanced-setup-for-code-scanning)"
* "[AUTOTITLE](/code-security/securing-your-organization/troubleshooting-security-configurations/not-enough-github-advanced-security-licenses)"

Просмотреть файл

@ -14,5 +14,6 @@ children:
- /editing-a-custom-security-configuration
- /managing-your-github-advanced-security-license-usage
- /detaching-repositories-from-their-security-configurations
- /finding-repositories-with-attachment-failures
- /deleting-a-custom-security-configuration
---

Просмотреть файл

@ -75,8 +75,12 @@ To learn how to interpret and resolve {% data variables.product.prodname_dependa
## Next steps
If you are using the {% data variables.product.prodname_github_security_configuration %}, and your findings indicate the security enablement settings are not meeting your needs, you should create a {% data variables.product.prodname_custom_security_configuration %}. To get started, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
{% ifversion security-configurations-cloud %}
If you are using a {% data variables.product.prodname_custom_security_configuration %}, and your findings indicate the security enablement settings are not meeting your needs, you can edit your existing configuration. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/managing-the-security-of-your-organization/editing-a-custom-security-configuration)."
If you are using the {% data variables.product.prodname_github_security_configuration %}, and your findings indicate the security enablement settings are not meeting your needs, you should create a {% data variables.product.prodname_custom_security_configuration %}. To get started, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% endif %}
If {% ifversion security-configurations-cloud %}you are using a {% data variables.product.prodname_custom_security_configuration %}, and {% endif %}your findings indicate the security enablement settings are not meeting your needs, you can edit your existing configuration. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/managing-the-security-of-your-organization/editing-a-custom-security-configuration)."
Lastly, you can also edit your organization-level security settings with {% data variables.product.prodname_global_settings %}. To learn more, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/configuring-global-security-settings-for-your-organization)."

Просмотреть файл

@ -55,8 +55,11 @@ To learn about GHAS licenses, as well as unique and active committers, see "[AUT
1. Select the **Apply configuration** {% octicon "triangle-down" aria-hidden="true" %} dropdown menu, then click **Disable {% data variables.product.prodname_GH_advanced_security %}**.
1. To finish disabling GHAS features on the selected private or internal repositories, in the "Disable {% data variables.product.prodname_GH_advanced_security %}?" window, click **Disable {% data variables.product.prodname_GH_advanced_security %}**.
> [!NOTE]
>[!NOTE]
{%- ifversion security-configurations-cloud %}
> * Disabling GHAS features for a private or internal repository will also detach that repository from any linked {% data variables.product.prodname_security_configuration %}.
> * Disabling GHAS features through the repository table _will not_ disable those features on public repositories since they do not require {% data variables.product.prodname_GH_advanced_security %} licenses.
> * On {% data variables.product.prodname_dotcom_the_website %}, disabling GHAS features through the repository table _will not_ disable those features on public repositories since they do not require {% data variables.product.prodname_GH_advanced_security %} licenses.{% elsif security-configurations-ghes-only %}
> * Disabling GHAS features for a repository will also detach that repository from any linked {% data variables.product.prodname_security_configuration %}.
{% endif %}
{% endif %}

Просмотреть файл

@ -1,14 +0,0 @@
---
title: Meeting your specific security needs with custom security configurations
shortTitle: Customize organization security
intro: 'You can create {% data variables.product.prodname_security_configurations %} with custom security enablement settings to best secure repositories in your organization.'
versions:
feature: security-configurations
topics:
- Advanced Security
- Organizations
- Security
children:
- /creating-a-custom-security-configuration
- /applying-a-custom-security-configuration
---

Просмотреть файл

@ -36,4 +36,4 @@ For all repositories without an active advanced setup, the {% data variables.pro
There are two ways you can solve this problem:
1. **Update the affected repositories to use default setup** for {% data variables.product.prodname_code_scanning %} at the repository level and then reapply your {% data variables.product.prodname_security_configuration %} to the repositories. For more information, see "[AUTOTITLE](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning)."
1. **Create a new custom {% data variables.product.prodname_security_configuration %}** that does not include a setting for {% data variables.product.prodname_code_scanning %} and apply this {% data variables.product.prodname_security_configuration %} to repositories that use advanced setup. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
1. **Create a new custom {% data variables.product.prodname_security_configuration %}** that does not include a setting for {% data variables.product.prodname_code_scanning %} and apply this {% data variables.product.prodname_security_configuration %} to repositories that use advanced setup. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."

Просмотреть файл

@ -0,0 +1,29 @@
---
title: A feature has disappeared from a security configuration
shortTitle: Feature disappears
allowTitleToDifferFromFilename: true
intro: 'Changes to your {% data variables.product.prodname_ghe_server %} instance''s installation settings by a site administrator may affect which security features are available to your configuration.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: security-configurations-ghes-only
topics:
- Advanced Security
- Organizations
- Security
---
## About the problem
Security configurations only include features that have been installed by a site administrator on your {% data variables.product.prodname_ghe_server %} instance.
If a site administrator changes the installation settings for a feature on your {% data variables.product.prodname_ghe_server %} instance, your configuration may be impacted.
After you have created and applied a security configuration to repositories across your organization:
* If a site administrator then **installs a new security feature** on the {% data variables.product.prodname_ghe_server %} instance, the feature appears in the configuration, but the enablement status for the feature displays as "Not set".
* If a site administrator **uninstalls an entire feature** from the {% data variables.product.prodname_ghe_server %} instance, the feature (and any sub-features) disappear from the configuration. The configuration doesn't detach from the repositories it's been applied to, and all other functionality continues as normal.
* If a site administrator **uninstalls {% data variables.product.prodname_actions %}** from the {% data variables.product.prodname_ghe_server %} instance, features that are dependent on {% data variables.product.prodname_actions %} (that is, {% data variables.product.prodname_dependabot_security_updates %} and {% data variables.product.prodname_code_scanning %}) disappear from the configuration. The configuration doesn't detach from the repositories it's been applied to, and all other functionality continues as normal.
* If a site administrator **uninstalls and then reinstalls** a feature on the {% data variables.product.prodname_ghe_server %} instance, the configuration remembers the pre-existing enablement status of the feature (either "Enabled", "Disabled", or "Not set") and reverts back to this original enablement status.
## Solving the problem
If you are concerned that a feature has disappeared from a configuration you've created, you should contact the site administrator for your {% data variables.product.prodname_ghe_server %} instance and check whether the feature, or its prerequisite feature, has been uninstalled from the instance, and if the change was intentional.

Просмотреть файл

@ -11,4 +11,5 @@ topics:
children:
- /a-repository-is-using-advanced-setup-for-code-scanning
- /not-enough-github-advanced-security-licenses
- /feature-disappears
---

Просмотреть файл

@ -31,7 +31,7 @@ For more information about configuring notification preferences, see "[AUTOTITLE
## Enabling or disabling private vulnerability reporting for public repositories added to the organization
You can enable or disable private vulnerability reporting for new public repositories added to the organization using the {% data variables.product.prodname_github_security_configuration %}, or you can create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
You can enable or disable private vulnerability reporting for new public repositories added to the organization using the {% data variables.product.prodname_github_security_configuration %}, or you can create a {% data variables.product.prodname_custom_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/applying-the-github-recommended-security-configuration-in-your-organization)" and "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
## What having private vulnerability reporting enabled for a repository looks like for a security researcher

Просмотреть файл

@ -2,7 +2,7 @@
title: Viewing metrics for pull request alerts
shortTitle: View PR alert metrics
allowTitleToDifferFromFilename: true
intro: 'You can use security overview to see how {% data variables.product.prodname_codeql %} is performing in pull requests for repositories across your organization, and to identify repositories where you may need to take action.'
intro: 'You can use security overview to see how {% data variables.product.prodname_codeql %} is performing in pull requests for repositories across your organizations, and to identify repositories where you may need to take action.'
permissions: '{% data reusables.permissions.security-overview %}'
type: how_to
topics:
@ -16,26 +16,36 @@ versions:
feature: security-overview-org-codeql-pr-alerts
---
## About {% data variables.product.prodname_codeql %} pull request alerts metrics for an organization
## About {% data variables.product.prodname_codeql %} pull request alerts metrics
The metrics overview for {% data variables.product.prodname_codeql %} pull request alerts helps you to understand how well {% data variables.product.prodname_codeql %} is preventing vulnerabilities in your organization. You can use the metrics to assess how {% data variables.product.prodname_codeql %} is performing in pull requests, and to easily identify the repositories where you may need to take action in order to identify and reduce security risks.
The metrics overview for {% data variables.product.prodname_codeql %} pull request alerts helps you to understand how well {% data variables.product.prodname_codeql %} is preventing vulnerabilities in your organizations. You can use the metrics to assess how {% data variables.product.prodname_codeql %} is performing in pull requests, and to easily identify the repositories where you may need to take action in order to identify and reduce security risks.
The overview shows you a summary of how many vulnerabilities prevented by {% data variables.product.prodname_codeql %} have been caught in pull requests. The metrics are only tracked for pull requests that have been merged into the default branches of repositories in your organization.
The overview shows you a summary of how many vulnerabilities prevented by {% data variables.product.prodname_codeql %} have been caught in pull requests. The metrics are only tracked for pull requests that have been merged into the default branches of repositories in your organizations.
You can also find more granular metrics, such as how many alerts were fixed with and without {% data variables.product.prodname_copilot_autofix_short %} suggestions, how many were unresolved and merged, and how many were dismissed as false positive or as risk accepted.
You can also find more granular metrics, such as how many alerts were fixed{% ifversion code-scanning-autofix %} with and without {% data variables.product.prodname_copilot_autofix_short %} suggestions{% endif %}, how many were unresolved and merged, and how many were dismissed as false positive or as risk accepted.
You can also view:
* The rules that are causing the most alerts in your organization, and how many alerts each rule is associated with.
* The rules that are causing the most alerts, and how many alerts each rule is associated with.
* The number of alerts that were merged into the default branch without resolution, and the number of alerts dismissed as an acceptable risk.
{% ifversion code-scanning-autofix %}
* The number of alerts that were fixed with an accepted {% data variables.product.prodname_copilot_autofix_short %} suggestion, displayed as a fraction of how many total {% data variables.product.prodname_copilot_autofix_short %} suggestions were available.
* Remediation rates, in a graph showing the percentage of alerts that were remediated with an available {% data variables.product.prodname_copilot_autofix_short %} suggestion, and the percentage of alerts that were remediated without a {% data variables.product.prodname_copilot_autofix_short %} suggestion.
{% endif %}
You can apply filters to the data. The metrics are based on activity from the default period or your selected period.
![Screenshot of the "CodeQL pull request alerts" view for an organization, showing status and trends over 90 days.](/assets/images/help/security-overview/security-overview-codeql-pull-requests-alerts-report.png)
{% ifversion code-scanning-autofix %}
> [!NOTE] Metrics for {% data variables.product.prodname_copilot_autofix_short %} will be shown only for repositories where {% data variables.product.prodname_copilot_autofix_short %} is enabled.
{% else %}
> [!NOTE] Metrics for {% data variables.product.prodname_copilot_autofix_short %} are omitted because {% data variables.product.prodname_copilot_autofix_short %} is available only on {% data variables.product.github %} cloud platforms.
{% endif %}
## Viewing {% data variables.product.prodname_codeql %} pull request alerts metrics for an organization
{% data reusables.organizations.navigate-to-org %}
@ -49,3 +59,17 @@ You can apply filters to the data. The metrics are based on activity from the de
* To search for repositories matching the selected filter, fill out the available fields for that filter, then click **Apply**. You can repeat this process to add as many filters as you would like to your search.
* Optionally, to remove a filter from your search, click {% octicon "filter" aria-hidden="true" %} **Filter**. In the row of the filter you want to remove, click {% octicon "x" aria-label="Delete FILTER-NUMBER: FILTER-PROPERTIES" %}, then click **Apply**.{% ifversion security-overview-export-data %}
1. You can use the {% octicon "download" aria-hidden="true" %} **Export CSV** button to download a CSV file of the data currently displayed on the page for security research and in-depth data analysis. For more information, see "[AUTOTITLE](/code-security/security-overview/exporting-data-from-security-overview)." {% endif %}
{% ifversion security-overview-enterprise-codeql-pr-alerts %}
## Viewing {% data variables.product.prodname_codeql %} pull request alerts metrics for your enterprise
You can also view metrics for {% data variables.product.prodname_codeql %} alerts in pull requests across organizations in your enterprise.
{% data reusables.security-overview.enterprise-filters-tip %}
{% data reusables.enterprise-accounts.access-enterprise-on-dotcom %}
{% data reusables.code-scanning.click-code-security-enterprise %}
1. In the sidebar, under "Metrics", click **{% octicon "graph" aria-hidden="true" %} {% data variables.product.prodname_codeql %} pull request alerts**.
{% endif %}

Просмотреть файл

@ -39,7 +39,7 @@ You must also enable {% data variables.product.prodname_actions %} for the repos
Repository administrators can enable or disable automatic dependency submission for a repository by following the steps outlined in this procedure.
Organization owners can enable automatic dependency submission for multiple repositories using a security configuration. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/meeting-your-specific-security-needs-with-custom-security-configurations/creating-a-custom-security-configuration)."
Organization owners can enable automatic dependency submission for multiple repositories using a security configuration. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/creating-a-custom-security-configuration)."
{% data reusables.repositories.navigate-to-repo %}
{% data reusables.repositories.sidebar-settings %}

Просмотреть файл

@ -71,7 +71,7 @@ The table below summarizes the availability of {% data variables.product.prodnam
For information about {% data variables.product.prodname_advanced_security %} features that are in development, see "[{% data variables.product.prodname_dotcom %} public roadmap](https://github.com/github/roadmap)." For an overview of all security features, see "[AUTOTITLE](/code-security/getting-started/github-security-features)."
{% ifversion fpt or ghec %}
{% data variables.product.prodname_GH_advanced_security %} features are enabled for all public repositories on {% data variables.product.prodname_dotcom_the_website %}. Organizations that use {% data variables.product.prodname_ghe_cloud %} with {% data variables.product.prodname_advanced_security %} can additionally enable these features for private and internal repositories. {% ifversion fpt %}See the [{% data variables.product.prodname_ghe_cloud %} documentation](/enterprise-cloud@latest/get-started/learning-about-github/about-github-advanced-security#enabling-advanced-security-features).
{% data variables.product.prodname_GH_advanced_security %} features are enabled for all public repositories on {% data variables.product.prodname_dotcom_the_website %}. Organizations that use {% data variables.product.prodname_ghe_cloud %} with {% data variables.product.prodname_advanced_security %} can additionally enable these features for private and internal repositories. {% ifversion fpt %}See the [{% data variables.product.prodname_ghe_cloud %} documentation](/enterprise-cloud@latest/get-started/learning-about-github/about-github-advanced-security#enabling-advanced-security-features).{% endif %}
{% endif %}
{% ifversion ghes or ghec %}
@ -80,10 +80,6 @@ For information about {% data variables.product.prodname_advanced_security %} fe
To learn about what you need to know to plan your {% data variables.product.prodname_GH_advanced_security %} deployment at a high level and to review the rollout phases we recommended, see "[AUTOTITLE](/code-security/adopting-github-advanced-security-at-scale)."
{% endif %}
{% ifversion not fpt %}
## Enabling {% data variables.product.prodname_advanced_security %} features
{% ifversion security-configurations %}
@ -103,9 +99,7 @@ For other repositories, once you have a license for your enterprise account, you
{%- endif %}
See "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization)" and "[AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository)."
{% ifversion ghec or ghes %}
If you have an enterprise account, license use for the entire enterprise is shown on your enterprise license page. See "[AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/viewing-your-github-advanced-security-usage)."
{% endif %}
{% endif %}
@ -124,4 +118,3 @@ You can highlight your code security knowledge by earning a {% data variables.pr
* "[AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise)"
{% endif %}
{% endif %}

Просмотреть файл

@ -1,9 +1,12 @@
---
title: Configurations
intro: Use the REST API to create and manage security configurations for your organization.
intro: >-
Use the REST API to create and manage security configurations for your
organization.
versions: # DO NOT MANUALLY EDIT. CHANGES WILL BE OVERWRITTEN BY A 🤖
fpt: '*'
ghec: '*'
ghes: '>=3.15'
topics:
- API
autogenerated: rest

Просмотреть файл

@ -10,5 +10,5 @@ children:
versions:
fpt: '*'
ghec: '*'
ghes: '>=3.15'
---

Просмотреть файл

@ -16,6 +16,10 @@ autogenerated: rest
You can manage {% data variables.location.product_location %} using the Manage {% data variables.product.prodname_ghe_server %} API. For example, you can retrieve information about the version of the {% data variables.product.prodname_ghe_server %} software running on the instance, or on instances with multiple nodes, view the status of replication.
{% ifversion management-console-manage-ghes-parity %}
> [!TIP] You can use this API to replace the functionality of the **Management Console API**, which was removed in {% data variables.product.prodname_ghe_server %} version 3.15. For a mapping between the endpoints, see {% ifversion ghes > 3.14 %}"[AUTOTITLE](/enterprise-server@3.14/rest/enterprise-admin/management-console)" in version 3.14 of the documentation.{% else %}"[AUTOTITLE](/rest/enterprise-admin/management-console)."{% endif %}
{% endif %}
Specify the port number when making API calls to endpoints for the Manage {% data variables.product.prodname_ghe_server %} API. If your instance uses TLS, the port number is 8443. Otherwise, the port number is 8080. If you cannot provide a port number, you'll need to configure your client to automatically follow redirects. For more information, see "[AUTOTITLE](/admin/configuration/configuring-network-settings/configuring-tls)."
You can also use the {% data variables.product.prodname_ghe_server %} extension of the {% data variables.product.prodname_cli %} to invoke endpoints in the Manage {% data variables.product.prodname_ghe_server %} API. For more information, see the [`github/gh-es`](https://github.com/github/gh-es/blob/main/README.md) repository.

Просмотреть файл

@ -2,4 +2,4 @@
versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.14'
ghes: '>= 3.15'

Просмотреть файл

@ -3,4 +3,3 @@
versions:
fpt: '*'
ghec: '*'
ghes: '>3.13'

Просмотреть файл

@ -0,0 +1,5 @@
# Reference: #15269
# Documentation for security configurations features that are **only** available to FPT/GHEC versions (e.g. the GitHub-recommended configuration)
versions:
fpt: '*'
ghec: '*'

Просмотреть файл

@ -0,0 +1,4 @@
# Reference: #15269
# Documentation for security configurations on GitHub Enterprise Server, for aspects of the feature that are only applicable to GHES.
versions:
ghes: '>3.14'

Просмотреть файл

@ -0,0 +1,5 @@
# Reference: #14348
# Documentation for enterprise-level CodeQL PR alerts report
versions:
ghes: '> 3.14'
ghec: '*'

Просмотреть файл

@ -1,4 +1,4 @@
# Reference: #4347
# Reference: #14347
# Documentation for org-level CodeQL PR alerts report
versions:
ghes: '> 3.14'

Просмотреть файл

@ -197,7 +197,12 @@ sections:
- |
...
deprecations:
closing_down:
# LINK TO RELEASE ISSUE
- |
...
retired:
# LINK TO RELEASE ISSUE
- |
...

Просмотреть файл

@ -0,0 +1,225 @@
date: '2024-11-12'
release_candidate: true
deprecated: false
intro: |
> [!NOTE] Release candidate (RC) builds are intended solely for use in a test environment. Do not install an RC in a production environment.
>
> Do not upgrade to an RC from a supported, earlier version.
>
> If {% data variables.location.product_location %} is running an RC, you cannot upgrade to the general availability (GA) release. You also cannot upgrade with a hotpatch.
For upgrade instructions, see "[AUTOTITLE](/admin/upgrading-your-instance/preparing-to-upgrade/overview-of-the-upgrade-process)."
sections:
# Remove section heading if the section contains no notes.
features:
# Remove a sub-section heading if the heading contains no notes. If sections
# that regularly recur are missing, add placeholders to this template.
- heading: Instance administration
notes:
# https://github.com/github/releases/issues/4353
- |
New installations of GitHub Enterprise Server version 3.15 and upgrades to 3.15 now require a root disk size of at least 400GB. Otherwise, the system will not boot. For more information on how to increase the root disk size in the appliance, see "[AUTOTITLE](/admin/monitoring-and-managing-your-instance/updating-the-virtual-machine-and-physical-resources/increasing-storage-capacity)."
# https://github.com/github/releases/issues/4353
- |
Minimum recommended requirements for vCPUs, memory, root storage, and data storage have been updated. See "[AUTOTITLE](/admin/installing-your-enterprise-server/setting-up-a-github-enterprise-server-instance/installing-github-enterprise-server-on-vmware#minimum-recommended-requirements)."
- heading: Audit logs
notes:
# https://github.com/github/releases/issues/4185
- |
Organization owners and security managers can monitor changes to the use of security configurations at the organization and repository levels. See "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)," [`security_configuration`](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/audit-log-events-for-your-organization#security_configuration), and [`repository_security_configuration`](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/audit-log-events-for-your-organization#repository_security_configuration).
- heading: Code scanning
notes:
# https://github.com/github/releases/issues/3915 and https://github.com/github/releases/issues/4469
- |
Users can run CodeQL analysis of C# code without building the project, `build-mode: none`. When you enable code scanning using default setup on a repository, both Java and C# use this mode. Analysis of both languages using this method is generally available. See "[About build mode None for CodeQL](/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages#about-build-mode-none-for-codeql)."
# https://github.com/github/releases/issues/4189
- |
CodeQL analysis of Swift and Kotlin code is generally available.
# https://github.com/github/releases/issues/4680
- |
This release comes installed with version **2.18.4** of the CodeQL CLI, used in the CodeQL action for code scanning. Significant updates since the default version installed on GitHub Enterprise Server 3.14 include:
* Support for Go 1.23 and TypeScript 5.5
* C# can now use `build-mode: none`, which allows scanning C# code without requiring working builds
* Kotlin & Swift support for mobile applications is generally available
* Java `build-mode: none` analyses only report a warning on the tool status page when significant analysis problems are detected
* Two new JavaScript queries, `js/functionality-from-untrusted-domain`, have been added to detect usage of scripts from untrusted domains, including `polyfill.io` content delivery network and `js/insecure-helmet-configuration` to detect instances where important Helmet security features are disabled
* The precision of `cpp/iterator-to-expired-container` & `cpp/unsafe-strncat` have been increased to high
- heading: Secret scanning
notes:
# https://github.com/github/releases/issues/4150
- |
Secret scanning for discussions, issues, and pull request titles, bodies, and comments is now generally available. See "[AUTOTITLE](/code-security/secret-scanning/introduction/about-secret-scanning)."
# https://github.com/github/releases/issues/4511
- |
Users can bypass push protection using the existing `Create a blob` and `Create or update file contents` REST API endpoints. This action can also be performed programmatically using the new `Create a push protection bypass` API endpoint. See the [GitHub Blog post](https://github.blog/changelog/2024-08-13-secret-scanning-push-protection-is-supported-for-content-upload-rest-api-endpoints/).
# https://github.com/github/releases/issues/4522
- |
Organization owners can enable the detection of non-provider patterns for their organization using a security configuration. This feature is in public beta and is subject to change. See "[Enabling detection of non-provider patterns for an organization](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/enabling-secret-scanning-for-non-provider-patterns#enabling-detection-of-non-provider-patterns-for-an-organization)."
- heading: Dependabot
notes:
# https://github.com/github/releases/issues/4522
- |
Organization owners, security managers and users with **admin** access can manage Dependabot auto-triage rules, as well as create custom auto-triage rules. Auto-triage rules are a powerful tool that automatically dismiss Dependabot alerts matching certain criteria. This feature is generally available. See "[AUTOTITLE](/code-security/dependabot/dependabot-auto-triage-rules/about-dependabot-auto-triage-rules)."
- heading: GitHub Connect
notes:
- |
For enterprises with a deployment of GitHub Enterprise Cloud on GHE.com, automatic license sync is supported from GitHub Enterprise Server to GHE.com.
- heading: GitHub Advanced Security
notes:
# https://github.com/github/releases/issues/3953 and https://github.com/github/releases/issues/3954
- |
Organization owners and security managers can use a "CodeQL pull request alerts" view in security overview to proactively identify and mitigate security risks at the organization and enterprise level. For example, they can see the most common alerts found in pull requests and see the corresponding remediation rates. See "[AUTOTITLE](/code-security/security-overview/viewing-metrics-for-pull-request-alerts)."
- heading: Code security
notes:
# https://github.com/github/releases/issues/4231
- |
Organization owners and security managers can simplify the rollout of GitHub security products at scale with security configurations. They can define collections of security settings, save them as a custom configuration, and apply them across groups of repositories. Security configurations can be enforced using policies to stop repositories making any changes to the enablement of security features. See "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
# https://github.com/github/releases/issues/4031 and https://github.com/github/releases/issues/4287 and https://github.com/github/releases/issues/4185
- |
Organization owners and security managers can create, apply, enforce, and monitor security configurations programmatically using REST API calls and audit logs. See "[AUTOTITLE](/rest/code-security/configurations)" and [`security_configuration`](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/audit-log-events-for-your-organization#security_configuration).
- heading: GitHub Actions
notes:
# Required Actions Runner version
- |
{% data reusables.actions.actions-runner-release-note %}
- heading: GitHub Packages
notes:
# https://github.com/github/releases/issues/4184
- |
Package managers benefit from improved performance as the npm registry no longer includes README content in package version metadata, reducing the size of package packuments (metadata manifest). This change enhances registry and npm CLI efficiency.
- heading: Repositories
notes:
# https://github.com/github/releases/issues/4073
- |
Users can use new property types when creating a custom property: `Multi select` and `True/False`.
# https://github.com/github/releases/issues/4139
- |
Users can gain deeper insights into contributors and code frequency with enhanced focus navigation, and a new table format for viewing and downloading data.
# https://github.com/github/releases/issues/4244
- |
Users can require that merges must be performed with a merge queue at the repository level. For more information about merge queues, see "[AUTOTITLE](/pull-requests/collaborating-with-pull-requests/incorporating-changes-from-a-pull-request/merging-a-pull-request-with-a-merge-queue#about-merge-queues)."
# https://github.com/github/releases/issues/4245
- |
Admins can enforce status checks and workflow runs on existing refs while allowing the creation of new refs.
# https://github.com/github/releases/issues/4246
- |
Organization members can use the new repository view and advanced filters to find repositories by visibility, language, custom properties, size, license, and more.
- heading: Projects
notes:
# https://github.com/github/releases/issues/4070
- |
Users can interact with project status updates programmatically using the `ProjectV2StatusUpdate` GraphQL object and the `projects_v2_status_update` webhook event. See [GitHub Issues & Projects](https://github.blog/changelog/2024-06-27-github-issues-projects-graphql-and-webhook-support-for-project-status-updates-and-more/) on the GitHub Blog.
# https://github.com/github/releases/issues/4665
- |
For better accessibility, swimlanes and card titles have heading elements attached to them.
# https://github.com/github/releases/issues/4071
- |
Project custom field changes are included directly in the [project_v2_item](/webhooks/webhook-events-and-payloads?actionType=edited#projects_v2_item) webhook event when a project item's fields are edited, allowing users to understand how project fields change over time and how long they have a particular value.
- heading: Accessibility
notes:
# https://github.com/github/releases/issues/4147
- |
Users can navigate and dismiss hovercards using keyboard shortcuts, enhancing accessibility. Additionally, a new setting allows users to disable all hovercards.
# https://github.com/github/releases/issues/4248
- |
Math equations are rendered with standardized MathML, replacing custom HTML MathJax to enhance accessibility and security. While most users will see minimal changes, slight differences in font and alignment may occur.
# https://github.com/github/releases/issues/4408
- |
The light and dark high contrast themes have been updated to improve readability.
- heading: Integrations and extensions
notes:
# https://github.com/github/releases/issues/4592
- |
The `client_id` field is included in all API responses that describe a GitHub App. This is part of a shift to use the client ID as the primary identifier for an app. See [Client IDs are now included in App API responses](https://github.blog/changelog/2024-08-23-client-ids-are-now-included-in-app-api-responses/) on the GitHub Blog.
# https://github.com/github/releases/issues/3685
- |
When users go through the device code flow for an OAuth app, such as the GitHub CLI, they are prompted to use an account picker if they have multiple accounts.
changes:
# https://github.com/github/releases/issues/4167
- |
The API endpoint for listing custom deployment rule integrations for an environment (`GET /repos/{owner}/{repo}/environments/{environment_name}/deployment_protection_rules/apps`) requires **"Administration" repository permissions (read)** for fine-grained tokens. Previously, the token required "Actions" repository permissions (read).
# https://github.com/github/releases/issues/3927
- |
Pushes that update over 5,000 branches no longer trigger webhooks or GitHub Actions workflows.
# https://github.com/github/releases/issues/4231
- |
Organization owners and security managers will see a new organization-level code security settings UI. In the organization settings sidebar, the **Code security and analysis** option has been replaced by an expanding **Code security** option. This contains new **Configurations** and **Global settings** options. See "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
known_issues:
- |
**Note:** This list is not complete. Any new known issues that are identified for the 3.15 release will be added between now and the GA.
- |
An organization-level code scanning configuration page is displayed on instances that do not use GitHub Advanced Security or code scanning.
- |
When initializing a new GHES cluster, nodes with the `consul-server` role should be added to the cluster before adding additional nodes. Adding all nodes simultaneously creates a race condition between nomad server registration and nomad client registration.
- |
Attempting to stop replications after stopping GitHub Actions on a GHES instance would fail, reporting that MSSQL was not responding. This can be avoided by starting MSSQL prior to stopping replication by running `/usr/local/share/enterprise/ghe-nomad-jobs queue /etc/nomad-jobs/mssql/mssql.hcl`.
- |
Admins setting up cluster high availability (HA) may encounter a `spokes` error when running `ghe-cluster-repl-status` if a new organization and repositories are created before using the `ghe-cluster-repl-bootstrap` command. To avoid this issue, complete the cluster HA setup with `ghe-cluster-repl-bootstrap` before creating new organizations and repositories.
- |
During the validation phase of a configuration run, a `No such object` error may occur for the Notebook and Viewscreen services. This error can be ignored as the services should still correctly start.
- |
If the root site administrator is locked out of the Management Console after failed login attempts, the account does not unlock automatically after the defined lockout time. Someone with administrative SSH access to the instance must unlock the account using the administrative shell. See "[AUTOTITLE](/admin/configuration/administering-your-instance-from-the-management-console/troubleshooting-access-to-the-management-console#unlocking-the-root-site-administrator-account)."
- |
On an instance with the HTTP `X-Forwarded-For` header configured for use behind a load balancer, all client IP addresses in the instance's audit log erroneously appear as 127.0.0.1.
- |
{% data reusables.release-notes.large-adoc-files-issue %}
- |
Repositories originally imported using `ghe-migrator` will not correctly track GitHub Advanced Security contributions.
- |
Admin stats REST API endpoints may timeout on appliances with many users or repositories. Retrying the request until data is returned is advised.
- |
When following the steps for [Replacing the primary MySQL node](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-the-primary-mysql-node), step 14 (running `ghe-cluster-config-apply`) might fail with errors. If this occurs, re-running `ghe-cluster-config-apply` is expected to succeed.
- |
Running a `config apply` as part of the steps for [Replacing a node in an emergency](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-a-node-in-an-emergency) may fail with errors if the node being replaced is still reachable. If this occurs, shutdown the node and repeat the steps.
- |
{% data reusables.release-notes.2024-06-possible-frontend-5-minute-outage-during-hotpatch-upgrade %}
- |
When restoring data originally backed up from a 3.13 appliance onto a 3.13 appliance, the Elasticsearch indices need to be reindexed before some of the data will show up. This happens via a nightly scheduled job. It can also be forced by running `/usr/local/share/enterprise/ghe-es-search-repair`.
- |
An organization-level code scanning configuration page is displayed on instances that do not use GitHub Advanced Security or code scanning.
- |
In the header bar displayed to site administrators, some icons are not available.
- |
When enabling automatic update checks for the first time in the Management Console, the status is not dynamically reflected until the "Updates" page is reloaded.
- |
When restoring from a backup snapshot, a large number of `mapper_parsing_exception` errors may be displayed.
- |
Services may respond with a `503` status due to an out of date `haproxy` configuration. This can usually be resolved with a `ghe-config-apply` run.
- |
Customers doing feature version upgrade to 3.14.3 may experience issues with database migrations due to data issues during database conversions.
closing_down:
# https://github.com/github/releases/issues/4964
- |
In GitHub Enterprise Server 3.16, the `/explore` functionality, including the `Activity` and `Trending` pages, will be removed.
retired:
# https://github.com/github/releases/issues/4110 and https://github.com/github/releases/issues/4193 and https://github.com/github/releases/issues/4231
- |
We are closing down the API endpoints and parameters that complemented the old organization-level code security settings UI experience. These have been replaced by a new API for security configurations. See "[AUTOTITLE](/rest/code-security/configurations)."
* **Retired:** The GET response for security product status in an organization: [Get an organization](/rest/orgs/orgs?apiVersion=2022-11-28#get-an-organization) is deprecated. This attribute will return inaccurate information.
* **Retired:** The PATCH functionality for security products to set a default status for new repos in an organization: [Update an organization](/rest/orgs/orgs?apiVersion=2022-11-28#update-an-organization) is deprecated. The PATCH operation may return an error or will not perform the PATCH or will be ignored.
* **Retired:** The POST endpoint to enable or disable a security feature for all repositories in an organization: [Enable or disable a security feature for an organization](/rest/orgs/orgs?apiVersion=2022-11-28#enable-or-disable-a-security-feature-for-an-organization) is deprecated. The POST will be ignored.
# https://github.com/github/releases/issues/4878
- |
The Management Console API has been removed. The Manage GHES API reached feature parity with the Management Console API in {% data variables.product.prodname_ghe_server %} version 3.12. For information about the Manage GHES API, see "[AUTOTITLE](/rest/enterprise-admin/manage-ghes)."

Просмотреть файл

@ -1,121 +0,0 @@
date: '2024-07-19'
intro: |
>[!NOTE] Due to a bug that caused hotpatch upgrades to fail for instances on Microsoft Azure, the previous patch release in this series (**3.9.17**) is not available for download. The following release notes include the updates introduced in that release.
{% warning %}
**Warning**: A change to MySQL in GitHub Enterprise Server 3.9 and later may impact the performance of your instance. Before you upgrade, make sure you've read the "[Known issues](#3.9.17-known-issues)" section of these release notes.
{% endwarning %}
sections:
security_fixes:
- |
**HIGH**: An attacker could cause unbounded resource exhaustion on the instance by sending a large payload to the Git server. To mitigate this issue, GitHub has limited the count of "have" and "want" lines for Git read operations. GitHub has requested CVE ID [CVE-2024-5795](https://www.cve.org/cverecord?id=CVE-2024-5795) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com).
- |
**MEDIUM:** An improper privilege management vulnerability allowed users to migrate private repositories without having appropriate scopes defined on the related {% data variables.product.pat_generic %}. GitHub has requested CVE ID CVE-2024-5566 for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com).
- |
**MEDIUM:** An attacker could have unauthorized access in a public repository using a suspended GitHub App via a scoped user access token. This was only exploitable in public repositories while private repositories were not impacted. GitHub has requested CVE ID [CVE-2024-5816](https://www.cve.org/cverecord?id=CVE-2024-5816) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com).
- |
**MEDIUM:** An attacker could execute a Cross Site Request Forgery (CSRF) attack to perform write operations on a victim-owned repository in GitHub Enterprise Server by exploiting incorrect request types. A mitigating factor is that the attacker has to be a trusted user and the victim has to visit a tag in the attacker's fork of their own repository. GitHub has requested CVE ID [CVE-2024-5815](https://nvd.nist.gov/vuln/detail/CVE-2024-5815) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com/).
- |
**MEDIUM:** An attacker could disclose sensitive information from a private repository exploiting organization ruleset features. This attack required an organization member to explicitly change the visibility of a dependent repository from private to public. GitHub has requested CVE ID [CVE-2024-6336](https://www.cve.org/cverecord?id=CVE-2024-6336) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com).
- |
**MEDIUM:** An attacker could have unauthorized read access to issue content inside an internal repository via GitHub projects. This attack required attacker access to the corresponding project board. GitHub has requested CVE ID [CVE-2024-5817](https://nvd.nist.gov/vuln/detail/CVE-2024-5817) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com/).
- |
**LOW:** An attacker with read access to a project could use the REST API to view a list of all members in an organization, including members who had made their membership private. This vulnerability was reported via the [GitHub Bug Bounty](https://bounty.github.com/) program.
- |
**LOW:** An attacker could include MathJax syntax in Markdown to bypass GitHubs normal restrictions on CSS properties in Markdown. This vulnerability was reported via the [GitHub Bug Bounty](https://bounty.github.com/) program.
- |
Firewall port 9199, which linked to a static maintenance page used when enabling maintenance mode with an IP exception list, was opened unnecessarily.
bugs:
- |
When an instance hosted on Azure was upgraded with a hotpatch, the upgrade failed with an `rsync` error.
- |
On an instance with GitHub Actions enabled, remote blob storage could fill up with large amounts of data because cleanup jobs were skipped on old hosts.
- |
The memory limit for a Redis job was too low in some cases, causing the process to run out of memory.
- |
In some cases, commands run in an administrative SSH shell were not written to the audit log.
- |
When an administrator submitted a support data to GitHub Support, spokesd keys were incorrectly sanitized.
- |
When log forwarding was enabled, some specific service logs, including babeld, gitauth, unicorn, and resqued, were duplicated.
- |
During the initial boot of an instance, a data disk attached as `/dev/sdb` may not have been recognized as an available disk.
- |
In some cases, the HAProxy `kill_timeout` setting caused service outages during upgrades or large transactions.
- |
The `ssh-audit-log.sh` script did not effectively log SSH commands, and the `ghe-sanitize-log.psed` script inadequately sanitized password-related logs
- |
The default MSSQL timeout of 8 seconds sometimes caused issues during administrator activities. The default timeout has been increased to 30 seconds.
- |
For an instance running on Microsoft Azure, the user disk service failed to start because the attached volume could not be found.
- |
Establishing a new GitHub Connect connection could fail with a 500 error.
- |
When using `ghe-migrator` to migrate a repository, the links for pull requests merge commits were not imported.
- |
In some cases, reading data from repositories with a large number of objects would result in timeout or error.
- |
On an instance that restricts emails to verified domains, secret scanning emails would sometimes be sent to an unverified domain.
- |
In some cases, on the "Files" tab of a pull request, a comment on the first line did not render.
- |
Some organizations were not recognized as part of an instance's enterprise account.
- |
On the "Code scanning" page of a repository, the branch filter did not correctly display all branches.
- |
Users viewing the alerts index page experienced inconsistencies in rendering the closed alert state.
- |
Organizations named "C" were incorrectly routed to the GitHub Enterprise Server contact page instead of their organization page.
- |
Chat integrations required frequent reauthentication, as a result of new app installations overwriting previous ones.
- |
On an instance in a cluster configuration, the `ghe-spokesctl ssh` command did not select the correct Nomad container when running a command within a git repository.
- |
On an instance with a GitHub Advanced Security license, disabling and re-enabling GitHub Advanced Security for an organization resulted in redundant scans of some repositories.
changes:
- |
When a user changes a repository's visibility to public, the user is now warned that previous Actions history and logs will become public as well.
known_issues:
- |
Custom firewall rules are removed during the upgrade process.
- |
During the validation phase of a configuration run, a `No such object` error may occur for the Notebook and Viewscreen services. This error can be ignored as the services should still correctly start.
- |
If the root site administrator is locked out of the Management Console after failed login attempts, the account does not unlock automatically after the defined lockout time. Someone with administrative SSH access to the instance must unlock the account using the administrative shell. For more information, see "[AUTOTITLE](/admin/configuration/administering-your-instance-from-the-management-console/troubleshooting-access-to-the-management-console#unlocking-the-root-site-administrator-account)."
- |
If an instance is configured to forward logs to a target server with TLS enabled, certificate authority (CA) bundles that a site administrator uploads using `ghe-ssl-ca-certificate-install` are not respected, and connections to the server fail.
- |
When running `ghe-config-apply`, the process may stall with the message `Deployment is running pending automatic promotion`.
- |
The `mbind: Operation not permitted` error in the `/var/log/mysql/mysql.err` file can be ignored. MySQL 8 does not gracefully handle when the `CAP_SYS_NICE` capability isn't required, and outputs an error instead of a warning.
- |
When enabling CodeQL via default setup [at scale](/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning-at-scale), some checks related to GitHub Actions are omitted, potentially preventing the process from completing.
- |
{% data reusables.release-notes.upgrade-to-3-9-or-to-3-10-mysql-cannot-start-up %}
- |
{% data reusables.release-notes.upgrade-to-3-9-or-to-3-10-io-utilization-increase %}
- |
{% data reusables.release-notes.2023-08-mssql-replication-known-issue %}
- |
{% data reusables.release-notes.2023-09-config-apply-timeout-hookshot-go-replicas %}
- |
{% data reusables.release-notes.2023-11-aws-system-time %}
- |
On an instance with the HTTP `X-Forwarded-For` header configured for use behind a load balancer, all client IP addresses in the instance's audit log erroneously appear as 127.0.0.1.
- |
{% data reusables.release-notes.2023-10-git-push-made-but-not-registered %}
- |
{% data reusables.release-notes.2023-10-actions-upgrade-bug %}
- |
{% data reusables.release-notes.2023-12-backup-utils-exit-early-redis %}
- |
{% data reusables.release-notes.2024-01-haproxy-upgrade-causing-increased-errors %}
- |
The reply.[hostname] subdomain is falsely always displaying as having no ssl and dns record, when testing the domain settings via management console **without subdomain isolation**.
- |
_Admin stats REST API endpoints may timeout on appliances with many users or repositories. Retrying the request until data is returned is advised._
- |
If a hotpatch upgrade requires the `haproxy-frontend` service to be restarted, the restart will hang if there are existing long-lived connections, such as browser web sockets or Git operations. No new connections will be accepted for up to 5 minutes. Any existing unfinished connections at this time will be disconnected.

Просмотреть файл

@ -1,5 +1,3 @@
{% warning %}
**Warning**: Changing this setting will cause user-facing services on {% data variables.product.prodname_ghe_server %} to restart. You should time this change carefully, to minimize downtime for users.
{% endwarning %}
> [!WARNING]
> * Changing this setting will cause user-facing services on {% data variables.product.prodname_ghe_server %} to restart. You should time this change carefully, to minimize downtime for users.{% ifversion security-configurations-ghes-only %}
> * You should communicate any changes you plan to make to feature enablement settings to organization owners before making them, so as not to impact existing security configurations that have been rolled out by organizations in your enterprise.{% endif %}

Просмотреть файл

@ -1,9 +1,9 @@
{% ifversion ghes < 3.15 %}
{% ifversion secret-scanning-enhancements-wikis or ifversion secret-scanning-enhancements-prs-discussions %}
{% ifversion secret-scanning-enhancements-prs-discussions %}
{% note %}
**Note:** The scanning of content in pull requests, {% data variables.product.prodname_discussions %}, and wikis is currently in {% data variables.release-phases.public_preview %} and subject to change.
**Note:** The scanning of content in pull requests and {% data variables.product.prodname_discussions %} is currently in {% data variables.release-phases.public_preview %} and subject to change.
{% endnote %}

Просмотреть файл

@ -1 +1 @@
You can quickly enable security features at scale with the {% data variables.product.prodname_github_security_configuration %}, a collection of security enablement settings you can apply to repositories in an organization. You can then further customize {% data variables.product.prodname_GH_advanced_security %} features at the organization level with {% data variables.product.prodname_global_settings %}. See "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."
You can quickly enable security features at scale with {% ifversion security-configurations-cloud %}the {% data variables.product.prodname_github_security_configuration %}{% else %}a {% data variables.product.prodname_security_configuration %}{% endif %}, a collection of security enablement settings you can apply to repositories in an organization. You can then further customize {% data variables.product.prodname_GH_advanced_security %} features at the organization level with {% data variables.product.prodname_global_settings %}. See "[AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale)."

Просмотреть файл

@ -1 +1 @@
{% data variables.product.prodname_secret_scanning_caps %} is a security tool that scans the entire Git history of repositories, as well as issues{% ifversion secret-scanning-enhancements-prs-discussions %}, pull requests, and discussions{% endif %} in those repositories, for leaked secrets that have been accidentally committed, such as tokens or private keys.
{% data variables.product.prodname_secret_scanning_caps %} is a security tool that scans the entire Git history of repositories, as well as issues{% ifversion secret-scanning-enhancements-wikis %}, pull requests, discussions, and wikis{% elsif ghes > 3.13 %}, pull requests, and discussions{% endif %} in those repositories, for leaked secrets that have been accidentally committed, such as tokens or private keys.

Просмотреть файл

@ -1 +1 @@
You may encounter an error when you attempt to apply a {% data variables.product.prodname_security_configuration %}. For information on common errors, see "[AUTOTITLE](/code-security/securing-your-organization/troubleshooting-security-configurations/)."
You may encounter an error when you attempt to apply a {% data variables.product.prodname_security_configuration %}. For more information, see "[AUTOTITLE](/code-security/securing-your-organization/managing-the-security-of-your-organization/finding-repositories-with-attachment-failures)" and "[AUTOTITLE](/code-security/securing-your-organization/troubleshooting-security-configurations/)."

Просмотреть файл

@ -97,7 +97,7 @@ prodname_codeql_cli: 'CodeQL CLI'
# CodeQL usually bumps its minor version for each minor version of GHES.
# Update this whenever a new enterprise version of CodeQL is being prepared.
codeql_cli_ghes_recommended_version: >-
{% ifversion ghes < 3.11 %}2.13.5{% elsif ghes < 3.12 %}2.14.6{% elsif ghes < 3.13 %}2.15.5{% elsif ghes < 3.14 %}2.16.5{% elsif ghes < 3.15 %}2.17.6{% endif %}
{% ifversion ghes < 3.11 %}2.13.5{% elsif ghes < 3.12 %}2.14.6{% elsif ghes < 3.13 %}2.15.5{% elsif ghes < 3.14 %}2.16.5{% elsif ghes < 3.15 %}2.17.6{% elsif ghes < 3.16 %}2.18.4{% endif %}
# Projects v2
prodname_projects_v2: 'Projects'
@ -150,7 +150,7 @@ prodname_unfurls: 'Content Attachments'
prodname_actions: 'GitHub Actions'
prodname_actions_runner_controller: 'Actions Runner Controller'
runner_required_version: >-
{% ifversion ghes < 3.11 %}2.304.0{% elsif ghes < 3.12 %}2.309.0{% elsif ghes < 3.13 %}2.311.0{% elsif ghes < 3.14 %}2.314.1{% elsif ghes < 3.15 %}2.317.0{% endif %}
{% ifversion ghes < 3.11 %}2.304.0{% elsif ghes < 3.12 %}2.309.0{% elsif ghes < 3.13 %}2.311.0{% elsif ghes < 3.14 %}2.314.1{% elsif ghes < 3.15 %}2.317.0{% elsif ghes < 3.16 %}2.319.1{% endif %}
# GitHub Debug
prodname_debug: 'GitHub Debug'

Просмотреть файл

@ -67,6 +67,8 @@ export default {
'security_fixes',
'backups',
'errata',
'closing_down',
'retired',
].reduce((prev, curr) => ({ ...prev, [curr]: section }), {}),
},
},

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -60,5 +60,5 @@
"2022-11-28"
]
},
"sha": "f9de54ab72eff1bc9855fd0940816350912ae5b7"
"sha": "c9cd73bd34f020305d23f5d3b63e3c59624f1537"
}

Просмотреть файл

@ -0,0 +1,528 @@
---
upcoming_changes:
- location: LegacyMigration.uploadUrlTemplate
description: '`uploadUrlTemplate` will be removed. Use `uploadUrl` instead.'
reason:
'`uploadUrlTemplate` is being removed because it is not a standard URL and
adds an extra user step.'
date: '2019-04-01T00:00:00+00:00'
criticality: breaking
owner: tambling
- location: AssignedEvent.user
description: '`user` will be removed. Use the `assignee` field instead.'
reason: Assignees can now be mannequins.
date: '2020-01-01T00:00:00+00:00'
criticality: breaking
owner: tambling
- location: UnassignedEvent.user
description: '`user` will be removed. Use the `assignee` field instead.'
reason: Assignees can now be mannequins.
date: '2020-01-01T00:00:00+00:00'
criticality: breaking
owner: tambling
- location: Issue.timeline
description: '`timeline` will be removed. Use Issue.timelineItems instead.'
reason: '`timeline` will be removed'
date: '2020-10-01T00:00:00+00:00'
criticality: breaking
owner: mikesea
- location: PullRequest.timeline
description: '`timeline` will be removed. Use PullRequest.timelineItems instead.'
reason: '`timeline` will be removed'
date: '2020-10-01T00:00:00+00:00'
criticality: breaking
owner: mikesea
- location: MergeStateStatus.DRAFT
description: '`DRAFT` will be removed. Use PullRequest.isDraft instead.'
reason:
DRAFT state will be removed from this enum and `isDraft` should be used
instead
date: '2021-01-01T00:00:00+00:00'
criticality: breaking
owner: nplasterer
- location: PackageType.DOCKER
description: '`DOCKER` will be removed.'
reason:
DOCKER will be removed from this enum as this type will be migrated to only
be used by the Packages REST API.
date: '2021-06-21'
criticality: breaking
owner: reybard
- location: ReactionGroup.users
description: '`users` will be removed. Use the `reactors` field instead.'
reason: Reactors can now be mannequins, bots, and organizations.
date: '2021-10-01T00:00:00+00:00'
criticality: breaking
owner: synthead
- location: AddPullRequestToMergeQueueInput.branch
description: '`branch` will be removed.'
reason:
PRs are added to the merge queue for the base branch, the `branch` argument
is now a no-op
date: '2022-07-01T00:00:00+00:00'
criticality: breaking
owner: jhunschejones
- location: DependencyGraphDependency.packageLabel
description:
'`packageLabel` will be removed. Use normalized `packageName` field
instead.'
reason: '`packageLabel` will be removed.'
date: '2022-10-01T00:00:00+00:00'
criticality: breaking
owner: github/dependency_graph
- location: RemovePullRequestFromMergeQueueInput.branch
description: '`branch` will be removed.'
reason:
PRs are removed from the merge queue for the base branch, the `branch` argument
is now a no-op
date: '2022-10-01T00:00:00+00:00'
criticality: breaking
owner: jhunschejones
- location: PackageType.NPM
description: '`NPM` will be removed.'
reason:
NPM will be removed from this enum as this type will be migrated to only
be used by the Packages REST API.
date: '2022-11-21'
criticality: breaking
owner: s-anupam
- location: PackageType.NUGET
description: '`NUGET` will be removed.'
reason:
NUGET will be removed from this enum as this type will be migrated to only
be used by the Packages REST API.
date: '2022-11-21'
criticality: breaking
owner: s-anupam
- location: PackageType.RUBYGEMS
description: '`RUBYGEMS` will be removed.'
reason:
RUBYGEMS will be removed from this enum as this type will be migrated to
only be used by the Packages REST API.
date: '2022-12-28'
criticality: breaking
owner: ankitkaushal01
- location: Commit.changedFiles
description: '`changedFiles` will be removed. Use `changedFilesIfAvailable` instead.'
reason: '`changedFiles` will be removed.'
date: '2023-01-01T00:00:00+00:00'
criticality: breaking
owner: adamshwert
- location: ProjectV2View.visibleFields
description:
'`visibleFields` will be removed. Check out the `ProjectV2View#fields`
API as an example for the more capable alternative.'
reason:
The `ProjectV2View#visibleFields` API is deprecated in favour of the more
capable `ProjectV2View#fields` API.
date: '2023-01-01T00:00:00+00:00'
criticality: breaking
owner: mattruggio
- location: PackageType.MAVEN
description: '`MAVEN` will be removed.'
reason:
MAVEN will be removed from this enum as this type will be migrated to only
be used by the Packages REST API.
date: '2023-02-10'
criticality: breaking
owner: ankitkaushal01
- location: ProjectV2View.groupBy
description:
'`groupBy` will be removed. Check out the `ProjectV2View#group_by_fields`
API as an example for the more capable alternative.'
reason:
The `ProjectV2View#order_by` API is deprecated in favour of the more capable
`ProjectV2View#group_by_field` API.
date: '2023-04-01T00:00:00+00:00'
criticality: breaking
owner: alcere
- location: ProjectV2View.sortBy
description:
'`sortBy` will be removed. Check out the `ProjectV2View#sort_by_fields`
API as an example for the more capable alternative.'
reason:
The `ProjectV2View#sort_by` API is deprecated in favour of the more capable
`ProjectV2View#sort_by_fields` API.
date: '2023-04-01T00:00:00+00:00'
criticality: breaking
owner: traumverloren
- location: ProjectV2View.verticalGroupBy
description:
'`verticalGroupBy` will be removed. Check out the `ProjectV2View#vertical_group_by_fields`
API as an example for the more capable alternative.'
reason:
The `ProjectV2View#vertical_group_by` API is deprecated in favour of the
more capable `ProjectV2View#vertical_group_by_fields` API.
date: '2023-04-01T00:00:00+00:00'
criticality: breaking
owner: traumverloren
- location: Repository.squashPrTitleUsedAsDefault
description:
'`squashPrTitleUsedAsDefault` will be removed. Use `Repository.squashMergeCommitTitle`
instead.'
reason: '`squashPrTitleUsedAsDefault` will be removed.'
date: '2023-04-01T00:00:00+00:00'
criticality: breaking
owner: github/pull_requests
- location: Commit.pushedDate
description: '`pushedDate` will be removed.'
reason: '`pushedDate` is no longer supported.'
date: '2023-07-01T00:00:00+00:00'
criticality: breaking
owner: darthwillis
- location: ProjectV2ItemFieldGroup.field
description:
'`field` will be removed. Check out the `ProjectV2ItemFieldGroup#groupByField`
API as an example for the more capable alternative.'
reason:
The `ProjectV2ItemFieldGroup#field` API is deprecated in favour of the more
capable `ProjectV2ItemFieldGroup#groupByField` API.
date: '2023-07-01T00:00:00+00:00'
criticality: breaking
owner: stevepopovich
- location: AddPullRequestReviewCommentInput.body
description:
'`body` will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply
instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewCommentInput.commitOID
description:
'`commitOID` will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply
instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewCommentInput.inReplyTo
description:
'`inReplyTo` will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply
instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewCommentInput.path
description:
'`path` will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply
instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewCommentInput.position
description:
'`position` will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply
instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewCommentInput.pullRequestId
description:
'`pullRequestId` will be removed. use addPullRequestReviewThread or
addPullRequestReviewThreadReply instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewCommentInput.pullRequestReviewId
description:
'`pullRequestReviewId` will be removed. use addPullRequestReviewThread
or addPullRequestReviewThreadReply instead'
reason: We are deprecating the addPullRequestReviewComment mutation
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: AddPullRequestReviewInput.comments
description: '`comments` will be removed. use the `threads` argument instead'
reason: We are deprecating comment fields that use diff-relative positioning
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: PullRequestReviewComment.originalPosition
description: '`originalPosition` will be removed.'
reason: We are phasing out diff-relative positioning for PR comments
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: PullRequestReviewComment.position
description:
'`position` will be removed. Use the `line` and `startLine` fields
instead, which are file line numbers instead of diff line numbers'
reason: We are phasing out diff-relative positioning for PR comments
date: '2023-10-01T00:00:00+00:00'
criticality: breaking
owner: aharpole
- location: TopicSuggestionDeclineReason.NOT_RELEVANT
description: '`NOT_RELEVANT` will be removed.'
reason: Suggested topics are no longer supported
date: '2024-04-01T00:00:00+00:00'
criticality: breaking
owner: calvinchilds
- location: TopicSuggestionDeclineReason.PERSONAL_PREFERENCE
description: '`PERSONAL_PREFERENCE` will be removed.'
reason: Suggested topics are no longer supported
date: '2024-04-01T00:00:00+00:00'
criticality: breaking
owner: calvinchilds
- location: TopicSuggestionDeclineReason.TOO_GENERAL
description: '`TOO_GENERAL` will be removed.'
reason: Suggested topics are no longer supported
date: '2024-04-01T00:00:00+00:00'
criticality: breaking
owner: calvinchilds
- location: TopicSuggestionDeclineReason.TOO_SPECIFIC
description: '`TOO_SPECIFIC` will be removed.'
reason: Suggested topics are no longer supported
date: '2024-04-01T00:00:00+00:00'
criticality: breaking
owner: calvinchilds
- location: CreateTeamDiscussionCommentInput.body
description:
'`body` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionCommentInput.discussionId
description:
'`discussionId` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionCommentPayload.teamDiscussionComment
description:
'`teamDiscussionComment` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionInput.body
description:
'`body` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionInput.private
description:
'`private` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionInput.teamId
description:
'`teamId` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionInput.title
description:
'`title` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: CreateTeamDiscussionPayload.teamDiscussion
description:
'`teamDiscussion` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: OrganizationInvitation.inviter
description: '`inviter` will be removed. `inviter` will be replaced by `inviterActor`.'
reason: '`inviter` will be removed.'
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: jdennes
- location: PullRequest.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
'`databaseId` will be removed because it does not support 64-bit signed
integer identifiers.'
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: JanKoszewski
- location: PullRequestReview.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
'`databaseId` will be removed because it does not support 64-bit signed
integer identifiers.'
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: JanKoszewski
- location: PullRequestReviewComment.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
'`databaseId` will be removed because it does not support 64-bit signed
integer identifiers.'
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: JanKoszewski
- location: TeamDiscussion.authorAssociation
description:
'`authorAssociation` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.bodyVersion
description:
'`bodyVersion` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.comments
description:
'`comments` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.commentsResourcePath
description:
'`commentsResourcePath` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.commentsUrl
description:
'`commentsUrl` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.isPinned
description:
'`isPinned` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.isPrivate
description:
'`isPrivate` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.number
description:
'`number` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.resourcePath
description:
'`resourcePath` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.team
description:
'`team` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.title
description:
'`title` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.url
description:
'`url` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussion.viewerCanPin
description:
'`viewerCanPin` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussionComment.authorAssociation
description:
'`authorAssociation` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussionComment.bodyVersion
description:
'`bodyVersion` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussionComment.discussion
description:
'`discussion` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussionComment.number
description:
'`number` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussionComment.resourcePath
description:
'`resourcePath` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges
- location: TeamDiscussionComment.url
description:
'`url` will be removed. Follow the guide at https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/
to find a suitable replacement.'
reason: The Team Discussions feature is deprecated in favor of Organization Discussions.
date: '2024-07-01T00:00:00+00:00'
criticality: breaking
owner: deborah-digges

Просмотреть файл

@ -0,0 +1 @@
[]

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -0,0 +1,580 @@
{
"2024-07-01": [
{
"location": "TeamDiscussionComment.url",
"description": "<p><code>url</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussionComment.resourcePath",
"description": "<p><code>resourcePath</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussionComment.number",
"description": "<p><code>number</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussionComment.discussion",
"description": "<p><code>discussion</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussionComment.bodyVersion",
"description": "<p><code>bodyVersion</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussionComment.authorAssociation",
"description": "<p><code>authorAssociation</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.viewerCanPin",
"description": "<p><code>viewerCanPin</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.url",
"description": "<p><code>url</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.title",
"description": "<p><code>title</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.team",
"description": "<p><code>team</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.resourcePath",
"description": "<p><code>resourcePath</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.number",
"description": "<p><code>number</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.isPrivate",
"description": "<p><code>isPrivate</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.isPinned",
"description": "<p><code>isPinned</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.commentsUrl",
"description": "<p><code>commentsUrl</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.commentsResourcePath",
"description": "<p><code>commentsResourcePath</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.comments",
"description": "<p><code>comments</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.bodyVersion",
"description": "<p><code>bodyVersion</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "TeamDiscussion.authorAssociation",
"description": "<p><code>authorAssociation</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "PullRequestReviewComment.databaseId",
"description": "<p><code>databaseId</code> will be removed. Use <code>fullDatabaseId</code> instead.</p>",
"reason": "<p><code>databaseId</code> will be removed because it does not support 64-bit signed integer identifiers.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "JanKoszewski"
},
{
"location": "PullRequestReview.databaseId",
"description": "<p><code>databaseId</code> will be removed. Use <code>fullDatabaseId</code> instead.</p>",
"reason": "<p><code>databaseId</code> will be removed because it does not support 64-bit signed integer identifiers.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "JanKoszewski"
},
{
"location": "PullRequest.databaseId",
"description": "<p><code>databaseId</code> will be removed. Use <code>fullDatabaseId</code> instead.</p>",
"reason": "<p><code>databaseId</code> will be removed because it does not support 64-bit signed integer identifiers.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "JanKoszewski"
},
{
"location": "OrganizationInvitation.inviter",
"description": "<p><code>inviter</code> will be removed. <code>inviter</code> will be replaced by <code>inviterActor</code>.</p>",
"reason": "<p><code>inviter</code> will be removed.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "jdennes"
},
{
"location": "CreateTeamDiscussionPayload.teamDiscussion",
"description": "<p><code>teamDiscussion</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionInput.title",
"description": "<p><code>title</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionInput.teamId",
"description": "<p><code>teamId</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionInput.private",
"description": "<p><code>private</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionInput.body",
"description": "<p><code>body</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionCommentPayload.teamDiscussionComment",
"description": "<p><code>teamDiscussionComment</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionCommentInput.discussionId",
"description": "<p><code>discussionId</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
},
{
"location": "CreateTeamDiscussionCommentInput.body",
"description": "<p><code>body</code> will be removed. Follow the guide at <a href=\"https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/\">https://github.blog/changelog/2023-02-08-sunset-notice-team-discussions/</a> to find a suitable replacement.</p>",
"reason": "<p>The Team Discussions feature is deprecated in favor of Organization Discussions.</p>",
"date": "2024-07-01",
"criticality": "breaking",
"owner": "deborah-digges"
}
],
"2024-04-01": [
{
"location": "TopicSuggestionDeclineReason.TOO_SPECIFIC",
"description": "<p><code>TOO_SPECIFIC</code> will be removed.</p>",
"reason": "<p>Suggested topics are no longer supported</p>",
"date": "2024-04-01",
"criticality": "breaking",
"owner": "calvinchilds"
},
{
"location": "TopicSuggestionDeclineReason.TOO_GENERAL",
"description": "<p><code>TOO_GENERAL</code> will be removed.</p>",
"reason": "<p>Suggested topics are no longer supported</p>",
"date": "2024-04-01",
"criticality": "breaking",
"owner": "calvinchilds"
},
{
"location": "TopicSuggestionDeclineReason.PERSONAL_PREFERENCE",
"description": "<p><code>PERSONAL_PREFERENCE</code> will be removed.</p>",
"reason": "<p>Suggested topics are no longer supported</p>",
"date": "2024-04-01",
"criticality": "breaking",
"owner": "calvinchilds"
},
{
"location": "TopicSuggestionDeclineReason.NOT_RELEVANT",
"description": "<p><code>NOT_RELEVANT</code> will be removed.</p>",
"reason": "<p>Suggested topics are no longer supported</p>",
"date": "2024-04-01",
"criticality": "breaking",
"owner": "calvinchilds"
}
],
"2023-10-01": [
{
"location": "PullRequestReviewComment.position",
"description": "<p><code>position</code> will be removed. Use the <code>line</code> and <code>startLine</code> fields instead, which are file line numbers instead of diff line numbers</p>",
"reason": "<p>We are phasing out diff-relative positioning for PR comments</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "PullRequestReviewComment.originalPosition",
"description": "<p><code>originalPosition</code> will be removed.</p>",
"reason": "<p>We are phasing out diff-relative positioning for PR comments</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewInput.comments",
"description": "<p><code>comments</code> will be removed. use the <code>threads</code> argument instead</p>",
"reason": "<p>We are deprecating comment fields that use diff-relative positioning</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.pullRequestReviewId",
"description": "<p><code>pullRequestReviewId</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.pullRequestId",
"description": "<p><code>pullRequestId</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.position",
"description": "<p><code>position</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.path",
"description": "<p><code>path</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.inReplyTo",
"description": "<p><code>inReplyTo</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.commitOID",
"description": "<p><code>commitOID</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
},
{
"location": "AddPullRequestReviewCommentInput.body",
"description": "<p><code>body</code> will be removed. use addPullRequestReviewThread or addPullRequestReviewThreadReply instead</p>",
"reason": "<p>We are deprecating the addPullRequestReviewComment mutation</p>",
"date": "2023-10-01",
"criticality": "breaking",
"owner": "aharpole"
}
],
"2023-07-01": [
{
"location": "ProjectV2ItemFieldGroup.field",
"description": "<p><code>field</code> will be removed. Check out the <code>ProjectV2ItemFieldGroup#groupByField</code> API as an example for the more capable alternative.</p>",
"reason": "<p>The <code>ProjectV2ItemFieldGroup#field</code> API is deprecated in favour of the more capable <code>ProjectV2ItemFieldGroup#groupByField</code> API.</p>",
"date": "2023-07-01",
"criticality": "breaking",
"owner": "stevepopovich"
},
{
"location": "Commit.pushedDate",
"description": "<p><code>pushedDate</code> will be removed.</p>",
"reason": "<p><code>pushedDate</code> is no longer supported.</p>",
"date": "2023-07-01",
"criticality": "breaking",
"owner": "darthwillis"
}
],
"2023-04-01": [
{
"location": "Repository.squashPrTitleUsedAsDefault",
"description": "<p><code>squashPrTitleUsedAsDefault</code> will be removed. Use <code>Repository.squashMergeCommitTitle</code> instead.</p>",
"reason": "<p><code>squashPrTitleUsedAsDefault</code> will be removed.</p>",
"date": "2023-04-01",
"criticality": "breaking",
"owner": "github/pull_requests"
},
{
"location": "ProjectV2View.verticalGroupBy",
"description": "<p><code>verticalGroupBy</code> will be removed. Check out the <code>ProjectV2View#vertical_group_by_fields</code> API as an example for the more capable alternative.</p>",
"reason": "<p>The <code>ProjectV2View#vertical_group_by</code> API is deprecated in favour of the more capable <code>ProjectV2View#vertical_group_by_fields</code> API.</p>",
"date": "2023-04-01",
"criticality": "breaking",
"owner": "traumverloren"
},
{
"location": "ProjectV2View.sortBy",
"description": "<p><code>sortBy</code> will be removed. Check out the <code>ProjectV2View#sort_by_fields</code> API as an example for the more capable alternative.</p>",
"reason": "<p>The <code>ProjectV2View#sort_by</code> API is deprecated in favour of the more capable <code>ProjectV2View#sort_by_fields</code> API.</p>",
"date": "2023-04-01",
"criticality": "breaking",
"owner": "traumverloren"
},
{
"location": "ProjectV2View.groupBy",
"description": "<p><code>groupBy</code> will be removed. Check out the <code>ProjectV2View#group_by_fields</code> API as an example for the more capable alternative.</p>",
"reason": "<p>The <code>ProjectV2View#order_by</code> API is deprecated in favour of the more capable <code>ProjectV2View#group_by_field</code> API.</p>",
"date": "2023-04-01",
"criticality": "breaking",
"owner": "alcere"
}
],
"2023-02-10": [
{
"location": "PackageType.MAVEN",
"description": "<p><code>MAVEN</code> will be removed.</p>",
"reason": "<p>MAVEN will be removed from this enum as this type will be migrated to only be used by the Packages REST API.</p>",
"date": "2023-02-10",
"criticality": "breaking",
"owner": "ankitkaushal01"
}
],
"2023-01-01": [
{
"location": "ProjectV2View.visibleFields",
"description": "<p><code>visibleFields</code> will be removed. Check out the <code>ProjectV2View#fields</code> API as an example for the more capable alternative.</p>",
"reason": "<p>The <code>ProjectV2View#visibleFields</code> API is deprecated in favour of the more capable <code>ProjectV2View#fields</code> API.</p>",
"date": "2023-01-01",
"criticality": "breaking",
"owner": "mattruggio"
},
{
"location": "Commit.changedFiles",
"description": "<p><code>changedFiles</code> will be removed. Use <code>changedFilesIfAvailable</code> instead.</p>",
"reason": "<p><code>changedFiles</code> will be removed.</p>",
"date": "2023-01-01",
"criticality": "breaking",
"owner": "adamshwert"
}
],
"2022-12-28": [
{
"location": "PackageType.RUBYGEMS",
"description": "<p><code>RUBYGEMS</code> will be removed.</p>",
"reason": "<p>RUBYGEMS will be removed from this enum as this type will be migrated to only be used by the Packages REST API.</p>",
"date": "2022-12-28",
"criticality": "breaking",
"owner": "ankitkaushal01"
}
],
"2022-11-21": [
{
"location": "PackageType.NUGET",
"description": "<p><code>NUGET</code> will be removed.</p>",
"reason": "<p>NUGET will be removed from this enum as this type will be migrated to only be used by the Packages REST API.</p>",
"date": "2022-11-21",
"criticality": "breaking",
"owner": "s-anupam"
},
{
"location": "PackageType.NPM",
"description": "<p><code>NPM</code> will be removed.</p>",
"reason": "<p>NPM will be removed from this enum as this type will be migrated to only be used by the Packages REST API.</p>",
"date": "2022-11-21",
"criticality": "breaking",
"owner": "s-anupam"
}
],
"2022-10-01": [
{
"location": "RemovePullRequestFromMergeQueueInput.branch",
"description": "<p><code>branch</code> will be removed.</p>",
"reason": "<p>PRs are removed from the merge queue for the base branch, the <code>branch</code> argument is now a no-op</p>",
"date": "2022-10-01",
"criticality": "breaking",
"owner": "jhunschejones"
},
{
"location": "DependencyGraphDependency.packageLabel",
"description": "<p><code>packageLabel</code> will be removed. Use normalized <code>packageName</code> field instead.</p>",
"reason": "<p><code>packageLabel</code> will be removed.</p>",
"date": "2022-10-01",
"criticality": "breaking",
"owner": "github/dependency_graph"
}
],
"2022-07-01": [
{
"location": "AddPullRequestToMergeQueueInput.branch",
"description": "<p><code>branch</code> will be removed.</p>",
"reason": "<p>PRs are added to the merge queue for the base branch, the <code>branch</code> argument is now a no-op</p>",
"date": "2022-07-01",
"criticality": "breaking",
"owner": "jhunschejones"
}
],
"2021-10-01": [
{
"location": "ReactionGroup.users",
"description": "<p><code>users</code> will be removed. Use the <code>reactors</code> field instead.</p>",
"reason": "<p>Reactors can now be mannequins, bots, and organizations.</p>",
"date": "2021-10-01",
"criticality": "breaking",
"owner": "synthead"
}
],
"2021-06-21": [
{
"location": "PackageType.DOCKER",
"description": "<p><code>DOCKER</code> will be removed.</p>",
"reason": "<p>DOCKER will be removed from this enum as this type will be migrated to only be used by the Packages REST API.</p>",
"date": "2021-06-21",
"criticality": "breaking",
"owner": "reybard"
}
],
"2021-01-01": [
{
"location": "MergeStateStatus.DRAFT",
"description": "<p><code>DRAFT</code> will be removed. Use PullRequest.isDraft instead.</p>",
"reason": "<p>DRAFT state will be removed from this enum and <code>isDraft</code> should be used instead</p>",
"date": "2021-01-01",
"criticality": "breaking",
"owner": "nplasterer"
}
],
"2020-10-01": [
{
"location": "PullRequest.timeline",
"description": "<p><code>timeline</code> will be removed. Use PullRequest.timelineItems instead.</p>",
"reason": "<p><code>timeline</code> will be removed</p>",
"date": "2020-10-01",
"criticality": "breaking",
"owner": "mikesea"
},
{
"location": "Issue.timeline",
"description": "<p><code>timeline</code> will be removed. Use Issue.timelineItems instead.</p>",
"reason": "<p><code>timeline</code> will be removed</p>",
"date": "2020-10-01",
"criticality": "breaking",
"owner": "mikesea"
}
],
"2020-01-01": [
{
"location": "UnassignedEvent.user",
"description": "<p><code>user</code> will be removed. Use the <code>assignee</code> field instead.</p>",
"reason": "<p>Assignees can now be mannequins.</p>",
"date": "2020-01-01",
"criticality": "breaking",
"owner": "tambling"
},
{
"location": "AssignedEvent.user",
"description": "<p><code>user</code> will be removed. Use the <code>assignee</code> field instead.</p>",
"reason": "<p>Assignees can now be mannequins.</p>",
"date": "2020-01-01",
"criticality": "breaking",
"owner": "tambling"
}
],
"2019-04-01": [
{
"location": "LegacyMigration.uploadUrlTemplate",
"description": "<p><code>uploadUrlTemplate</code> will be removed. Use <code>uploadUrl</code> instead.</p>",
"reason": "<p><code>uploadUrlTemplate</code> is being removed because it is not a standard URL and adds an extra user step.</p>",
"date": "2019-04-01",
"criticality": "breaking",
"owner": "tambling"
}
]
}

Просмотреть файл

@ -1,16 +1,20 @@
import { useRouter } from 'next/router'
import cx from 'classnames'
import { CookBookArticleCard } from './CookBookArticleCard'
import { CookBookFilter } from './CookBookFilter'
import { useCategoryLandingContext } from 'src/frame/components/context/CategoryLandingContext'
//import { useTranslation } from 'src/languages/components/useTranslation'
import { DefaultLayout } from 'src/frame/components/DefaultLayout'
import { ArticleTitle } from 'src/frame/components/article/ArticleTitle'
import { Lead } from 'src/frame/components/ui/Lead'
import { useCategoryLandingContext } from 'src/frame/components/context/CategoryLandingContext'
import { ClientSideRedirects } from 'src/rest/components/ClientSideRedirects'
import { RestRedirect } from 'src/rest/components/RestRedirect'
import { Breadcrumbs } from 'src/frame/components/page-header/Breadcrumbs'
export const CategoryLanding = () => {
const router = useRouter()
//const { t } = useTranslation('toc')
const { title, intro, tocItems } = useCategoryLandingContext()
// tocItems contains directories and its children, we only want the child articles
@ -28,38 +32,31 @@ export const CategoryLanding = () => {
<Breadcrumbs />
</div>
<ArticleTitle>{title}</ArticleTitle>
{intro && <Lead data-search="lead">{intro}</Lead>}
<h2 className="py-5">Spotlight</h2>
<div className="container-lg clearfix">
<div className="col-4 float-left border p-4">Spotlight 1</div>
<div className="col-4 float-left border p-4">Spotlight 2</div>
<div className="col-4 float-left border p-4">Spotlight 3</div>
<div className="d-md-flex d-sm-block">
<CookBookArticleCard image="DeleteMe" spotlight={true} />
<CookBookArticleCard image="DeleteMe" spotlight={true} />
<CookBookArticleCard image="DeleteMe" spotlight={true} />
</div>
<div className="pt-8">
<div className="py-5 clearfix border-bottom">
<div className="col-5 float-left p-3">
<div className="py-5 border-bottom">
<div className="col-lg-4 col-sm-12 float-md-left pb-3 mr-5 ml-1">
<h2>Explore {onlyFlatItems.length} prompt articles</h2>
</div>
<div className="col-3 float-left p-4">Searchbar</div>
<div className="col-1 float-left p-4">Category</div>
<div className="col-1 float-left p-4">Complexity</div>
<div className="col-1 float-left p-4">Industry</div>
<div className="col-1 float-left p-4">Reset</div>
<div>
<CookBookFilter />
</div>
</div>
<div className="clearfix gutter-md-spacious">
{/* TODO: replace with card components */}
<ul className="clearfix gutter-md-spacious">
{onlyFlatItems.map((item, index) => (
<div key={index} className="col-4 float-left p-4">
<div className="px-3 pb-3 border-bottom">
<div>{item.title}</div>
<div>{item.intro}</div>
</div>
</div>
<li key={index} className="col-md-4 col-sm-12 list-style-none float-left p-4">
<CookBookArticleCard title={item.title} description={item.intro} />
</li>
))}
</div>
</ul>
</div>
</div>
</DefaultLayout>

Просмотреть файл

@ -0,0 +1,82 @@
import { Label, LabelGroup } from '@primer/react'
import { BugIcon } from '@primer/octicons-react'
type Props = {
title?: string
icon?: string
url?: string
description?: string
tags?: string[]
spotlight?: boolean
image?: string
complexity?: string
}
const defaultProps = {
title: 'Article Name',
description:
'Man bun letterpress put a bird on it la croix offal, meh grailed hot chicken kombucha gochujang messenger bag fit before they sold out lyft.',
tags: ['Tag Example', 'Tag Example'],
icon: 'bugicon',
}
function setIcon(icon: string) {
switch (icon) {
case 'bugicon':
return <BugIcon size={48} className="mr-4 bgColor-accent-muted p-3 circle fgColor-accent" />
case 'none':
return null
default:
return null
}
}
function setImage(image: string) {
return (
// <div className="d-flex flex-column flex-align-center">
image ? (
<div
style={{
width: 'max-width',
height: 200,
backgroundColor: 'gray',
marginBottom: 20,
borderRadius: 5,
}}
></div>
) : null
// </div>
)
}
const spotlightClasses = 'd-flex flex-column align-items-center'
export const CookBookArticleCard = ({
title = defaultProps.title,
icon = defaultProps.icon,
tags = defaultProps.tags,
description = defaultProps.description,
image = '',
spotlight = false,
}: Props) => {
return (
<div className="m-2">
<div
style={{ minHeight: 200 }}
className={spotlight ? spotlightClasses : 'd-flex pb-3 border-bottom'}
>
{spotlight ? setImage(image) : null}
{spotlight ? setIcon('none') : setIcon(icon)}
<div>
<h3 className="h4">{title}</h3>
<div className="fgColor-muted mb-3 mt-2">{description}</div>
<LabelGroup>
{tags.map((tag, index) => (
<Label key={index} variant="accent" sx={{ mr: 1 }} size="small">
{tag}
</Label> //fix this to have unique keys
))}
</LabelGroup>
</div>
</div>
</div>
)
}

Просмотреть файл

@ -0,0 +1,60 @@
import { TextInput, ActionMenu, ActionList, Button } from '@primer/react'
import { SearchIcon } from '@primer/octicons-react'
export const CookBookFilter = () => {
return (
<>
<div>
<TextInput
leadingVisual={SearchIcon}
className="float-lg-left m-1"
sx={{ minWidth: ['stretch', 'stretch', 'stretch', 250] }}
placeholder="Search articles"
/>
</div>
<div className="d-flex">
<ActionMenu>
<ActionMenu.Button className="col-md-1 col-sm-2 float-md-left m-1">
Category
</ActionMenu.Button>
<ActionMenu.Overlay width="small">
<ActionList>
<ActionList.Item>Item 1</ActionList.Item>
<ActionList.Item>Item 2</ActionList.Item>
<ActionList.Item>Item 3</ActionList.Item>
</ActionList>
</ActionMenu.Overlay>
</ActionMenu>
<ActionMenu>
<ActionMenu.Button className="col-md-1 col-sm-2 float-left m-1">
Complexity
</ActionMenu.Button>
<ActionMenu.Overlay width="small">
<ActionList>
<ActionList.Item>Item 1</ActionList.Item>
<ActionList.Item>Item 2</ActionList.Item>
<ActionList.Item>Item 3</ActionList.Item>
</ActionList>
</ActionMenu.Overlay>
</ActionMenu>
<ActionMenu>
<ActionMenu.Button className="col-md-1 col-sm-2 float-left m-1">
Industry
</ActionMenu.Button>
<ActionMenu.Overlay width="small">
<ActionList>
<ActionList.Item>Item 1</ActionList.Item>
<ActionList.Item>Item 2</ActionList.Item>
<ActionList.Item>Item 3</ActionList.Item>
</ActionList>
</ActionMenu.Overlay>
</ActionMenu>
<Button variant="invisible" className="col-md-1 col-sm-2 float-left mt-1">
Reset filters
</Button>
</div>
</>
)
}

Просмотреть файл

@ -11,6 +11,8 @@ const SectionToLabelMap: Record<string, string> = {
deprecations: 'Deprecations',
backups: 'Backups',
errata: 'Errata',
closing_down: 'Closing down',
retired: 'Retired',
}
type Props = {

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -93824,7 +93824,7 @@
}
],
"previews": [],
"descriptionHTML": "<p>Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of <code>401 - Unauthorized</code>, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.</p>\n<p>Optionally, you can use the <code>repositories</code> or <code>repository_ids</code> body parameters to specify individual repositories that the installation access token can access. If you don't use <code>repositories</code> or <code>repository_ids</code> to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.</p>\n<p>Optionally, use the <code>permissions</code> body parameter to specify the permissions that the installation access token should have. If <code>permissions</code> is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.</p>\n<p>When using the repository or permission parameters to reduce the access of the token, the complexity of the token is increased due to both the number of permissions in the request and the number of repositories the token will have access to. If the complexity is too large, the token will fail to be issued. If this occurs, the error message will indicate the maximum number of repositories that should be requested. For the average application requesting 8 permissions, this limit is around 5000 repositories. With fewer permissions requested, more repositories are supported.</p>\n<p>You must use a <a href=\"https://docs.github.com/enterprise-server@3.10/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app\">JWT</a> to access this endpoint.</p>",
"descriptionHTML": "<p>Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of <code>401 - Unauthorized</code>, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.</p>\n<p>Optionally, you can use the <code>repositories</code> or <code>repository_ids</code> body parameters to specify individual repositories that the installation access token can access. If you don't use <code>repositories</code> or <code>repository_ids</code> to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.</p>\n<p>Optionally, use the <code>permissions</code> body parameter to specify the permissions that the installation access token should have. If <code>permissions</code> is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.</p>\n<p>You must use a <a href=\"https://docs.github.com/enterprise-server@3.10/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app\">JWT</a> to access this endpoint.</p>",
"statusCodes": [
{
"httpStatusCode": "201",
@ -202167,7 +202167,7 @@
"urn:ietf:params:scim:schemas:core:2.0:Group"
],
"externalId": "8aa1a0c0-c4c3-4bc0-b4a5-2ef676900159",
"id": "927fa2c08dcb4a7fae9e",
"id": "24b28bbb-5fc4-4686-a153-a020debb1155",
"displayName": "Engineering",
"members": [
{
@ -202185,7 +202185,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
}
],
@ -202547,7 +202547,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -202833,7 +202833,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203158,7 +203158,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203374,7 +203374,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203682,7 +203682,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203893,7 +203893,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {

Просмотреть файл

@ -93848,7 +93848,7 @@
}
],
"previews": [],
"descriptionHTML": "<p>Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of <code>401 - Unauthorized</code>, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.</p>\n<p>Optionally, you can use the <code>repositories</code> or <code>repository_ids</code> body parameters to specify individual repositories that the installation access token can access. If you don't use <code>repositories</code> or <code>repository_ids</code> to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.</p>\n<p>Optionally, use the <code>permissions</code> body parameter to specify the permissions that the installation access token should have. If <code>permissions</code> is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.</p>\n<p>When using the repository or permission parameters to reduce the access of the token, the complexity of the token is increased due to both the number of permissions in the request and the number of repositories the token will have access to. If the complexity is too large, the token will fail to be issued. If this occurs, the error message will indicate the maximum number of repositories that should be requested. For the average application requesting 8 permissions, this limit is around 5000 repositories. With fewer permissions requested, more repositories are supported.</p>\n<p>You must use a <a href=\"https://docs.github.com/enterprise-server@3.11/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app\">JWT</a> to access this endpoint.</p>",
"descriptionHTML": "<p>Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of <code>401 - Unauthorized</code>, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.</p>\n<p>Optionally, you can use the <code>repositories</code> or <code>repository_ids</code> body parameters to specify individual repositories that the installation access token can access. If you don't use <code>repositories</code> or <code>repository_ids</code> to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.</p>\n<p>Optionally, use the <code>permissions</code> body parameter to specify the permissions that the installation access token should have. If <code>permissions</code> is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.</p>\n<p>You must use a <a href=\"https://docs.github.com/enterprise-server@3.11/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app\">JWT</a> to access this endpoint.</p>",
"statusCodes": [
{
"httpStatusCode": "201",
@ -202410,7 +202410,7 @@
"urn:ietf:params:scim:schemas:core:2.0:Group"
],
"externalId": "8aa1a0c0-c4c3-4bc0-b4a5-2ef676900159",
"id": "927fa2c08dcb4a7fae9e",
"id": "24b28bbb-5fc4-4686-a153-a020debb1155",
"displayName": "Engineering",
"members": [
{
@ -202428,7 +202428,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
}
],
@ -202790,7 +202790,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203076,7 +203076,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203401,7 +203401,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203617,7 +203617,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -203925,7 +203925,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -204136,7 +204136,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {

Просмотреть файл

@ -94005,7 +94005,7 @@
}
],
"previews": [],
"descriptionHTML": "<p>Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of <code>401 - Unauthorized</code>, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.</p>\n<p>Optionally, you can use the <code>repositories</code> or <code>repository_ids</code> body parameters to specify individual repositories that the installation access token can access. If you don't use <code>repositories</code> or <code>repository_ids</code> to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.</p>\n<p>Optionally, use the <code>permissions</code> body parameter to specify the permissions that the installation access token should have. If <code>permissions</code> is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.</p>\n<p>When using the repository or permission parameters to reduce the access of the token, the complexity of the token is increased due to both the number of permissions in the request and the number of repositories the token will have access to. If the complexity is too large, the token will fail to be issued. If this occurs, the error message will indicate the maximum number of repositories that should be requested. For the average application requesting 8 permissions, this limit is around 5000 repositories. With fewer permissions requested, more repositories are supported.</p>\n<p>You must use a <a href=\"https://docs.github.com/enterprise-server@3.12/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app\">JWT</a> to access this endpoint.</p>",
"descriptionHTML": "<p>Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of <code>401 - Unauthorized</code>, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.</p>\n<p>Optionally, you can use the <code>repositories</code> or <code>repository_ids</code> body parameters to specify individual repositories that the installation access token can access. If you don't use <code>repositories</code> or <code>repository_ids</code> to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.</p>\n<p>Optionally, use the <code>permissions</code> body parameter to specify the permissions that the installation access token should have. If <code>permissions</code> is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.</p>\n<p>You must use a <a href=\"https://docs.github.com/enterprise-server@3.12/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app\">JWT</a> to access this endpoint.</p>",
"statusCodes": [
{
"httpStatusCode": "201",
@ -204596,7 +204596,7 @@
"urn:ietf:params:scim:schemas:core:2.0:Group"
],
"externalId": "8aa1a0c0-c4c3-4bc0-b4a5-2ef676900159",
"id": "927fa2c08dcb4a7fae9e",
"id": "24b28bbb-5fc4-4686-a153-a020debb1155",
"displayName": "Engineering",
"members": [
{
@ -204614,7 +204614,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
}
],
@ -204976,7 +204976,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205262,7 +205262,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205587,7 +205587,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205803,7 +205803,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -206111,7 +206111,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -206322,7 +206322,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -479163,6 +479163,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "active"
},
@ -479249,6 +479271,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}
@ -480565,6 +480590,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "active"
},
@ -480651,6 +480698,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}
@ -481910,6 +481960,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "inactive"
},
@ -481929,6 +482001,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}

Просмотреть файл

@ -204772,7 +204772,7 @@
"urn:ietf:params:scim:schemas:core:2.0:Group"
],
"externalId": "8aa1a0c0-c4c3-4bc0-b4a5-2ef676900159",
"id": "927fa2c08dcb4a7fae9e",
"id": "24b28bbb-5fc4-4686-a153-a020debb1155",
"displayName": "Engineering",
"members": [
{
@ -204790,7 +204790,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
}
],
@ -205152,7 +205152,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205438,7 +205438,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205763,7 +205763,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205979,7 +205979,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -206287,7 +206287,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -206498,7 +206498,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -482245,6 +482245,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "active"
},
@ -482331,6 +482353,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}
@ -483647,6 +483672,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "active"
},
@ -483733,6 +483780,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}
@ -484992,6 +485042,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "inactive"
},
@ -485011,6 +485083,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}

Просмотреть файл

@ -204772,7 +204772,7 @@
"urn:ietf:params:scim:schemas:core:2.0:Group"
],
"externalId": "8aa1a0c0-c4c3-4bc0-b4a5-2ef676900159",
"id": "927fa2c08dcb4a7fae9e",
"id": "24b28bbb-5fc4-4686-a153-a020debb1155",
"displayName": "Engineering",
"members": [
{
@ -204790,7 +204790,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
}
],
@ -205152,7 +205152,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205438,7 +205438,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205763,7 +205763,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -205979,7 +205979,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -206287,7 +206287,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -206498,7 +206498,7 @@
"resourceType": "Group",
"created": "2012-03-27T19:59:26.000Z",
"lastModified": "2018-03-27T19:59:26.000Z",
"location": "https://api.github.localhost/scim/v2/Groups/927fa2c08dcb4a7fae9e"
"location": "https://api.github.localhost/scim/v2/Groups/24b28bbb-5fc4-4686-a153-a020debb1155"
}
},
"schema": {
@ -485730,6 +485730,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "active"
},
@ -485816,6 +485838,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}
@ -487132,6 +487157,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "active"
},
@ -487218,6 +487265,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}
@ -488477,6 +488527,28 @@
},
"push_protection_bypassed": true,
"push_protection_bypassed_at": "2020-11-06T21:48:51Z",
"push_protection_bypass_request_reviewer": {
"login": "octocat",
"id": 3,
"node_id": "MDQ6VXNlcjI=",
"avatar_url": "https://alambic.github.com/avatars/u/3?",
"gravatar_id": "",
"url": "https://api.github.com/users/octocat",
"html_url": "https://github.com/octocat",
"followers_url": "https://api.github.com/users/octocat/followers",
"following_url": "https://api.github.com/users/octocat/following{/other_user}",
"gists_url": "https://api.github.com/users/octocat/gists{/gist_id}",
"starred_url": "https://api.github.com/users/octocat/starred{/owner}{/repo}",
"subscriptions_url": "https://api.github.com/users/octocat/subscriptions",
"organizations_url": "https://api.github.com/users/octocat/orgs",
"repos_url": "https://api.github.com/users/octocat/repos",
"events_url": "https://api.github.com/users/octocat/events{/privacy}",
"received_events_url": "https://api.github.com/users/octocat/received_events",
"type": "User",
"site_admin": true
},
"push_protection_bypass_request_comment": "Example comment",
"push_protection_bypass_request_html_url": "https://github.com/owner/repo/secret_scanning_exemptions/1",
"resolution_comment": "Example comment",
"validity": "inactive"
},
@ -488496,6 +488568,9 @@
"push_protection_bypassed_by": null,
"push_protection_bypassed": false,
"push_protection_bypassed_at": null,
"push_protection_bypass_request_reviewer": null,
"push_protection_bypass_request_comment": null,
"push_protection_bypass_request_html_url": null,
"resolution_comment": null,
"validity": "unknown"
}

Различия файлов скрыты, потому что одна или несколько строк слишком длинны

Просмотреть файл

@ -20,6 +20,9 @@
],
"ghes-3.14": [
"2022-11-28"
],
"ghes-3.15": [
"2022-11-28"
]
},
"versionMapping": {
@ -47,5 +50,5 @@
]
}
},
"sha": "f9de54ab72eff1bc9855fd0940816350912ae5b7"
"sha": "c9cd73bd34f020305d23f5d3b63e3c59624f1537"
}

Просмотреть файл

@ -9,13 +9,13 @@ export const dates = JSON.parse(await fs.readFile('src/ghes-releases/lib/enterpr
// enterprise-releases/docs/supported-versions.md#release-lifecycle-dates
// Some frontmatter may contain the upcoming GHES release number
export const next = '3.15'
export const nextNext = '3.16'
export const next = '3.16'
export const nextNext = '3.17'
export const supported = ['3.14', '3.13', '3.12', '3.11', '3.10']
export const supported = ['3.15', '3.14', '3.13', '3.12', '3.11', '3.10']
// Edit this to `null` when it's no longer the release candidate
export const releaseCandidate = null
export const releaseCandidate = '3.15'
// Ensure that:
// "next" is ahead of "latest" by one minor or major release.

Просмотреть файл

@ -215895,6 +215895,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -216328,6 +216473,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -216761,6 +217051,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -217194,6 +217629,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -217627,6 +218207,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -218061,6 +218786,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",

Просмотреть файл

@ -218232,6 +218232,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -218665,6 +218810,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -219098,6 +219388,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -219531,6 +219966,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -219964,6 +220544,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",
@ -220398,6 +221123,151 @@
"name": "push_protection_bypassed_at",
"description": "<p>The time that push protection was bypassed in ISO 8601 format: <code>YYYY-MM-DDTHH:MM:SSZ</code>.</p>"
},
{
"type": "object",
"name": "push_protection_bypass_request_reviewer",
"description": "<p>A GitHub user.</p>",
"childParamsGroups": [
{
"type": "string or null",
"name": "name",
"description": ""
},
{
"type": "string or null",
"name": "email",
"description": ""
},
{
"type": "string",
"name": "login",
"description": "",
"isRequired": true
},
{
"type": "integer",
"name": "id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "node_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "avatar_url",
"description": "",
"isRequired": true
},
{
"type": "string or null",
"name": "gravatar_id",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "html_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "followers_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "following_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "gists_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "subscriptions_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "organizations_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "repos_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "received_events_url",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "type",
"description": "",
"isRequired": true
},
{
"type": "boolean",
"name": "site_admin",
"description": "",
"isRequired": true
},
{
"type": "string",
"name": "starred_at",
"description": ""
},
{
"type": "string",
"name": "user_view_type",
"description": ""
}
]
},
{
"type": "string or null",
"name": "push_protection_bypass_request_comment",
"description": "<p>An optional comment when requesting a push protection bypass.</p>"
},
{
"type": "string or null",
"name": "push_protection_bypass_request_html_url",
"description": "<p>The URL to a push protection bypass request.</p>"
},
{
"type": "boolean or null",
"name": "publicly_leaked",

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -1,3 +1,3 @@
{
"sha": "f9de54ab72eff1bc9855fd0940816350912ae5b7"
"sha": "c9cd73bd34f020305d23f5d3b63e3c59624f1537"
}