diff --git a/content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md b/content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md index a08607b8dc75..185d0d92d635 100644 --- a/content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md +++ b/content/admin/configuring-settings/hardening-security-for-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list.md @@ -49,7 +49,9 @@ Using your IdP's allow list deactivates the {% data variables.product.company_sh By default, your IdP runs the CAP on the initial interactive SAML or OIDC sign-in to {% data variables.product.company_short %} for any IP allow list configuration you choose. -The OIDC CAP only applies for requests to the API using a user token, such as an OAuth token for an {% data variables.product.prodname_oauth_app %} or a user access token for a {% data variables.product.prodname_github_app %} acting on behalf of a user. The OIDC CAP does not apply when a {% data variables.product.prodname_github_app %} uses an installation access token. For more information, see "[AUTOTITLE](/apps/creating-github-apps/authenticating-with-a-github-app/about-authentication-with-a-github-app)" and "[AUTOTITLE](/enterprise-cloud@latest/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-support-for-your-idps-conditional-access-policy#github-apps-and-oauth-apps)." +The OIDC CAP applies to web requests and requests to the API using a user token, such as an OAuth token for an {% data variables.product.prodname_oauth_app %} or a user access token for a {% data variables.product.prodname_github_app %} acting on behalf of a user. The OIDC CAP does not apply when a {% data variables.product.prodname_github_app %} uses an installation access token. See "[AUTOTITLE](/apps/creating-github-apps/authenticating-with-a-github-app/about-authentication-with-a-github-app)" and "[AUTOTITLE](/enterprise-cloud@latest/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-support-for-your-idps-conditional-access-policy#github-apps-and-oauth-apps)." + +{% data reusables.enterprise-accounts.emu-cap-public-preview %} To ensure seamless use of the OIDC CAP while still applying the policy to OAuth tokens and user access tokens, you must copy all of the IP ranges from each {% data variables.product.prodname_github_app %} that your enterprise uses to your IdP policy. @@ -57,7 +59,7 @@ To ensure seamless use of the OIDC CAP while still applying the policy to OAuth ### Enabling {% data variables.product.company_short %}'s IP allow list -{% data reusables.profile.access_org %} +{% data reusables.enterprise-accounts.access-enterprise %} {% data reusables.profile.org_settings %} {% data reusables.organizations.security %} 1. If you're using {% data variables.product.prodname_emus %} with OIDC, under "IP allow list", select the **IP allow list configuration** dropdown menu and click **GitHub**. @@ -123,7 +125,7 @@ To ensure seamless use of the OIDC CAP while still applying the policy to OAuth {% endnote %} -{% data reusables.profile.access_org %} +{% data reusables.enterprise-accounts.access-enterprise %} {% data reusables.profile.org_settings %} {% data reusables.organizations.security %} 1. Under "IP allow list", select the **IP allow list configuration** dropdown menu and click **Identity Provider**. diff --git a/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/about-support-for-your-idps-conditional-access-policy.md b/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/about-support-for-your-idps-conditional-access-policy.md index e249331162b1..db96a04b5059 100644 --- a/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/about-support-for-your-idps-conditional-access-policy.md +++ b/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/about-support-for-your-idps-conditional-access-policy.md @@ -21,6 +21,8 @@ redirect_from: {% data reusables.enterprise-accounts.emu-cap-validates %} +{% data reusables.enterprise-accounts.emu-cap-public-preview %} + {% data variables.product.product_name %} supports CAP for any {% data variables.enterprise.prodname_emu_enterprise %} where OIDC SSO is enabled. Enterprise owners can choose to use this IP allow list configuration instead of {% data variables.product.product_name %}'s IP allow list, and can do so once OIDC SSO is configured. For more information about IP allow lists, see "[AUTOTITLE](/admin/configuration/configuring-your-enterprise/restricting-network-traffic-to-your-enterprise-with-an-ip-allow-list#about-your-idps-allow-list)" and "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-allowed-ip-addresses-for-your-organization)." * {% data variables.product.product_name %} enforces your IdP's IP conditions but cannot enforce your device compliance conditions. diff --git a/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md b/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md index 8d779e52f3b9..75a41b9897f6 100644 --- a/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md +++ b/content/admin/managing-iam/configuring-authentication-for-enterprise-managed-users/configuring-oidc-for-enterprise-managed-users.md @@ -23,6 +23,8 @@ With {% data variables.product.prodname_emus %}, your enterprise uses your ident {% data reusables.enterprise-accounts.emu-cap-validates %} See "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/about-support-for-your-idps-conditional-access-policy)." +{% data reusables.enterprise-accounts.emu-cap-public-preview %} + You can adjust the lifetime of a session, and how often a {% data variables.enterprise.prodname_managed_user %} needs to reauthenticate with your IdP, by changing the lifetime policy property of the ID tokens issued for {% data variables.product.prodname_dotcom %} from your IdP. The default lifetime is one hour. See "[Configure token lifetime policies](https://learn.microsoft.com/en-us/entra/identity-platform/configure-token-lifetimes#create-a-policy-and-assign-it-to-a-service-principal)" in the Microsoft documentation. To change the lifetime policy property, you will need the object ID associated with your {% data variables.product.prodname_emus %} OIDC. See "[AUTOTITLE](/admin/identity-and-access-management/configuring-authentication-for-enterprise-managed-users/finding-the-object-id-for-your-entra-oidc-application)." diff --git a/content/admin/managing-iam/reconfiguring-iam-for-enterprise-managed-users/migrating-from-saml-to-oidc.md b/content/admin/managing-iam/reconfiguring-iam-for-enterprise-managed-users/migrating-from-saml-to-oidc.md index 2e44893f5724..3774c7fa28a8 100644 --- a/content/admin/managing-iam/reconfiguring-iam-for-enterprise-managed-users/migrating-from-saml-to-oidc.md +++ b/content/admin/managing-iam/reconfiguring-iam-for-enterprise-managed-users/migrating-from-saml-to-oidc.md @@ -21,6 +21,8 @@ redirect_from: If your {% data variables.enterprise.prodname_emu_enterprise %} uses SAML SSO to authenticate with Entra ID, you can migrate to OIDC. {% data reusables.enterprise-accounts.emu-cap-validates %} +{% data reusables.enterprise-accounts.emu-cap-public-preview %} + When you migrate from SAML to OIDC, {% data variables.enterprise.prodname_managed_users %} and groups that were previously provisioned for SAML but are not provisioned by the {% data variables.product.prodname_emu_idp_oidc_application %} application will have "(SAML)" appended to their display names. If you're new to {% data variables.product.prodname_emus %} and haven't yet configured authentication for your enterprise, you do not need to migrate and can set up OIDC single sign-on immediately. For more information, see "[AUTOTITLE](/admin/identity-and-access-management/using-enterprise-managed-users-for-iam/configuring-oidc-for-enterprise-managed-users)." diff --git a/content/authentication/securing-your-account-with-two-factor-authentication-2fa/countries-where-sms-authentication-is-supported.md b/content/authentication/securing-your-account-with-two-factor-authentication-2fa/countries-where-sms-authentication-is-supported.md index ee2e23fbb6fa..a6e8de3ac6e6 100644 --- a/content/authentication/securing-your-account-with-two-factor-authentication-2fa/countries-where-sms-authentication-is-supported.md +++ b/content/authentication/securing-your-account-with-two-factor-authentication-2fa/countries-where-sms-authentication-is-supported.md @@ -27,12 +27,12 @@ If your country is not on this list, then we aren't currently able to reliably d
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all active Copilot seats across organizations or enterprise teams for an enterprise with a Copilot Business or Copilot Enterprise subscription.
\nUsers with access through multiple organizations or enterprise teams will only be counted toward total_seats
once.
For each organization or enterprise team which grants Copilot access to a user, a seat detail object will appear in the seats
array.
Only enterprise owners and billing managers can view assigned Copilot seats across their child organizations or enterprise teams.
\nPersonal access tokens (classic) need either the manage_billing:copilot
or read:enterprise
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all Copilot seats currently being billed for across organizations or enterprise teams for an enterprise with a Copilot Business or Copilot Enterprise subscription.
\nUsers with access through multiple organizations or enterprise teams will only be counted toward total_seats
once.
For each organization or enterprise team which grants Copilot access to a user, a seat detail object will appear in the seats
array.\nEach seat object contains information about the assigned user's most recent Copilot activity. Users must have\ntelemetry enabled in their IDE for Copilot in the IDE activity to be reflected in last_activity_at
. For more information about activity data,\nsee \"Reviewing user activity data for Copilot in your organization.\"
Only enterprise owners and billing managers can view assigned Copilot seats across their child organizations or enterprise teams.
\nPersonal access tokens (classic) need either the manage_billing:copilot
or read:enterprise
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand feature policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization\".
\nOnly organization owners can view details about the organization's Copilot Business or Copilot Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand feature policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization.\"
\nOnly organization owners can view details about the organization's Copilot Business or Copilot Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all active Copilot seats for an organization with a Copilot Business or Copilot Enterprise subscription.\nOnly organization owners can view assigned seats.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all Copilot seats for which an organization with a Copilot Business or Copilot Enterprise subscription is currently being billed.\nOnly organization owners can view assigned seats.
\nEach seat object contains information about the assigned user's most recent Copilot activity. Users must have telemetry enabled in their IDE for Copilot in the IDE activity to be reflected in last_activity_at
.\nFor more information about activity data, see \"Reviewing user activity data for Copilot in your organization.\"
OAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed for each seat based on the organization's Copilot plan. For more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Subscribing to Copilot for your organization.\"\nFor more information about setting a suggestion matching policy, see \"Managing policies for Copilot in your organization.\"
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nCancels the Copilot seat assignment for all members of each team specified.\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nSets seats for all members of each team specified to \"pending cancellation\".\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle unless they retain access through another team.
\nFor more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to Copilot for members of your organization.\"
\nOnly organization owners can cancel Copilot seats for their organization members.
\nThe response will contain the total number of seats set to \"pending cancellation\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed for each seat based on the organization's Copilot plan. For more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Subscribing to Copilot for your organization.\"\nFor more information about setting a suggestion matching policy, see \"Managing policies for Copilot in your organization.\"
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nCancels the Copilot seat assignment for each user specified.\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nSets seats for all users specified to \"pending cancellation\".\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle unless they retain access through team membership.
\nFor more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to Copilot for members of your organization.\"
\nOnly organization owners can cancel Copilot seats for their organization members.
\nThe response will contain the total number of seats set to \"pending cancellation\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the GitHub Copilot seat assignment details for a member of an organization who currently has access to GitHub Copilot.
\nOnly organization owners can view Copilot seat assignment details for members of their organization.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the GitHub Copilot seat details for a member of an organization who currently has access to GitHub Copilot.
\nThe seat object contains information about the user's most recent Copilot activity. Users must have telemetry enabled in their IDE for Copilot in the IDE activity to be reflected in last_activity_at
.\nFor more information about activity data, see \"Reviewing user activity data for Copilot in your organization.\"
Only organization owners can view Copilot seat assignment details for members of their organization.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
If secret_scanning_push_protection_custom_link_enabled
is true, the URL that will be displayed to contributors who are blocked from pushing a secret.
Controls whether or not deploy keys may be added and used for repositories in the organization.
" } ], "progAccess": { @@ -357309,6 +357335,7 @@ "members_can_fork_private_repositories": false, "web_commit_signoff_required": false, "updated_at": "2014-03-03T18:58:10Z", + "deploy_keys_enabled_for_repositories": false, "dependency_graph_enabled_for_new_repositories": false, "dependabot_alerts_enabled_for_new_repositories": false, "dependabot_security_updates_enabled_for_new_repositories": false, @@ -357735,6 +357762,13 @@ "null" ], "format": "date-time" + }, + "deploy_keys_enabled_for_repositories": { + "type": "boolean", + "description": "Controls whether or not deploy keys may be added and used for repositories in the organization.", + "examples": [ + false + ] } }, "required": [ @@ -369927,6 +369961,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -370163,6 +370198,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -370191,6 +370230,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -371673,6 +371713,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -371902,6 +371943,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -371929,6 +371974,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index 9bf63d9f34ea..9afb6e085809 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -236007,7 +236007,7 @@ } ], "previews": [], - "descriptionHTML": "Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all active Copilot seats across organizations or enterprise teams for an enterprise with a Copilot Business or Copilot Enterprise subscription.
\nUsers with access through multiple organizations or enterprise teams will only be counted toward total_seats
once.
For each organization or enterprise team which grants Copilot access to a user, a seat detail object will appear in the seats
array.
Only enterprise owners and billing managers can view assigned Copilot seats across their child organizations or enterprise teams.
\nPersonal access tokens (classic) need either the manage_billing:copilot
or read:enterprise
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all Copilot seats currently being billed for across organizations or enterprise teams for an enterprise with a Copilot Business or Copilot Enterprise subscription.
\nUsers with access through multiple organizations or enterprise teams will only be counted toward total_seats
once.
For each organization or enterprise team which grants Copilot access to a user, a seat detail object will appear in the seats
array.\nEach seat object contains information about the assigned user's most recent Copilot activity. Users must have\ntelemetry enabled in their IDE for Copilot in the IDE activity to be reflected in last_activity_at
. For more information about activity data,\nsee \"Reviewing user activity data for Copilot in your organization.\"
Only enterprise owners and billing managers can view assigned Copilot seats across their child organizations or enterprise teams.
\nPersonal access tokens (classic) need either the manage_billing:copilot
or read:enterprise
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand feature policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization\".
\nOnly organization owners can view details about the organization's Copilot Business or Copilot Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand feature policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization.\"
\nOnly organization owners can view details about the organization's Copilot Business or Copilot Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all active Copilot seats for an organization with a Copilot Business or Copilot Enterprise subscription.\nOnly organization owners can view assigned seats.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nLists all Copilot seats for which an organization with a Copilot Business or Copilot Enterprise subscription is currently being billed.\nOnly organization owners can view assigned seats.
\nEach seat object contains information about the assigned user's most recent Copilot activity. Users must have telemetry enabled in their IDE for Copilot in the IDE activity to be reflected in last_activity_at
.\nFor more information about activity data, see \"Reviewing user activity data for Copilot in your organization.\"
OAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed for each seat based on the organization's Copilot plan. For more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Subscribing to Copilot for your organization.\"\nFor more information about setting a suggestion matching policy, see \"Managing policies for Copilot in your organization.\"
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nCancels the Copilot seat assignment for all members of each team specified.\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nSets seats for all members of each team specified to \"pending cancellation\".\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle unless they retain access through another team.
\nFor more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to Copilot for members of your organization.\"
\nOnly organization owners can cancel Copilot seats for their organization members.
\nThe response will contain the total number of seats set to \"pending cancellation\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed for each seat based on the organization's Copilot plan. For more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Subscribing to Copilot for your organization.\"\nFor more information about setting a suggestion matching policy, see \"Managing policies for Copilot in your organization.\"
\nThe response will contain the total number of new seats that were created and existing seats that were refreshed.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nCancels the Copilot seat assignment for each user specified.\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nSets seats for all users specified to \"pending cancellation\".\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle unless they retain access through team membership.
\nFor more information about Copilot pricing, see \"About billing for GitHub Copilot in your organization.\"
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to Copilot for members of your organization.\"
\nOnly organization owners can cancel Copilot seats for their organization members.
\nThe response will contain the total number of seats set to \"pending cancellation\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or admin:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the GitHub Copilot seat assignment details for a member of an organization who currently has access to GitHub Copilot.
\nOnly organization owners can view Copilot seat assignment details for members of their organization.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
Note
\n\nThis endpoint is in public preview and is subject to change.
\nGets the GitHub Copilot seat details for a member of an organization who currently has access to GitHub Copilot.
\nThe seat object contains information about the user's most recent Copilot activity. Users must have telemetry enabled in their IDE for Copilot in the IDE activity to be reflected in last_activity_at
.\nFor more information about activity data, see \"Reviewing user activity data for Copilot in your organization.\"
Only organization owners can view Copilot seat assignment details for members of their organization.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot
or read:org
scopes to use this endpoint.
If specified, only return results for a single year. The value of year
is an integer with four digits representing a year. For example, 2023
.
If specified, only return results for a single year. The value of year
is an integer with four digits representing a year. For example, 2024
. Default value is the current year.
The ID corresponding to a cost center.
", + "description": "The ID corresponding to a cost center. The default value is no cost center.
", "in": "query", "required": false, "schema": { @@ -261571,7 +261583,7 @@ } ], "previews": [], - "descriptionHTML": "Gets a report of the total usage for an enterprise. To use this endpoint, you must be an administrator or billing manager of the enterprise.
\nNote: This endpoint is only available to enterprises with access to the enhanced billing platform. For more information, see \"About the enhanced billing platform for enterprises.\"
", + "descriptionHTML": "Gets a report of usage by cost center for an enterprise. To use this endpoint, you must be an administrator or billing manager of the enterprise. By default this endpoint will return usage that does not have a cost center.
\nNote: This endpoint is only available to enterprises with access to the enhanced billing platform. For more information, see \"About the enhanced billing platform for enterprises.\"
", "statusCodes": [ { "httpStatusCode": "200", @@ -373581,6 +373593,7 @@ "web_commit_signoff_required": false, "updated_at": "2014-03-03T18:58:10Z", "archived_at": null, + "deploy_keys_enabled_for_repositories": false, "dependency_graph_enabled_for_new_repositories": false, "dependabot_alerts_enabled_for_new_repositories": false, "dependabot_security_updates_enabled_for_new_repositories": false, @@ -374016,6 +374029,13 @@ "null" ], "format": "date-time" + }, + "deploy_keys_enabled_for_repositories": { + "type": "boolean", + "description": "Controls whether or not deploy keys may be added and used for repositories in the organization.", + "examples": [ + false + ] } }, "required": [ @@ -374276,6 +374296,12 @@ "name": "secret_scanning_validity_checks_enabled", "in": "body", "description": "Endpoint closing down notice. Please use code security configurations instead.
\nWhether secret scanning automatic validity checks on supported partner tokens is enabled for all repositories under this organization.
" + }, + { + "type": "boolean", + "name": "deploy_keys_enabled_for_repositories", + "in": "body", + "description": "Controls whether or not deploy keys may be added and used for repositories in the organization.
" } ], "progAccess": { @@ -374371,6 +374397,7 @@ "web_commit_signoff_required": false, "updated_at": "2014-03-03T18:58:10Z", "archived_at": null, + "deploy_keys_enabled_for_repositories": false, "dependency_graph_enabled_for_new_repositories": false, "dependabot_alerts_enabled_for_new_repositories": false, "dependabot_security_updates_enabled_for_new_repositories": false, @@ -374806,6 +374833,13 @@ "null" ], "format": "date-time" + }, + "deploy_keys_enabled_for_repositories": { + "type": "boolean", + "description": "Controls whether or not deploy keys may be added and used for repositories in the organization.", + "examples": [ + false + ] } }, "required": [ @@ -391576,6 +391610,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -391812,6 +391847,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -391840,6 +391879,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -393334,6 +393374,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -393563,6 +393604,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -393590,6 +393635,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/data/ghes-3.10-2022-11-28/schema.json b/src/rest/data/ghes-3.10-2022-11-28/schema.json index f37fa0c3a993..04b0ea4fec9f 100644 --- a/src/rest/data/ghes-3.10-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.10-2022-11-28/schema.json @@ -328761,6 +328761,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -328997,6 +328998,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -329025,6 +329030,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -330480,6 +330486,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -330709,6 +330716,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -330736,6 +330747,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/data/ghes-3.11-2022-11-28/schema.json b/src/rest/data/ghes-3.11-2022-11-28/schema.json index 81da6ed5eafb..14eade790bd7 100644 --- a/src/rest/data/ghes-3.11-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.11-2022-11-28/schema.json @@ -329032,6 +329032,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -329268,6 +329269,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -329296,6 +329301,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -330751,6 +330757,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -330980,6 +330987,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -331007,6 +331018,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/data/ghes-3.12-2022-11-28/schema.json b/src/rest/data/ghes-3.12-2022-11-28/schema.json index 3d0ab39fbe1b..fa05de03dcf9 100644 --- a/src/rest/data/ghes-3.12-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.12-2022-11-28/schema.json @@ -331422,6 +331422,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -331658,6 +331659,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -331686,6 +331691,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -333141,6 +333147,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -333370,6 +333377,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -333397,6 +333408,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/data/ghes-3.13-2022-11-28/schema.json b/src/rest/data/ghes-3.13-2022-11-28/schema.json index 9aca05c805d0..43243adf6aa6 100644 --- a/src/rest/data/ghes-3.13-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.13-2022-11-28/schema.json @@ -332929,6 +332929,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -333165,6 +333166,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -333193,6 +333198,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -334648,6 +334654,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -334877,6 +334884,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -334904,6 +334915,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/data/ghes-3.14-2022-11-28/schema.json b/src/rest/data/ghes-3.14-2022-11-28/schema.json index 3393c44fdce2..62b25ec62ca1 100644 --- a/src/rest/data/ghes-3.14-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.14-2022-11-28/schema.json @@ -335535,6 +335535,7 @@ }, "created_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -335771,6 +335772,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -335799,6 +335804,7 @@ "permissions", "created_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" @@ -337254,6 +337260,7 @@ }, "access_granted_at": "2023-05-16T08:47:09.000-07:00", "token_id": 98716, + "token_name": "Some Token", "token_expired": false, "token_expires_at": "2023-11-16T08:47:09.000-07:00", "token_last_used_at": null @@ -337483,6 +337490,10 @@ "type": "integer", "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants." }, + "token_name": { + "type": "string", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens." + }, "token_expired": { "type": "boolean", "description": "Whether the associated fine-grained personal access token has expired." @@ -337510,6 +337521,7 @@ "permissions", "access_granted_at", "token_id", + "token_name", "token_expired", "token_expires_at", "token_last_used_at" diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index ae81169ecabc..c513bbd01c45 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -47,5 +47,5 @@ ] } }, - "sha": "10e2f151b45a960f135417e71bd6f0ac5ce0aa97" + "sha": "8f64fcb5cee86e8cf793e6129b230f8fbedaf96c" } \ No newline at end of file diff --git a/src/webhooks/data/fpt/schema.json b/src/webhooks/data/fpt/schema.json index d72d53465995..5f0a6677d9c7 100644 --- a/src/webhooks/data/fpt/schema.json +++ b/src/webhooks/data/fpt/schema.json @@ -18195,6 +18195,11 @@ "name": "verified", "description": "", "isRequired": true + }, + { + "type": "boolean", + "name": "enabled", + "description": "" } ] }, @@ -18317,6 +18322,11 @@ "name": "verified", "description": "", "isRequired": true + }, + { + "type": "boolean", + "name": "enabled", + "description": "" } ] }, @@ -89230,6 +89240,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -89588,6 +89604,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -89946,6 +89968,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -90303,6 +90331,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/data/ghec/schema.json b/src/webhooks/data/ghec/schema.json index 36260183b8f2..bc43803830f0 100644 --- a/src/webhooks/data/ghec/schema.json +++ b/src/webhooks/data/ghec/schema.json @@ -20529,6 +20529,11 @@ "name": "verified", "description": "", "isRequired": true + }, + { + "type": "boolean", + "name": "enabled", + "description": "" } ] }, @@ -20651,6 +20656,11 @@ "name": "verified", "description": "", "isRequired": true + }, + { + "type": "boolean", + "name": "enabled", + "description": "" } ] }, @@ -91564,6 +91574,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -91922,6 +91938,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -92280,6 +92302,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -92637,6 +92665,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/data/ghes-3.10/schema.json b/src/webhooks/data/ghes-3.10/schema.json index e7e82331c004..8a3ac7669580 100644 --- a/src/webhooks/data/ghes-3.10/schema.json +++ b/src/webhooks/data/ghes-3.10/schema.json @@ -84855,6 +84855,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -85213,6 +85219,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -85571,6 +85583,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -85928,6 +85946,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/data/ghes-3.11/schema.json b/src/webhooks/data/ghes-3.11/schema.json index 73a94c4cab7a..696f084bbd4f 100644 --- a/src/webhooks/data/ghes-3.11/schema.json +++ b/src/webhooks/data/ghes-3.11/schema.json @@ -84984,6 +84984,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -85342,6 +85348,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -85700,6 +85712,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -86057,6 +86075,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/data/ghes-3.12/schema.json b/src/webhooks/data/ghes-3.12/schema.json index 2e49d8eab867..fd9dbf9390ce 100644 --- a/src/webhooks/data/ghes-3.12/schema.json +++ b/src/webhooks/data/ghes-3.12/schema.json @@ -86248,6 +86248,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -86606,6 +86612,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -86964,6 +86976,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -87321,6 +87339,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/data/ghes-3.13/schema.json b/src/webhooks/data/ghes-3.13/schema.json index 937fd282db9c..a868ff8a1528 100644 --- a/src/webhooks/data/ghes-3.13/schema.json +++ b/src/webhooks/data/ghes-3.13/schema.json @@ -86263,6 +86263,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -86621,6 +86627,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -86979,6 +86991,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -87336,6 +87354,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/data/ghes-3.14/schema.json b/src/webhooks/data/ghes-3.14/schema.json index 02bceba929a4..021c02d4b8d5 100644 --- a/src/webhooks/data/ghes-3.14/schema.json +++ b/src/webhooks/data/ghes-3.14/schema.json @@ -87411,6 +87411,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -87769,6 +87775,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -88127,6 +88139,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", @@ -88484,6 +88502,12 @@ "description": "Unique identifier of the user's token. This field can also be found in audit log events and the organization's settings for their PAT grants.
", "isRequired": true }, + { + "type": "string", + "name": "token_name", + "description": "The name given to the user's token. This field can also be found in an organization's settings page for Active Tokens.
", + "isRequired": true + }, { "type": "boolean", "name": "token_expired", diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index 11de88301705..39826e835564 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "10e2f151b45a960f135417e71bd6f0ac5ce0aa97" + "sha": "8f64fcb5cee86e8cf793e6129b230f8fbedaf96c" } \ No newline at end of file