From b55c3d6f5a2057eb303a620fce26e805b0779287 Mon Sep 17 00:00:00 2001 From: Thom Wong <101249231+supergranular@users.noreply.github.com> Date: Wed, 8 Apr 2026 09:41:50 +0200 Subject: [PATCH 1/5] Update contents-of-a-github-docs-article.md (#59349) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --- .../contents-of-a-github-docs-article.md | 17 ++++++----------- 1 file changed, 6 insertions(+), 11 deletions(-) diff --git a/content/contributing/style-guide-and-content-model/contents-of-a-github-docs-article.md b/content/contributing/style-guide-and-content-model/contents-of-a-github-docs-article.md index bb76fc80cf0d..569e1bd4e752 100644 --- a/content/contributing/style-guide-and-content-model/contents-of-a-github-docs-article.md +++ b/content/contributing/style-guide-and-content-model/contents-of-a-github-docs-article.md @@ -53,20 +53,15 @@ Titles can be challenging. Use these general guidelines to help create clear, he ## Intro -The top of every page has an intro that provides context and sets expectations, allowing readers to quickly decide if the page is relevant to them. Intros also are displayed in search results to provide contextual information to help readers choose a result. +Every page and article has an intro which describes what they’re about. The text we use for intros is also displayed within search results, making them important for SEO. ### How to write an intro -* Article intros are one to two sentences long. -* Map topic and category intros are one sentence long. -* API reference intros are one sentence long. - * The intro for an API page should define the feature so that someone knows whether the feature meets their needs without reading the entire article. -* Intros contain a high-level summary of the page’s content, developing the idea presented in a title with more detail. - * Use approachable synonyms of words in the page’s title to help readers understand the article’s purpose differently. Avoid repeating words from the title when possible. -* Intros are relatively evergreen and high-level, so they can scale with future changes to the content on the page without needing to be frequently updated. -* For searchability, include keywords on the page's subject in the intro. -* When a term in the intro has an acronym we’ll use elsewhere in the article, indicate the acronym. -* Intros generally don't contain permissions for any tasks contained within the article. +* Intros should be concise, ideally one sentence long. +* Intros help people know if they’re in the right place for what they need. Let the user know what value is being provided to them, using words they would use and search for. +* Intros are also an invitation to continue reading. A good intro reassures the reader that their time is being well spent. +* If an important term has a related acronym that is generally used in its place, include the acronym in the intro. (Example: Search engine optimization and SEO.) +* Finally, review your intro to ensure it is search engine friendly by including relevant keywords and phrases. ## Permissions statements From 33beb26e246941e078525f953d8c00519fd9aebd Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Wed, 8 Apr 2026 03:53:23 -0700 Subject: [PATCH 2/5] Update docs changelog (for PR #60438) (#60563) Co-authored-by: github-actions[bot] Co-authored-by: hubwriter Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> --- CHANGELOG.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index a78b1e39373b..dbeddafa8930 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -16,6 +16,15 @@ We've expanded the documentation for custom agents in Copilot CLI, adding inform
+**31 March 2026** + +The documentation for Copilot CLI now includes a new reference article about the `~/.copilot` directory, and information on how a Copilot skill can run a script: + +* [GitHub Copilot CLI configuration directory](https://docs.github.com/en/copilot/reference/copilot-cli-reference/cli-config-dir-reference) +* [Creating agent skills for GitHub Copilot CLI](https://docs.github.com/en/copilot/how-tos/copilot-cli/customize-copilot/create-skills#enabling-a-skill-to-run-a-script) + +
+ **27 March 2026** We've introduced a new discovery landing page design for all the top-level doc sets on docs.github.com. The landing pages highlight recommended articles and give users the ability to filter articles by category with a drop down menu. Every article across the site now includes category metadata, making it easier to browse doc sets without relying solely on search. This replaces the previous product-landing layout across 35 doc sets. From 8d835e18091bc9863010a393a3cb53320ebbd5ec Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Wed, 8 Apr 2026 04:03:39 -0700 Subject: [PATCH 3/5] Update OpenAPI Description (#60664) Co-authored-by: hubwriter --- src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/actions.json | 99 ++++++++ src/rest/data/fpt-2022-11-28/activity.json | 45 ++++ src/rest/data/fpt-2022-11-28/checks.json | 45 ++++ .../data/fpt-2022-11-28/code-security.json | 222 +++++++++++++++--- src/rest/data/fpt-2022-11-28/codespaces.json | 162 +++++++++++++ .../data/fpt-2022-11-28/collaborators.json | 36 +++ src/rest/data/fpt-2022-11-28/commits.json | 9 + src/rest/data/fpt-2022-11-28/copilot.json | 9 + src/rest/data/fpt-2022-11-28/dependabot.json | 9 + src/rest/data/fpt-2022-11-28/migrations.json | 18 ++ src/rest/data/fpt-2022-11-28/orgs.json | 27 +++ src/rest/data/fpt-2022-11-28/packages.json | 81 +++++++ src/rest/data/fpt-2022-11-28/repos.json | 109 +++++++++ src/rest/data/fpt-2022-11-28/search.json | 18 ++ .../data/fpt-2022-11-28/secret-scanning.json | 18 ++ .../fpt-2022-11-28/security-advisories.json | 9 + src/rest/data/fpt-2022-11-28/teams.json | 18 ++ src/rest/data/fpt-2026-03-10/actions.json | 99 ++++++++ src/rest/data/fpt-2026-03-10/activity.json | 45 ++++ src/rest/data/fpt-2026-03-10/checks.json | 45 ++++ .../data/fpt-2026-03-10/code-security.json | 222 +++++++++++++++--- src/rest/data/fpt-2026-03-10/codespaces.json | 162 +++++++++++++ .../data/fpt-2026-03-10/collaborators.json | 36 +++ src/rest/data/fpt-2026-03-10/commits.json | 9 + src/rest/data/fpt-2026-03-10/copilot.json | 9 + src/rest/data/fpt-2026-03-10/dependabot.json | 9 + src/rest/data/fpt-2026-03-10/orgs.json | 27 +++ src/rest/data/fpt-2026-03-10/packages.json | 81 +++++++ src/rest/data/fpt-2026-03-10/repos.json | 109 +++++++++ src/rest/data/fpt-2026-03-10/search.json | 18 ++ .../data/fpt-2026-03-10/secret-scanning.json | 18 ++ .../fpt-2026-03-10/security-advisories.json | 9 + src/rest/data/fpt-2026-03-10/teams.json | 18 ++ src/rest/data/ghec-2022-11-28/actions.json | 99 ++++++++ src/rest/data/ghec-2022-11-28/activity.json | 45 ++++ src/rest/data/ghec-2022-11-28/checks.json | 45 ++++ .../data/ghec-2022-11-28/code-security.json | 222 +++++++++++++++--- src/rest/data/ghec-2022-11-28/codespaces.json | 162 +++++++++++++ .../data/ghec-2022-11-28/collaborators.json | 36 +++ src/rest/data/ghec-2022-11-28/commits.json | 9 + src/rest/data/ghec-2022-11-28/copilot.json | 9 + src/rest/data/ghec-2022-11-28/dependabot.json | 9 + src/rest/data/ghec-2022-11-28/migrations.json | 18 ++ src/rest/data/ghec-2022-11-28/orgs.json | 27 +++ src/rest/data/ghec-2022-11-28/packages.json | 81 +++++++ src/rest/data/ghec-2022-11-28/repos.json | 109 +++++++++ src/rest/data/ghec-2022-11-28/search.json | 18 ++ .../data/ghec-2022-11-28/secret-scanning.json | 29 ++- .../ghec-2022-11-28/security-advisories.json | 9 + src/rest/data/ghec-2022-11-28/teams.json | 18 ++ src/rest/data/ghec-2026-03-10/actions.json | 99 ++++++++ src/rest/data/ghec-2026-03-10/activity.json | 45 ++++ src/rest/data/ghec-2026-03-10/checks.json | 45 ++++ .../data/ghec-2026-03-10/code-security.json | 222 +++++++++++++++--- src/rest/data/ghec-2026-03-10/codespaces.json | 162 +++++++++++++ .../data/ghec-2026-03-10/collaborators.json | 36 +++ src/rest/data/ghec-2026-03-10/commits.json | 9 + src/rest/data/ghec-2026-03-10/copilot.json | 9 + src/rest/data/ghec-2026-03-10/dependabot.json | 9 + src/rest/data/ghec-2026-03-10/orgs.json | 27 +++ src/rest/data/ghec-2026-03-10/packages.json | 81 +++++++ src/rest/data/ghec-2026-03-10/repos.json | 109 +++++++++ src/rest/data/ghec-2026-03-10/search.json | 18 ++ .../data/ghec-2026-03-10/secret-scanning.json | 29 ++- .../ghec-2026-03-10/security-advisories.json | 9 + src/rest/data/ghec-2026-03-10/teams.json | 18 ++ .../ghes-3.15-2022-11-28/code-security.json | 23 +- .../ghes-3.16-2022-11-28/code-security.json | 27 +-- .../ghes-3.17-2022-11-28/code-security.json | 27 +-- .../ghes-3.18-2022-11-28/code-security.json | 27 +-- .../ghes-3.19-2022-11-28/code-security.json | 27 +-- .../ghes-3.20-2022-11-28/code-security.json | 27 +-- src/rest/lib/config.json | 2 +- src/webhooks/data/fpt/schema.json | 50 ++++ src/webhooks/data/ghec/schema.json | 50 ++++ src/webhooks/lib/config.json | 2 +- 77 files changed, 3723 insertions(+), 263 deletions(-) diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 058f9ab39c4b..1d8fd340bc6c 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "758e5523c8b6082bdd547cef042b884229a0355c" + "sha": "2d6cbdb1321b97517f0af20e94eff59e89a36c25" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/actions.json b/src/rest/data/fpt-2022-11-28/actions.json index ba8be99fbe2d..df26d4b18f67 100644 --- a/src/rest/data/fpt-2022-11-28/actions.json +++ b/src/rest/data/fpt-2022-11-28/actions.json @@ -11993,6 +11993,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15651,6 +15660,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -23984,6 +24002,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -28577,6 +28604,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -29277,6 +29313,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -30895,6 +30940,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -31595,6 +31649,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -33671,6 +33734,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -34371,6 +34443,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -38176,6 +38257,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -38876,6 +38966,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/activity.json b/src/rest/data/fpt-2022-11-28/activity.json index dbaba4da3a9b..f6afa8ca52d1 100644 --- a/src/rest/data/fpt-2022-11-28/activity.json +++ b/src/rest/data/fpt-2022-11-28/activity.json @@ -90859,6 +90859,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -91855,6 +91864,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -93246,6 +93264,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -99039,6 +99066,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -99950,6 +99986,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/checks.json b/src/rest/data/fpt-2022-11-28/checks.json index ebbb51ea7aa3..caf4b7ae64b6 100644 --- a/src/rest/data/fpt-2022-11-28/checks.json +++ b/src/rest/data/fpt-2022-11-28/checks.json @@ -8520,6 +8520,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10126,6 +10135,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -11318,6 +11336,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12858,6 +12885,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -14533,6 +14569,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/code-security.json b/src/rest/data/fpt-2022-11-28/code-security.json index e187d66a2ea5..0ea9d7e35590 100644 --- a/src/rest/data/fpt-2022-11-28/code-security.json +++ b/src/rest/data/fpt-2022-11-28/code-security.json @@ -333,6 +333,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -987,6 +996,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1166,16 +1184,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -1446,6 +1455,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1839,6 +1857,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2488,6 +2515,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2863,8 +2899,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -3101,6 +3146,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -3882,16 +3936,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -4143,6 +4188,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -4509,6 +4563,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -4635,8 +4699,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -4858,6 +4931,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5029,16 +5111,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -5309,6 +5382,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5584,8 +5666,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -5807,6 +5898,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6172,6 +6272,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -6514,6 +6624,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6889,8 +7008,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -7127,6 +7255,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -8126,6 +8263,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" diff --git a/src/rest/data/fpt-2022-11-28/codespaces.json b/src/rest/data/fpt-2022-11-28/codespaces.json index 03f0fced6ad0..bb640660fb8e 100644 --- a/src/rest/data/fpt-2022-11-28/codespaces.json +++ b/src/rest/data/fpt-2022-11-28/codespaces.json @@ -1250,6 +1250,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2780,6 +2789,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4180,6 +4198,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6256,6 +6283,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7657,6 +7693,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9424,6 +9469,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10963,6 +11017,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12360,6 +12423,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -13814,6 +13886,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15288,6 +15369,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19764,6 +19854,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -21236,6 +21335,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -22702,6 +22810,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24797,6 +24914,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -26529,6 +26655,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -28587,6 +28722,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -30164,6 +30308,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32497,6 +32650,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/collaborators.json b/src/rest/data/fpt-2022-11-28/collaborators.json index 57bde2f2264e..d4dc3665f126 100644 --- a/src/rest/data/fpt-2022-11-28/collaborators.json +++ b/src/rest/data/fpt-2022-11-28/collaborators.json @@ -1192,6 +1192,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2742,6 +2751,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -3943,6 +3961,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5185,6 +5212,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/commits.json b/src/rest/data/fpt-2022-11-28/commits.json index 19786827087d..2700734c765a 100644 --- a/src/rest/data/fpt-2022-11-28/commits.json +++ b/src/rest/data/fpt-2022-11-28/commits.json @@ -10131,6 +10131,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/copilot.json b/src/rest/data/fpt-2022-11-28/copilot.json index aa0eb0490a4a..485597d66da5 100644 --- a/src/rest/data/fpt-2022-11-28/copilot.json +++ b/src/rest/data/fpt-2022-11-28/copilot.json @@ -1202,6 +1202,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/dependabot.json b/src/rest/data/fpt-2022-11-28/dependabot.json index bd2b8055ba05..7664388036e1 100644 --- a/src/rest/data/fpt-2022-11-28/dependabot.json +++ b/src/rest/data/fpt-2022-11-28/dependabot.json @@ -9487,6 +9487,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/migrations.json b/src/rest/data/fpt-2022-11-28/migrations.json index efc02a2edcaf..21a00f738b32 100644 --- a/src/rest/data/fpt-2022-11-28/migrations.json +++ b/src/rest/data/fpt-2022-11-28/migrations.json @@ -4434,6 +4434,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10765,6 +10774,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/orgs.json b/src/rest/data/fpt-2022-11-28/orgs.json index 7f76ae172915..6a0092ad65a6 100644 --- a/src/rest/data/fpt-2022-11-28/orgs.json +++ b/src/rest/data/fpt-2022-11-28/orgs.json @@ -3223,6 +3223,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -18761,6 +18770,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -20313,6 +20331,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/packages.json b/src/rest/data/fpt-2022-11-28/packages.json index 4b81b8a3ea41..7d5dfb2b734c 100644 --- a/src/rest/data/fpt-2022-11-28/packages.json +++ b/src/rest/data/fpt-2022-11-28/packages.json @@ -900,6 +900,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1963,6 +1972,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2974,6 +2992,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4819,6 +4846,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5861,6 +5897,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6921,6 +6966,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8727,6 +8781,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9790,6 +9853,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10868,6 +10940,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/repos.json b/src/rest/data/fpt-2022-11-28/repos.json index d669253c1d79..186c5bb89bff 100644 --- a/src/rest/data/fpt-2022-11-28/repos.json +++ b/src/rest/data/fpt-2022-11-28/repos.json @@ -860,6 +860,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4533,6 +4542,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8096,6 +8114,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8406,6 +8433,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -11948,6 +11985,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15328,6 +15374,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19068,6 +19123,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19922,6 +19986,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24547,6 +24620,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -25541,6 +25623,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -31443,6 +31534,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -34980,6 +35080,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/search.json b/src/rest/data/fpt-2022-11-28/search.json index 9db17981acbc..cc203ac2e2f0 100644 --- a/src/rest/data/fpt-2022-11-28/search.json +++ b/src/rest/data/fpt-2022-11-28/search.json @@ -835,6 +835,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2166,6 +2175,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/secret-scanning.json b/src/rest/data/fpt-2022-11-28/secret-scanning.json index 7f2a048ef821..35929386ce77 100644 --- a/src/rest/data/fpt-2022-11-28/secret-scanning.json +++ b/src/rest/data/fpt-2022-11-28/secret-scanning.json @@ -39,6 +39,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -1892,6 +1901,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", diff --git a/src/rest/data/fpt-2022-11-28/security-advisories.json b/src/rest/data/fpt-2022-11-28/security-advisories.json index 5e5a2065ce9a..1e34f0e8bf3f 100644 --- a/src/rest/data/fpt-2022-11-28/security-advisories.json +++ b/src/rest/data/fpt-2022-11-28/security-advisories.json @@ -18894,6 +18894,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2022-11-28/teams.json b/src/rest/data/fpt-2022-11-28/teams.json index 4147ec593964..3ee0727a9632 100644 --- a/src/rest/data/fpt-2022-11-28/teams.json +++ b/src/rest/data/fpt-2022-11-28/teams.json @@ -3566,6 +3566,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7563,6 +7572,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/actions.json b/src/rest/data/fpt-2026-03-10/actions.json index 9db2ebca6a3b..4e938b7c6118 100644 --- a/src/rest/data/fpt-2026-03-10/actions.json +++ b/src/rest/data/fpt-2026-03-10/actions.json @@ -11958,6 +11958,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15613,6 +15622,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -23879,6 +23897,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -28469,6 +28496,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -29166,6 +29202,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -30781,6 +30826,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -31478,6 +31532,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -33551,6 +33614,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -34248,6 +34320,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -38050,6 +38131,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -38747,6 +38837,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/activity.json b/src/rest/data/fpt-2026-03-10/activity.json index 253e92d6ba80..f6da111b7b62 100644 --- a/src/rest/data/fpt-2026-03-10/activity.json +++ b/src/rest/data/fpt-2026-03-10/activity.json @@ -88516,6 +88516,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -89509,6 +89518,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -90897,6 +90915,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -96623,6 +96650,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -97531,6 +97567,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/checks.json b/src/rest/data/fpt-2026-03-10/checks.json index 69136584c507..38b12f1955f9 100644 --- a/src/rest/data/fpt-2026-03-10/checks.json +++ b/src/rest/data/fpt-2026-03-10/checks.json @@ -8517,6 +8517,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10120,6 +10129,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -11309,6 +11327,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12846,6 +12873,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -14518,6 +14554,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/code-security.json b/src/rest/data/fpt-2026-03-10/code-security.json index e187d66a2ea5..0ea9d7e35590 100644 --- a/src/rest/data/fpt-2026-03-10/code-security.json +++ b/src/rest/data/fpt-2026-03-10/code-security.json @@ -333,6 +333,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -987,6 +996,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1166,16 +1184,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -1446,6 +1455,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1839,6 +1857,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2488,6 +2515,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2863,8 +2899,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -3101,6 +3146,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -3882,16 +3936,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -4143,6 +4188,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -4509,6 +4563,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -4635,8 +4699,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -4858,6 +4931,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5029,16 +5111,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -5309,6 +5382,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5584,8 +5666,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -5807,6 +5898,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6172,6 +6272,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -6514,6 +6624,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6889,8 +7008,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -7127,6 +7255,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -8126,6 +8263,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" diff --git a/src/rest/data/fpt-2026-03-10/codespaces.json b/src/rest/data/fpt-2026-03-10/codespaces.json index e972f58d67d0..0067d2345f77 100644 --- a/src/rest/data/fpt-2026-03-10/codespaces.json +++ b/src/rest/data/fpt-2026-03-10/codespaces.json @@ -1247,6 +1247,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2774,6 +2783,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4171,6 +4189,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6244,6 +6271,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7642,6 +7678,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9406,6 +9451,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10942,6 +10996,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12336,6 +12399,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -13787,6 +13859,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15258,6 +15339,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19680,6 +19770,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -21149,6 +21248,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -22612,6 +22720,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24704,6 +24821,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -26433,6 +26559,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -28488,6 +28623,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -30062,6 +30206,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32392,6 +32545,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/collaborators.json b/src/rest/data/fpt-2026-03-10/collaborators.json index 11ae86bfbe1f..5b82ead71154 100644 --- a/src/rest/data/fpt-2026-03-10/collaborators.json +++ b/src/rest/data/fpt-2026-03-10/collaborators.json @@ -1189,6 +1189,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2736,6 +2745,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -3934,6 +3952,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5173,6 +5200,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/commits.json b/src/rest/data/fpt-2026-03-10/commits.json index 997df1e23b9e..390d232b86c3 100644 --- a/src/rest/data/fpt-2026-03-10/commits.json +++ b/src/rest/data/fpt-2026-03-10/commits.json @@ -9970,6 +9970,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/copilot.json b/src/rest/data/fpt-2026-03-10/copilot.json index 851ebb85abba..3e7db53b16c8 100644 --- a/src/rest/data/fpt-2026-03-10/copilot.json +++ b/src/rest/data/fpt-2026-03-10/copilot.json @@ -1199,6 +1199,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/dependabot.json b/src/rest/data/fpt-2026-03-10/dependabot.json index 89b54377c052..17e23bc2700c 100644 --- a/src/rest/data/fpt-2026-03-10/dependabot.json +++ b/src/rest/data/fpt-2026-03-10/dependabot.json @@ -9344,6 +9344,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/orgs.json b/src/rest/data/fpt-2026-03-10/orgs.json index 9a6146ea82b9..8512da73a561 100644 --- a/src/rest/data/fpt-2026-03-10/orgs.json +++ b/src/rest/data/fpt-2026-03-10/orgs.json @@ -3209,6 +3209,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -18711,6 +18720,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -20260,6 +20278,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/packages.json b/src/rest/data/fpt-2026-03-10/packages.json index 7891fa2efa19..2e9515d98336 100644 --- a/src/rest/data/fpt-2026-03-10/packages.json +++ b/src/rest/data/fpt-2026-03-10/packages.json @@ -897,6 +897,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1957,6 +1966,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2965,6 +2983,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4807,6 +4834,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5846,6 +5882,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6903,6 +6948,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8706,6 +8760,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9766,6 +9829,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10841,6 +10913,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/repos.json b/src/rest/data/fpt-2026-03-10/repos.json index cc391d726f20..6fb119f913ff 100644 --- a/src/rest/data/fpt-2026-03-10/repos.json +++ b/src/rest/data/fpt-2026-03-10/repos.json @@ -857,6 +857,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4476,6 +4485,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7989,6 +8007,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8299,6 +8326,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -11787,6 +11824,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15164,6 +15210,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -18850,6 +18905,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19701,6 +19765,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24256,6 +24329,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -25251,6 +25333,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -31131,6 +31222,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -34614,6 +34714,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/search.json b/src/rest/data/fpt-2026-03-10/search.json index 4b36f6c8d974..d82ded060198 100644 --- a/src/rest/data/fpt-2026-03-10/search.json +++ b/src/rest/data/fpt-2026-03-10/search.json @@ -832,6 +832,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2160,6 +2169,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/secret-scanning.json b/src/rest/data/fpt-2026-03-10/secret-scanning.json index 7f2a048ef821..35929386ce77 100644 --- a/src/rest/data/fpt-2026-03-10/secret-scanning.json +++ b/src/rest/data/fpt-2026-03-10/secret-scanning.json @@ -39,6 +39,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -1892,6 +1901,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", diff --git a/src/rest/data/fpt-2026-03-10/security-advisories.json b/src/rest/data/fpt-2026-03-10/security-advisories.json index ccfc5c9b4249..19a2c7b30361 100644 --- a/src/rest/data/fpt-2026-03-10/security-advisories.json +++ b/src/rest/data/fpt-2026-03-10/security-advisories.json @@ -18570,6 +18570,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/fpt-2026-03-10/teams.json b/src/rest/data/fpt-2026-03-10/teams.json index 26a42b0f2623..e2ff4d5eb83c 100644 --- a/src/rest/data/fpt-2026-03-10/teams.json +++ b/src/rest/data/fpt-2026-03-10/teams.json @@ -3553,6 +3553,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7541,6 +7550,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/actions.json b/src/rest/data/ghec-2022-11-28/actions.json index 88d36909337b..1dccba3ff451 100644 --- a/src/rest/data/ghec-2022-11-28/actions.json +++ b/src/rest/data/ghec-2022-11-28/actions.json @@ -16067,6 +16067,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -21309,6 +21318,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32668,6 +32686,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -37273,6 +37300,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -37985,6 +38021,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -39615,6 +39660,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -40327,6 +40381,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -42415,6 +42478,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -43127,6 +43199,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -46944,6 +47025,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -47656,6 +47746,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/activity.json b/src/rest/data/ghec-2022-11-28/activity.json index 5524472ebddb..7061b3caa908 100644 --- a/src/rest/data/ghec-2022-11-28/activity.json +++ b/src/rest/data/ghec-2022-11-28/activity.json @@ -90871,6 +90871,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -91879,6 +91888,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -93282,6 +93300,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -99087,6 +99114,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -100010,6 +100046,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/checks.json b/src/rest/data/ghec-2022-11-28/checks.json index 491d96dcabac..85bbbe30431e 100644 --- a/src/rest/data/ghec-2022-11-28/checks.json +++ b/src/rest/data/ghec-2022-11-28/checks.json @@ -8532,6 +8532,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10150,6 +10159,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -11354,6 +11372,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12906,6 +12933,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -14593,6 +14629,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/code-security.json b/src/rest/data/ghec-2022-11-28/code-security.json index b109a0f60c9f..01e00fe33a9b 100644 --- a/src/rest/data/ghec-2022-11-28/code-security.json +++ b/src/rest/data/ghec-2022-11-28/code-security.json @@ -333,6 +333,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -987,6 +996,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1166,16 +1184,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -1446,6 +1455,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1839,6 +1857,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2488,6 +2515,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2863,8 +2899,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -3101,6 +3146,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -3882,16 +3936,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -4143,6 +4188,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -4509,6 +4563,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -4635,8 +4699,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -4858,6 +4931,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5029,16 +5111,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -5309,6 +5382,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5584,8 +5666,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -5807,6 +5898,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6172,6 +6272,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -6514,6 +6624,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6889,8 +7008,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -7127,6 +7255,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -8126,6 +8263,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" diff --git a/src/rest/data/ghec-2022-11-28/codespaces.json b/src/rest/data/ghec-2022-11-28/codespaces.json index b540bb6e73bb..26f420520c78 100644 --- a/src/rest/data/ghec-2022-11-28/codespaces.json +++ b/src/rest/data/ghec-2022-11-28/codespaces.json @@ -1262,6 +1262,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2804,6 +2813,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4216,6 +4234,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6304,6 +6331,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7717,6 +7753,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9496,6 +9541,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -11047,6 +11101,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12456,6 +12519,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -13922,6 +13994,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15408,6 +15489,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19896,6 +19986,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -21380,6 +21479,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -22858,6 +22966,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24965,6 +25082,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -26709,6 +26835,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -28779,6 +28914,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -30368,6 +30512,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32713,6 +32866,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/collaborators.json b/src/rest/data/ghec-2022-11-28/collaborators.json index 7b2d3feecc9c..f25c08bc8f66 100644 --- a/src/rest/data/ghec-2022-11-28/collaborators.json +++ b/src/rest/data/ghec-2022-11-28/collaborators.json @@ -1204,6 +1204,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2766,6 +2775,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -3979,6 +3997,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5233,6 +5260,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/commits.json b/src/rest/data/ghec-2022-11-28/commits.json index 8b44bf0dd1b8..fbed91baf344 100644 --- a/src/rest/data/ghec-2022-11-28/commits.json +++ b/src/rest/data/ghec-2022-11-28/commits.json @@ -10143,6 +10143,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/copilot.json b/src/rest/data/ghec-2022-11-28/copilot.json index d3015d032186..9578c6bbabe1 100644 --- a/src/rest/data/ghec-2022-11-28/copilot.json +++ b/src/rest/data/ghec-2022-11-28/copilot.json @@ -1214,6 +1214,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/dependabot.json b/src/rest/data/ghec-2022-11-28/dependabot.json index 740273d5643a..a294bd511bd2 100644 --- a/src/rest/data/ghec-2022-11-28/dependabot.json +++ b/src/rest/data/ghec-2022-11-28/dependabot.json @@ -11205,6 +11205,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/migrations.json b/src/rest/data/ghec-2022-11-28/migrations.json index 26e89d946748..21326647b5db 100644 --- a/src/rest/data/ghec-2022-11-28/migrations.json +++ b/src/rest/data/ghec-2022-11-28/migrations.json @@ -4446,6 +4446,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10789,6 +10798,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/orgs.json b/src/rest/data/ghec-2022-11-28/orgs.json index d8393f64ceda..09cf3d3bf18e 100644 --- a/src/rest/data/ghec-2022-11-28/orgs.json +++ b/src/rest/data/ghec-2022-11-28/orgs.json @@ -3845,6 +3845,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -23454,6 +23463,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -25018,6 +25036,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/packages.json b/src/rest/data/ghec-2022-11-28/packages.json index e3ade18d189d..adb07cbd8af5 100644 --- a/src/rest/data/ghec-2022-11-28/packages.json +++ b/src/rest/data/ghec-2022-11-28/packages.json @@ -912,6 +912,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1987,6 +1996,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -3010,6 +3028,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4867,6 +4894,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5921,6 +5957,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6993,6 +7038,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8811,6 +8865,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9886,6 +9949,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10976,6 +11048,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/repos.json b/src/rest/data/ghec-2022-11-28/repos.json index 404f776fa5a6..3f2bdaa1ca57 100644 --- a/src/rest/data/ghec-2022-11-28/repos.json +++ b/src/rest/data/ghec-2022-11-28/repos.json @@ -871,6 +871,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4557,6 +4566,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8137,6 +8155,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8460,6 +8487,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -12014,6 +12051,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15406,6 +15452,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19158,6 +19213,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -20024,6 +20088,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24661,6 +24734,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -25667,6 +25749,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32342,6 +32433,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -35891,6 +35991,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/search.json b/src/rest/data/ghec-2022-11-28/search.json index 67394ce5e8c8..588c5a5a8beb 100644 --- a/src/rest/data/ghec-2022-11-28/search.json +++ b/src/rest/data/ghec-2022-11-28/search.json @@ -847,6 +847,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2190,6 +2199,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/secret-scanning.json b/src/rest/data/ghec-2022-11-28/secret-scanning.json index a7774b969b0d..5a8671bb0667 100644 --- a/src/rest/data/ghec-2022-11-28/secret-scanning.json +++ b/src/rest/data/ghec-2022-11-28/secret-scanning.json @@ -39,6 +39,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -1870,6 +1879,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -3723,6 +3741,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -12477,4 +12504,4 @@ } } ] -} \ No newline at end of file +} diff --git a/src/rest/data/ghec-2022-11-28/security-advisories.json b/src/rest/data/ghec-2022-11-28/security-advisories.json index 67d8b1140337..229112dbeb96 100644 --- a/src/rest/data/ghec-2022-11-28/security-advisories.json +++ b/src/rest/data/ghec-2022-11-28/security-advisories.json @@ -18906,6 +18906,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2022-11-28/teams.json b/src/rest/data/ghec-2022-11-28/teams.json index bba212ec8a0f..2b65b5174c3c 100644 --- a/src/rest/data/ghec-2022-11-28/teams.json +++ b/src/rest/data/ghec-2022-11-28/teams.json @@ -3578,6 +3578,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7587,6 +7596,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/actions.json b/src/rest/data/ghec-2026-03-10/actions.json index ef506710c885..17b8c87d71bb 100644 --- a/src/rest/data/ghec-2026-03-10/actions.json +++ b/src/rest/data/ghec-2026-03-10/actions.json @@ -16032,6 +16032,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -21271,6 +21280,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32531,6 +32549,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -37133,6 +37160,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -37842,6 +37878,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -39469,6 +39514,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -40178,6 +40232,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -42263,6 +42326,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -42972,6 +43044,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -46786,6 +46867,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -47495,6 +47585,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/activity.json b/src/rest/data/ghec-2026-03-10/activity.json index 33db0b9599f8..a7169288d841 100644 --- a/src/rest/data/ghec-2026-03-10/activity.json +++ b/src/rest/data/ghec-2026-03-10/activity.json @@ -88528,6 +88528,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -89533,6 +89542,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -90933,6 +90951,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -96671,6 +96698,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -97591,6 +97627,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/checks.json b/src/rest/data/ghec-2026-03-10/checks.json index 39bea3b8556b..c87d544213cd 100644 --- a/src/rest/data/ghec-2026-03-10/checks.json +++ b/src/rest/data/ghec-2026-03-10/checks.json @@ -8529,6 +8529,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10144,6 +10153,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -11345,6 +11363,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12894,6 +12921,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -14578,6 +14614,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/code-security.json b/src/rest/data/ghec-2026-03-10/code-security.json index b109a0f60c9f..01e00fe33a9b 100644 --- a/src/rest/data/ghec-2026-03-10/code-security.json +++ b/src/rest/data/ghec-2026-03-10/code-security.json @@ -333,6 +333,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -987,6 +996,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1166,16 +1184,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -1446,6 +1455,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -1839,6 +1857,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2488,6 +2515,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -2863,8 +2899,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -3101,6 +3146,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -3882,16 +3936,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -4143,6 +4188,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -4509,6 +4563,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -4635,8 +4699,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -4858,6 +4931,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5029,16 +5111,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -5309,6 +5382,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -5584,8 +5666,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -5807,6 +5898,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6172,6 +6272,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -6514,6 +6624,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -6889,8 +7008,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -7127,6 +7255,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -8126,6 +8263,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" diff --git a/src/rest/data/ghec-2026-03-10/codespaces.json b/src/rest/data/ghec-2026-03-10/codespaces.json index 8531c2bcd901..45570f73e88e 100644 --- a/src/rest/data/ghec-2026-03-10/codespaces.json +++ b/src/rest/data/ghec-2026-03-10/codespaces.json @@ -1259,6 +1259,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2798,6 +2807,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4207,6 +4225,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6292,6 +6319,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7702,6 +7738,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9478,6 +9523,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -11026,6 +11080,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -12432,6 +12495,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -13895,6 +13967,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15378,6 +15459,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19812,6 +19902,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -21293,6 +21392,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -22768,6 +22876,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24872,6 +24989,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -26613,6 +26739,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -28680,6 +28815,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -30266,6 +30410,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32608,6 +32761,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/collaborators.json b/src/rest/data/ghec-2026-03-10/collaborators.json index ed1ce7b4655e..efd12b892f1b 100644 --- a/src/rest/data/ghec-2026-03-10/collaborators.json +++ b/src/rest/data/ghec-2026-03-10/collaborators.json @@ -1201,6 +1201,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2760,6 +2769,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -3970,6 +3988,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5221,6 +5248,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/commits.json b/src/rest/data/ghec-2026-03-10/commits.json index 44d71513c145..903376320491 100644 --- a/src/rest/data/ghec-2026-03-10/commits.json +++ b/src/rest/data/ghec-2026-03-10/commits.json @@ -9982,6 +9982,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/copilot.json b/src/rest/data/ghec-2026-03-10/copilot.json index ae6d5f289c20..6a636453c724 100644 --- a/src/rest/data/ghec-2026-03-10/copilot.json +++ b/src/rest/data/ghec-2026-03-10/copilot.json @@ -1211,6 +1211,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/dependabot.json b/src/rest/data/ghec-2026-03-10/dependabot.json index d27256a5eadc..e13e7812eca6 100644 --- a/src/rest/data/ghec-2026-03-10/dependabot.json +++ b/src/rest/data/ghec-2026-03-10/dependabot.json @@ -11062,6 +11062,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/orgs.json b/src/rest/data/ghec-2026-03-10/orgs.json index 47eb0c55d305..1503091b849f 100644 --- a/src/rest/data/ghec-2026-03-10/orgs.json +++ b/src/rest/data/ghec-2026-03-10/orgs.json @@ -3831,6 +3831,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -23185,6 +23194,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24746,6 +24764,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/packages.json b/src/rest/data/ghec-2026-03-10/packages.json index 09d5375868ca..c1579c203573 100644 --- a/src/rest/data/ghec-2026-03-10/packages.json +++ b/src/rest/data/ghec-2026-03-10/packages.json @@ -909,6 +909,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1981,6 +1990,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -3001,6 +3019,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4855,6 +4882,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -5906,6 +5942,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -6975,6 +7020,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8790,6 +8844,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -9862,6 +9925,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -10949,6 +11021,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/repos.json b/src/rest/data/ghec-2026-03-10/repos.json index 1fb68b7692a4..2dc02f4162bc 100644 --- a/src/rest/data/ghec-2026-03-10/repos.json +++ b/src/rest/data/ghec-2026-03-10/repos.json @@ -868,6 +868,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -4500,6 +4509,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8030,6 +8048,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -8353,6 +8380,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -11853,6 +11890,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -15242,6 +15288,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -18940,6 +18995,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -19803,6 +19867,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -24370,6 +24443,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -25377,6 +25459,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -32030,6 +32121,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -35525,6 +35625,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/search.json b/src/rest/data/ghec-2026-03-10/search.json index f106a4243cc1..86af5ff22beb 100644 --- a/src/rest/data/ghec-2026-03-10/search.json +++ b/src/rest/data/ghec-2026-03-10/search.json @@ -844,6 +844,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -2184,6 +2193,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/secret-scanning.json b/src/rest/data/ghec-2026-03-10/secret-scanning.json index a7774b969b0d..5a8671bb0667 100644 --- a/src/rest/data/ghec-2026-03-10/secret-scanning.json +++ b/src/rest/data/ghec-2026-03-10/secret-scanning.json @@ -39,6 +39,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -1870,6 +1879,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -3723,6 +3741,15 @@ "type": "string" } }, + { + "name": "exclude_secret_types", + "in": "query", + "description": "

A comma-separated list of secret types to exclude from the results. All default secret patterns are returned except those matching the specified types. Cannot be combined with the secret_type parameter. See \"Supported secret scanning patterns\" for a complete list of secret types.

", + "required": false, + "schema": { + "type": "string" + } + }, { "name": "resolution", "in": "query", @@ -12477,4 +12504,4 @@ } } ] -} \ No newline at end of file +} diff --git a/src/rest/data/ghec-2026-03-10/security-advisories.json b/src/rest/data/ghec-2026-03-10/security-advisories.json index 03989be0dfb3..d1d5cee21a71 100644 --- a/src/rest/data/ghec-2026-03-10/security-advisories.json +++ b/src/rest/data/ghec-2026-03-10/security-advisories.json @@ -18582,6 +18582,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghec-2026-03-10/teams.json b/src/rest/data/ghec-2026-03-10/teams.json index abc350914013..3994f6139643 100644 --- a/src/rest/data/ghec-2026-03-10/teams.json +++ b/src/rest/data/ghec-2026-03-10/teams.json @@ -3565,6 +3565,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -7565,6 +7574,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/src/rest/data/ghes-3.15-2022-11-28/code-security.json b/src/rest/data/ghes-3.15-2022-11-28/code-security.json index 23e94e5d43b2..cdba40a91e76 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.15-2022-11-28/code-security.json @@ -88,16 +88,7 @@ "code_scanning_default_setup": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/17", @@ -561,8 +552,8 @@ "dependabot_security_updates": "not_set", "code_scanning_default_setup": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -1222,8 +1213,8 @@ "dependabot_security_updates": "not_set", "code_scanning_default_setup": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -2120,8 +2111,8 @@ "dependabot_security_updates": "not_set", "code_scanning_default_setup": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", diff --git a/src/rest/data/ghes-3.16-2022-11-28/code-security.json b/src/rest/data/ghes-3.16-2022-11-28/code-security.json index 017710dd553c..4c8beea43580 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.16-2022-11-28/code-security.json @@ -2117,8 +2117,8 @@ "runner_label": null }, "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -3033,16 +3033,7 @@ "code_scanning_default_setup": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/17", @@ -3561,8 +3552,8 @@ "runner_label": null }, "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -4284,8 +4275,8 @@ "runner_label": null }, "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -5270,8 +5261,8 @@ "runner_label": null }, "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", diff --git a/src/rest/data/ghes-3.17-2022-11-28/code-security.json b/src/rest/data/ghes-3.17-2022-11-28/code-security.json index ae93f0e79d96..e1eb713eefc0 100644 --- a/src/rest/data/ghes-3.17-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.17-2022-11-28/code-security.json @@ -2334,8 +2334,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -3283,16 +3283,7 @@ "code_scanning_default_setup": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/17", @@ -3879,8 +3870,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -4669,8 +4660,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -5756,8 +5747,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", diff --git a/src/rest/data/ghes-3.18-2022-11-28/code-security.json b/src/rest/data/ghes-3.18-2022-11-28/code-security.json index 17a63cc5e515..e9e7fb6cdaa7 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.18-2022-11-28/code-security.json @@ -2334,8 +2334,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -3283,16 +3283,7 @@ "code_scanning_default_setup": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/17", @@ -3879,8 +3870,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -4669,8 +4660,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -5756,8 +5747,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", diff --git a/src/rest/data/ghes-3.19-2022-11-28/code-security.json b/src/rest/data/ghes-3.19-2022-11-28/code-security.json index 58e866eabd30..190db86b8cd2 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.19-2022-11-28/code-security.json @@ -2469,8 +2469,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -3434,16 +3434,7 @@ "code_scanning_default_setup": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/17", @@ -4081,8 +4072,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -4906,8 +4897,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -6051,8 +6042,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", diff --git a/src/rest/data/ghes-3.20-2022-11-28/code-security.json b/src/rest/data/ghes-3.20-2022-11-28/code-security.json index 50f35386c9ee..45823a357ecf 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/code-security.json +++ b/src/rest/data/ghes-3.20-2022-11-28/code-security.json @@ -2469,8 +2469,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -3434,16 +3434,7 @@ "code_scanning_default_setup": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/17", @@ -4081,8 +4072,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -4906,8 +4897,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", @@ -6051,8 +6042,8 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "enforcement": "enforced", diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 9d07f57768f6..14db94b004df 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -55,5 +55,5 @@ ] } }, - "sha": "758e5523c8b6082bdd547cef042b884229a0355c" + "sha": "2d6cbdb1321b97517f0af20e94eff59e89a36c25" } \ No newline at end of file diff --git a/src/webhooks/data/fpt/schema.json b/src/webhooks/data/fpt/schema.json index f77edbd12663..98c358e473a6 100644 --- a/src/webhooks/data/fpt/schema.json +++ b/src/webhooks/data/fpt/schema.json @@ -2833,6 +2833,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -4964,6 +4974,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -7096,6 +7116,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -9239,6 +9269,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -268572,6 +268612,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } diff --git a/src/webhooks/data/ghec/schema.json b/src/webhooks/data/ghec/schema.json index 1857bd8ab4a6..23bc0fe6ca12 100644 --- a/src/webhooks/data/ghec/schema.json +++ b/src/webhooks/data/ghec/schema.json @@ -4967,6 +4967,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -7114,6 +7124,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -9262,6 +9282,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -11421,6 +11451,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } @@ -277488,6 +277528,16 @@ "TEAM", "ROLE" ] + }, + { + "type": "string", + "name": "mode", + "description": "

The bypass mode for the reviewer

", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } ] } diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index e02837768c67..6236e7eb6cda 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "758e5523c8b6082bdd547cef042b884229a0355c" + "sha": "2d6cbdb1321b97517f0af20e94eff59e89a36c25" } \ No newline at end of file From 8fa9f11fe71f779d14c336a588a038bdcf313fbb Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Wed, 8 Apr 2026 04:33:37 -0700 Subject: [PATCH 4/5] docs: update copilot-cli content from source docs (#60663) Co-authored-by: github-actions[bot] Co-authored-by: hubwriter --- .../cli-command-reference.md | 321 +++++++++++++++++- src/content-pipelines/state/copilot-cli.sha | 2 +- 2 files changed, 320 insertions(+), 3 deletions(-) diff --git a/content/copilot/reference/copilot-cli-reference/cli-command-reference.md b/content/copilot/reference/copilot-cli-reference/cli-command-reference.md index a460528081f0..76039d457be4 100644 --- a/content/copilot/reference/copilot-cli-reference/cli-command-reference.md +++ b/content/copilot/reference/copilot-cli-reference/cli-command-reference.md @@ -415,6 +415,323 @@ Prompt hooks auto-submit text as if the user typed it. They are only supported o | `errorOccurred` | An error occurs during execution. | No | | `notification` | Fires asynchronously when the CLI emits a system notification (shell completion, agent completion or idle, permission prompts, elicitation dialogs). Fire-and-forget: never blocks the session. Supports `matcher` regex on `notification_type`. | Optional — can inject `additionalContext` into the session. | +### Hook event input payloads + +Each hook event delivers a JSON payload to the hook handler. Two payload formats are supported, selected by the event name used in the hook configuration: + +* **camelCase format** — Configure the event name in camelCase (for example, `sessionStart`). Fields use camelCase. +* **{% data variables.product.prodname_vscode_shortname %} compatible format** — Configure the event name in PascalCase (for example, `SessionStart`). Fields use snake_case to match the {% data variables.product.prodname_vscode_shortname %} {% data variables.product.prodname_copilot_short %} extension format. + +#### `sessionStart` / `SessionStart` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; // Unix timestamp in milliseconds + cwd: string; + source: "startup" | "resume" | "new"; + initialPrompt?: string; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "SessionStart"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + source: "startup" | "resume" | "new"; + initial_prompt?: string; +} +``` + +#### `sessionEnd` / `SessionEnd` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + reason: "complete" | "error" | "abort" | "timeout" | "user_exit"; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "SessionEnd"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + reason: "complete" | "error" | "abort" | "timeout" | "user_exit"; +} +``` + +#### `userPromptSubmitted` / `UserPromptSubmit` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + prompt: string; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "UserPromptSubmit"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + prompt: string; +} +``` + +#### `preToolUse` / `PreToolUse` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + toolName: string; + toolArgs: unknown; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +When configured with the PascalCase event name `PreToolUse`, the payload uses snake_case field names to match the {% data variables.product.prodname_vscode_shortname %} {% data variables.product.prodname_copilot_short %} extension format: + +```typescript +{ + hook_event_name: "PreToolUse"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + tool_name: string; + tool_input: unknown; // Tool arguments (parsed from JSON string when possible) +} +``` + +#### `postToolUse` / `PostToolUse` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + toolName: string; + toolArgs: unknown; + toolResult: { + resultType: "success"; + textResultForLlm: string; + } +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "PostToolUse"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + tool_name: string; + tool_input: unknown; + tool_result: { + result_type: "success" | "failure" | "denied" | "error"; + text_result_for_llm: string; + } +} +``` + +#### `postToolUseFailure` / `PostToolUseFailure` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + toolName: string; + toolArgs: unknown; + error: string; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "PostToolUseFailure"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + tool_name: string; + tool_input: unknown; + error: string; +} +``` + +#### `agentStop` / `Stop` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + transcriptPath: string; + stopReason: "end_turn"; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "Stop"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + transcript_path: string; + stop_reason: "end_turn"; +} +``` + +#### `subagentStart` + +**Input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + transcriptPath: string; + agentName: string; + agentDisplayName?: string; + agentDescription?: string; +} +``` + +#### `subagentStop` / `SubagentStop` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + transcriptPath: string; + agentName: string; + agentDisplayName?: string; + stopReason: "end_turn"; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "SubagentStop"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + transcript_path: string; + agent_name: string; + agent_display_name?: string; + stop_reason: "end_turn"; +} +``` + +#### `errorOccurred` / `ErrorOccurred` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + error: { + message: string; + name: string; + stack?: string; + }; + errorContext: "model_call" | "tool_execution" | "system" | "user_input"; + recoverable: boolean; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "ErrorOccurred"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + error: { + message: string; + name: string; + stack?: string; + }; + error_context: "model_call" | "tool_execution" | "system" | "user_input"; + recoverable: boolean; +} +``` + +#### `preCompact` / `PreCompact` + +**camelCase input:** + +```typescript +{ + sessionId: string; + timestamp: number; + cwd: string; + transcriptPath: string; + trigger: "manual" | "auto"; + customInstructions: string; +} +``` + +**{% data variables.product.prodname_vscode_shortname %} compatible input:** + +```typescript +{ + hook_event_name: "PreCompact"; + session_id: string; + timestamp: string; // ISO 8601 timestamp + cwd: string; + transcript_path: string; + trigger: "manual" | "auto"; + custom_instructions: string; +} +``` + ### `preToolUse` decision control The `preToolUse` hook can control tool execution by writing a JSON object to stdout. @@ -628,7 +945,7 @@ Custom agents are specialized AI agents defined in Markdown files. The filename | Agent | Default model | Description | |-------|--------------|-------------| | `code-review` | claude-sonnet-4.5 | High signal-to-noise code review. Analyzes diffs for bugs, security issues, and logic errors. | -| `critic` | complementary model | Adversarial feedback on proposals, designs, and implementations. Identifies weak points and suggests improvements. Experimental—requires `--experimental`. | +| `critic` | complementary model | Rubber-duck adversarial feedback on proposals, designs, and implementations. Identifies weak points and suggests improvements. Available for Claude models. Experimental—requires `--experimental`. | | `explore` | claude-haiku-4.5 | Fast codebase exploration. Searches files, reads code, and answers questions. Returns focused answers under 300 words. Safe to run in parallel. | | `general-purpose` | claude-sonnet-4.5 | Full-capability agent for complex multi-step tasks. Runs in a separate context window. | | `research` | claude-sonnet-4.6 | Deep research agent. Generates a report based on information in your codebase, in relevant repositories, and on the web. | @@ -847,7 +1164,7 @@ Feature flags enable functionality that is not yet generally available. Enable f | Flag | Tier | Description | |------|------|-------------| -| `CRITIC_AGENT` | experimental | Critic subagent for adversarial feedback on code and designs (Claude and GPT models) | +| `RUBBER_DUCK_AGENT` | experimental | Rubber-duck subagent for adversarial feedback on code and designs (available for Claude models) | | `BACKGROUND_SESSIONS` | experimental | Multiple concurrent sessions with background management | | `MULTI_TURN_AGENTS` | experimental | Multi-turn subagent message passing via `write_agent` | | `EXTENSIONS` | experimental | Programmatic extensions with custom tools and hooks | diff --git a/src/content-pipelines/state/copilot-cli.sha b/src/content-pipelines/state/copilot-cli.sha index 88fc117fd962..b1910ad011c5 100644 --- a/src/content-pipelines/state/copilot-cli.sha +++ b/src/content-pipelines/state/copilot-cli.sha @@ -1 +1 @@ -e566c239b96a15dd2d7e2e32b67668227e21f417 +ed524424679cf44e46cf94e5beb5b8aa9974b554 From 5ad7894610497e66e42ffab41ed91fc6c33f54d7 Mon Sep 17 00:00:00 2001 From: Isaac Brown <101839405+isaacmbrown@users.noreply.github.com> Date: Wed, 8 Apr 2026 13:29:13 +0100 Subject: [PATCH 5/5] Remove unfinished sentence (#60669) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --- .../prioritizing-dependabot-alerts-using-metrics.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics.md b/content/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics.md index 8fa410483440..a2bc2343edc7 100644 --- a/content/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics.md +++ b/content/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics.md @@ -45,7 +45,7 @@ You can customize the default funnel order on the "Alert prioritization" graph t ### 2. Focus on critical and high severity alerts -Start by identifying alerts with the highest severity by using the the `severity-critical` or `severity-high` filters. These vulnerabilities pose the greatest risk and are often prioritized by compliance standards. You can then +Start by identifying alerts with the highest severity by using the `severity-critical` or `severity-high` filters. These vulnerabilities pose the greatest risk and are often prioritized by compliance standards. ### 3. Assess exploitability and reachability