From 3660c221eb0f677fca15f48336e55702b2693018 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Fri, 15 Nov 2024 08:35:27 -0800 Subject: [PATCH 1/3] Update audit log event data (#53135) --- src/audit-logs/data/fpt/organization.json | 4 +- src/audit-logs/data/fpt/user.json | 5 +++ src/audit-logs/data/ghec/enterprise.json | 44 ++++++++++++++----- src/audit-logs/data/ghec/organization.json | 4 +- src/audit-logs/data/ghec/user.json | 5 +++ .../data/ghes-3.11/organization.json | 4 +- .../data/ghes-3.12/organization.json | 4 +- .../data/ghes-3.13/organization.json | 4 +- .../data/ghes-3.14/organization.json | 4 +- .../data/ghes-3.15/organization.json | 4 +- src/audit-logs/lib/config.json | 2 +- 11 files changed, 57 insertions(+), 27 deletions(-) diff --git a/src/audit-logs/data/fpt/organization.json b/src/audit-logs/data/fpt/organization.json index 5ce31ba76feb..87c192dca1e9 100644 --- a/src/audit-logs/data/fpt/organization.json +++ b/src/audit-logs/data/fpt/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/data/fpt/user.json b/src/audit-logs/data/fpt/user.json index f6392625eb24..01a0e6d3befb 100644 --- a/src/audit-logs/data/fpt/user.json +++ b/src/audit-logs/data/fpt/user.json @@ -669,6 +669,11 @@ "description": "An authorization for an OAuth application was deleted.", "docs_reference_links": "/apps/using-github-apps/reviewing-your-authorized-integrations" }, + { + "action": "oauth_authorization.update", + "description": "An authorization for an OAuth application was updated.", + "docs_reference_links": "/apps/oauth-apps/using-oauth-apps/authorizing-oauth-apps" + }, { "action": "org.add_member", "description": "A user joined an organization.", diff --git a/src/audit-logs/data/ghec/enterprise.json b/src/audit-logs/data/ghec/enterprise.json index d816f6fbd3f9..3f3522746060 100644 --- a/src/audit-logs/data/ghec/enterprise.json +++ b/src/audit-logs/data/ghec/enterprise.json @@ -66,12 +66,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { @@ -1279,16 +1279,6 @@ "description": "An external identity was updated.", "docs_reference_links": "N/A" }, - { - "action": "forbid_auto_approve_personal_access_token_requests.disable", - "description": "Auto-approve policy for fine-grained personal access tokens was enabled for the organization.", - "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization#enforcing-an-approval-policy-for-fine-grained-personal-access-tokens" - }, - { - "action": "forbid_auto_approve_personal_access_token_requests.enable", - "description": "Auto-approve policy for fine-grained personal access tokens was disabled for the organization.", - "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization#enforcing-an-approval-policy-for-fine-grained-personal-access-tokens" - }, { "action": "git.clone", "description": "A repository was cloned.", @@ -3879,6 +3869,36 @@ "description": "A user requested to bypass secret scanning push protection.", "docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line" }, + { + "action": "security_configuration.create", + "description": "A security configuration was created", + "docs_reference_links": "N/A" + }, + { + "action": "security_configuration_default.delete", + "description": "A default security configuration setting for new repositories was removed.", + "docs_reference_links": "N/A" + }, + { + "action": "security_configuration_default.update", + "description": "A default security configuration setting for new repositories was updated.", + "docs_reference_links": "N/A" + }, + { + "action": "security_configuration.delete", + "description": "A security configuration was deleted", + "docs_reference_links": "N/A" + }, + { + "action": "security_configuration_policy.update", + "description": "A security configuration policy was updated", + "docs_reference_links": "N/A" + }, + { + "action": "security_configuration.update", + "description": "A security configuration was updated", + "docs_reference_links": "N/A" + }, { "action": "sponsors.agreement_sign", "description": "A GitHub Sponsors agreement was signed on behalf of an organization.", diff --git a/src/audit-logs/data/ghec/organization.json b/src/audit-logs/data/ghec/organization.json index 5ce31ba76feb..87c192dca1e9 100644 --- a/src/audit-logs/data/ghec/organization.json +++ b/src/audit-logs/data/ghec/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/data/ghec/user.json b/src/audit-logs/data/ghec/user.json index f6392625eb24..01a0e6d3befb 100644 --- a/src/audit-logs/data/ghec/user.json +++ b/src/audit-logs/data/ghec/user.json @@ -669,6 +669,11 @@ "description": "An authorization for an OAuth application was deleted.", "docs_reference_links": "/apps/using-github-apps/reviewing-your-authorized-integrations" }, + { + "action": "oauth_authorization.update", + "description": "An authorization for an OAuth application was updated.", + "docs_reference_links": "/apps/oauth-apps/using-oauth-apps/authorizing-oauth-apps" + }, { "action": "org.add_member", "description": "A user joined an organization.", diff --git a/src/audit-logs/data/ghes-3.11/organization.json b/src/audit-logs/data/ghes-3.11/organization.json index e451d6a2eeea..0044e1828814 100644 --- a/src/audit-logs/data/ghes-3.11/organization.json +++ b/src/audit-logs/data/ghes-3.11/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/data/ghes-3.12/organization.json b/src/audit-logs/data/ghes-3.12/organization.json index 18ca16e0ba20..7fbddd0eba62 100644 --- a/src/audit-logs/data/ghes-3.12/organization.json +++ b/src/audit-logs/data/ghes-3.12/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/data/ghes-3.13/organization.json b/src/audit-logs/data/ghes-3.13/organization.json index e7959eb1ec7f..3a6a8b7ee115 100644 --- a/src/audit-logs/data/ghes-3.13/organization.json +++ b/src/audit-logs/data/ghes-3.13/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/data/ghes-3.14/organization.json b/src/audit-logs/data/ghes-3.14/organization.json index 4efd1492ca83..75288da17a46 100644 --- a/src/audit-logs/data/ghes-3.14/organization.json +++ b/src/audit-logs/data/ghes-3.14/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/data/ghes-3.15/organization.json b/src/audit-logs/data/ghes-3.15/organization.json index 008606185937..5f5c680d88ed 100644 --- a/src/audit-logs/data/ghes-3.15/organization.json +++ b/src/audit-logs/data/ghes-3.15/organization.json @@ -41,12 +41,12 @@ }, { "action": "auto_approve_personal_access_token_requests.disable", - "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources.", + "description": "Triggered when the organization must approve fine-grained personal access tokens before the tokens can access organization resources. See also: personal_access_token.auto_approve_grant_requests_disabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { "action": "auto_approve_personal_access_token_requests.enable", - "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval.", + "description": "Triggered when fine-grained personal access tokens can access organization resources without prior approval. See also: personal_access_token.auto_approve_grant_requests_enabled", "docs_reference_links": "/organizations/managing-programmatic-access-to-your-organization/setting-a-personal-access-token-policy-for-your-organization" }, { diff --git a/src/audit-logs/lib/config.json b/src/audit-logs/lib/config.json index 8a2589c4287d..5e8a825d3899 100644 --- a/src/audit-logs/lib/config.json +++ b/src/audit-logs/lib/config.json @@ -3,5 +3,5 @@ "apiOnlyEvents": "This event is not available in the web interface, only via the REST API, audit log streaming, or JSON/CSV exports.", "apiRequestEvent": "This event is only available via audit log streaming." }, - "sha": "0f178a562a0c8017d95657f31865a541f44c3a03" + "sha": "61a843e468c47922c5b4504d9710fc4ea5608d05" } \ No newline at end of file From 50e3085589c20fed67e714a1ee2d84aa15bce944 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Fri, 15 Nov 2024 08:55:33 -0800 Subject: [PATCH 2/3] Sync secret scanning data (#53134) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- src/secret-scanning/data/public-docs.yml | 66 ++++++++++++++++++++++++ src/secret-scanning/lib/config.json | 4 +- 2 files changed, 68 insertions(+), 2 deletions(-) diff --git a/src/secret-scanning/data/public-docs.yml b/src/secret-scanning/data/public-docs.yml index 53bfadd9bc84..6980ee6902cb 100644 --- a/src/secret-scanning/data/public-docs.yml +++ b/src/secret-scanning/data/public-docs.yml @@ -138,6 +138,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -155,12 +156,24 @@ hasPushProtection: true hasValidityCheck: false isduplicate: false +- provider: Anthropic + supportedSecret: Anthropic Management API Key + secretType: anthropic_management_api_key + versions: + fpt: '*' + ghec: '*' + isPublic: true + isPrivateWithGhas: true + hasPushProtection: false + hasValidityCheck: false + isduplicate: false - provider: Anthropic supportedSecret: Anthropic Session ID secretType: anthropic_session_id versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -183,6 +196,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -254,6 +268,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -265,6 +280,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -276,6 +292,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -287,6 +304,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -298,6 +316,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -309,6 +328,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -344,6 +364,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -391,6 +412,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -414,6 +436,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -425,6 +448,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -436,6 +460,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -447,6 +472,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -458,6 +484,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -469,6 +496,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -504,6 +532,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -515,6 +544,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -562,6 +592,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -573,6 +604,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -620,6 +652,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -631,6 +664,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -690,6 +724,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -713,6 +748,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -783,6 +819,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -806,6 +843,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -817,6 +855,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -1183,6 +1222,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -1434,6 +1474,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -1445,6 +1486,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -1518,6 +1560,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -1531,6 +1574,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -1770,6 +1814,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -1781,6 +1826,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -1792,6 +1838,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -1803,6 +1850,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -1814,6 +1862,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -1825,6 +1874,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -2028,6 +2078,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -2300,6 +2351,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -2407,6 +2459,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -2418,6 +2471,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -2429,6 +2483,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -2758,6 +2813,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -2865,6 +2921,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -2876,6 +2933,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -2887,6 +2945,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -2898,6 +2957,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -2933,6 +2993,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: false isPrivateWithGhas: true hasPushProtection: false @@ -3052,6 +3113,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -3325,6 +3387,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.15' isPublic: false isPrivateWithGhas: true hasPushProtection: true @@ -3396,6 +3459,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: false @@ -3419,6 +3483,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true @@ -3514,6 +3579,7 @@ versions: fpt: '*' ghec: '*' + ghes: '>=3.14' isPublic: true isPrivateWithGhas: true hasPushProtection: true diff --git a/src/secret-scanning/lib/config.json b/src/secret-scanning/lib/config.json index 06f7108ed122..027c22d3693f 100644 --- a/src/secret-scanning/lib/config.json +++ b/src/secret-scanning/lib/config.json @@ -1,5 +1,5 @@ { - "sha": "83070f32cc15cca56b693ddec28b6a2210e7da9c", - "blob-sha": "7f30272d239f59a199c53f04f509bfb51dd9a18b", + "sha": "2d12e72e667b4842e181cadaff7ad619e356d5d1", + "blob-sha": "b1855224a34264029de0f0e7d8967ac1ee009419", "targetFilename": "code-security/secret-scanning/introduction/supported-secret-scanning-patterns" } \ No newline at end of file From 65302030b2d68e5bfe0d455d781ce42a6b01ae17 Mon Sep 17 00:00:00 2001 From: Ashley Date: Fri, 15 Nov 2024 12:50:20 -0500 Subject: [PATCH 3/3] Added Octicons to Copilot Landing page (#53122) Co-authored-by: Hector Alfaro --- .../components/CookBookArticleCard.tsx | 61 ++++++++++++++----- src/landings/types.ts | 13 +++- 2 files changed, 57 insertions(+), 17 deletions(-) diff --git a/src/landings/components/CookBookArticleCard.tsx b/src/landings/components/CookBookArticleCard.tsx index 417ec6771e9f..6e6e67e4ece3 100644 --- a/src/landings/components/CookBookArticleCard.tsx +++ b/src/landings/components/CookBookArticleCard.tsx @@ -1,9 +1,37 @@ import { Label, LabelGroup, Link } from '@primer/react' -import { BugIcon } from '@primer/octicons-react' +import { + BugIcon, + LightBulbIcon, + CodeIcon, + GearIcon, + RocketIcon, + BeakerIcon, + CopilotIcon, + HubotIcon, + LogIcon, + TerminalIcon, + BookIcon, +} from '@primer/octicons-react' + +const Icons = { + bug: BugIcon, + lightbulb: LightBulbIcon, + code: CodeIcon, + gear: GearIcon, + rocket: RocketIcon, + beaker: BeakerIcon, + copilot: CopilotIcon, + hubot: HubotIcon, + log: LogIcon, + terminal: TerminalIcon, + book: BookIcon, +} + +type IconType = keyof typeof Icons type Props = { title?: string - icon?: string + icon?: IconType url?: string description?: string tags?: string[] @@ -17,18 +45,7 @@ const defaultProps = { description: 'Man bun letterpress put a bird on it la croix offal, meh grailed hot chicken kombucha gochujang messenger bag fit before they sold out lyft.', tags: ['Tag Example', 'Tag Example'], - icon: 'bugicon', -} - -function setIcon(icon: string) { - switch (icon) { - case 'bugicon': - return - case 'none': - return null - default: - return null - } + icon: 'book', } function setImage(image: string) { @@ -51,13 +68,18 @@ function setImage(image: string) { const spotlightClasses = 'd-flex flex-column align-items-center' export const CookBookArticleCard = ({ title = defaultProps.title, - icon = defaultProps.icon, + icon = defaultProps.icon as IconType, tags = defaultProps.tags, description = defaultProps.description, image = '', url, spotlight = false, }: Props) => { + const setIcon = (icon: keyof typeof Icons) => { + return Icons[icon] || CopilotIcon + } + + const IconComponent = setIcon(icon as keyof typeof Icons) return (
{spotlight ? setImage(image) : null} - {spotlight ? setIcon('none') : setIcon(icon)} + {spotlight + ? null + : IconComponent && ( + + )}

{title}

diff --git a/src/landings/types.ts b/src/landings/types.ts index 35a2a8fd7bd8..b38c9e66dba0 100644 --- a/src/landings/types.ts +++ b/src/landings/types.ts @@ -5,7 +5,18 @@ export type BaseTocItem = { } export type ChildTocItem = BaseTocItem & { - octicon?: string + octicon?: + | 'code' + | 'log' + | 'terminal' + | 'bug' + | 'lightbulb' + | 'gear' + | 'rocket' + | 'beaker' + | 'copilot' + | 'hubot' + | 'book' category?: string[] complexity?: string[] industry?: string[]