From f7b7494f80c60acc903cc5e02181b3425d31b243 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Tue, 14 Apr 2026 16:19:11 -0700 Subject: [PATCH 1/8] Update OpenAPI Description (#60777) Co-authored-by: Sunbrye Ly <56200261+sunbrye@users.noreply.github.com> --- .../fine-grained-pat-permissions.json | 54 ++-- .../data/fpt-2022-11-28/fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../fpt-2022-11-28/server-to-server-rest.json | 18 +- .../fpt-2022-11-28/user-to-server-rest.json | 18 +- .../fine-grained-pat-permissions.json | 54 ++-- .../data/fpt-2026-03-10/fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../fpt-2026-03-10/server-to-server-rest.json | 18 +- .../fpt-2026-03-10/user-to-server-rest.json | 18 +- .../fine-grained-pat-permissions.json | 54 ++-- .../ghec-2022-11-28/fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../server-to-server-rest.json | 18 +- .../ghec-2022-11-28/user-to-server-rest.json | 18 +- .../fine-grained-pat-permissions.json | 54 ++-- .../ghec-2026-03-10/fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../server-to-server-rest.json | 18 +- .../ghec-2026-03-10/user-to-server-rest.json | 18 +- .../fine-grained-pat-permissions.json | 54 ++-- .../fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../server-to-server-rest.json | 18 +- .../user-to-server-rest.json | 18 +- .../fine-grained-pat-permissions.json | 54 ++-- .../fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../server-to-server-rest.json | 18 +- .../user-to-server-rest.json | 18 +- .../fine-grained-pat-permissions.json | 54 ++-- .../fine-grained-pat.json | 18 +- .../server-to-server-permissions.json | 66 ++--- .../server-to-server-rest.json | 18 +- .../user-to-server-rest.json | 18 +- src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/copilot.json | 258 ++++++++++++++++++ src/rest/data/fpt-2022-11-28/dependabot.json | 6 +- src/rest/data/fpt-2026-03-10/copilot.json | 258 ++++++++++++++++++ src/rest/data/fpt-2026-03-10/dependabot.json | 6 +- src/rest/data/ghec-2022-11-28/copilot.json | 258 ++++++++++++++++++ src/rest/data/ghec-2022-11-28/dependabot.json | 6 +- src/rest/data/ghec-2026-03-10/copilot.json | 258 ++++++++++++++++++ src/rest/data/ghec-2026-03-10/dependabot.json | 6 +- .../data/ghes-3.18-2022-11-28/dependabot.json | 6 +- .../data/ghes-3.19-2022-11-28/dependabot.json | 6 +- .../data/ghes-3.20-2022-11-28/dependabot.json | 6 +- src/rest/lib/config.json | 2 +- src/webhooks/lib/config.json | 2 +- 49 files changed, 1665 insertions(+), 633 deletions(-) diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json index 60908391ae70..51876442c912 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json @@ -126,33 +126,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "billing", "slug": "get-all-budgets-for-an-organization", @@ -738,6 +711,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json index 3cdbf95020e7..0d1b2e88b5d3 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json @@ -2260,29 +2260,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json index abad69559359..6aeb401ca8ed 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json @@ -395,39 +395,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "billing", "slug": "get-all-budgets-for-an-organization", @@ -1143,6 +1110,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json index 181ac5310971..834fe88e59eb 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json @@ -2272,29 +2272,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json index 13c9fde5a1a8..ccbc89f2c602 100644 --- a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json @@ -2538,29 +2538,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json index 60908391ae70..51876442c912 100644 --- a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat-permissions.json @@ -126,33 +126,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "billing", "slug": "get-all-budgets-for-an-organization", @@ -738,6 +711,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json index 3cdbf95020e7..0d1b2e88b5d3 100644 --- a/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2026-03-10/fine-grained-pat.json @@ -2260,29 +2260,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json b/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json index abad69559359..6aeb401ca8ed 100644 --- a/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2026-03-10/server-to-server-permissions.json @@ -395,39 +395,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "billing", "slug": "get-all-budgets-for-an-organization", @@ -1143,6 +1110,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json b/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json index 181ac5310971..834fe88e59eb 100644 --- a/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2026-03-10/server-to-server-rest.json @@ -2272,29 +2272,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json b/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json index 13c9fde5a1a8..ccbc89f2c602 100644 --- a/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2026-03-10/user-to-server-rest.json @@ -2538,29 +2538,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index 0c86fc53a737..563616214926 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -135,33 +135,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "orgs", "slug": "update-an-organization", @@ -747,6 +720,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "closing-down---list-fine-grained-permissions-for-an-organization", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json index 2456259f18dc..cef4e7f3ad7c 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json @@ -2268,29 +2268,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index 3023951e8d61..8f602d1858b7 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -1064,39 +1064,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "orgs", "slug": "update-an-organization", @@ -1812,6 +1779,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "closing-down---list-fine-grained-permissions-for-an-organization", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json index 25883260f787..6646a0013fff 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json @@ -2346,29 +2346,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index ff9bedd50c35..287173fdc0bc 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -2594,29 +2594,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json index 0c86fc53a737..563616214926 100644 --- a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat-permissions.json @@ -135,33 +135,6 @@ "additional-permissions": false, "access": "write" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "orgs", "slug": "update-an-organization", @@ -747,6 +720,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "closing-down---list-fine-grained-permissions-for-an-organization", diff --git a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json index 2456259f18dc..cef4e7f3ad7c 100644 --- a/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2026-03-10/fine-grained-pat.json @@ -2268,29 +2268,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json b/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json index 3023951e8d61..8f602d1858b7 100644 --- a/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json @@ -1064,39 +1064,6 @@ "server-to-server": true, "additional-permissions": false }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "orgs", "slug": "update-an-organization", @@ -1812,6 +1779,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "closing-down---list-fine-grained-permissions-for-an-organization", diff --git a/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json b/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json index 25883260f787..6646a0013fff 100644 --- a/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json @@ -2346,29 +2346,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json b/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json index ff9bedd50c35..287173fdc0bc 100644 --- a/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json @@ -2594,29 +2594,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json index f9fdfd18ab24..e5b4f5a92947 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat-permissions.json @@ -12,33 +12,6 @@ "additional-permissions": true, "access": "read" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "orgs", "slug": "update-an-organization", @@ -309,6 +282,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat.json index da54b0c55235..03aec55a2d8b 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/fine-grained-pat.json @@ -1440,29 +1440,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json index 2c574fc8c08a..c32bcdfb19de 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-permissions.json @@ -224,39 +224,6 @@ "server-to-server": true, "additional-permissions": true }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "orgs", "slug": "update-an-organization", @@ -587,6 +554,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-rest.json index 71e1916589f7..9247cf456ed5 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/server-to-server-rest.json @@ -1572,29 +1572,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.18-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.18-2022-11-28/user-to-server-rest.json index fdc6965992f3..373f49d0d03b 100644 --- a/src/github-apps/data/ghes-3.18-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.18-2022-11-28/user-to-server-rest.json @@ -1620,29 +1620,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json index f35234287e29..366933861482 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat-permissions.json @@ -12,33 +12,6 @@ "additional-permissions": true, "access": "read" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "orgs", "slug": "update-an-organization", @@ -417,6 +390,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat.json index 82f5d8474124..bc1862cf133f 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/fine-grained-pat.json @@ -1572,29 +1572,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json index 7850cd8596e5..727fb525d0cd 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-permissions.json @@ -390,39 +390,6 @@ "server-to-server": true, "additional-permissions": true }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "orgs", "slug": "update-an-organization", @@ -885,6 +852,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-rest.json index 520a542fa684..b0a2b8a1708e 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/server-to-server-rest.json @@ -1704,29 +1704,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.19-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.19-2022-11-28/user-to-server-rest.json index f63e1d84d659..741a17aeaa43 100644 --- a/src/github-apps/data/ghes-3.19-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.19-2022-11-28/user-to-server-rest.json @@ -1752,29 +1752,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json index 884811c571e5..4a8d7e9010ec 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat-permissions.json @@ -12,33 +12,6 @@ "additional-permissions": true, "access": "read" }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "read" - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "additional-permissions": false, - "access": "write" - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "additional-permissions": false, - "access": "write" - }, { "category": "orgs", "slug": "update-an-organization", @@ -417,6 +390,33 @@ "additional-permissions": true, "access": "read" }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "read" + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "additional-permissions": false, + "access": "write" + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "additional-permissions": false, + "access": "write" + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat.json index 2c18dbf7828d..52d19d059e2c 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/fine-grained-pat.json @@ -1572,29 +1572,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json index 7876400a8b5b..53504e34adef 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-permissions.json @@ -572,39 +572,6 @@ "server-to-server": true, "additional-permissions": true }, - { - "category": "dependabot", - "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", - "subcategory": "repository-access", - "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "updates-dependabots-repository-access-list-for-an-organization", - "subcategory": "repository-access", - "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "dependabot", - "slug": "set-the-default-repository-access-level-for-dependabot", - "subcategory": "repository-access", - "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, { "category": "orgs", "slug": "update-an-organization", @@ -1067,6 +1034,39 @@ "server-to-server": true, "additional-permissions": true }, + { + "category": "dependabot", + "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", + "subcategory": "repository-access", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "updates-dependabots-repository-access-list-for-an-organization", + "subcategory": "repository-access", + "verb": "patch", + "requestPath": "/orgs/{org}/dependabot/repository-access", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "dependabot", + "slug": "set-the-default-repository-access-level-for-dependabot", + "subcategory": "repository-access", + "verb": "put", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "orgs", "slug": "list-app-installations-for-an-organization", diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-rest.json index a0b762214ee2..f381f6c63b40 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/server-to-server-rest.json @@ -1704,29 +1704,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/data/ghes-3.20-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.20-2022-11-28/user-to-server-rest.json index b7c19d2508e0..3cbfc7f54dde 100644 --- a/src/github-apps/data/ghes-3.20-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.20-2022-11-28/user-to-server-rest.json @@ -1752,29 +1752,29 @@ } ], "dependabot": [ + { + "slug": "list-dependabot-alerts-for-an-organization", + "subcategory": "alerts", + "verb": "get", + "requestPath": "/orgs/{org}/dependabot/alerts" + }, { "slug": "lists-the-repositories-dependabot-can-access-in-an-organization", "subcategory": "repository-access", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "updates-dependabots-repository-access-list-for-an-organization", "subcategory": "repository-access", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access" + "requestPath": "/orgs/{org}/dependabot/repository-access" }, { "slug": "set-the-default-repository-access-level-for-dependabot", "subcategory": "repository-access", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level" - }, - { - "slug": "list-dependabot-alerts-for-an-organization", - "subcategory": "alerts", - "verb": "get", - "requestPath": "/orgs/{org}/dependabot/alerts" + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level" }, { "slug": "list-organization-secrets", diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index c7242861fe5f..4b335e8dd79a 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "b8cc3c7e6d2050e2e0feb03abf5f32c17e2f964f" + "sha": "2b6e93c2823a6f5dc1f6a3727b6b53eafa407fb2" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/copilot.json b/src/rest/data/fpt-2022-11-28/copilot.json index 485597d66da5..d382cf3c7647 100644 --- a/src/rest/data/fpt-2022-11-28/copilot.json +++ b/src/rest/data/fpt-2022-11-28/copilot.json @@ -1,5 +1,263 @@ { "copilot-coding-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "put", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent", + "title": "Set the coding agent policy for an enterprise", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "
The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "string", + "name": "policy_state", + "description": "The policy state for Copilot coding agent in the enterprise. Can be one of enabled_for_all_orgs, disabled_for_all_orgs, enabled_for_selected_orgs, or configured_by_org_admins.
Sets the policy for Copilot coding agent usage across an enterprise.
\nEnterprise owners can configure whether Copilot coding agent is enabled for all\norganizations, disabled for all organizations, configured by individual organization\nadmins, or enabled for selected organizations only.
\nOnly enterprise owners can set the coding agent policy for their enterprise.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Add organizations to the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to enable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Enables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can add organizations to the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "delete", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Remove organizations from the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to disable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Disables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can remove organizations from the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/fpt-2022-11-28/dependabot.json b/src/rest/data/fpt-2022-11-28/dependabot.json index 7664388036e1..4630ed28c98d 100644 --- a/src/rest/data/fpt-2022-11-28/dependabot.json +++ b/src/rest/data/fpt-2022-11-28/dependabot.json @@ -7464,7 +7464,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -8020,7 +8020,7 @@ { "serverUrl": "https://api.github.com", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -8093,7 +8093,7 @@ { "serverUrl": "https://api.github.com", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/data/fpt-2026-03-10/copilot.json b/src/rest/data/fpt-2026-03-10/copilot.json index 3e7db53b16c8..799f4dc71cdd 100644 --- a/src/rest/data/fpt-2026-03-10/copilot.json +++ b/src/rest/data/fpt-2026-03-10/copilot.json @@ -1,5 +1,263 @@ { "copilot-coding-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "put", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent", + "title": "Set the coding agent policy for an enterprise", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "string", + "name": "policy_state", + "description": "The policy state for Copilot coding agent in the enterprise. Can be one of enabled_for_all_orgs, disabled_for_all_orgs, enabled_for_selected_orgs, or configured_by_org_admins.
Sets the policy for Copilot coding agent usage across an enterprise.
\nEnterprise owners can configure whether Copilot coding agent is enabled for all\norganizations, disabled for all organizations, configured by individual organization\nadmins, or enabled for selected organizations only.
\nOnly enterprise owners can set the coding agent policy for their enterprise.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Add organizations to the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to enable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Enables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can add organizations to the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "delete", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Remove organizations from the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to disable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Disables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can remove organizations from the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/fpt-2026-03-10/dependabot.json b/src/rest/data/fpt-2026-03-10/dependabot.json index 17e23bc2700c..cfed61fe0528 100644 --- a/src/rest/data/fpt-2026-03-10/dependabot.json +++ b/src/rest/data/fpt-2026-03-10/dependabot.json @@ -7324,7 +7324,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -7880,7 +7880,7 @@ { "serverUrl": "https://api.github.com", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -7953,7 +7953,7 @@ { "serverUrl": "https://api.github.com", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/data/ghec-2022-11-28/copilot.json b/src/rest/data/ghec-2022-11-28/copilot.json index 6c13b55e3702..8c52e2c72b85 100644 --- a/src/rest/data/ghec-2022-11-28/copilot.json +++ b/src/rest/data/ghec-2022-11-28/copilot.json @@ -1,5 +1,263 @@ { "copilot-coding-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "put", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent", + "title": "Set the coding agent policy for an enterprise", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "string", + "name": "policy_state", + "description": "The policy state for Copilot coding agent in the enterprise. Can be one of enabled_for_all_orgs, disabled_for_all_orgs, enabled_for_selected_orgs, or configured_by_org_admins.
Sets the policy for Copilot coding agent usage across an enterprise.
\nEnterprise owners can configure whether Copilot coding agent is enabled for all\norganizations, disabled for all organizations, configured by individual organization\nadmins, or enabled for selected organizations only.
\nOnly enterprise owners can set the coding agent policy for their enterprise.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Add organizations to the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to enable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Enables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can add organizations to the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "delete", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Remove organizations from the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to disable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Disables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can remove organizations from the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/ghec-2022-11-28/dependabot.json b/src/rest/data/ghec-2022-11-28/dependabot.json index 7c21f50edad3..ec969b68e554 100644 --- a/src/rest/data/ghec-2022-11-28/dependabot.json +++ b/src/rest/data/ghec-2022-11-28/dependabot.json @@ -9170,7 +9170,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -9726,7 +9726,7 @@ { "serverUrl": "https://api.github.com", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -9799,7 +9799,7 @@ { "serverUrl": "https://api.github.com", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/data/ghec-2026-03-10/copilot.json b/src/rest/data/ghec-2026-03-10/copilot.json index c9e1f507ac02..0683ef2ed3e2 100644 --- a/src/rest/data/ghec-2026-03-10/copilot.json +++ b/src/rest/data/ghec-2026-03-10/copilot.json @@ -1,5 +1,263 @@ { "copilot-coding-agent-management": [ + { + "serverUrl": "https://api.github.com", + "verb": "put", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent", + "title": "Set the coding agent policy for an enterprise", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "string", + "name": "policy_state", + "description": "The policy state for Copilot coding agent in the enterprise. Can be one of enabled_for_all_orgs, disabled_for_all_orgs, enabled_for_selected_orgs, or configured_by_org_admins.
Sets the policy for Copilot coding agent usage across an enterprise.
\nEnterprise owners can configure whether Copilot coding agent is enabled for all\norganizations, disabled for all organizations, configured by individual organization\nadmins, or enabled for selected organizations only.
\nOnly enterprise owners can set the coding agent policy for their enterprise.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Add organizations to the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to enable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Enables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can add organizations to the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, + { + "serverUrl": "https://api.github.com", + "verb": "delete", + "requestPath": "/enterprises/{enterprise}/copilot/policies/coding_agent/organizations", + "title": "Remove organizations from the enterprise coding agent policy", + "category": "copilot", + "subcategory": "copilot-coding-agent-management", + "parameters": [ + { + "name": "enterprise", + "description": "The slug version of the enterprise name.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "array of strings", + "name": "organizations", + "description": "List of organization logins within the enterprise to disable Copilot coding agent for.
" + }, + { + "type": "array of objects", + "name": "custom_properties", + "description": "List of custom property filters to match organizations. Organizations matching any of the specified property name/value pairs will be included. This is a one-time operation, setting the property on an organization in the future will not automatically update its coding agent policy.
", + "childParamsGroups": [ + { + "type": "string", + "name": "property_name", + "description": "The name of the custom property to filter by.
", + "isRequired": true + }, + { + "type": "array of strings", + "name": "values", + "description": "The values of the custom property to match.
", + "isRequired": true + } + ] + } + ], + "descriptionHTML": "Disables Copilot coding agent for the specified organizations within the enterprise.
\nThe enterprise's coding agent policy must be set to enabled_for_selected_orgs before\nusing this endpoint. Organizations can be specified by login or matched via custom properties.
Only organizations that have Copilot enabled and belong to the enterprise will be affected.
\nOnly enterprise owners can remove organizations from the coding agent policy.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:enterprise scopes to use this endpoint.
A header with no content is returned.
" + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "204", + "description": "A header with no content is returned.
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": false, + "serverToServer": false, + "fineGrainedPat": false, + "permissions": [] + } + }, { "serverUrl": "https://api.github.com", "verb": "get", diff --git a/src/rest/data/ghec-2026-03-10/dependabot.json b/src/rest/data/ghec-2026-03-10/dependabot.json index d260ed13bf74..725299dba9cc 100644 --- a/src/rest/data/ghec-2026-03-10/dependabot.json +++ b/src/rest/data/ghec-2026-03-10/dependabot.json @@ -9030,7 +9030,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -9586,7 +9586,7 @@ { "serverUrl": "https://api.github.com", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -9659,7 +9659,7 @@ { "serverUrl": "https://api.github.com", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/data/ghes-3.18-2022-11-28/dependabot.json b/src/rest/data/ghes-3.18-2022-11-28/dependabot.json index 77702381f82f..dcbdf6d3ddd2 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/dependabot.json +++ b/src/rest/data/ghes-3.18-2022-11-28/dependabot.json @@ -6696,7 +6696,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -7252,7 +7252,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -7325,7 +7325,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/data/ghes-3.19-2022-11-28/dependabot.json b/src/rest/data/ghes-3.19-2022-11-28/dependabot.json index f639eff618ad..f25d783e037c 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/dependabot.json +++ b/src/rest/data/ghes-3.19-2022-11-28/dependabot.json @@ -7981,7 +7981,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -8537,7 +8537,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -8610,7 +8610,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/data/ghes-3.20-2022-11-28/dependabot.json b/src/rest/data/ghes-3.20-2022-11-28/dependabot.json index fa42df4b6b8f..4933ea6f1ce7 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/dependabot.json +++ b/src/rest/data/ghes-3.20-2022-11-28/dependabot.json @@ -8324,7 +8324,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "get", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Lists the repositories Dependabot can access in an organization", "category": "dependabot", "subcategory": "repository-access", @@ -8880,7 +8880,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "patch", - "requestPath": "/organizations/{org}/dependabot/repository-access", + "requestPath": "/orgs/{org}/dependabot/repository-access", "title": "Updates Dependabot's repository access list for an organization", "category": "dependabot", "subcategory": "repository-access", @@ -8953,7 +8953,7 @@ { "serverUrl": "http(s)://HOSTNAME/api/v3", "verb": "put", - "requestPath": "/organizations/{org}/dependabot/repository-access/default-level", + "requestPath": "/orgs/{org}/dependabot/repository-access/default-level", "title": "Set the default repository access level for Dependabot", "category": "dependabot", "subcategory": "repository-access", diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index b27d8b92644e..019cea1ec2f2 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -55,5 +55,5 @@ ] } }, - "sha": "b8cc3c7e6d2050e2e0feb03abf5f32c17e2f964f" + "sha": "2b6e93c2823a6f5dc1f6a3727b6b53eafa407fb2" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index 930fb912056b..5346911eb94b 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "b8cc3c7e6d2050e2e0feb03abf5f32c17e2f964f" + "sha": "2b6e93c2823a6f5dc1f6a3727b6b53eafa407fb2" } \ No newline at end of file From 35aa16b1dc491ec202e3e71ffe78efc852ea199a Mon Sep 17 00:00:00 2001 From: Eboni <32157169+EboniLM@users.noreply.github.com> Date: Tue, 14 Apr 2026 20:36:53 -0400 Subject: [PATCH 2/8] Update trial setup instructions for Copilot (#60775) --- .../overview/setting-up-a-trial-of-github-enterprise-cloud.md | 1 - 1 file changed, 1 deletion(-) diff --git a/content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md b/content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md index 1eb8a19c10fb..e103798de800 100644 --- a/content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md +++ b/content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md @@ -44,7 +44,6 @@ Your trial **won't** include access to {% data variables.product.prodname_ghe_se * {% data variables.product.prodname_github_codespaces %} * {% data variables.copilot.copilot_enterprise %} * {% data variables.copilot.copilot_for_business %} - * Contact {% data variables.contact.github_support %} to enable {% data variables.copilot.copilot_for_business %} during your trial. * {% data variables.product.prodname_sponsors %} * Paid {% data variables.product.prodname_marketplace %} apps * {% data variables.product.prodname_github_connect %} From f0863250664b07462a38041af6be897a99d1f30b Mon Sep 17 00:00:00 2001 From: Dhruv ChandKCLQeAsXS3o`o6%N*#7JOYbwdnEmO=)O*s K)GCB6IQ>P>5*2`q_;7YE<5|NTKfXk_^Ztu<5FMU+j!sg;oweoQE6* zGleFR;l*2^+vC4#xm!eZUa)lTq4{=+XMa}g?Bvuf)a^f!B899FLzwmP$$hhPzLlH) zZvvv<(2NZEnSRrVR9&`!4vg&JbzQx^&Kn(xnqD3s8`P@db@aQ6d+`+f`Mey**yG}W z^~m#hhS=Ksc$1IZ^SUQ)>FGY#0FyD{%X{;?si^K1XaG66fS!StR&vD%@8u61j qQ-N$5LMTZ19hlkfj+xiLqiuDK)vL)>m!m|Qosky zx2GMS^DEO_A2-fe8x11fUMh+|X%~??&z}sphyS>|P112+Yif_+k$kH>yh8Na?7W}@ zZAN4&LAYwcIDN6;Q{Gn6KboZKl`ma%mxf^V+VN^z+B*g0hS)Z?DRSGbGl*qYKV0%L zYs6wrOV a6(_hZw0Ya}xiYwLOQBTwA0$#h}AxMD?CWsG24+UyTd_`lpJ05FUP z3kM4q&`wG1_{koD?@P;SfjM5-BovV}DoP#8141E|Kk*^qKew|z-|n}$xmi=ys!o27 z`#2@o#Y9xR7B0xhRLXo^jKU~WtPo85uLu}e&mw?iawtk)Aq^+JEp56<%~+`4yiMvY zV5T$#DyDy9?8N@dZvz0W{zzy@XuG?+?>s?YwIIh=*QRiY7>ZSz<>lp=0;iwX@jvm$ zOGt+MxBhK%K7(sR)z?uM%^NX`2-%Bo#1_@RG$r6N7)q8aR^YzcI3uC}2WBWMWyTTK zcW$D1ou H;-nZNIsqKQhI z>yGar>750IrI>3jZLBR3F?Vp^w$<#qmv7>9; e;0bZHdt zvDb_|ie(xyOCC=2%uHD*ol;&cL15+J8{MEB$JL(P-jbg`dW3o-Y}yHWxIM_AZIgdT zJJVk^RTRyMNnU((mR~pXv?X6hJ_iF)n_~6K_x_td@q15v&7upfm%Jo7iyt2l$H(hM zP|&grs+~;Vbr2nzoj!dX9VG*e*B0zO{Kb@yK@%_H7DV_eOU$e^%k V7MEq4hG zr7e#c99N5$(zS9z!E!yw`6!fMq;5t(2WBIjzSH6c=b0%tP5iyU#;A5I(ye|`<}1lC zP$>Qs>0I&!<-m+8O_uWukVV4*S6qsx-RyW8iK#sofz)WIpn!+zcp0UgHgvQnk;l<0 z4+_OC(eWfHuS$Ol&bz8Dge#-XKfV6gl#`+S#_-L=C6Wi_A5vHNk@%le32o9~pu(am zXWm2974?ZCiIuDxvD4}huv^D4tFCK*Dz9eFeUkRcPw#c4pW$=Xxeis2*T!~#s5l8} zyhx}LLPt~icnjNwD*D=orE7OSIO)($l>g$?edP-}Azt-Z9G#qIa=eCKp#S(vwzGgL zQxwZZ#}?vm9@6JGwmyg^Jz8Y2(=Skfw|h1m>VLYBeO0TVs%vjeACl$sIQ=P-^Lgh$ z>9HRnbyZaL5k>rV9*hlZJg6vVTfyP}Vfko%= f%ul>mM)IdfHo~ z8Qy+pljlq!MQn-y6~=s(*+Wxlm(-548|kU6XA}T!o7hUTl1jh>9X5nudzvRbZC%}Y zHq(W?8m~%kX74-FzB>wVZ@Q>YZe7xSydn@mM3?8%z{%;ypaw^tYAWF<8I1aBRmwfb zg5D`jIZ)&EWtVY^cmD2FP$dJ*TjSl;&-A)(s`mnhUYv-)zR{5JymXFAl`PXyp_DoI zDUqQ9_v_oMpu~O3Y|+w3s^*KGtHvz%Kj%FDP!pYU)vXy=C%#XI!QyG|O82ilKb`MO zYS5#vw~4|7-!{B_>B!Dh+whL8BG;I}ngoPK&R+(3)P 5inS7GD6|7yq?QHsKL*^748$+f6@4lFO;Lnt<+aI)~een1_k zMreBc+&00zP m!rNrQzZVR5{|-4d2kZ7{!| zU9mNH=+1te<9d>icrKqBdOj2JbkAn!m0$d!kQjFyWBzJ7 eKbzNHYo4q3 zcCUP{M8|kluvS5Ldbx`A;r_uEb5USp2Qeg$<&=y22dWCf1x-eg7|X>gW0{G0Ze5bQ z)?yA_uip5yF^e(2(XIR=`3e(@76CrSz0&cb3@|JlqwawpCk?D=8}Ai9yq6qgxK9cI zh2AeW-cm-qeNtJrT4}WpK6E{Iy(m7VzHHi84QTx>2OxcMrXig(na#Pp&TC=p#*TV< zb9RD$>B;d4hZXrISyK{1krg&iBm)^%>N~jX{x%OOLf7xMs(6h?#IL6AJ#hWlbot%; zS7SAq`QU!O_k!y}TCFbiuSI9`%(2DvK6E iWoWGD#rNBCy&VE_&W4o1&>QI0 zn~V7NZ;mP!7DbEu7@7E#GLb40BAh&$=>=m#&22HtrXzKl?`|28?KYYxB~|-2Q)>3+ z7nxID%N?Pu=@Ki7Nsv<|4Ha?rsnUQ0(O~`9HKT7Isd9U3PWZZ&+o8^pe38g#ZhsCX zt&$5ZP~pUpEAPue*!p0ar^mI!y~Af{&b cw&gKndj=Zc#8<97vgKyukPAD%ZFC8`>HeWHF7$UMG_)Tix(VD63znnJK zIQ;2G1A@E{4f^olxPjo;@$^weMF)wM$AMEI>VdoE!LMgZ*M4AvsnS1aAYew&z0vGb zORCMoyPMO_+^g6Z9$4Sqgh%S4yXg6Eyor()>U&m5=L#0JG6XOmZ&Wwo7oVV*?1k4p zFTe=E{Puc;TkYHz!0Z6oFo~qc+=in7cml8Uvn3}_%k9L|rf{geN{RJ!#llqcg=g69 zSrcaSeEwFbSmC>(rK2MYK>vgH-kl&a5i$R*gGnvc)mvaV1lGvg4TD&akhZn$I(K8R z<*D3Q@M*&uUgWwpE#(eFr_OY)^L_Rfi%X3y6AJdW(DZlLxmT63r9tk ephrBE)B5u>8E4St9Fj|H>=mr9LCYG9hzOstn2dJ5{ppW1c@g!`^{>~AXdk0^Vm zvZ8-f<;~+Wa~QqK;c%r UGk}#77UVLX#ATgLGql~>joY& *l@%9(5fh^vS)o{XdYI>eGLRHJ_gGGIga< z?u#VgwD;+$65>M$=T4VN1Wy< TALe;U?K~QK!&WSA@j2Ur z2mdGaR8@L=JY%IV{?1!2c4Jnyt_sBocO+>3ulqwuLIFx6Z?s${F3J0`z$y!O`a{U{ zvl{d-jV1fIK5pLz{nt8X>a=Z9YpA`D6QJTRKbIXhKi*#ED9v+{^O!x3glj~dJM?MG z!LznP)qogX<5+_YnUQ#He#H9<_dKpW@6=9Y%(O<|DDCihfDNfjNRH7a8`hG*CE=JM zx*k*pApU-l*Ot}q13A~H#5r2o*7%-o$qo{=3P9)4wlpG+1ndiErh!&eVBG4^U`oSc zfs4mWfhbR@&eXk<23e1XjW}HaXK7s}FpqPi*+}am-A;?+#Ho_IB@XRlxrY-f8NWX9rog8ZK&B81sIlC6{-ntMT&>@qY+_2D!_%e@sQ;@{*1?W)cV7; zQUp%dV#MExo2bT2RjKB!{UlX2-|?*`#=<-G4aP6jJm8o5{%?XINJI-1Ig|>%FwU^2 z;{h(pkecNr3k+xjn&WVq(;F>?Uy>^sgSY7oi30?v^R;>?Kq?!{X1kB?2Rn_fuTfcW zaWj(YWsVYCCBJvb&t|=uMqIrS;w;gB+6xs`o*yx_^=S}TkPc1ani?S&riJ>#phA~0 zodR*{8| E4UQscQzc1I6iD2Ane@B9X(OeYML%e$_3GHkg6FQsu#-ekz3C?I@) z8i;&>6oHOju1s<^{JHLbUE=o4)O5%dLR-3xGygspnMK kTs$w#bo?G^_4bM~$ z>6F&^_$rE5(e>0osvf{7fGQ7lzpdshn+fF72HC4QC|i$FCIFo+AciaN^C0!slB-=A z-T2ZXDCG>1ahvuAjwAa8WM7i=XFR2&E{h!VT_0aqd-P@PBi33|ai#5c7)Km3rE;6E zdXJ(QzINN~FVAFv`DzBjExo>*QR;h-o^X8a*>;@Wew&srU@-~49yJ!Qq7kj%OxV&P zI-cyf9+-#MQ2QA;9>i=c`5XeIRLX^735(*sRC z)8}o%BMj#m5Js6BsR(2=k5o7O?l{%_U0RrB&Y7H(_hBVhmwoO-N|wS60&%}gguq tyB@50*y#;fMMbe|R_{^hGiATCn9i z+U_s!LV}vxe<4P>_dsz(e#t1@%};R;Gr$+s``$^k|AZf2p>%Edkj}bR#CeW x&4idANi!0-H=M@VA+P~bUmavr(gR$FEyQ
@h+^q8JAy#0U(yjBc z(<)Y 3*28Z+EGbf(x3Gj*Q&9bOa-ldV9OfZ#bORXQ!p^o!^NQHubG{ayI+DM z`yX%t6H?oGgu%*Ax;W!N(y{h(#uqvr6!J#cpS=rP4dPt6q$YwR|E&(*Z(Eoc#8qzG zo67amM^htE4xB#n$Js1BJvuYk$*Vg8e>K`@pHwB+LENk!e;O8Y#~jYvAM+eg?hAUD z%^kKUNjewL$k$ich$LZXm)7r^m0vnP-ikkI20-3ABB{uLVjd(j)wMN_UTNGt$*QO_ zinfMTR}QI=^0;Q%oh&zxX*BZ)W)rU< ^orJ$Q;fZXjAfx`s_c42;&)-aGu zI5Q~;zi83GXn`%|f$xG4w@J???R%yvK_p6lv0U?X|9oQQ4+@ij=iE8-%SG>g=^qAG z13JgI-togQ-zAV>W?D(!K@q#KSMwGk$jeQQeZ)DgxDbYCO2$6d%n(i&H!^+dRU <~}?Di%^OmCVro8mJ~ z@`HpgG&KPp V$*X#=)hDv!{{eZJ@tRJ;U e{ zWd5q|jRQFYx`b@BFMf4ofw*Q~0I|_X*nQk4?~veFLCJ#N0_okDWDnfYRvi0Ptu1mX zY{vbc``OkwTBnf{5|mC)H<_v6VcICXS9-}GuXFVdtebcI2khwr&&7#(R6URHXDY=h zi!exiLd4&tFNhj`I;`*_4W`53Y2; EMY zz7eA;aK9a0TDlkrY3+z7izeZtH1EIe2QWjwbZ9}+Lm;19iQ= 5K`ow}+>7@BYNeRtmPJ$JdBd zps1Ii;cW(x&*$_62Acr0c41U0rJ>JoJ;F|78_+MLl^eJc9itaGM^`=p{{iv0t^H9v zOy|Lf%YH7dHzg--c)8D>Yr9-b%SK+u#d1odY5Szt-#Dp9DjkubtAYhohNY9eR!AN8 z2}kFI#|<5>=9UO(&E2-VKT`=K_DFttKfWkJ4;hkrd6^~GL;9M_a=P2LNeO5qlN2P? zoaaQ0GnTvHamKQGNZzvL9P{NV`!NE4fKRDz?`Uf Ui@DS{ zICt}jB&k7Fa#1cJ7x09yCsVHXSxDN5uyxBr_#4z%bIF>Qt=M#ONi%$gSRs0*gi3bm zbRmX4%>3K (^l)F}a8jj!M&aL$JPD z2ISQ4p{wB?H{`+Xz8jt{ziKTL_=JZ!Y=A^yLqJQ%f;|(^pRms2nR)38eR(W2`<^7D zgGVx%YFcLnn=(C=w7-ZQAxwIxytbD*>Fu1a@ZjpZxw1r`and=CM0vQR6?DAL>NV`V zko5O+tO7>qaPPwzK j__jrDt+G^k()n-s=kr*zycTNjq> z#?bQ@bOqERacGaQ6c8YLMJEjeMu{(gRwOUG38za=!lra{cM(c!4ro45qo`5zC4WnJ zYxs)<-wFk2yo!y+b@ #ySC;9g(~j*Myj<55l(z6H&3Lrn(;?@?XNXE zA^zc3lrVaJNtkf$(b`%WT~iZ0Y&ngM=3rfkqhncx02hsJ9L!Y}Qvj%8)YGx}ygBg^ z4B~bScPBbU1qd%wQsN$(0(?<$6x#u=fKK23>-}Dt0n`t?cUEmaCZO6$vDAlkWT4H% zVKmbIz3Q|IG%Yw<=uLNWljyFI!?B=59%FQu{C#ej@nlJemM^qXd%p}#Q-ACN=jp$; zW7nK2c(^e7^aaAOltbEg{XHQt7Q!cc*kF^bx35fK8pC+C@Q^1lk%5gE^b-YSC#XOj z@N|7)RO6FJAl%#)iPe17gyWPprl neegeMYj&3igX0K znfk9tR_{$5sD{mivZ}(K%Uvq<$v`q~<*^0|FxDu27va(xtHIMa>eJ{dj`4aI8m>Gd z?G}_)6}39h^g|$|%x1ud=u5ooT%{2!+ntR*(uRy%wf)gH#)1UG=Hjy>>h??;7dcGr zZ6)h82c 91+^2Jqv -*FAB!Gju_*-_Q*#D zI@vDQ C^g%nHk9h-=mM~=<&jIhht=y#{helDN zHV;ntBOeI@vRyO_2u*sRELuSdEFao%idwhO^6{5Y;c(whc4SodX96@2$&6XOuEorh z`pf2%UrCSJ{mZ|Ic{x3jJA|!vy^ls2D`&aYQ)Z2Ce8QQ4jw%gs_Tsr7`+i3a_jaF= z^-xPZ%Rf~Hry!aOK5698L>bxiOoCfK=+0mHjDKJwJ)WUqR@aqW>pr*O_(`GQE6ng> zm?|ca4eT-c@ot!v)4KRQ3ia5kzxKHr-~CSMqfjDUupqq_80$cGW;D>vpAROS 7y_5JE z1t|Qhn6gdaE-ZN+0S+hms{}pU#!p0&dy)41Wtq>PRak7;3Mm5Mdd;#6ePL N@5M*~v1`EpbEzI_jQJ z`#-C5WDOpoyU}wJo#U~lxrA&0$K$yQ0M=MHQrSy%`l7`!AgwI#%_LR$$8KctDq^$M zIOxpIvoQ{FUXLlOY7@fadz>nz9gbHMyc2szXHD={RxMdr2nchvMYDG0%!PHeP$aXZ z#;Af{{(+*U#f)g~JD?gD?Kmx40VFseJNZl1N!QV5UR7pIULQC9O(2 ptmV52LfR=`wmZu7)1xl+F~hStSlutN5QLtfg!c6bsJvk zfN6mJEHwEOlD5rop$)dd4Woclc4!m&&|kFMdjeqfLQ%dTi8rI;$yh*_EgwWJtTarG zgb1OVIonYRB})DOxL~!$17Aql3FKUQN?wsk+Pf6X1lQ0S6}Zk^fwN8j0bCZ1p)k}M z&R)BQX~qbGNJ|HQdYE`le2PBaKOA{uGMx4na3HVDE0d*PnfrMix0CDIcH)8WRCQc8 z=mqbgOHbzwVdPE5LUZrOfX>>fYzAZdCwy_Tb@88t?n(@mLbjx}5?))}4qJU=a@qOL z=Y8R4-E_2YganH!@O&WWwtVdUY4`;>nd{H_+aQBCjDshYd3xr_`#BA&qUKdv%zF+t z2f|kwt;A}Z!Rym)eF?F#nsu6bi16hj<}cFd<(gZ(sQ!+D-EzW2YT=gnu50&rTx!72 zsh7I&1#awNjTE=JKo%v6nuLA#ttH~X fD(9V6-#a{Q?;-lDSH^-5-DB$N&me&cyCD-{i3sFJcn%uAOa@G^YXCg!?}J zDAX+)@=@3kCQnt}Erkeu^S`5c*C0-Sw(sy3IbXZq-ne78%|dyIy)c|t^_!X(GBEwa zUWqVuP7PkTD}r@J&;RC6@(>xOJ)sM)=1FD1!|qiBQ<|)ufG1A``#CQcx2 I1#S1XkHDb)>eI5!zX{bruU-}Q`NEUyqMB<-y7g=I=j?dx*OzMd`flpy7oMJ z92Xb3zLE1fmr8pCU9aW}yg%`i^SFj1cUx)@JWh3PzS4GXJPV(*YPg|$k1*TLQoHCj z^%mVff~e)Y%UsC=uZiBDOm}(lw_!IR#pPB?&u3Dm;d&`@`@QoUrh(!>#90IED}z&Y zrRFJ`zVyxN>Yc(A6I>$x+bXVyox{5ct1cA4Dsg{t$}Jjut!!@sLDkwv^O{P{K#MS{ zm%fB%dp~Mn35;I3x0Cq7>kX3gP5VNh6WQIwv(FE}&Wz=YI2C7|a2cPb@2gSHoXEjZ zv2K(g8!gx8t%BJJXE%m`K-;j2gEpTED;eIAOgh^6OIzI6ba}b-J#BMtC^SX+y% +Wlo?uw zlkc1Tj;!$GC!UpJeHR `U7ANfRvP5ZoS5iDI? z+9 2qhD?Oq^RZ(v+40BxCPNc(!=evagS@ zw=iKwuhK`<>j*grUUE`?{FrWeg-a)b2#e7#(?Ru(D7 ;*&A$tdA4zFvt@bBXU)X+fUw7@$|wxI?yh;qLVTzcp;16)2`#y z=;HIf^{E#zM$n9m?rJPG?$@%wyARR@3pGuhTiCt}+O$OUHnB?Z)ohrx$0sn8h=68F z`x6N>aINgYd!0B;LLGu*2IPNDeNpg6fa_uLNWZUk{eb1HhYECRCS83;BKG|Qe9Tp#yDo EDDWl(b=$)K zMV?P3-1D2I$;dl$_sNklO3;tEWq?56<^oa+ {JT%vf= b8wsGY28f?;^Z9GG0XuidttRS8XfwZ$_ab~jVm zd6(~-XNE^!Cnbo7%&>#N-T{{ELrzC!$hN*vuNd!?c^hPY{7n@@3sz^28r@V&s1Yi# z;Fbxp`>jO=T#bWfNE9iUK&I-OS`PTc^c|7s0aH lJ1-&do|q k{Wa2yxeLJNC25>>m=^R}%J<{?laWLYX=9_3Okn{>a1!STEVIxS L;Ar ze9po#9N0> gd>#oc$t;x-=;_yHl+e4m` z1X+vC5Rj)Gekpz$B$qv>pC-)7&J-CaN(s;6M5ciZge`S1a5K4;+%2BLNBh>ozzfbC z5?@E~GkEx@O72IyRO##;_T!={KyJ&rc(&?@Crvyw)n!eFTOs7yUGTy7sjWR<$EIAt zoa Y zIEl1P;BtSw<0Hmmpl}lSyy`g-%Fclxd>(MS{^}K4HkTsp`UY|D#K0st&mIfqHADf4 zSREYd^rS7GmuyjzSZ<(+qO3|+t mr{zY>^7VZn0=oOEha-rqWA7}kE zcl%P{WvVJaA=kxV29N|sM { z nw^k^TXPpFS(tTd5l(y &gR|~6 zSO=CN^ln++q{BY6YVRIRjx7s1v()=B1*agXxVMFeKj$!$FkWX|ziGK9C_Y_i)E`?GWW2L1H@{{Bx!MqHoA zIzshoaO2z;Wq!@{X8j0m>iOE@F5q3XK67!u*)%%e-(OWV;ikN*ThP*0a28cqfK&2% z 8zuP_rpRhsr^snp>r=vrX}_4heol!aK6WmSw$!vamlQgTaTgYCZ0PnCs_W5 z2p;_lAr3LS-!%tXs2)H_a+ng44%6j&CazE%wKt%MmTuN3aOHQY?XXM#OEtlnw=MBK zhcu?!oIXVF{e4?o{p};71vS;?upD=07o-o#?N5=LmfW(Hrb;m1-i~uGVcvg#8Wwoa zdGoX?rBQ2%lLk{|wcr-<_NrpkH-OwzvZx<&ci?O?Ta`a?9j`B^R>7VNmE(U^Da&6& z&k?UAZ1w}NiJkvfoI^R#&f(+l9NYZ)uyBe$I&xpO>p8GCSkZM}FOoK!kz zpVoBOc(%*9m28Rt;5}a6m|7ILsNyJUUH;mYhR*~Zjv#YiRe#Mvj>&sHEJj#J^pEC% z9jX1x0ab!yk_SBPtzG~CX>iQ7k9mr3`a&4d#`15@Ao>|kZbq#A`6CwZMIn$eHeic+ ziI&I8Qj{RuG_mLTNp3MUiUZoIR|@Y-z_k05XLXHGkMMoC2;bq4v3-Pu6KI>hoB-4F z<@`-Z?VOeSS-EkkAAVM`$&V_bFG(+k A9)4>lVvRhnx zJn;U%3pa( `rYJ`cmkD?rRBG(%%XXoP6R_{{#T!)A!*dRhVo vl}=i~C)(mp(Gu!R?MS@zp=D>bX4mkO_ol^;jaRxR26u*Jd0* z>a~8@a5Pe5`CKWz%?Z0;UgtAO7!OF-yh=^zt6YWi%T3*(K7m4s9F9i%Qd?X1#j}LV z?E3?lt6||(K!AK^)@ygTCc>;2jPeM-H9bkVO|kT|f`~|{J)@11g#tVcJ9X5ex-Yqo zIn{oDm#Ed%U9KeXu-c%y
2jw2F!elS{@ zhlTZHaeAZuN+!|$VFj2NHx=5l`CyKWmMAcGhcFWM0EJ4bti06qgV;kT?hTQ#K!CrB ztci-}hXpH9UgmVtZ{5eN-1D){=OK!2m}7C`8cB2V)KPk3!otm!nlRU#Z0k3`!5yfd zYo!s0adRO8Urv53K1D_YV1ayEe{%$==~nbJt;17VXQw_Ytr~4{9JQ8}m^;mSY!-Q` z)LCGFXNB$y{QLz09;n$l($y@~@z|O!*AmzH*ecYi(M5{$T$s(%{ud@(nZzMR&LrH| zX1^T;5dL|}b+Bk}kr?oqu&1tzvIPcO(FVfH 7n?aMZGh?`SoJv+Twbd(|;nGyRs)HO8c znf4$JD6_6jP3zaP9Y)U8fVRmDHMyPHKLLTaUy1hTisNqb5CusEt<8j8gl%VD8W(lw zHs6pc{T6T%{H&e7wIBp}ZcCZ7Zc%1tN9v493UNmCX1R>ZjrkTfh>kvpLL}!k* zMC)ez~Y-sf5{&Z*mW3AcP Zx$e#3@miX2I6H}6jLp2%6c0f;{F(JT3g9i`;QQ$DHl+*tn|xB23#?;P2+ zk?o>B`BPrR=C0ke!h>pk_TDFPP2B=$VtzT m$Wln0g426p!OL-c zBa-t9PXhAy+5y54p~9!C%qrz0Ev)jf*B!nwgYh$ddG(Kl59IwXJ?-tv8@V&j3puYM z`WE8mFC?PrWHf55#x}|_?;bemnwtc6`(iC;{}Ob>Zxj7l&^)8piSY!oje|m8;)6dX zqR{-?DS;~lfpp=aeBmbZAt|=RZywhbD5g-Hqj^lPh91Sb2_~ }w%_34)skS0`PuBT{q9S%BhKlNrPa$>9alMzty`u4NOLL*1<`ksTchtxCr zXRFUkxCkVhk{YKdzv+C<>My?~gZENg>;)+6AFLGMvb$54Mr3xlVsN~b3W(;so&88t zDY!W0OUHa)ZGzR *hsQhvaI`FC&r?ism18xpjN zpl@3gEz~Ms*+lc3eP|rDCKWq=>>st}c)O{yn4*(00hd9%C-qvMWA7O5ZAlyr*K>|$ zovCz`+j06_i#8AIUnc^9wiy`$$s%fNI3l&7x^ZtZs4H-Qz`}bKKzh<+;r*-|gBOhO zJvRJ9p7+M38^5gvSb+Q6n)+5rJ&r=Zh9+e6Keh;f3OA(~FJA%+N;$f(N|K_;$r80| zTOrj??K2n)#Jaie9k+Sp`NE`da4c5ws<^fY1tl!<^o6OKLjPJ81voE`2^S?v{W?l9 zKv3&7hYftMV{mJg?{Qx8FddxVwSHua @RzG=C$6t_}Z9T(OF` @ET|JdJi(BSO8=pyC6VP|JhFRERS|s@Toe*VWq!p-9EW#r z5=*_)3fX3b5+bZTXBf(@wJlqu7UYekOUK_jDrztE!uge(@BicXo(0@`j`E2!t|zzc z&9nM&?K`YPj-9diqWGKsW5Inn_t>E74nEFy4xRxHCr2S*wkt5VA;8duuIQANIk>+E z<5e$mDf26)anoN=QR~T46~v;!Jblfl?HB)c3q8%$p)T}(Vn9lNdWwm7lWelVJjAYF z_cnK)cPf@MgWC=d7$MGR=*{EdmHnuAr8@zvJxM*N*x7 !{1fK$x_mtBNqA zLGq^~K^` XzbSlekwuYv !Th5Gz&}j-{6kgfAL%ImL4zg!2OlmlkowOT z6u5tM^nZ%xzO;6Kru_HhRtoPu(cn)@1qB5dew%8_&oJ?6n56Le_X1wDME&0b$^pXm zMZX7j!6xB<21tPe<-Z3C+SA{t{2p-xad!O~_`eYe*5zPZT`X;2yLWHp@6OUY?cW`y zMiz552M!CxyO8K&13y0xUD8){o<{D*><`4t;luRz4{!nx_l0+49uAK`JJHe6>zlH& zIB97oT-LV;cwz>WCnoYuO~pDp54hipzTeo~coXq;Kox8~esEd#HQf)a&O<{
2CxzD%49hX z4o2ZNPnZ0$+moBta$BDi*43kA>@XD^Q|Ng2)Gq#}lh(u{`K|FIDr-}Ye|B~*af8>x z1FL@D2~KWu+c=|=G3b&+z)qSw_~$2!Z~RAbEq1s4>eOv)Yjixt5j&k`W@Z&}u%hq9 zh+VI5;+E=TH;B2dUo-30=uJe{8%&A`o0!CxpFBTyIdprLoAz cNe#z_}AikyrajHKXOIg zv!xzKH<+@c8w!mbg@wQ0Q+bA_@pPIZz$u_U-dO)g9M=JN_w`M&=z2Xgai9W`fIbi( z2nB8NB0(GFcR%Y1j-i$!;C3rJLjOcCDl)K3Hu+ `@p-}=5l>#tkEii(Ot=kSjp(O+|bhlBTfK*ZefR8Ucw ze7r7gd1yO+wIF~MxMzlEw1~=85cBwIavv4QULe%e*EfgQ)(Ttp(&G< T=3{NKv7@e^OFSb;1u1b}q31y;R%B(A zsDhe!o$tc6@n5`BHxVuw+$^3m-~u{hqfJ^*XK@5jfa2}j6~+<^Z4Cdg2&cd+c9hKH zs-fm0>U<@opfJ*^PRqnlq|xNmmO(r7hR7PB>myT+-as=X{rdK%k0DkmcSubpBM<_Z z{DS$1TVI&v@cL2fJI2$E%GwBPLqo&d_N=>!<_E+%az;B}cV_G5D&MvrC()reQ$=&j z84B;7RrBYg=LFFOmtp$C$Y1}9sV1`f2Uo&ozcxiCIx|K|etrV4rBNvzYDrN+@6dAw zS+B3o)zvQJApgnS+#K;EI8vyr=nI8L2zp!Vuk1RT6Kr3Ye?Al-hTo>~2Q|`jL-BGr z0ju`pWmM?)(TX~ILUSsuZPP1}%hBzJ&AT**4TBpBT>=&zIu0_2I13Al`Stv 5iZ`Fel#+OLjK~($VSc`ASbRvmrr2E3kx2Eq z@P&Cp`Nmi}^}`BXoQ_wg^rFji4xD?zoBu4=`!FuY@AH66{Z-152Z1mpgHz|y!&-~9 zI790DT50ip#Tp-J@mG!8QDWtY!X~^cHv~FbZzi9crr|5F8a_ze3spz(ZvIHJt~)^0 zy DH (<(Jhhqx_lL5SZ6 zdYU!6zT#T?DK{dEeTVh70J6)U|6hAw85Y&|wktIt3^0;I51@1mpfmzfq6jER#}I-b z-5mo6C@tL*0)m9Jbax{m-JQ~THu(GdKkxgVFDJg7>w4$YzGl|!wbv8(bFXJTYwg%> zbx8HZR~F0rsZE)I>?|~Lb>+lhgmZ+7=RrEnM?-8}d}AXD?x%&7qgG@7ta}GMeH`Ry z(fC`But9!;dE3D*RfwjjbT*C0=s%2~ZM8fhpRjqPOi#io&hHzkMGGCCc;BZXpV> ziK4MyY(y>nEzRQ2>js#|=P#e;#!t(GX{3!V#JYp7L8P3YT~<*(9;FXe{myqKS;Dk@ zWfki;YU}q~!1q>-H`;7S9azS)q+45HK`f_nTU DS9x6L_k#c8AzAAdp)m?yC`$4%lhP|6ABTwFVq-a zWkcR)g+9__Y<`bKQ5fFU*Q;3!k|PuN_;jY3xQea0x2@N{?XDKd`s*T8&wXRhKbqM9 zG?T`4&UQZXvo>Cx4bScyIjNSDwaw$)YE>*yi^JVl84MBvQ?%RzW~{QNcoKYsU`nN5 z5nAoVD$5HmN=T+gRgeuT`7mq{skYmi{?gJz+02FTmeLNkl;g~W(Rf6?Q}7D|gU&qr z^qyI@FAE%DDef*IBHPV2{y5z*=SyZ~o3iscz+9*| -glys#3q=rLu_9cVUbMpT>)aA7gAS>23SFw57m^JaP@Y$MufWcQe_c$l_>6+ zz@b$x)$5fj$;SlUXdS+psr}(v`nDC(B7E;Mh(PXICHyTqspQQXdlg9WN<3N1$ekRn zbH )dp7MydR)-fB#soyI zed1Y^!lCKuv4K`pBe=o8q-2~ENm=fJu@_3E;Z|J>2lGlN-ny5B=lFOm4fV@}qaR-y zm|)rG$Hhs|7hQE1_vxWAnL6FgE%yfacdXxBNN?7EaIyAIU?YzOCoH;!zsYdDOIQ)r zMf&_n%?r$6*&cVJ^~R_78gpAQLOFIz;22as3_a1sWX~C~LEU$kjN=I9i7Nf9MBX%r z9a)8EAyyt^8n6Vo3@&^{AWGh(w0G)C#58M@-$f+FUMpdV-5VXPa <5#B(q8Csc&AY=)Xyp08OqB@y)&8kVx`#rvnubWgRqU~5FBQYvOoU=~ zYr?e6Sobp-2-v(7p=deU{xO`N_PykBL7^qJDo11R>WrOGH4#rky{L0y%)2ADis}r$ zX8oO(vCF65D6l}ps)aR(-Cg?7UlT9s$VK%YHHghnFNDpis_VUIdhmcY?~#$9?HBsm zi>QJ)!4Ej^sHjzCWspEhk3oYQRN!Jbk6Wy@%bdajD$*nY6J*IO+3zRdfbxwXz6yy~ zlCKFHQsFwR7-$@E;}mr^{dLr4NEBz8peSWNo|%gNQ&Y<$2X%P1K=-_r%*xPBw7P-0 z5=8%7Ti?-;Pi}#tV`QUx;ZnTVAZa-VL1XaceH!krX8vu%G3IOxolqZZlj0UPJ8V!Z zhn2=Vl|}2bXUN*`2zZ27-UCYYS?2Nm?3^$w8-JvCvAaQGVdR8|m8rHw; vUIEPUxD8k`K;lp$KKjbNg?NHC7 z_oG8<+Li;IP@Cg8a@nAfS`A0YhGVckp p0s2v0Lhx|heKEqI`$oy!<&$$qI&Mo_ z5E&ZtF=0w YFtT%y0JIp!~~pB^}GRQ7!hXS zvp?49RLwZ9=tvJ8>qD`U`@$90(yo*ha+exmph_^L_Jmqiw;@% t!*2 z1pTc9zlX-j`!)0csO$%bkJ>d!4LA*F8zvj8blAcKg~XW)1{7eaLX}*lR%7jJFd1uW z5Q>f%_6_xY&w`#A3ez?3d`F0x26K&@aO9w}iPwEFOg0WJu&<~tY%o81_F3Gn>go7U zjoZD*K7ebe41;EJ~U;Tpa`2(2-7)`- s^}|gqcz{Kvk&(s4{)-Oc z((edG+t`->f(mbA$;Sy9%fmfo2m(qt_wtNwr($a6e@@TsT ag zNi}#Kx>L%1|JukvgpSta$2cH=pCl<~TMK^2Y$w)_n^W;=n3pj52 )zDrWvK&LJO$|#C0ypTA2=< zspR9+$EOdz&>Uy-o;^!8yW_xy4XPG*=45}Cu+;hl)dB`JTgUE1qST7KN)aT9q^Kna zqR|JXhye<2WGu}oVt wS1l?A1z3?-_YTd+m_Z{7O zdXqU5v`~QAv9S^n7OMIJzAGArHDmorXHy3rfND6^eNh%a1}pacfl#yq&=l`Kq3Kg( zn@PN+ &%ZnPJG#X$Ao9JV+b^5AiW`}ri{X%VY5rs- z2>3n;J33 tGl-RIS#!m(;{FD-@*44)@e`-08dSjAE2KY9X&dihzg zK^AVZAAAqJM-wB#6xcxM0&E?15i|H%h8Fv|E(9z`MDu&GDwVpD&J 6#XIPGq2Y+x!e96w z{fLK#@CDx85si9^vmYuB&mIN bgF? z`$tT>f}8eu<%7@gZ5mRIj0B6IAqpp;pBO%AO>AICtG}}tX&g{6uS~!W6i263HzFQG zeKGPk4CAqKjre !8PK!x%oZm+kw4%XQ-9eT2jid2Q~PMwxGebDy8TeBUXJ%Gx>2 zAN$V4j!%k;?uM`0G}LdAU&QbDGz_kT3a^pk KESy`ARKf1X9BU@;avY5t_}LWT%Ut(km*q9P*XN$d{PVNyAb>pO3ZlE)7ImG9Qv zLXZX$7KlBsEDYGzclhZxET`>_-J^y(K}lj03pQmh2feHUk={7?$C~hfqEYR{u0DwQ zb-`QqJd*CX5qAJr8><5m_4phlymaDZYL@bbVhZRDsjqI~{=SWBi5qPZj-O 3l9G%*9{x4`is_H`#bDfR)3!*E3f~<+gQ#*dWGaw{@UAY{ON7 zK6F^ea7C|~j*Ab8(J~kVI43C>d=l*^NXrub9e3x~GSVB?aOm>&vTEisKV$J_8>Q;n z?yTMy1w%4|FCDo>whdzCWt9j;Xu%_3S~K^t&Pn3kVSiKTFfQU6!{>WklGPw{oM~Eg z&ZRGk$Z<8!{OjiD2VZ|QvEls}%X@lMp(E$v%my(wcw&HK0-hJ_kA17U?WDEUzCN{f z5^Eblc+07^ga;d)`uaSMY RPJgEKQ36XDlq(dEFQR)J!)NlFISZ7im6a4cY5Hl0yE*QU zE |hy0~6IW^+j~(1>cAgR7VAE&tcrXtO?RJLq1p+K|79-R5>R*61bZVm>VL zQ x)&2l zjP8T)u`5xWJ!1H1@d@hwkMYLr`F=SaEU@{UZ=5qf>2?ZYcVD%(HPiWvUI1+r0o=AM z^MX>g9I$`I2)7@S(&})l94AA;j1%0d%~VD&izAiThdV9p@Xj7)XyiuNf%Ivzbp5d( zl7}jjK^Hercqcl~lv8;jL}+I}LbYbu-YM2PjwM)|6B;?Ow129G37&YK4R#E0kf*h; zZbQ+h#Y{&anh7ieo|9c4O#bE^Go&;c>Fsx|-Z_~Y;Bv`r@6CO<+m!uqmRj4I&0XCV z1Eb;23L^AD!c()+imh}Y0l?%TB#m~5RL3r`FU{W= dd=GhbK{t;V1uA*SlZ@L^Pe(AN5k(bKyw$CZe^;w$_I;dBY*k z7zRAxjVGr8=T1xjB2jM7{wK~kyJ`>`^CgDp(;EYmLN4hHN!sP<-_yq}+Sl^kTCZY= zn%`SHthZhOd5eebW<=n9|7W& )gli;t|sfrtV)s@GtgG{Vf zl()%Q8kyLRm6}Xm|DyMMa TFX>ecTH6bPF<&fZW-4QKuad?<=spws$Ch|F9#^8x8JVkiw`)LSw <3}wsVObGF82p5l#qV {6Kt#n9;;zP~c?JUSlK%^gmf _a*2jigwgtUlHU8cXzz~NmL<={naQptnl_T{ zk1EZ2l(~zBZ^#JYifwz^zvjP4@${a7z{Fz3RRU=Ji$UftE_RaTX`W?dM!Nh2TX9Ea z0|^NRS}|vHV_w4H=Qj=YmDwFBq#wkiQDb`si#UT3cV5qxBzmE_w(Mr+3Pku^1rd1- zzh9{OhJa0W>C+N8s>Aycl#X59zA7sCwl)+pY#`s4@a$3A4Pc^GBrC`Ia(TOE=Sui0 z=$^dk&wk!{d6=w%TEZca&Cs@rWOyFXa?JF_YkFhLtIc2eHN4%X+W!e={Go` b3vW~vAz-!BZ4q3Gh~jQ#lS#=}B;bm>iI&_ G>| z$yZ*Sb2W#d5xM7yj{Xtj-}&qNG7KN-goWZJH 5T;~Q1_H?h&-YF?wi*X%=+ELRW3TAJ{NWmqCppfzVfcD zI|}K2vL90?_p9}7w57;qz#*?F$h?pyqwKSk^!kUPb^E8T>23-ep|x+iF?$H!2UyQM zXV5bYCinsbmiKWTcVWEr5o#V?I&`ORMm{YYytIgk=?`0Vh7izQGD1;@evG|}?s+2i zT&@`ExmQYe5w5B(p+dLPp`m(2&Hjc_rm>eNBriRsT?WToFUS!8GbfOrS7v_cmAW;% zX4Bi-c6v67?!&aWOPrc+lrAfBDcF59U6duMGl=*385f_;x2E6@>f>p>Y$r>qF0)vO zPbp^K$}&sL$97RxuTA gk9d?M6LT0U+^0E59
b$+j|qv2c>8__B2E4@>iQkq`AW`3Q}&)yPVsaEdyJJE$EPK3Jj1KemN`G(zF* zDya+u5?`OYp$YFUd$vV{yS?&+)XcmfEYv9{I3&VnD4 9~!(N&*U@ZTdjMno21(YJO!W9ma{5E<1nu$N}fN zeOJ$@vNTd?GRx|&QO88l{u5;W?wNIzZl9n>UZR^`HLx|cHzn$7$W>-(161fr)Dxr{ zb=6F}d+)$q79C9#aw1oY_qBaOsC)2#%I=)V-ctFt!)my5;O{UYqlfN+MLK^bL_}Z@ zRI#rsF|{v)TjNvZf};R9`Ujb;!#>|S6}H *V^RR=> zIz=HzhcBo1s#J_PS>&I{lLAE^Fu0gNZ*MOHaNnC=W%!pW-gI>oAujrPd*ml?z6>J- zs!eY@2G+vCVhGruiXwE-EZB#B{NTXOROF_a7{bfuPZi96U;H0P!|Yq!^5&RR`s0Vc zRH-)Ca_x`s5=W 2nm2t-3?S|3@zF;#Uv-lj^3%^UHrVlAc8j{3H8lvrA`(QPiI zIW(`n*X(2=EOG`B3B0;J23QQye+7Zcz37t!L!8CX(ONXMXi`4(eK~>)Rb@RE{!v^m zYP2=+O{yTxa-iu}b68--5ObyxY-P~8t%29{)l}(Od;6H=2t$_9_h@&Dx(_6y-Iq@% zX}3S&CABWv*_mvkyI**FW@^v`0qdnk@jW8!7Zle{D#BdJ6bhk_B^8z(*v`mmUfh_6 zSN)x(F@{z~2G?^_TU#U>HPiI>U09vOB>VRGS?Rr^-+hUqi!=cyXAb8QSE~vKEN9Wj zJZF?53jg}E6V{`I;>*$ow=_|P%i=q!b_o;|%}EPaIS rs;BA>liE;9>3d?$rc8UeRQ1Q6sqN ugN%!}sFJGmA#3x@F4UKOAOiYl|9YY^^3pS_96yXD9v>%t4U3;= zR<(sN?Te-7xcXYR=g{9cK7N_^l*EHUWTr7_Z*qxBinm6Gf>PH1BlJ0MHdOnz{0s2) zHj+H{_A*-27axtI)QuGp<_)v$YJ%0x0eL((z1{If=`503Az3sL-{A3CZ5r%j=hqrS z3iDVc-`1zyC=Rm=7-+M+WL8q;qhB(jmrHN^T*oN@y`3kBUWs_T*0)Ssm1W80dgOkx zDXEOGOoLkf(|Z@j(wJE<2QPboFbw}LiG}r&KG2B*%NrTh%y#BB{~oe-uIYaS8jaIg zRL83(%pPEmhLMJhC=&1Xkx@t!eIs48le!SntG(6^p%30`&AvT-6b4rlj9fTrHav2? zlwvsGe8|$y2m3&xYq<4<^CJ#6wGpJ|*+;HNBA>Pfc}Qr4xtpIB)3%NM>#uZ?29~<) znmUSBdg6O`U|skmRl~4}SSFV!lJu%qLc)CXEQMSzgGAVG3!HA$7ZS|(fsHdD=X(BS zgZCC{QG=8R@5ZYGcH*Jfiy8Gco*pB?h-Rl^?>36ttt2-#siyHJRmad-JVzp^%NR6H z=d(JIcGX||>RT4QLXeB>^V>6hZ{*K)RLl9j8n%3f^97@2hwvTI2R3e|??Ts`o5}Rf ztk)O2@15}fYW;aOey~v&4oLz@35+K|G%mDO3ZK)3s41OGySCU7#@ U5kEyH!>gtkZh*EFO1m1ZjzkiXAcG$*s#TP5iY z2nWhn^}N^iuVOi9D9N6;Y)(} LqslCM<> zbl1_*vA4JPO|!hUd}wGWr>A-BSc>8D?~{|h`y!BFem?Yl3FGv%14AMp&vl^B&-j|O zingzVF@>@VXOJ=+B~Q1mHY zNY+e>Lt_BBl>5DrKm36P0bwL*-bd!F#o>6;y1Tbg+RFV}8CFu*S{>u+yAmz7zO%o& z`j%xQ@!G<3j&(W`_u8H2v^%EuswNW?G|mOu J(1F%i1L0dxgG0RP(bH!%2 zQg;JR8VT_Da%wJ8&dAVd9N(i{F94XV?&XfI+n)B0Q>V!EQM2pCk!DI_a(ujNwpgMj zoQvz8Zh>aG-sOzvX(iv|%frx$o-Ezpk+$;VcHZfs3W94HndqPbr%R!7`^1DJ_2_!o zv{<#j6NSmkf59Es@_ah6@Lomp`zPaXaLi1V4TGPIbUdspE^};=JWW<3QLKM&|E}(& zmlStX_&3gud(XEJoxQMkS2M?=mq(Q}BHI-U>xVA)F=wtCWy;Le$E}x_U3GV^w_PgJ zb+5cOcKFXDOLQ||1+prsYfse#w;E!1kwTj(0*)b;^tYgjiuQ~U8p$8S|H_w+k=8h- zg^C0VJijsME#4g=^StF^jOz+{f~)D&=~1T)}DV(UoP3c7b!?%FMZ`HkIa(2jIwL zQ0QCU1WWf`36IlneQuW@Q)<_uIGu-BsSam1E@to_A9Yr)P_JZBu}vv>oL0?yi+ij7 zgXkJq-r}b!c76@}m>|!KH9i`rn(L~g2P%`R`!Z9DEHYE`EHX8_)2f17v2|IOyq42i z-$slQdQ^pvIQS~NKTv2HwXhes9N^|#9n=(@d(OD5H0@_%-D9D2-7LCcrNGXgMBr@< zs6O+?&`8Uz!UqGtJTKlKvkn?Uf{TP{ws}$=k{C&P?Y6{gNCL_a5ECGdN1DD{)H3$ zaWo$+S`E+Dy>a8D)BLQNdD-&1&8>X Fd*uAqv7zCMo0N Ev{3m*Ylk#B8x1ZXOmQdeOJ$aS)LzlWhFUiXkviyL_jy=xe1aP$+a4Q zn _qyvc&5Jc#N5Spm zz8sa_7w5sj!NB_s7`BS_n!cpCAGOSQEU mtlkF zahqKO%EL)+!_Q5uKmY23gAS7FebDP+KU?joMfs6{1djsmV%Gbc3QZujwCK>q57yFH zrW>@zXeLJ D!Fx`y%HjL4b2Ln0eNKTt=pv)U5kAT0B_!{9>Wrer_ zrrZ&KgS2WOrs?+zZscuItz@D#S7K1`nq{lxnxsgl7a48+u+#hT x9uxz$-v%KC$GU7J>@W$X^N+u!F(t)s_k%$BV*wBI+C}rM4xPf*B9DUQa zEwOgtu=T6d 3?juZK; kVS4itTnmD*NNgUuEp$4E)e`a4~Hz8uQ}%alp%S%$6sDt zUU$L;iYxAWEY!;vvY1*|cb#b48(5P1DklR?(znoNsZ&Woq_m)bQ(j=Y#AIl>Cqe0L zaXm~304#~WA!o1+%2v(#vP6wT(JET>os|5`UIk7jcQ5gLfM#3%aD%Z+e^dEL9|F`@ zjtwb@y4%=r_t2{lOQu0$S}HL_L`0ZNbP*7P&>OM;13i%jca?^&CyugCBt0v;Q=4CW z50S$EXxaWrd-4_VR*~lH6^qWl9QO@C*ts}$b3-YIyJ7j9S9?HY14s|y$NT!NH(Cdn zj9@FZCG79LO@J`$7B0Rgdp%zyUa9a#`$KJ}KKZAiab4i7lZ3UW1PeW&zwLc8#RQIy ze(p =@L`gW?OGP5+ljGwdWZ~h~6wtJn{ zZu;E1hKl;0pONhQK5Xnv71c18*A}eTMJKc2w9*>0ySJ_@1|-UEh$YnaU~gqTGxPxy zH8GL84&;)V=fji)m+SOEB`Xz~eg@Yx)c#+r74?R-wmx*P Q_oy;HZs+do51?&`B`?j`Y32*2(TvEmmrLwlES&g;(mqIoC-ZS~rBe0Gd=B zawDJ{dlyy%`O6eDpNAI(#x_{K`N(J#8uB 3Kk6{Q?rgd vN4g8gPOo+o03F*+S4y7JzNQwgzmlB z!M BRL2uHK6}FS2rIOcI^tfrSza9ciW_UX7zs##f09tRU zYi?l%`E~%39GJJT?i*2Pa8xxtCA#RH_HGC-8Xp(QNs{zTQynO;P8nEPb^hxxyj;A~ z+2CP=AEK7wD28+5izoxjt!U~Wb$fd5rnOMbKVIuMk&|CZxLDM@RQ`I{uxepo`el5w z*wNB7>hJV&QIm0rf=SBquYSu`R0Iw`4 |M7cn6@Ief0^)v^&CE+!J%75)Djgvs{R;;4aOraXoGw3;=ZLa1|)J zJL6)}r#?}o5slkiJRi6>>Ev=i>q2lT`{q{aH#wRAy9 B+pIpvt zprT}>OC>En6p%uFN%v`diyR}>K`80x&Tmg7)-Df^0wdH5aoa8IfA=En_HS4q*q_~2 z|L-oWRPWxp^qm46&}-U;JL|yu^6~~Xm$iwcDQZnp08tz^P=&KTjT}%QuA-=K)rI zu?}=S7w0JHZl7%2M_hCZDSl6F f`G7Y2X@C7rSWz+|J~$P4FCVjrT@tv=Y!WP VCOdFm2;Qn$R!Uwn{|N&5KL9@_jZXjo literal 0 HcmV?d00001 From 585664177bec2599ad736a01fe15506575f00529 Mon Sep 17 00:00:00 2001 From: hubwriter Date: Wed, 15 Apr 2026 14:01:31 +0100 Subject: [PATCH 8/8] Copilot CLI: Document LSP servers (#60592) Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com> Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> Co-authored-by: John Clement <70238417+jclement136@users.noreply.github.com> Co-authored-by: examon <1676292+examon@users.noreply.github.com> --- .../concepts/agents/about-agent-skills.md | 6 +- .../concepts/agents/copilot-cli/index.md | 1 + .../agents/copilot-cli/lsp-servers.md | 74 +++++ .../{create-skills.md => add-skills.md} | 12 +- .../copilot-cli/customize-copilot/index.md | 2 +- .../copilot-cli/customize-copilot/overview.md | 2 +- content/copilot/how-tos/copilot-cli/index.md | 4 +- .../set-up-copilot-cli/add-lsp-servers.md | 295 ++++++++++++++++++ .../configure-copilot-cli.md | 2 +- .../copilot-cli/set-up-copilot-cli/index.md | 1 + .../invoke-custom-agents.md | 2 +- .../use-copilot-cli-agents/overview.md | 2 +- .../{create-skills.md => add-skills.md} | 5 +- .../use-copilot-agents/cloud-agent/index.md | 2 +- .../cli-config-dir-reference.md | 2 +- .../copilot/creating-adding-skills.md | 27 +- 16 files changed, 417 insertions(+), 22 deletions(-) create mode 100644 content/copilot/concepts/agents/copilot-cli/lsp-servers.md rename content/copilot/how-tos/copilot-cli/customize-copilot/{create-skills.md => add-skills.md} (83%) create mode 100644 content/copilot/how-tos/copilot-cli/set-up-copilot-cli/add-lsp-servers.md rename content/copilot/how-tos/use-copilot-agents/cloud-agent/{create-skills.md => add-skills.md} (86%) diff --git a/content/copilot/concepts/agents/about-agent-skills.md b/content/copilot/concepts/agents/about-agent-skills.md index 7dc1137803f6..15a42529b311 100644 --- a/content/copilot/concepts/agents/about-agent-skills.md +++ b/content/copilot/concepts/agents/about-agent-skills.md @@ -29,8 +29,8 @@ Support for organization-level and enterprise-level skills is coming soon. ## Next steps -To create an agent skill, see: +To create or add agent skills, see: -* [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/create-skills) -* [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/create-skills) +* [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/add-skills) +* [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/add-skills) * [AUTOTITLE](/copilot/reference/customization-cheat-sheet) diff --git a/content/copilot/concepts/agents/copilot-cli/index.md b/content/copilot/concepts/agents/copilot-cli/index.md index bd99c879e093..a78a8fa3a4be 100644 --- a/content/copilot/concepts/agents/copilot-cli/index.md +++ b/content/copilot/concepts/agents/copilot-cli/index.md @@ -15,6 +15,7 @@ children: - /fleet - /research - /chronicle + - /lsp-servers - /context-management contentType: concepts docsTeamMetrics: diff --git a/content/copilot/concepts/agents/copilot-cli/lsp-servers.md b/content/copilot/concepts/agents/copilot-cli/lsp-servers.md new file mode 100644 index 000000000000..9c7a6ced4c2e --- /dev/null +++ b/content/copilot/concepts/agents/copilot-cli/lsp-servers.md @@ -0,0 +1,74 @@ +--- +title: Using LSP servers with {% data variables.copilot.copilot_cli %} +shortTitle: LSP servers +allowTitleToDifferFromFilename: true +intro: 'LSP servers give {% data variables.copilot.copilot_cli_short %} precise code intelligence, enabling it to navigate definitions, find references, and rename symbols accurately across your project.' +versions: + feature: copilot +contentType: concepts +docsTeamMetrics: + - copilot-cli +category: + - Learn about Copilot # Copilot discovery page + - Learn about Copilot CLI # Copilot CLI bespoke page +--- + +## Introduction + +The Language Server Protocol (LSP) is an open standard used for communication between a code editor and a language server. A language server is a process that provides language-specific features like go-to-definition and renaming a code symbol across your codebase. An "LSP server" is any language server that supports the Language Server Protocol. + +{% data variables.copilot.copilot_cli %} can use LSP servers to understand the structure of your code more precisely. By adding and configuring an LSP server for each programming language in your project, you'll give {% data variables.copilot.copilot_cli_short %} a better understanding of your code. + +## Benefits of LSP servers + +* **Accuracy**: Results come from the language's own compiler/analyzer, providing an understanding of the structure of your code. This improves {% data variables.product.prodname_copilot_short %}'s precision when it works with your code. For example, when {% data variables.product.prodname_copilot_short %} can use "go to definition" it will find the actual definition, not a text match that looks similar. +* **Token efficiency**: Operations like "list all symbols" or "find references" return compact structured results instead of requiring the agent to read entire files into the conversation. +* **Safe refactoring**: When you rename a symbol, the LSP server reliably updates every reference across the project. +* **Speed**: Language servers index your project in the background, allowing near-instant responses. + +## What LSP servers allow {% data variables.copilot.copilot_cli_short %} to do + +When LSP servers are available, {% data variables.copilot.copilot_cli_short %} uses them automatically. You don't need to explicitly request it. {% data variables.copilot.copilot_cli_short %} will use an LSP server rather than text-based search whenever it can access an LSP server for the programming language you're using. + +The following language server operations are supported: + +| Operation | What it does | +|-----------|-------------| +| Go to definition | Jumps to where a symbol (function, class, variable) is defined. | +| Find references | Finds every location where a symbol is used. | +| Hover | Retrieves type information and documentation for a symbol. | +| Rename | Renames a symbol across the entire project, updating all references. | +| Document symbols | Lists all symbols defined in a file. | +| Workspace symbol search | Searches for symbols by name across the project. | +| Go to implementation | Finds implementations of an interface or abstract method. | +| Incoming calls | Shows which functions call a given function. | +| Outgoing calls | Shows which functions a given function calls. | + +{% data variables.product.prodname_copilot_short %} selects the most appropriate LSP operation based on your prompt. For example, if you ask "where is `handlePayment` defined?", {% data variables.product.prodname_copilot_short %} will use the go-to-definition operation. + +## How to add an LSP server + +For {% data variables.copilot.copilot_cli_short %} to be able to use an LSP server, you must first install the server software on your local machine and then configure it in one of the configuration files that {% data variables.copilot.copilot_cli_short %} reads on startup. See [AUTOTITLE](/copilot/how-tos/copilot-cli/set-up-copilot-cli/add-lsp-servers). + +An LSP server may also be added as part of a CLI plugin that you choose to install. A plugin might include an LSP server if, for example, it's designed to work with an uncommon programming language or a framework-specific file type. LSP servers included as part of a plugin are automatically available when you install the plugin—no additional configuration is needed. If you uninstall the plugin, the LSP server is removed. For more information, see [AUTOTITLE](/copilot/concepts/agents/copilot-cli/about-cli-plugins). + +## How LSP servers are loaded + +When {% data variables.copilot.copilot_cli %} starts, it loads LSP server configurations from multiple sources with the following priority (highest to lowest): + +1. **Project config**: `.github/lsp.json` in the current repository. +1. **Plugin configs**: language servers provided by installed plugins. +1. **User config**: `~/.copilot/lsp-config.json`. + +Higher-priority configurations override lower-priority ones with the same server name. This means a project can customize or disable language servers for all contributors. + +Once the working directory is trusted, {% data variables.copilot.copilot_cli_short %} automatically starts any LSP servers that are relevant to your project, in the background, so they are ready to respond immediately when needed. + +## Next steps + +* [AUTOTITLE](/copilot/how-tos/copilot-cli/set-up-copilot-cli/add-lsp-servers) + +## Further reading + +* [Language Server Protocol](https://microsoft.github.io/language-server-protocol/) on the Microsoft website +* [AUTOTITLE](/copilot/reference/cli-command-reference) diff --git a/content/copilot/how-tos/copilot-cli/customize-copilot/create-skills.md b/content/copilot/how-tos/copilot-cli/customize-copilot/add-skills.md similarity index 83% rename from content/copilot/how-tos/copilot-cli/customize-copilot/create-skills.md rename to content/copilot/how-tos/copilot-cli/customize-copilot/add-skills.md index cd7f5d17a897..a51a76fbdb1b 100644 --- a/content/copilot/how-tos/copilot-cli/customize-copilot/create-skills.md +++ b/content/copilot/how-tos/copilot-cli/customize-copilot/add-skills.md @@ -1,11 +1,13 @@ --- -title: Creating agent skills for {% data variables.copilot.copilot_cli %} -shortTitle: Create agent skills +title: Adding agent skills for {% data variables.copilot.copilot_cli %} +shortTitle: Add agent skills allowTitleToDifferFromFilename: true intro: 'Modify {% data variables.product.prodname_copilot_short %}''s behavior and abilities when it works on particular tasks.' versions: feature: copilot contentType: how-tos +redirect_from: + - /copilot/how-tos/copilot-cli/customize-copilot/create-skills category: - Configure Copilot # Copilot discovery page - Author and optimize with Copilot # Copilot discovery page @@ -18,6 +20,12 @@ Agent skills are folders of instructions, scripts, and resources that {% data va {% data reusables.copilot.creating-adding-skills %} +1. Start a CLI session, or if you are currently in a CLI session enter `/skills reload`. +1. Enter `/skills info SKILL-NAME` to check that the skill has reloaded. + + SKILL-NAME is defined in the SKILL.md file and is typically the same as the name of the skill directory. + + ## Using agent skills {% data reusables.copilot.skills-using %} diff --git a/content/copilot/how-tos/copilot-cli/customize-copilot/index.md b/content/copilot/how-tos/copilot-cli/customize-copilot/index.md index ae4869df3634..f989232db78e 100644 --- a/content/copilot/how-tos/copilot-cli/customize-copilot/index.md +++ b/content/copilot/how-tos/copilot-cli/customize-copilot/index.md @@ -9,7 +9,7 @@ children: - /overview - /add-custom-instructions - /use-hooks - - /create-skills + - /add-skills - /add-mcp-servers - /create-custom-agents-for-cli - /use-byok-models diff --git a/content/copilot/how-tos/copilot-cli/customize-copilot/overview.md b/content/copilot/how-tos/copilot-cli/customize-copilot/overview.md index 8695c8fa99d9..6089975adb0c 100644 --- a/content/copilot/how-tos/copilot-cli/customize-copilot/overview.md +++ b/content/copilot/how-tos/copilot-cli/customize-copilot/overview.md @@ -35,7 +35,7 @@ For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-cop Skills are folders of instructions, scripts, and resources that {% data variables.product.prodname_copilot_short %} can load to improve its performance on specialized tasks. By adding skills to your project, you can give {% data variables.product.prodname_copilot_short %} extra knowledge or tools for particular workflows, technologies, or domains. -For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/create-skills). +For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/add-skills). ## Custom agents diff --git a/content/copilot/how-tos/copilot-cli/index.md b/content/copilot/how-tos/copilot-cli/index.md index 28e60dab6bac..101102e16629 100644 --- a/content/copilot/how-tos/copilot-cli/index.md +++ b/content/copilot/how-tos/copilot-cli/index.md @@ -34,16 +34,18 @@ children: - /content/copilot/concepts/agents/copilot-cli/about-remote-access - /content/copilot/concepts/agents/copilot-cli/fleet - /content/copilot/concepts/agents/copilot-cli/research + - /content/copilot/concepts/agents/copilot-cli/lsp-servers - /content/copilot/concepts/agents/copilot-cli/chronicle - /content/copilot/concepts/agents/copilot-cli/context-management - /set-up-copilot-cli/install-copilot-cli - /set-up-copilot-cli/configure-copilot-cli + - /set-up-copilot-cli/add-lsp-servers - /automate-copilot-cli/quickstart - /automate-copilot-cli/automate-with-actions - /automate-copilot-cli/run-cli-programmatically - /customize-copilot/add-custom-instructions - /customize-copilot/create-custom-agents-for-cli - - /customize-copilot/create-skills + - /customize-copilot/add-skills - /customize-copilot/plugins-creating - /customize-copilot/plugins-finding-installing - /customize-copilot/plugins-marketplace diff --git a/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/add-lsp-servers.md b/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/add-lsp-servers.md new file mode 100644 index 000000000000..0eff54cce2f8 --- /dev/null +++ b/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/add-lsp-servers.md @@ -0,0 +1,295 @@ +--- +title: Adding LSP servers for {% data variables.copilot.copilot_cli %} +shortTitle: Add LSP servers +intro: 'You can add LSP servers to give {% data variables.copilot.copilot_cli_short %} precise code intelligence, improving its ability to navigate definitions, find references, and rename symbols.' +versions: + feature: copilot +contentType: how-tos +docsTeamMetrics: + - copilot-cli +category: + - Configure Copilot # Copilot discovery page + - Configure Copilot CLI # Copilot CLI bespoke page +--- + +## Introduction + +This article explains how to add LSP servers for {% data variables.copilot.copilot_cli_short %}. For conceptual information about LSP servers, see [AUTOTITLE](/copilot/concepts/agents/copilot-cli/lsp-servers). + +Adding an LSP server for {% data variables.copilot.copilot_cli_short %} is a two-step process: + +1. Install the LSP server software on your local machine. +1. Configure the server in a configuration file. + +These steps are described in detail in this article. + +## Installing and configuring an LSP server + +You can add an LSP server for a specific language by either: +* Using the `lsp-setup` skill, which automates the process. +* Manually installing the server software and then configuring {% data variables.copilot.copilot_cli_short %} to use the server. + +These two approaches are described in the sections below. + +## Using the `lsp-setup` skill to add a language server + +The `lsp-setup` skill from the "Awesome {% data variables.product.prodname_copilot %}" repository automates the installation and configuration of a selection of popular languages. + +1. Go to the "Awesome {% data variables.product.prodname_copilot %}" download site and search for "lsp": + + https://awesome-copilot.github.com/skills/?q=lsp. + +1. Download the `lsp-setup` skill. +1. Unzip the downloaded `.zip` file to create a directory called `lsp-setup`. +1. Move the `lsp-setup` directory into either: + + * Your personal skills directory: `~/.copilot/skills/`. + * A project skills directory: `.github/skills/` in a Git repository. + +1. Start {% data variables.copilot.copilot_cli_short %}, or if you are currently in a CLI session enter `/skills reload`. +1. Enter the prompt: + + ```copilot copy + setup lsp + ``` + +1. Follow the on-screen instructions to select the language for the server you want to set up, then complete the additional steps. +1. When the process is complete, enter `/lsp reload` to load the new LSP server. +1. Check that the server has been added and is working correctly. See [Confirming that an LSP server is available](#confirming-that-an-lsp-server-is-available) later in this article. + +## Manually installing and configuring an LSP server + +Installing an LSP server for a specific language typically involves installing a package via a package manager such as `npm`, `gem`, or `pip`. + +To manually install an LSP server, refer to the documentation for the specific language server you want to install. Listed below are some example commands for installing popular LSP servers. + +> [!NOTE] +> Useful resources for finding LSP servers for different languages include: +> * [Implementations](https://microsoft.github.io/language-server-protocol/implementors/servers/) on Microsoft's Language Server Protocol website. +> * [Language Server Protocol](https://wiki.archlinux.org/title/Language_Server_Protocol) on the Arch Linux website. + +> [!CAUTION] +> Only install LSP servers from sources you trust. + +### Example installation command: TypeScript and JavaScript + +If you have Node.js installed, you can install the `typescript-language-server` LSP server with the following command: + +```bash copy +npm install -g typescript typescript-language-server +``` + +The `typescript-language-server` LSP server supports both TypeScript and JavaScript. + +### Example installation command: Ruby + +If you have gem installed, you can install the `ruby-lsp` LSP server with the following command: + +```bash copy +gem install ruby-lsp +``` + +Alternatively, you can install the `solargraph` LSP server for Ruby with: + +```bash copy +gem install solargraph +``` + +### Example installation command: Python + +If you have Node.js installed, you can install the `pyright` LSP server with the following command: + +```bash copy +npm install -g pyright +``` + +Alternatively, if you have pip installed, you can install the `python-lsp-server` LSP server with: + +```bash copy +pip install python-lsp-server +``` + +## Configuring the language server + +1. To configure the LSP server, add a server definition to either of the two configuration files: + + * **User configuration**: `~/.copilot/lsp-config.json` applies to all your projects. + * **Project configuration**: `.github/lsp.json`, in your repository, applies to everyone working on that project. + + Both files use the same JSON syntax: + + ```json + { + "lspServers": { + "SERVER-NAME": { + "command": "COMMAND", + "args": ["ARG1", "ARG2"], + "fileExtensions": { + ".EXT": "LANGUAGE-ID" + } + }, + "ANOTHER-SERVER": { + ... + } + } + } + ``` + + Some examples of server definitions for specific LSP servers are provided later in this article. + +1. After installing and configuring the server, confirm that {% data variables.copilot.copilot_cli_short %} can use it. See [Confirming that an LSP server is available](#confirming-that-an-lsp-server-is-available) below. + +### Configuration fields + +Each server definition in the configuration file must have a unique name and contain only alphanumeric characters, underscores, and hyphens. + +Within each server definition, the following fields are available/required: + + +
+ +### Example server definition: `typescript-language-server` LSP server + +```json copy +{ + "lspServers": { + "typescript": { + "command": "typescript-language-server", + "args": ["--stdio"], + "fileExtensions": { + ".ts": "typescript", + ".tsx": "typescriptreact", + ".js": "javascript", + ".jsx": "javascriptreact", + ".mjs": "javascript", + ".cjs": "javascript", + ".mts": "typescript", + ".cts": "typescript" + } + } + } +} +``` + +### Example server definition: `ruby-lsp` LSP server + +```json copy +{ + "lspServers": { + "ruby": { + "command": "ruby-lsp", + "args": [], + "fileExtensions": { + ".rb": "ruby", + ".rbw": "ruby", + ".rake": "ruby", + ".gemspec": "ruby" + } + } + } +} +``` + +### Example server definition: `pyright` LSP server for Python + +```json copy +{ + "lspServers": { + "python": { + "command": "pyright-langserver", + "args": ["--stdio"], + "fileExtensions": { + ".py": "python", + ".pyw": "python", + ".pyi": "python" + } + } + } +} +``` + +## Managing language servers with the `/lsp` command + +You can list and manage your LSP servers in an interactive CLI session using the `/lsp` slash command: + +| Slash command | Description | +|---------------------------|-------------| +| `/lsp` or `/lsp show` | Show the status of all configured LSP servers. | +| `/lsp test SERVER-NAME` | Test whether a server starts correctly. | +| `/lsp reload` | Reload LSP configurations from disk. | +| `/lsp help` | Show `/lsp` command information. | + +### Listing available LSP servers + +1. In {% data variables.copilot.copilot_cli_short %}, confirm that the LSP server you chose is available by using the `/lsp` slash command. You will see output such as: + + ```text + ● LSP Server Status: + + User-configured servers: + • ruby: ruby-lsp (.rb, .rbw, .rake, .gemspec) + • omnisharp: omnisharp (.cs) + + User config: /Users/username/.copilot/lsp-config.json + ``` + +### Confirming that an LSP server is available + +1. After adding and configuring an LSP server, start (or restart) {% data variables.copilot.copilot_cli_short %}. +1. Use the slash command: `/lsp test SERVER-NAME` to check that the LSP server is working correctly. + + {% data variables.copilot.copilot_cli_short %} attempts to start a temporary, standalone instance of the server and reports whether it was successful or if there were any errors. It then kills the temporary server process. + +## Further reading + +* [AUTOTITLE](/copilot/how-tos/copilot-cli) +* [AUTOTITLE](/copilot/how-tos/use-copilot-agents/use-copilot-cli) diff --git a/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/configure-copilot-cli.md b/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/configure-copilot-cli.md index d748fcb8fd49..eb886380c7fb 100644 --- a/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/configure-copilot-cli.md +++ b/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/configure-copilot-cli.md @@ -1,5 +1,5 @@ --- -title: Configure GitHub Copilot CLI +title: Configuring GitHub Copilot CLI shortTitle: Configure Copilot CLI intro: Configure trusted directories, tool access, and path and URL permissions for {% data variables.copilot.copilot_cli_short %} versions: diff --git a/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/index.md b/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/index.md index 4298bbb5d0b9..ab40084e1547 100644 --- a/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/index.md +++ b/content/copilot/how-tos/copilot-cli/set-up-copilot-cli/index.md @@ -8,6 +8,7 @@ children: - /install-copilot-cli - /authenticate-copilot-cli - /configure-copilot-cli + - /add-lsp-servers - /troubleshoot-copilot-cli-auth contentType: how-tos docsTeamMetrics: diff --git a/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/invoke-custom-agents.md b/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/invoke-custom-agents.md index c9b517744911..237755abbaf3 100644 --- a/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/invoke-custom-agents.md +++ b/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/invoke-custom-agents.md @@ -87,7 +87,7 @@ For more information, see [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud- You can create skills to enhance the ability of {% data variables.product.prodname_copilot_short %} to perform specialized tasks with instructions, scripts, and resources. -For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/create-skills). +For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/add-skills). ## Add an MCP server diff --git a/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/overview.md b/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/overview.md index 2ea76ca4de4d..1b5fe2634093 100644 --- a/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/overview.md +++ b/content/copilot/how-tos/copilot-cli/use-copilot-cli-agents/overview.md @@ -216,7 +216,7 @@ For more information, see [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud- You can create skills to enhance the ability of {% data variables.product.prodname_copilot_short %} to perform specialized tasks with instructions, scripts, and resources. -For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/create-skills). +For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/add-skills). ### Add an MCP server diff --git a/content/copilot/how-tos/use-copilot-agents/cloud-agent/create-skills.md b/content/copilot/how-tos/use-copilot-agents/cloud-agent/add-skills.md similarity index 86% rename from content/copilot/how-tos/use-copilot-agents/cloud-agent/create-skills.md rename to content/copilot/how-tos/use-copilot-agents/cloud-agent/add-skills.md index e54f03ba5de4..7417748a1112 100644 --- a/content/copilot/how-tos/use-copilot-agents/cloud-agent/create-skills.md +++ b/content/copilot/how-tos/use-copilot-agents/cloud-agent/add-skills.md @@ -1,6 +1,6 @@ --- -title: Creating agent skills for {% data variables.product.prodname_copilot %} -shortTitle: Create agent skills +title: Adding agent skills for {% data variables.product.prodname_copilot %} +shortTitle: Add agent skills allowTitleToDifferFromFilename: true intro: 'You can modify {% data variables.product.prodname_copilot_short %}''s behavior and abilities when it works on particular tasks.' versions: @@ -11,6 +11,7 @@ category: - Author and optimize with Copilot redirect_from: - /copilot/how-tos/use-copilot-agents/coding-agent/create-skills + - /copilot/how-tos/use-copilot-agents/cloud-agent/create-skills --- > [!NOTE] diff --git a/content/copilot/how-tos/use-copilot-agents/cloud-agent/index.md b/content/copilot/how-tos/use-copilot-agents/cloud-agent/index.md index e4d68c308282..ac80c665de96 100644 --- a/content/copilot/how-tos/use-copilot-agents/cloud-agent/index.md +++ b/content/copilot/how-tos/use-copilot-agents/cloud-agent/index.md @@ -14,7 +14,7 @@ children: - /review-copilot-prs - /create-custom-agents - /test-custom-agents - - /create-skills + - /add-skills - /extend-cloud-agent-with-mcp - /integrate-cloud-agent-with-jira - /integrate-cloud-agent-with-slack diff --git a/content/copilot/reference/copilot-cli-reference/cli-config-dir-reference.md b/content/copilot/reference/copilot-cli-reference/cli-config-dir-reference.md index 8cf199f38fae..ca501b9c5a83 100644 --- a/content/copilot/reference/copilot-cli-reference/cli-config-dir-reference.md +++ b/content/copilot/reference/copilot-cli-reference/cli-config-dir-reference.md @@ -89,7 +89,7 @@ For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-cop Store personal custom skill definitions here. Each skill lives in a subdirectory containing a `SKILL.md` file—for example, `~/.copilot/skills/my-skill/SKILL.md`. Personal skills are available in all your sessions. Project-level skills take precedence over personal skills if they share the same name. -For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/create-skills). +For more information, see [AUTOTITLE](/copilot/how-tos/copilot-cli/customize-copilot/add-skills). ### `hooks/` diff --git a/data/reusables/copilot/creating-adding-skills.md b/data/reusables/copilot/creating-adding-skills.md index 7981a47a712b..ab31184fd8f6 100644 --- a/data/reusables/copilot/creating-adding-skills.md +++ b/data/reusables/copilot/creating-adding-skills.md @@ -1,16 +1,14 @@ ## Creating and adding a skill -To create an agent skill you write a `SKILL.md` file and, optionally, other resources, such as supplementary Markdown files, or scripts, which you reference in the `SKILL.md` instructions. +To create an agent skill, you write a `SKILL.md` file and, optionally, other resources, such as supplementary Markdown files, or scripts, which you reference in the `SKILL.md` instructions. -To add a skill, you save the `SKILL.md` file, and any subsidiary resources, to a location where {% data variables.product.prodname_copilot_short %} knows to look for skills. This can be within a repository, or within your home directory. +1. If you haven't already done so, create a `skills` directory in one of the following locations. This is where you will locate your skill, and any others you may want to create in the future. -1. Create a `skills` directory in one of the supported locations to store your skill and any others you may want to create in the future. + For **project skills**, specific to a single repository, create a `.github/skills`, `.claude/skills`, or `.agents/skills` directory in your repository. - For **project skills**, specific to a single repository, create and use a `.github/skills`, `.claude/skills`, or `.agents/skills` directory in your repository. + For **personal skills**, shared across projects, create a `~/.copilot/skills`, `~/.claude/skills`, or `~/.agents/skills` directory in your local home directory. - For **personal skills**, shared across projects, create and use a `~/.copilot/skills`, `~/.claude/skills`, or `~/.agents/skills` directory in your home directory. - -1. Create a subdirectory for your new skill. Each skill should have its own directory (for example, `.github/skills/webapp-testing`). +1. Within the `skills` directory, create a subdirectory for your new skill. Each skill should have its own directory (for example, `.github/skills/webapp-testing`). Skill subdirectory names should be lowercase and use hyphens for spaces. @@ -86,3 +84,18 @@ To create a skill that runs a script: from this skill's base directory, passing the input SVG file path as the first argument. ``` + +## Adding a skill that someone else has created + +In addition to creating your own skills, you can also add skills that other people have created. + +1. Download a skill directory (that is, a directory containing a SKILL.md file and, optionally, other files and subdirectories). + + For example, download a skill from the Awesome {% data variables.product.prodname_copilot %} repository: https://awesome-copilot.github.com/skills/. + +1. If you downloaded a `.zip` file, unzip this. +1. Move the skill directory to the required location: + + * For **project skills**, specific to a single repository: `.github/skills`, `.claude/skills`, or `.agents/skills` in your repository. + + * For **personal skills**, shared across projects: `~/.copilot/skills`, `~/.claude/skills`, or `~/.agents/skills` in your local home directory.+ + ++ + + + + + +Field +Required +Description ++ ++ commandYes +The command used to start the LSP server. ++ ++ argsNo +Arguments to pass to the command. ++ ++ fileExtensionsYes +A JSON map of file extensions and their corresponding language ID (for example, +{ ".rs": "rust" }).+ ++ envNo +Environment variables to set when starting the server. Supports +${VAR}and${VAR:-default}expansion syntax.+ ++ rootUriNo +The root directory for the LSP server, relative to the Git root. Defaults to +".". Useful for monorepos. If your project lives in a subdirectory of the Git repository rather than the repository root, setrootUrito that subdirectory path.+ ++ initializationOptionsNo +Custom options sent to the server during startup. ++ + ++ requestTimeoutMsNo +The timeout for server requests in milliseconds (default: 90 seconds). +