From 6591b60675d9a2b78f922e1545a10c4974454395 Mon Sep 17 00:00:00 2001 From: Kevin Heis Date: Wed, 16 Apr 2025 12:03:38 -0700 Subject: [PATCH 1/5] Prevent error in purge old workflow runs workflow (#55313) --- src/workflows/purge-old-workflow-runs.ts | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/workflows/purge-old-workflow-runs.ts b/src/workflows/purge-old-workflow-runs.ts index 779e984611c4..4594a130be96 100755 --- a/src/workflows/purge-old-workflow-runs.ts +++ b/src/workflows/purge-old-workflow-runs.ts @@ -155,11 +155,11 @@ async function deleteWorkflowRuns( created: minCreatedSearch, }, ) - const runs = data.workflow_runs + const runs = data.workflow_runs || [] console.log( `Total runs in workflow "${ workflow.name - }" (${minCreatedSearch}): ${data.total_count.toLocaleString()}`, + }" (${minCreatedSearch}): ${(data.total_count || 0).toLocaleString()}`, ) let deletions = 0 From 5274310c1127979675ec3b2efafd4d22b1333388 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Wed, 16 Apr 2025 12:18:20 -0700 Subject: [PATCH 2/5] Update OpenAPI Description (#55307) Co-authored-by: Sarita Iyer <66540150+saritai@users.noreply.github.com> --- .../fine-grained-pat-permissions.json | 54 + .../server-to-server-permissions.json | 66 + .../fine-grained-pat-permissions.json | 54 + .../server-to-server-permissions.json | 66 + .../fine-grained-pat-permissions.json | 54 + .../server-to-server-permissions.json | 66 + .../fine-grained-pat-permissions.json | 54 + .../server-to-server-permissions.json | 66 + .../fine-grained-pat-permissions.json | 54 + .../server-to-server-permissions.json | 66 + .../fine-grained-pat-permissions.json | 54 + .../server-to-server-permissions.json | 66 + src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/schema.json | 742 ++++++----- src/rest/data/ghec-2022-11-28/schema.json | 1114 +++++++++-------- .../data/ghes-3.12-2022-11-28/schema.json | 14 +- .../data/ghes-3.13-2022-11-28/schema.json | 14 +- .../data/ghes-3.14-2022-11-28/schema.json | 14 +- .../data/ghes-3.15-2022-11-28/schema.json | 14 +- .../data/ghes-3.16-2022-11-28/schema.json | 16 +- src/rest/lib/config.json | 2 +- src/webhooks/lib/config.json | 2 +- 22 files changed, 1744 insertions(+), 910 deletions(-) diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index 46b4b70eff20..a97afbce352d 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -63,6 +63,60 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index b863b8bc7b83..12274acb2bb2 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -75,6 +75,72 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json index 4dcaabfc73e5..baaf4a7d35c9 100644 --- a/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json @@ -3,6 +3,60 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json index f59b77a2831e..4afdf0e5279e 100644 --- a/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json @@ -3,6 +3,72 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json index e19b295f6482..54c995e5a371 100644 --- a/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json @@ -3,6 +3,60 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json index 3e32f7efd910..6293b1928d1b 100644 --- a/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json @@ -3,6 +3,72 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json index bd49339a1dba..4610c5958c72 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json @@ -3,6 +3,60 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json index f799d5c86a2b..aa633c2ea6a6 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json @@ -3,6 +3,72 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json index f1b8c4a0b457..cf4dc0d3abf6 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json @@ -3,6 +3,60 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json index bb1dfa088f4a..29057e6645ba 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json @@ -3,6 +3,72 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json index 587eb88a6ad9..d8c38097b2d6 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json @@ -3,6 +3,60 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "additional-permissions": false, + "access": "write" + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json index fdf032e82d4a..db235a138990 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json @@ -3,6 +3,72 @@ "title": "Enterprise SCIM", "displayTitle": "Business permissions for \"Enterprise SCIM\"", "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-provisioned-scim-groups-for-an-enterprise", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "provision-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "post", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-scim-provisioning-information-for-an-enterprise-group", + "subcategory": "scim", + "verb": "get", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "set-scim-information-for-a-provisioned-enterprise-group", + "subcategory": "scim", + "verb": "put", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-an-attribute-for-a-scim-enterprise-group", + "subcategory": "scim", + "verb": "patch", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "delete-a-scim-group-from-an-enterprise", + "subcategory": "scim", + "verb": "delete", + "requestPath": "/scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, { "category": "enterprise-admin", "slug": "list-scim-provisioned-identities-for-an-enterprise", diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 1b4e5a1372f9..1820b2a95cfd 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "1cd73ab20b4ba8355d380bd1f422ddf49c47a7af" + "sha": "c5cf21bd038d40077bcb9a9dffd0c8d0691c1d78" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 9aa8d916caca..a0c0e7525320 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -171581,7 +171581,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -171866,10 +171868,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ], "default": "disabled" }, @@ -172166,7 +172170,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -172576,7 +172582,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -172926,7 +172934,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -173221,10 +173231,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security. Must be set to enabled if you want to enable any GHAS settings.

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, { @@ -173506,7 +173518,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -174077,7 +174091,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -175267,7 +175283,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -175552,10 +175570,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ], "default": "disabled" }, @@ -175902,7 +175922,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -176304,7 +176326,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -176758,7 +176782,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -177053,10 +177079,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, { @@ -177386,7 +177414,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -177958,7 +177988,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -179101,7 +179133,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -241490,171 +241524,178 @@ "type": "object", "properties": { "assignee": { - "title": "Simple User", - "description": "A GitHub user.", - "type": "object", - "properties": { - "name": { - "type": [ - "string", - "null" - ] - }, - "email": { - "type": [ - "string", - "null" - ] - }, - "login": { - "type": "string", - "examples": [ - "octocat" - ] - }, - "id": { - "type": "integer", - "format": "int64", - "examples": [ - 1 - ] - }, - "node_id": { - "type": "string", - "examples": [ - "MDQ6VXNlcjE=" - ] - }, - "avatar_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/images/error/octocat_happy.gif" - ] - }, - "gravatar_id": { - "type": [ - "string", - "null" - ], - "examples": [ - "41d064eb2195891e12d0413f63227ea7" - ] - }, - "url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat" - ] - }, - "html_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/octocat" - ] - }, - "followers_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/followers" - ] - }, - "following_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/following{/other_user}" - ] - }, - "gists_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/gists{/gist_id}" - ] - }, - "starred_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/starred{/owner}{/repo}" - ] - }, - "subscriptions_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/subscriptions" - ] - }, - "organizations_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/orgs" - ] - }, - "repos_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/repos" - ] - }, - "events_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/events{/privacy}" - ] - }, - "received_events_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/received_events" - ] - }, - "type": { - "type": "string", - "examples": [ - "User" - ] - }, - "site_admin": { - "type": "boolean" - }, - "starred_at": { - "type": "string", - "examples": [ - "\"2020-07-09T00:17:55Z\"" - ] + "anyOf": [ + { + "type": "null" }, - "user_view_type": { - "type": "string", - "examples": [ - "public" + { + "title": "Simple User", + "description": "A GitHub user.", + "type": "object", + "properties": { + "name": { + "type": [ + "string", + "null" + ] + }, + "email": { + "type": [ + "string", + "null" + ] + }, + "login": { + "type": "string", + "examples": [ + "octocat" + ] + }, + "id": { + "type": "integer", + "format": "int64", + "examples": [ + 1 + ] + }, + "node_id": { + "type": "string", + "examples": [ + "MDQ6VXNlcjE=" + ] + }, + "avatar_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/images/error/octocat_happy.gif" + ] + }, + "gravatar_id": { + "type": [ + "string", + "null" + ], + "examples": [ + "41d064eb2195891e12d0413f63227ea7" + ] + }, + "url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat" + ] + }, + "html_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/octocat" + ] + }, + "followers_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/followers" + ] + }, + "following_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/following{/other_user}" + ] + }, + "gists_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/gists{/gist_id}" + ] + }, + "starred_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/starred{/owner}{/repo}" + ] + }, + "subscriptions_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/subscriptions" + ] + }, + "organizations_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/orgs" + ] + }, + "repos_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/repos" + ] + }, + "events_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/events{/privacy}" + ] + }, + "received_events_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/received_events" + ] + }, + "type": { + "type": "string", + "examples": [ + "User" + ] + }, + "site_admin": { + "type": "boolean" + }, + "starred_at": { + "type": "string", + "examples": [ + "\"2020-07-09T00:17:55Z\"" + ] + }, + "user_view_type": { + "type": "string", + "examples": [ + "public" + ] + } + }, + "required": [ + "avatar_url", + "events_url", + "followers_url", + "following_url", + "gists_url", + "gravatar_id", + "html_url", + "id", + "node_id", + "login", + "organizations_url", + "received_events_url", + "repos_url", + "site_admin", + "starred_url", + "subscriptions_url", + "type", + "url" ] } - }, - "required": [ - "avatar_url", - "events_url", - "followers_url", - "following_url", - "gists_url", - "gravatar_id", - "html_url", - "id", - "node_id", - "login", - "organizations_url", - "received_events_url", - "repos_url", - "site_admin", - "starred_url", - "subscriptions_url", - "type", - "url" ] }, "organization": { @@ -242101,7 +242142,6 @@ } }, "required": [ - "assignee", "created_at" ], "additionalProperties": false @@ -242678,171 +242718,178 @@ "type": "object", "properties": { "assignee": { - "title": "Simple User", - "description": "A GitHub user.", - "type": "object", - "properties": { - "name": { - "type": [ - "string", - "null" - ] - }, - "email": { - "type": [ - "string", - "null" - ] - }, - "login": { - "type": "string", - "examples": [ - "octocat" - ] - }, - "id": { - "type": "integer", - "format": "int64", - "examples": [ - 1 - ] - }, - "node_id": { - "type": "string", - "examples": [ - "MDQ6VXNlcjE=" - ] - }, - "avatar_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/images/error/octocat_happy.gif" - ] - }, - "gravatar_id": { - "type": [ - "string", - "null" - ], - "examples": [ - "41d064eb2195891e12d0413f63227ea7" - ] - }, - "url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat" - ] - }, - "html_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/octocat" - ] - }, - "followers_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/followers" - ] - }, - "following_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/following{/other_user}" - ] - }, - "gists_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/gists{/gist_id}" - ] - }, - "starred_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/starred{/owner}{/repo}" - ] - }, - "subscriptions_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/subscriptions" - ] - }, - "organizations_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/orgs" - ] - }, - "repos_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/repos" - ] - }, - "events_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/events{/privacy}" - ] - }, - "received_events_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/received_events" - ] - }, - "type": { - "type": "string", - "examples": [ - "User" - ] - }, - "site_admin": { - "type": "boolean" - }, - "starred_at": { - "type": "string", - "examples": [ - "\"2020-07-09T00:17:55Z\"" - ] + "anyOf": [ + { + "type": "null" }, - "user_view_type": { - "type": "string", - "examples": [ - "public" + { + "title": "Simple User", + "description": "A GitHub user.", + "type": "object", + "properties": { + "name": { + "type": [ + "string", + "null" + ] + }, + "email": { + "type": [ + "string", + "null" + ] + }, + "login": { + "type": "string", + "examples": [ + "octocat" + ] + }, + "id": { + "type": "integer", + "format": "int64", + "examples": [ + 1 + ] + }, + "node_id": { + "type": "string", + "examples": [ + "MDQ6VXNlcjE=" + ] + }, + "avatar_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/images/error/octocat_happy.gif" + ] + }, + "gravatar_id": { + "type": [ + "string", + "null" + ], + "examples": [ + "41d064eb2195891e12d0413f63227ea7" + ] + }, + "url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat" + ] + }, + "html_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/octocat" + ] + }, + "followers_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/followers" + ] + }, + "following_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/following{/other_user}" + ] + }, + "gists_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/gists{/gist_id}" + ] + }, + "starred_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/starred{/owner}{/repo}" + ] + }, + "subscriptions_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/subscriptions" + ] + }, + "organizations_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/orgs" + ] + }, + "repos_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/repos" + ] + }, + "events_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/events{/privacy}" + ] + }, + "received_events_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/received_events" + ] + }, + "type": { + "type": "string", + "examples": [ + "User" + ] + }, + "site_admin": { + "type": "boolean" + }, + "starred_at": { + "type": "string", + "examples": [ + "\"2020-07-09T00:17:55Z\"" + ] + }, + "user_view_type": { + "type": "string", + "examples": [ + "public" + ] + } + }, + "required": [ + "avatar_url", + "events_url", + "followers_url", + "following_url", + "gists_url", + "gravatar_id", + "html_url", + "id", + "node_id", + "login", + "organizations_url", + "received_events_url", + "repos_url", + "site_admin", + "starred_url", + "subscriptions_url", + "type", + "url" ] } - }, - "required": [ - "avatar_url", - "events_url", - "followers_url", - "following_url", - "gists_url", - "gravatar_id", - "html_url", - "id", - "node_id", - "login", - "organizations_url", - "received_events_url", - "repos_url", - "site_admin", - "starred_url", - "subscriptions_url", - "type", - "url" ] }, "organization": { @@ -243289,7 +243336,6 @@ } }, "required": [ - "assignee", "created_at" ], "additionalProperties": false @@ -281994,7 +282040,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index 517d98d1bc6c..c0aca7720a1a 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -182665,7 +182665,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -182950,10 +182952,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ], "default": "disabled" }, @@ -183250,7 +183254,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -183660,7 +183666,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -184010,7 +184018,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -184305,10 +184315,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security. Must be set to enabled if you want to enable any GHAS settings.

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, { @@ -184590,7 +184602,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -185161,7 +185175,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -186351,7 +186367,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -186636,10 +186654,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ], "default": "disabled" }, @@ -186986,7 +187006,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -187388,7 +187410,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -187842,7 +187866,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -188137,10 +188163,12 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security

", + "description": "

The enablement status of GitHub Advanced Security features. enabled will enable both Code Security and Secret Protection features.

", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, { @@ -188470,7 +188498,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -189042,7 +189072,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -190185,7 +190217,9 @@ "description": "The enablement status of GitHub Advanced Security", "enum": [ "enabled", - "disabled" + "disabled", + "code_security", + "secret_protection" ] }, "dependency_graph": { @@ -253811,171 +253845,178 @@ "type": "object", "properties": { "assignee": { - "title": "Simple User", - "description": "A GitHub user.", - "type": "object", - "properties": { - "name": { - "type": [ - "string", - "null" - ] - }, - "email": { - "type": [ - "string", - "null" - ] - }, - "login": { - "type": "string", - "examples": [ - "octocat" - ] - }, - "id": { - "type": "integer", - "format": "int64", - "examples": [ - 1 - ] - }, - "node_id": { - "type": "string", - "examples": [ - "MDQ6VXNlcjE=" - ] - }, - "avatar_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/images/error/octocat_happy.gif" - ] - }, - "gravatar_id": { - "type": [ - "string", - "null" - ], - "examples": [ - "41d064eb2195891e12d0413f63227ea7" - ] - }, - "url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat" - ] - }, - "html_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/octocat" - ] - }, - "followers_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/followers" - ] - }, - "following_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/following{/other_user}" - ] - }, - "gists_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/gists{/gist_id}" - ] - }, - "starred_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/starred{/owner}{/repo}" - ] - }, - "subscriptions_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/subscriptions" - ] - }, - "organizations_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/orgs" - ] - }, - "repos_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/repos" - ] - }, - "events_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/events{/privacy}" - ] - }, - "received_events_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/received_events" - ] - }, - "type": { - "type": "string", - "examples": [ - "User" - ] - }, - "site_admin": { - "type": "boolean" - }, - "starred_at": { - "type": "string", - "examples": [ - "\"2020-07-09T00:17:55Z\"" - ] + "anyOf": [ + { + "type": "null" }, - "user_view_type": { - "type": "string", - "examples": [ - "public" + { + "title": "Simple User", + "description": "A GitHub user.", + "type": "object", + "properties": { + "name": { + "type": [ + "string", + "null" + ] + }, + "email": { + "type": [ + "string", + "null" + ] + }, + "login": { + "type": "string", + "examples": [ + "octocat" + ] + }, + "id": { + "type": "integer", + "format": "int64", + "examples": [ + 1 + ] + }, + "node_id": { + "type": "string", + "examples": [ + "MDQ6VXNlcjE=" + ] + }, + "avatar_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/images/error/octocat_happy.gif" + ] + }, + "gravatar_id": { + "type": [ + "string", + "null" + ], + "examples": [ + "41d064eb2195891e12d0413f63227ea7" + ] + }, + "url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat" + ] + }, + "html_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/octocat" + ] + }, + "followers_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/followers" + ] + }, + "following_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/following{/other_user}" + ] + }, + "gists_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/gists{/gist_id}" + ] + }, + "starred_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/starred{/owner}{/repo}" + ] + }, + "subscriptions_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/subscriptions" + ] + }, + "organizations_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/orgs" + ] + }, + "repos_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/repos" + ] + }, + "events_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/events{/privacy}" + ] + }, + "received_events_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/received_events" + ] + }, + "type": { + "type": "string", + "examples": [ + "User" + ] + }, + "site_admin": { + "type": "boolean" + }, + "starred_at": { + "type": "string", + "examples": [ + "\"2020-07-09T00:17:55Z\"" + ] + }, + "user_view_type": { + "type": "string", + "examples": [ + "public" + ] + } + }, + "required": [ + "avatar_url", + "events_url", + "followers_url", + "following_url", + "gists_url", + "gravatar_id", + "html_url", + "id", + "node_id", + "login", + "organizations_url", + "received_events_url", + "repos_url", + "site_admin", + "starred_url", + "subscriptions_url", + "type", + "url" ] } - }, - "required": [ - "avatar_url", - "events_url", - "followers_url", - "following_url", - "gists_url", - "gravatar_id", - "html_url", - "id", - "node_id", - "login", - "organizations_url", - "received_events_url", - "repos_url", - "site_admin", - "starred_url", - "subscriptions_url", - "type", - "url" ] }, "organization": { @@ -254422,7 +254463,6 @@ } }, "required": [ - "assignee", "created_at" ], "additionalProperties": false @@ -254804,171 +254844,178 @@ "type": "object", "properties": { "assignee": { - "title": "Simple User", - "description": "A GitHub user.", - "type": "object", - "properties": { - "name": { - "type": [ - "string", - "null" - ] - }, - "email": { - "type": [ - "string", - "null" - ] - }, - "login": { - "type": "string", - "examples": [ - "octocat" - ] - }, - "id": { - "type": "integer", - "format": "int64", - "examples": [ - 1 - ] - }, - "node_id": { - "type": "string", - "examples": [ - "MDQ6VXNlcjE=" - ] - }, - "avatar_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/images/error/octocat_happy.gif" - ] - }, - "gravatar_id": { - "type": [ - "string", - "null" - ], - "examples": [ - "41d064eb2195891e12d0413f63227ea7" - ] - }, - "url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat" - ] - }, - "html_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/octocat" - ] - }, - "followers_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/followers" - ] - }, - "following_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/following{/other_user}" - ] - }, - "gists_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/gists{/gist_id}" - ] - }, - "starred_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/starred{/owner}{/repo}" - ] - }, - "subscriptions_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/subscriptions" - ] - }, - "organizations_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/orgs" - ] - }, - "repos_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/repos" - ] - }, - "events_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/events{/privacy}" - ] - }, - "received_events_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/received_events" - ] - }, - "type": { - "type": "string", - "examples": [ - "User" - ] - }, - "site_admin": { - "type": "boolean" - }, - "starred_at": { - "type": "string", - "examples": [ - "\"2020-07-09T00:17:55Z\"" - ] + "anyOf": [ + { + "type": "null" }, - "user_view_type": { - "type": "string", - "examples": [ - "public" + { + "title": "Simple User", + "description": "A GitHub user.", + "type": "object", + "properties": { + "name": { + "type": [ + "string", + "null" + ] + }, + "email": { + "type": [ + "string", + "null" + ] + }, + "login": { + "type": "string", + "examples": [ + "octocat" + ] + }, + "id": { + "type": "integer", + "format": "int64", + "examples": [ + 1 + ] + }, + "node_id": { + "type": "string", + "examples": [ + "MDQ6VXNlcjE=" + ] + }, + "avatar_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/images/error/octocat_happy.gif" + ] + }, + "gravatar_id": { + "type": [ + "string", + "null" + ], + "examples": [ + "41d064eb2195891e12d0413f63227ea7" + ] + }, + "url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat" + ] + }, + "html_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/octocat" + ] + }, + "followers_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/followers" + ] + }, + "following_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/following{/other_user}" + ] + }, + "gists_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/gists{/gist_id}" + ] + }, + "starred_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/starred{/owner}{/repo}" + ] + }, + "subscriptions_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/subscriptions" + ] + }, + "organizations_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/orgs" + ] + }, + "repos_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/repos" + ] + }, + "events_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/events{/privacy}" + ] + }, + "received_events_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/received_events" + ] + }, + "type": { + "type": "string", + "examples": [ + "User" + ] + }, + "site_admin": { + "type": "boolean" + }, + "starred_at": { + "type": "string", + "examples": [ + "\"2020-07-09T00:17:55Z\"" + ] + }, + "user_view_type": { + "type": "string", + "examples": [ + "public" + ] + } + }, + "required": [ + "avatar_url", + "events_url", + "followers_url", + "following_url", + "gists_url", + "gravatar_id", + "html_url", + "id", + "node_id", + "login", + "organizations_url", + "received_events_url", + "repos_url", + "site_admin", + "starred_url", + "subscriptions_url", + "type", + "url" ] } - }, - "required": [ - "avatar_url", - "events_url", - "followers_url", - "following_url", - "gists_url", - "gravatar_id", - "html_url", - "id", - "node_id", - "login", - "organizations_url", - "received_events_url", - "repos_url", - "site_admin", - "starred_url", - "subscriptions_url", - "type", - "url" ] }, "organization": { @@ -255415,7 +255462,6 @@ } }, "required": [ - "assignee", "created_at" ], "additionalProperties": false @@ -255992,171 +256038,178 @@ "type": "object", "properties": { "assignee": { - "title": "Simple User", - "description": "A GitHub user.", - "type": "object", - "properties": { - "name": { - "type": [ - "string", - "null" - ] - }, - "email": { - "type": [ - "string", - "null" - ] - }, - "login": { - "type": "string", - "examples": [ - "octocat" - ] - }, - "id": { - "type": "integer", - "format": "int64", - "examples": [ - 1 - ] - }, - "node_id": { - "type": "string", - "examples": [ - "MDQ6VXNlcjE=" - ] - }, - "avatar_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/images/error/octocat_happy.gif" - ] - }, - "gravatar_id": { - "type": [ - "string", - "null" - ], - "examples": [ - "41d064eb2195891e12d0413f63227ea7" - ] - }, - "url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat" - ] - }, - "html_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://github.com/octocat" - ] - }, - "followers_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/followers" - ] - }, - "following_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/following{/other_user}" - ] - }, - "gists_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/gists{/gist_id}" - ] - }, - "starred_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/starred{/owner}{/repo}" - ] - }, - "subscriptions_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/subscriptions" - ] - }, - "organizations_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/orgs" - ] - }, - "repos_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/repos" - ] - }, - "events_url": { - "type": "string", - "examples": [ - "https://api.github.com/users/octocat/events{/privacy}" - ] - }, - "received_events_url": { - "type": "string", - "format": "uri", - "examples": [ - "https://api.github.com/users/octocat/received_events" - ] - }, - "type": { - "type": "string", - "examples": [ - "User" - ] - }, - "site_admin": { - "type": "boolean" - }, - "starred_at": { - "type": "string", - "examples": [ - "\"2020-07-09T00:17:55Z\"" - ] + "anyOf": [ + { + "type": "null" }, - "user_view_type": { - "type": "string", - "examples": [ - "public" + { + "title": "Simple User", + "description": "A GitHub user.", + "type": "object", + "properties": { + "name": { + "type": [ + "string", + "null" + ] + }, + "email": { + "type": [ + "string", + "null" + ] + }, + "login": { + "type": "string", + "examples": [ + "octocat" + ] + }, + "id": { + "type": "integer", + "format": "int64", + "examples": [ + 1 + ] + }, + "node_id": { + "type": "string", + "examples": [ + "MDQ6VXNlcjE=" + ] + }, + "avatar_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/images/error/octocat_happy.gif" + ] + }, + "gravatar_id": { + "type": [ + "string", + "null" + ], + "examples": [ + "41d064eb2195891e12d0413f63227ea7" + ] + }, + "url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat" + ] + }, + "html_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://github.com/octocat" + ] + }, + "followers_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/followers" + ] + }, + "following_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/following{/other_user}" + ] + }, + "gists_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/gists{/gist_id}" + ] + }, + "starred_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/starred{/owner}{/repo}" + ] + }, + "subscriptions_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/subscriptions" + ] + }, + "organizations_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/orgs" + ] + }, + "repos_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/repos" + ] + }, + "events_url": { + "type": "string", + "examples": [ + "https://api.github.com/users/octocat/events{/privacy}" + ] + }, + "received_events_url": { + "type": "string", + "format": "uri", + "examples": [ + "https://api.github.com/users/octocat/received_events" + ] + }, + "type": { + "type": "string", + "examples": [ + "User" + ] + }, + "site_admin": { + "type": "boolean" + }, + "starred_at": { + "type": "string", + "examples": [ + "\"2020-07-09T00:17:55Z\"" + ] + }, + "user_view_type": { + "type": "string", + "examples": [ + "public" + ] + } + }, + "required": [ + "avatar_url", + "events_url", + "followers_url", + "following_url", + "gists_url", + "gravatar_id", + "html_url", + "id", + "node_id", + "login", + "organizations_url", + "received_events_url", + "repos_url", + "site_admin", + "starred_url", + "subscriptions_url", + "type", + "url" ] } - }, - "required": [ - "avatar_url", - "events_url", - "followers_url", - "following_url", - "gists_url", - "gravatar_id", - "html_url", - "id", - "node_id", - "login", - "organizations_url", - "received_events_url", - "repos_url", - "site_admin", - "starred_url", - "subscriptions_url", - "type", - "url" ] }, "organization": { @@ -256603,7 +256656,6 @@ } }, "required": [ - "assignee", "created_at" ], "additionalProperties": false @@ -281237,7 +281289,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets the summary of the free and paid GitHub Actions minutes used.

\n

Paid minutes only apply to workflows in private repositories that use GitHub-hosted runners. Minutes used is listed for each GitHub-hosted runner operating system. Any job re-runs are also included in the usage. The usage does not include the multiplier for macOS and Windows runners and is not rounded up to the nearest whole minute. For more information, see \"Managing billing for GitHub Actions\".

\n

The authenticated user must be an enterprise admin.

", + "descriptionHTML": "

Gets the summary of the free and paid GitHub Actions minutes used.

\n

Paid minutes only apply to workflows in private repositories that use GitHub-hosted runners. Minutes used is listed for each GitHub-hosted runner operating system. Any job re-runs are also included in the usage. The usage does not include the multiplier for macOS and Windows runners and is not rounded up to the nearest whole minute. For more information, see \"Managing billing for GitHub Actions\".

\n

The authenticated user must be an enterprise admin.

\n

Note

\n

\nThis endpoint is available to enterprise customers who are using the legacy billing platform.

\n
", "statusCodes": [ { "httpStatusCode": "200", @@ -281612,8 +281664,19 @@ "type": "array of strings", "name": "users", "in": "body", - "description": "

The usernames of the users to add to the cost center.

", - "isRequired": true + "description": "

The usernames of the users to add to the cost center.

" + }, + { + "type": "array of strings", + "name": "organizations", + "in": "body", + "description": "

The organizations to add to the cost center.

" + }, + { + "type": "array of strings", + "name": "repositories", + "in": "body", + "description": "

The repositories to add to the cost center.

" } ], "progAccess": { @@ -281658,7 +281721,7 @@ } ], "previews": [], - "descriptionHTML": "

Adds users to a cost center.

\n

The usage for the users will be charged to the cost center's budget. The authenticated user must be an enterprise admin in order to use this endpoint.

", + "descriptionHTML": "

Adds users, orgs, or repos to a cost center.

\n

The usage for the users will be charged to the cost center's budget. The authenticated user must be an enterprise admin in order to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -281862,7 +281925,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets the free and paid storage used for GitHub Packages in gigabytes.

\n

Paid minutes only apply to packages stored for private repositories. For more information, see \"Managing billing for GitHub Packages.\"

\n

The authenticated user must be an enterprise admin.

", + "descriptionHTML": "

Gets the free and paid storage used for GitHub Packages in gigabytes.

\n

Paid minutes only apply to packages stored for private repositories. For more information, see \"Managing billing for GitHub Packages.\"

\n

The authenticated user must be an enterprise admin.

\n

Note

\n

\nThis endpoint is available to enterprise customers who are using the legacy billing platform.

\n
", "statusCodes": [ { "httpStatusCode": "200", @@ -281944,7 +282007,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets the estimated paid and estimated total storage used for GitHub Actions and GitHub Packages.

\n

Paid minutes only apply to packages stored for private repositories. For more information, see \"Managing billing for GitHub Packages.\"

\n

The authenticated user must be an enterprise admin.

", + "descriptionHTML": "

Gets the estimated paid and estimated total storage used for GitHub Actions and GitHub Packages.

\n

Paid minutes only apply to packages stored for private repositories. For more information, see \"Managing billing for GitHub Packages.\"

\n

The authenticated user must be an enterprise admin.

\n

Note

\n

\nThis endpoint is available to enterprise customers who are using the legacy billing platform.

\n
", "statusCodes": [ { "httpStatusCode": "200", @@ -282221,6 +282284,7 @@ "enum": [ "completed", "cancelled", + "approved", "expired", "deleted", "denied", @@ -292482,7 +292546,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -292842,7 +292906,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -293135,7 +293199,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -293452,7 +293516,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -293992,7 +294056,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -294505,7 +294569,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -314203,7 +314267,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } @@ -427272,6 +427336,7 @@ "enum": [ "completed", "cancelled", + "approved", "expired", "deleted", "denied", @@ -568597,6 +568662,7 @@ "enum": [ "completed", "cancelled", + "approved", "expired", "deleted", "denied", @@ -609145,6 +609211,7 @@ "enum": [ "completed", "cancelled", + "approved", "expired", "deleted", "denied", @@ -609577,6 +609644,7 @@ "enum": [ "completed", "cancelled", + "approved", "expired", "deleted", "denied", diff --git a/src/rest/data/ghes-3.12-2022-11-28/schema.json b/src/rest/data/ghes-3.12-2022-11-28/schema.json index 1f8bd785c716..5835e8e90c8e 100644 --- a/src/rest/data/ghes-3.12-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.12-2022-11-28/schema.json @@ -211675,7 +211675,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -212035,7 +212035,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -212328,7 +212328,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -212645,7 +212645,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -213185,7 +213185,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -213698,7 +213698,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -237178,7 +237178,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } diff --git a/src/rest/data/ghes-3.13-2022-11-28/schema.json b/src/rest/data/ghes-3.13-2022-11-28/schema.json index 0f99ee61c938..75058078eda3 100644 --- a/src/rest/data/ghes-3.13-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.13-2022-11-28/schema.json @@ -211851,7 +211851,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -212211,7 +212211,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -212504,7 +212504,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -212821,7 +212821,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -213361,7 +213361,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -213874,7 +213874,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -237378,7 +237378,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } diff --git a/src/rest/data/ghes-3.14-2022-11-28/schema.json b/src/rest/data/ghes-3.14-2022-11-28/schema.json index 063d1a8f1b63..f0b4e47c1256 100644 --- a/src/rest/data/ghes-3.14-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.14-2022-11-28/schema.json @@ -211851,7 +211851,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -212211,7 +212211,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -212504,7 +212504,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -212821,7 +212821,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -213361,7 +213361,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -213874,7 +213874,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -237378,7 +237378,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } diff --git a/src/rest/data/ghes-3.15-2022-11-28/schema.json b/src/rest/data/ghes-3.15-2022-11-28/schema.json index 9158f4c45d51..a6beadb8b658 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.15-2022-11-28/schema.json @@ -214748,7 +214748,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -215108,7 +215108,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -215401,7 +215401,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -215718,7 +215718,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -216258,7 +216258,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -216771,7 +216771,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -240299,7 +240299,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } diff --git a/src/rest/data/ghes-3.16-2022-11-28/schema.json b/src/rest/data/ghes-3.16-2022-11-28/schema.json index ce6349f0cb43..a904626852bb 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.16-2022-11-28/schema.json @@ -162513,7 +162513,7 @@ "type": "string", "name": "advanced_security", "in": "body", - "description": "

The enablement status of GitHub Advanced Security. Must be set to enabled if you want to enable any GHAS settings.

", + "description": "

The enablement status of GitHub Advanced Security

", "enum": [ "enabled", "disabled" @@ -219932,7 +219932,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -220292,7 +220292,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -220585,7 +220585,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "read" } ] }, @@ -220902,7 +220902,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -221442,7 +221442,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -221955,7 +221955,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Enterprise administration\" business permissions": "write" + "\"Enterprise SCIM\" business permissions": "write" } ] }, @@ -245530,7 +245530,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Validation failed, an attempt was made to delete the default branch, or the endpoint has been spammed.

" } ] } diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index ab7971d19c60..1513356ed801 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -47,5 +47,5 @@ ] } }, - "sha": "1cd73ab20b4ba8355d380bd1f422ddf49c47a7af" + "sha": "c5cf21bd038d40077bcb9a9dffd0c8d0691c1d78" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index da2a0e67d5d2..197b5438f7bc 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "1cd73ab20b4ba8355d380bd1f422ddf49c47a7af" + "sha": "c5cf21bd038d40077bcb9a9dffd0c8d0691c1d78" } \ No newline at end of file From 9ac080ed5b6cc09b4e81e8b0b918bf9a19b67ae3 Mon Sep 17 00:00:00 2001 From: Dani Brooks <104226514+danibrooks@users.noreply.github.com> Date: Wed, 16 Apr 2025 12:28:52 -0700 Subject: [PATCH 3/5] Adding an Additional Subprocessor (#55299) Co-authored-by: Sarita Iyer <66540150+saritai@users.noreply.github.com> --- content/site-policy/privacy-policies/github-subprocessors.md | 1 + 1 file changed, 1 insertion(+) diff --git a/content/site-policy/privacy-policies/github-subprocessors.md b/content/site-policy/privacy-policies/github-subprocessors.md index bfb4f86ed294..f36690ec7e80 100644 --- a/content/site-policy/privacy-policies/github-subprocessors.md +++ b/content/site-policy/privacy-policies/github-subprocessors.md @@ -42,6 +42,7 @@ If you have questions about this list, please contact us at | NexMo (aka Vonage) | SMS notification provider for 2 Factor Authentication | United States | United States | | Npm, Inc. | GitHub Subsidiary | United States | United States | | Obsidian Security | Security management | United States | United States | +| OpenAI | AI Inference and AI Services | United States | United States | | Pusher | Building and managing real-time infrastructure for web and mobile applications | United States | United States | | Semmle Inc. | GitHub Subsidiary | United States | United States | | SendGrid | SMS notification provider for 2 Factor Authentication | United States | United States | From dae13afd90952874bfcb79e44497084f32c961f7 Mon Sep 17 00:00:00 2001 From: Sam Browning <106113886+sabrowning1@users.noreply.github.com> Date: Wed, 16 Apr 2025 16:53:44 -0400 Subject: [PATCH 4/5] Add content on commit generation in Desktop (#55257) Co-authored-by: Melissa Xie Co-authored-by: Joe Clark <31087804+jc-clark@users.noreply.github.com> Co-authored-by: Steve Ward --- .../help/desktop/create-commit-details.png | Bin 0 -> 49326 bytes .../github-copilot-features.md | 4 ++++ ...d-features-for-copilot-in-your-enterprise.md | 5 +++++ ...policies-for-copilot-in-your-organization.md | 1 + ...changes-to-your-project-in-github-desktop.md | 9 ++++++--- 5 files changed, 16 insertions(+), 3 deletions(-) create mode 100644 assets/images/help/desktop/create-commit-details.png diff --git a/assets/images/help/desktop/create-commit-details.png b/assets/images/help/desktop/create-commit-details.png new file mode 100644 index 0000000000000000000000000000000000000000..b2dc089ca185605931ce6425321398cdd6a9e654 GIT binary patch literal 49326 zcmeFZcTkhT*EXyOqM~90M5G8PB2587fe=IyqzlrUD7}SV5|W6hs7UW!I!KdVLu?30 zCqQUPL^>fvAR&;D@CN-o&->py@60#fe9t#yW-@m+yLWc??Af!|xz4%s#!z4L#IXy< z4jede;(^vZqXP#Ht{gbP`uxaY<~Pudst?S|K|do+^#hgt7nhlZU`O)@PI`I=t}#C! zIly}G!U4AZCd{|$LB9X~eE;Cp1Bd>6&vM{EgzEv;|FqF(UiV+I%=i91f3Jt$AN)^i z=6CN|{;T!DmG_7K>oe=~{o6*n6S$d|quyE;eg_V4U*3Nod|)K{`@jLU0}t-qc@%tb z6~i8UZj}4edcq6rodPY;^Q*!pl0q7fPMy~HNI6zgGO)EuUFGLG*MYrr`t-NM*N$=D zyZ6wrKsyDiOw2x7tE{T{;t=ohaJusE?YEZV+A7Mey~ zb9y3tiuG8nny>xI?D5lT2M)5HdL4A|SU{WeYx>>&($x``b1Ujuu;-fpBkDAc1&~;C zPO(fi5@V&T8oL_^Q;wa{m>LLW&7YQ)nJK9ec|~XaNk@Uhn_oud=0pCQ*IAge(7MN* zldw}o>}oCd;t4**?gmd~xhV5UN`oi0)_4pwF4+;u6IbJ?4bf0Wy-Yi}FNUYgTP}(f zUnfqk)Z-mdMHRQN3_eGAPAQ4ow7huq!BDyrZ-0mNl-m3EY)$uV26-RTTvlQooV1TtgnSvQOylUHumxSLURZtXO4dPw-N9y7_cZF4AnCm?6~>NxaH zw!m)ryS)twi}p~BR}(9K3(daf86u7&OE-A?JHL$|DYr%_=oGiq*4_lPjFE>=bya+t zZr*g*!udITeHE2f={Ent1lvXp5*x>c;`v=6{+i2^bWsW%YUO?A>ydlsuAVDyC-W>| z*#(ks2*S^t&b7rT$p#P3`aaHowOmwXiLg}gniREa@OYpYb-J2s5QVX57RXAdSOEvn zGY=2E5$M@w=_D`BpHQWKLJZ^Q5_X49+vNyu)wGdT@WUVG?Kjr=s$MPZgnlu@{{8~z z?!IWYogpwHDlgS~2(Rc73*V!gy*(!`9N>oTU;EXYBgC>0Q^F%@eHA*OB=e}CCsA5T zQ!wO(zfuum>0?94CXW^+0n+1~6JrotH!-D0xRpHWKCB$HmYDn1Hdf!J6%16$Oe(^o z34^DuYK8Skx2vVgs~S?bR5ebz4c{_rl^x>`y@;DVce|Ow+ic0n(b@QHS;P%-*q=aF zjD-1)1~P6tch{TQi91?@9wYU37p$78EqsXl1;(MO1cS~{p%W`;ir8kl0n22ovV`YQ z{N)WKWKRs<$AI8gAzQ0_{SI1<`Hi5VQ&+EsiNv^wJykvb&@jWf_2|{d)YsH-PR*Vw zIT&TwSC^JQpPb>PWn2)T&aSAst+UzxnGG^lfZKzpa_iD~m90T& zeEgZ))9E+eyBv9Je)iEe+(AvoALC-y+OtSmnUI;nVbVv1;SV+tG;cxiE|C$D7kI>? z(JO1(hk_X1**-fzIHnogQ%CgAJl?i;*rLwGr$rYjw+nC$@)v8~-Z)qjNU&^PPo6?h zH2s%^qcZBx5yrRhAh}_w#hAg`Ly8!1M4ig6%aG#*{?OD$`c3ySa8=8iSk8sj0Rb>s z|1$D-d}GDeNr7d;VkvYWzBrp#cyATJcRKy{_3OXroNZ7yUl$2ibbD=`3nXzdVMz5b zH|Gf_vOkF$#nWRo5<`a$713Qt2*xyc5sY{n}Wn7Mny&(sBi)ZH7!>87J^ z`z<;t8KkoXpEdckS_+cVH!fnVvSBw1&K9a)(R^&Sg|yZW+;l}n^Ue@xg0SOsqiqyv zvVkG#gHXzWZ4Alx^x1th?7u||MNb9S16wIA{yV9fm`*Xl5JPb0cwbKDOqr^Wq(sG|?qOfdC--S^tB#S8ktz3^TLz|$JU;gKg=2LN z0*uCRn?{8?g%%00kI3J{u-w{bjC)x@i4tpeP5Le(SeVU)n;t?|jUIZG#*RI!eEiXd zxV2~V_bCTe$4NmZ%IKAtttZI&B7ArPB0Omjm&Y*cS-tIt(glS+79k?~H`j}Ey6yWo z_2g`Dp)1tgC4c&qch_eBk`9iZ=Hm1nxw67#%vH$a=OIC-{8E!n2jDnbWng42DX&m|7AnZ_XD8h%J23!Uxv0 zAj((IZVH`}2r~fEgdY{;K&VG|+`r4Gk@1g07Rf0HoQ6~-1NRPFytToQo(9jhvy{Qb zNQ>(cf=3AP*^Zl$b+!!1>^zSHHL+WE1EVX;QYu z->u*=D1@e!6%W|KW^R|7-yl!A)Soe#$F>qBE=MahL`cK$13> z#1D%_J4vu8ki6)cm-V;~IxBr}yJC+kB|=)k3{X-qbUTjLftlsE$E!Mw`T8Ox zYXh9*0m#Obq4w)iH`qv$BgS{Ld%PFv`sKX+=Tf)l(YRn@i@(zSXu|LW-0x0WM+*kD8@OX|Y2oO!GSiB9JU?M@X2~#a%dAKfOPDO=p0TK9Y-mENQkvYcX3ePO z&%%TOZ;!=j?0W$d%~oJ59&7gq&I|QK7wIikWKUA2>Rge*;m%n@ijNBDuGC3lO=LLe z?pOF8qH2*e&trG)0+F-M6E&$E`JPBF!GKK4R*9THXd>hb==NwY_D5CHhbo(TBLNZ` zN_E1APiYAq1hkB*XAT(zel2aF5EE^=QJmjDj}2oYE8qsww}_cPmySn}DZ|LnK+GqJ zyBd>rT9F%M^hpx#2TM@1v=Kfq6s?tCXdh1XUAn{$L8{Srd4KAmWO-0 zG9-_t0`jEo+Cz`1Dc>{kL%aB)(iL1U`mA506?0d3PN8r)Wm$EwAk9f&tNI82J0$Aw zS7g36ccs&24M7Dks+5H+RI^k&>Dnu9RDe4w{|O)+&Fv{jMg{RvN~e)d#J*L=QEpu4 zVE`dUe{-dZhQ`4-qkz-U$Afamsdr|%(LVF*cLualq_YY<@utHwOZmgl_eZ79JF4wH zo?CqARgnMcYU_6wR^emT{*30~A!zVG$+CqUz_QN`B{IVNHMH{C0P1a?V2w)S&ZliS zj7ZEam0y>e-;Gsp8n0W`S?S})CMdCqX|;?*FnNU<8C(TM230@l7=FjmzC63ehHjSx zQ)vtMDh~cQS}}r_3D))weC2obaf2ayWO`t-%j{b%FUtb_7?v6@TxHTYfeTn0?suB- zEELK7G8|CQ^qd>pKpaP(F1vS_!mg<#wH5S}X9shd7niIM#Mm7y8Z}j}SNYxbbR!M_ zt%%Jkg@PWUZ_my}PkHI14@%WN|9FrN)}}9%?Ygx9F0eG89^~v`6ux)C@3{SH9J-=$ z5%}sOZdDSVbIzHb zwpHiP?dhvBm0V#}XfsQ}*zzb+Y&Trv+v*&gg z5#m_hTYynj|8X7c=4pZUJ-Edr*|L6%4wJEJuwH3}$<62)#L&>g_>oFp)!Qh_r1Rp7 z+2|w#Yt35#dIh?aeDa(pf3)f_#xtJQ6P>np?^5dL)!df?cLE91-8#A0Jb9Tf#T}1f z5iRa|ii$iPPAnUrt(|Av-$z?*eGAMy)%}JKP zkX=2&SL~@I+!saObtnudE{Sa9x#7aZ24T;*O$dG)BWGi}=BnCH5vnUZ=SqgwZZuiR znfu}jelD;5bo~wWdo5|bZLs8t3LnO9@TSLhe<~HDkQRPJ;CSe-Niaoe0y3X7&5w$;J3SR?>9&HKJ@{(3YGCe`L<1Lqg4OC&RbnGu! zPk5HyJd6{k@5rqlf1mwEd6P6^RqCG;&VGim$w~@uVxp;Wl5Q%zb*^@RQ^zl|5Quw> zcAo-GDqaz*Kq&i;$we?XF*Jz%EpDo{7LU-6jC!`Lj#*FL!n*Pn4)3WPnyzgNN3v2& zbfM=zy;79|izKNgQ>(n1s+-I4GeCgNUm3u!$jDREi(%m!Oh_ zpe%8!H&*j{s1W46Nt$e1l9bi`ekDYVB6UbCCz%HW#k9msl4!ofphk~rp8@Cwsdg=8 zB1@H$q3TStr;rMCXm<0^xCbAfP8o;iY&s|8$0!NQXHKY1$d)!nIVjk9Q@c)!%=HWa zQ+i~Yo{oyqhN`^qJII_&%rmxuImK-nF5RX=jumq<+9)53B|FanSnRUuYG&bL{W zzf-d;0`gQ%9>PK4{BklaLS$lE;P!Aa_X-Y}Rmtxm7{D$@72@(VYZaKET$UHpqacW` zr72Vfq!WX^MtUY@6fvGzp5r)ux2arYdJoxpFUPKeb9ayyL)HY+le`;Em&MeO%T1b? zr}xRFz-CYI1q`$Qqb5?Wzqx1rk`1jbhBh>t1Dp6#X~VFYjjqM$>OM8OMjNqD{f^JR}doe z{rVD5nhT1+N@H0P|Gk=-Hi#N3)Jf^uP;_}2c!lp!3rrv4eCVCUriofkbnr_^Q!K+q zX+2RDo5khWlca~bL|!>aA6_-Cbt-MtT-Jhqf6j1m)(1FNR%GzClfTbnp~H-XuC}9L zaB!=$vNcx&_S2l?iLKQk3{BerzF-S57CbzUT)Y{?QWR5?bYIyD@p~1uHWucN*xOdp z=g|GAg(v4!=VSe{+KsAQ@hY%QpyL(I+Xze1+hk)G-(gj406%%<<068kSi>O0%Q%AA zM0RRkTY++NuYbT}qu9{ZL66dT_T*Edb+rRcZV!@@^TW(e#2(FwPFl|iofC+?J`OP& zXZk6402bt)h_}3ed*3OL9Ja<|0_b)jfpov8oX>Q)*w+sEO`^JKW|fjvNK)uh2z$$PzfEbQ z*UHBR4$Q-Ph5$bN(Q`e{^IqPRhqy(7>2teNc}z;C@oJL*|Cr_rYH@#AtChV~y$7!< z2hs0R?3{kps&a8!B-iCHd0>7mh_Q44Kq!cSy-dcBB~7mNjO9ZuG$o%5qjaf~-kzgn zW`e_dXmnb7(k%s=f4>F%mSWURAhM+eQ{crZb+ifx>@868fol zndX&AzBUtlEnMc-Ugn^f13g(9v9+3W3~f8j%UrBAS;rMed7T#5$%)IRdWa8?Dn-lC zl`-9}-T+KroPT-ESMY|8T1*4E*Ca4qI-jmD>!xIY00+pWU)Ds~2BnPc)+RFKzWLP& zbHBZ6SQ1?#a_s#1(wum*gd&}GiF^*y!`(M8XjVWscD}ICycTve2n*BsaGGN*M>p+Ma)TZX7@qXCd#OxE^I{tpT(48VHT(ws(q0mpbyyT1 z@ri#uz4mJBF>)_gvt#e%+HW$3pcIt_9pjzJKl_WmMNpnbDxC~dUVkw=cZYI4**x2bg0>mA6Ce4`U|%Be zZer*odreh4BiRISI?}W+Jp{~;J#YUd;%=_~_PHzf4uGu|#(i?YaOaiLGCcHwrfFrN z*gbEbhJovSkF?BmHnj%>Z|1+(Zrq4uH)HA>=e|T#x)_wlh;SKcOA5Ob&pVR(-w=PV0 zr#itMU70Z9$J3Q}S;vvQQeWfR!#zk8? zCdSvyKAf70VjW8^jyW~TLjO9lEbG3N`RNMppV6y*N>)RCk17c0xm);T$M*)OZY@ z`E>M&Z3$UxQf8Px#!IY^^Y&F!+7Ix5R6_Zn)HtR!Fmd1GHcNoTb_4YT&{aKJ3FrAO zI_uDlwh3b>%;eQ!9}4^pzxw_PcHIpNtjN&m%s)wK_&xFBO^p+#CDlW!=%uA{v@6K# zkGas@_^SPp%GPLkV<0dS8y0T5%6JC^T?3}XIp(WQO;5i&f_7VU!i!a<7x zI`?P?>G*nC^&YFoidE>v6fNIMo~rw(vOiH7fHi6e^d zS_*P}&=Yi0|GVMdU*|}aHu=GUtBPu_er=Jvm4oR!+v%HdGFfAP+8>49b7~AVJniha zjyPMZo`nb4v;Ez~Lb3YK)U%>roc>$<7NgcHc&&q{|*a`zgbRgP|F zhJ_N{ntdG+JE}XsBzBe(jvCe6JKDV0&sShRG~#{(NLR73g)SZf?S7?9XD%!KiJ+(n z`GqyfjDR0m8FpAUdLl4;+p&@_gGXj6=F3$9h>&9aJq!d>6Hw-oOCe_A8lFb1Vi8vU zp}|(O+1AB&9L0c3Wcvg1e~e7|(QnY)F%e6=X1#@u$>;v0_!{E5pqR5tJ<7zGIHjAM zu`TuPPOhD{P#QE1;M^|nW@uKq9P}_b+5XBOyA;P9iKsZ7l}b_?g3em3G`2f5bS$t7 zic;_X5q%dV3>xtu1S!?fy+a|+$Wri7EcnE!B zVeG7jOiLc4!wgrH2Cr9E%D%Ou8R9Z%Xwm8g^$wh<4g$1P^4Nx0!P3?>(;ZR0y?pyK zyTf*7>$Orc#cXi_wwwb?zs6&mUJI$PgV~qVd10>I*~2?{HdZxlU!17-OHtX}Et4I9 zM(P64JF7o>`YGI7g4M+!)r+)d-JBaJKDdAD*f66@0gEnV+;DGb+rhe+jWqV04Yy0Q z0yW9{E2k=MV&VQ6y$d&EPii(MT^RkK9VdL0W~Y3f`|JKb`W1L3a$d@+x!KN=!&Beu z63X#csg^;8>Rkno>2vF5dH$tmhMT{}oi27%s40<1r5YEwxXp~9&s=_6Y~jK5(l#bi zaKW=DLD1C95X%+M$4YrNQ^`y-%gej*i*Jo%9NpE6WJHh0Rir5cU^_3Jj}D|8-0fis z;<`}m#|Zx0;?YAJh4>$On;^lSl?ZlBHd5ECfv?ALFS}8VBxWRG+h!ik5l}#W8AEgS zSqVzRZ`)#8Ul}BaV|YHAUA601CIjG%yw@*VjA?=Ami>L-F)cm^%TcS6Spvfi`P<2~ ze70H(4|kAyG5STxeP{18`L%+~)btL=-7+|h9;5#C^T9o;zc=B49k8&38e)4Zgf z)*4smkKyeqH}7qw zEP0yw$)!UnJJSE%(Hca{wIm9Ml-$pFzq?;Qhw--tY7Zp}uigITS_NWXv_HRZXRfN{ z_J^0h;&FfL|GkThUxOTX&6>Q~wixEz#%jzA6Nh~fVYbM(rgd1F30~~a@4MXVmLjvK zh-n|Iv=EVBL#^YwO2zmE!9>nbC0O3l+0F|i6(XLN{3|gFT+9xx%RH_$boPe_zyv3Z z-c#s|M<2{TLu#=Y7KNS8(%}ywaznHda^MG}LhT>+5%OdKb6EzS86dx`5$%T7-YR?a zkOZmHY=)G>Q>l@Sp>(BsN=4!&rVhV9btF|{gqPgX-$x&Q`EyS_`_*_a<_Y<$L21WU z-;Cf}MyCIlYTqx_{A~nVe=orh(lU?3Oy1><1!a`ma~HHnJp5>q=fT90s+MB*p*Qxnr$rlYS{L zZNj(z6YQ5`0;9~!FEIOdg=qq=o~l(R*tt*Fid{)*3#WBm|9j9Mz5EeMI|+hEuF)4h zO|ORb9t&7TpwB9Lyxlc<(>(Fu@A0H26vwLIiCraB+VT0-5}9XT(zQa>!6zMWO`0bJ z|EtXmTXL28a))7q$Aop~nOb$5&1Wmv{$8u!29-f?x&A;>q1Y}KzlGv4bvonubVDlF z%6&3En6}ZGQ|n0o9@UJIN&bWC)PydvkswE589OPB!~iz}Z8$gcF!Nlr$yE<=9WDuL z6a?x%fIf224|+TQ7iwrd3L_TjZU!P;XYU(@5FKZxzcEKpq3jb}wt!72B9(xt@6wtl zWd3`stnGWQExXiCJ6kCajI08V#Dh|=&>YQDzPS7uMkY|s;a|{XzMuSqLgyZ-MUt5K zdd!mwlD0 z@%`=JX>}bs$iyH_xYGF8mFR_>O;z2--wG1Nh`!RW3<5ggvbnmSRL~OF|AQp85_lv2 zV3lV_4+746VrtTqF*d3T>vOKTTNG1{t<`1@hoShw8Zg;%Vy^v5tY#EdiMbb;w}{3+ zQ{{e?bE}9`uGFfvXr$6a}A#EhRk36-jQSu!P#5kuUOOqS+9;v3_Y>^JH8Ez_ga#T6xy%@@2=z9 zcRN-N^U>qw&At!g1Wsri_Mg1WZieH}NUGuf+x*NuAt#(>g+|L1hxiSN!5Nt4$4(pV z>XSh;fc?&%d4{ECQO87<&G|Jnh0y_c1(&}wJ$EIHi6sG;EVLA`Ar5`xBjfq$aRj7s zb-G!u?|Tqo^0NC_g^pab;{I-LJNm8Muye(w#o$mJvFg+i`Zsr(=QbYG5>VEgCO1Hv zXzjjn5JJckwp$Zc&X=eW=|X4)s~y{q;JgE#&l4iTj|7j{vN> zYlduWC&Gm{_s~SIFRo4uFTSfSK)XWQa&WLcfN5EDOZKR{Y0r1P3`ZuJ{&3M=9ej|k zR_NtER{j8ZBmBl$F_;K5Bvz|Sa|F9oGTjx>b`{d8r)FNFZKetn3Y)5Tk7$&_*lwS0 z0&-UEPaSsbn@KLi09}{sJ`^2LJ!bqKgxIXi9HZ!_As^dMp4jM5{N!x+j`FM2wEk_| z`ectRbR}k(usz%6)0fUK4A5Vd*5h;&Ud)0fmo^<`ZbFZv-$+~K(}PRPUV!+M4R>-P z-=&_tn9ynus0g8D1^rM=xB`)2h9BE|)07p1BpjEUxKh_?g4p%|V&HRm(3oT&Y$c9- zh=NUUx(M1=wcvBFBSlukFme9Dag5KS1Mb$j(TaFv-g*shK1le<5A#Jdj;3eI^}*D$<+48ekfk zxipGawDXgX$3GS6mF|?76?=^*j<@wa2(6xwb-%+roJ9?PYL0;2AdknzL3*E_-jE)K z8Ik3eW@A(&!7Iib>R##GAML-|CJqTktyj9Qw789yU#hTdNQBX)Qx1JFiEN<~+iAA8 zq4Op?Go9jCl>q!ma(=XmQ6*x*P29HJyk(vg{>gaYcrvkl&z50PH=a>hEf2z4R|W_w zxsBWs>XQ}0@`;D%K>L;JAvow>LZ<*ky*p4u01bK3g%^aPoFj z=|$+sL*I=DfP$jUHzQ6146E!=DsS3$Ut?}JAx6pQ@X5AoB-OG*HU>-5%;3y%&%Lcy z;`&%c4{&`ue>iU^7yAKBUXx(@=t+>ZHX9{>mz=`UMfrBgip;eARXoDNW?4e-e>y`O z4RY}?2%+JL!-cgHl4e?IvW~kCZ^K6OOJVd%l2Rd?S)Rrtc-^NHyt}$3S6LT#e0~^g zAZY?eqBkm2@HaP^6z-3wF)E@OZ&!8tzP#kH8JO2mf7xkgsC-w-uY**aQ}knS@vzS9 z{ixjsHLjaiK#Uy@?ygVnl{%d9mkrBQ`dCI$-i~#?QCEKkZGQx;TG= z6HbJtQ8(pFEgj(?44;CBmf`@NQ&p0gwUOr3mi>Gz=b<3%DzR;+XtmL&kD~7B_+KSC5d^m_gAr$|X_dESm2bJ8$6m`}-DJB6hL3 zU2f$#H#S5!NOcTd7%t>#S^w@q9Jcytgmn--Dp#0}%kYZz5rkf~3*D%mCPeo$QChde zfktd#>r(0L@2yga%E>p&^=7v5Iqf-fQbFTuz*eR($!N8tAMKJN^)>ws= zqqB+Y0&}mqntuA@G_kYLPEPrL^md9|s&@udRCFlrg8k~4YP0Fs5cNEj5h)Q0s~-O1 zdmpEoi@8;g?lxjFmd(BVm)znq=k$H>;?s{&EVBMxaz?r8Y#@J=pkuUtWv_&8FI&Jy z#%({-bjOv^3OrYLas>Ysu^71}ZK^&i`Jwv@3oxkv2}aW)y_04+frQGg-n)osX{ z3h&l%kF4uPQ0}_Y?=a<+(V~|DU2+D^#yd9=l=&Y?35QQeClwTkhB$TkVViyeExiTd z8{(jmoyBYsGrI|({7%!;RxM_vYCca#dNX0#}}t22G3buKG#Vtj{=R;f{8O^wS)i0=iv5iZ&Ne9EpowQT-} zG!0A2-N^cOiWMwCV6%}2kH$IolT1s|`QaLqxM=R&)5P}6ASC0%#bJ^V+<%GeV%9_# zCd7>3hdrn2wy+E`+K%BuB!Af)NRW_jmDh{ga$Xv*4p%H;Q=Jr_md;Y5)<)P)9gdbH zD^=iNX^b+(@x}qyTw#I%3aumEa(!DtUIo(MzP7_-7YuW01HN~bBS}7Qu&8y~$#)#X znvcqw7tnd@x*BhlH}5rkvh}-Q7e=_w$J_;SEFppS__23-;lOV4!d681Tf(ql0h?Io z=R!7g*vff_P5f+Nh&bs#g2>RBo=ylxL-qv>@pc1rlbJ=Mbvp zK8!nAeF3hHlFZ|;#1rbD-Ic*O1G@{n6W84sXr(JK?2CV zr{LH7%8+X~3Ra=;?9D5ldKn62TM@dSVZ!(2%4*GY8JW&``S!MHv9YKFEHCd04IHZv zJc43RX3gMU3j2H-5)pvC=LR3}$x*N_Yo^qB2T~Bh>%Zc7e2SAqZbEyPZ|?0FL<(FOSzy2&mTt)}5L%@}hsibLX zroZ2JrdP}#sBO33w`z%~QT3MMDssVb@dli)8s<4JM7|>)$t@F2{(!155X>o!xjkBh zj$)eUtD1Gn)>}9@Tzs(-*T1`I&`g6<3azBYM1CYo;W4&F=rQM3&GP$7j+GQ+1KNCw ze_7STr#MeDrae$^Syp;N>*qHr*BX*XM>0d<^8tn^?Ap*|jbl%q-jBxh+fg#Oz}OR) zo;|Y&Q;`_CmTXZSJ<=_Cx_~o~!iE=L1TwUs8zu$NG4}YSugZ1XY@qtL@}T>(Ma|J> zFv!ZA&cZ${ew@*CJ50m^ZtZ2u=|^#N&lSM8xBZ%~9Y`Kt`+Dc2Yn4CrWMHuSnOi2< zl81L?)_#WwBhXe~{j-qHk8jI)TLOlaHlAAR&-TPXpYk0MdTb>`-x)aHiRZ!p9$n~2 z=={=OFCH5N;rD(OV@+uSu!-z;{d1kB`V1NkG#*0~(-y2iXAzwi8Md8_zzv7y?-*^aQvRj4wKy!V>K8%XP3qcf zN}Ir}Wh#Bajss25Xu(!;zDoPGc2;I78MS>3jGRzqqWpHXY#z7EZy%MPE!{K^PS0qy z?SdK1DX+C?evhV)Lmm|cejkpAnGQz55gMd!duD#Ywa|4B1W*Yt4@q8$>&%IT5aEWe+OJFY&1y|Gcu7sp=w-lANwBzAs&7pM6R7o5i~z;y zB|V8HIMdeLAu3L3GW}_uE|f9ujsVi!oxS!RUWNPJ-3YSjhdXO`gch^lx#-XMg{ie8 zIUNvqXGP=dz52JOox8qt9pY0Ush(T9t3%QGpweiox9R?iUI zmZ2P@ra=orMyPFpkl!#SLF||-cap(=3}HacZe2SCEqPN39Ct&1mPYl)*315?YTtiPcc55*mA)!c?2N{iC0}QmVhIt49^7h9M z{?k{!c|V%Z6Xqax%|^{VhSxhc*!Ji>5dW2}Z7OAR>Br}5BGP&2f)r^z!a$sckOq{-+SEke?_K1oq^0@`LI3-TxpHK>yWfp4z+Gbf-(116rc`{ zgvnC0#is8bNlSj$s^$p-0mOJ(fGfwUe`w-FyictR#s*9O_q6o2#EKK&KCBw3u9iArql);QL zct{O`MFH>6YAAvBBv!3jv4EK`HadHwZXdCsgKHs?q0h%cz>mSnWvU4R$-0sGUy%qFV5$+aaf3Pc2bD(T5k%% zeaJoYk;;1$-G+`*V(RspGy97a7R+Pb>Y&|D$P=jV{Ln!fp_I>SI4l+XlJ)X>TRwd{ z!=~K&QGpfR#&_r8RKbJMtZEB!ru)cT`m6pdpHY}BTGi{2U9cr|vcwAu4xjo#c=g1z zq+W{xMm*|0RwtOsy^G${_31z+zEcX4>zIs~*{62ZgeqB|1bk3dDfw@jBZ64a{(mAm zV1HDK$pf9LHO5sdrLUpX=72UD0yJxfZ<%$u-=6Ssa7)H!wFVX2R6|nY6NQ<%5edIK zA`3GXV#b*ch@^F07d&IeeO^1MAarNr;o?NIU$Nx&q9F5Wn&vteSZboAh44z7lKsS6 zt{PWVk^km72_xNWCLe^Do|(R)ROq)?C-@vXek5U+Rz^8vjV{*&zIxJ=Tv6jNVFYTv zmL#DwQR8^G>|~{!yzCFPzC&&fOMH&ip?px>Ap}Rn4Pstt3Fmnda#c9q@b>lQ_?3RrR=U&Xl zBxH+aiRxVtJnz#U^BpD`o(=n+5jb&~r>BF*_LNWi@3<<&`l~k5k235MzN*!fN>aTk zuj8GS8~5<=tCO(%CzZ=X5=+^DVAO&h)AMwiScUDgQEF{R3M%fgwV8oM`8_Pl>w_1a zX#@&xe#c(s2O$V^8O)l6N{)|TFML)#t9r5mJQ5-JBOB1%nq|Y$OA~w-zbVr)F7csN zB=hDG&%qOI6o%GNKD9UfLYs2vJ*QenSFo?IH9e?jSXJ&UQ(T6FEIxks=yWdO2(&@Z zjjLaliFJN+yO^v-%r#7F)+x&{?h1{_p7`zeesvda&*DhND`-?My1b7C8TAXuttFw zX403E6{Jv4lO@=<5ee=nnp>-z&|`HmCRBON@T9o z{lh@AgUhtD+&^)*p&1EJaS9CI@n%x$1kC&!kd2#RC63{D|< zt46N`lQPpqs_y+{#jbZuO}x&+pbvhA-BfVC)Rjbc`S^i{c`UvU|MgLl}w--`)wR6HqA z=E{CZv;T376u}@nrN?;(_ zk~Y!GcLZRh8$+B2_anh-Y-7@l8`oZ_zLG~;g>kPuUaWrnGi2zEWD}$J6*B?&Lb@Y_ zyK?rGQ~#G|+(-*JW4>>q&{(r-Hobkwy*J^hH!H5v)9Q8+eF#ehUXWAx6|kjHVX3`| zD4qcBUZsXFYeq4;tPCO-`tEK*L^if_2vd!a;sr8kch=x!d?Suu8XWQobO8+qA@s05 z=zb7#Q`(}=;SI1G|6q^w^U}r&9`xe-&LQI>-6TFQYE>`uc`*Vjqn<87wG+pqD>j|y znMU$hwc7oGLjwbyu~hM{P4%pY&L4mGKW#A%39*^vRH{WY**9#42E@p$_a}E*@7P&a zs#p$mCaTh|v2vu!4%aGGMmyRGnSIXRD=d{U>Z6w~f3)vIBV5A`%n{$fc^`UyUCS2K z4G#JS!Ky$Fl=~o3ui>QlPorihV+}fCqEGKfB^v9mEfc;cmI5J~lX@777iP8>uACKn zmy%)^`nfgpy<8i067L!q6xUj@R)j#TlHm7JN|>rR-dKazfY@y$ccCR<%wQ zBjpxyB&^`lcrIdz{WKsi^Y^IP+PTn`2sSu%an^W0Kd^d>5ECDC|2RcVBXl(14nVkA zF_ zz3HDF^&ZSbRnv-eMZJNGF6EN~&^i0tAMNjg%u@*HpRz%3p4Pq#-h+ZJ?lCRq4EJEw zhvT+6C*79J%ol=sm|-*?*ArdH!vvn0;3bu!Vof{vY+r0+w%3Vl^-)x(rD$IL&(d+N z&DF_z5zJB!JbNK)c=V`^Qou<)5bA?Ti3{uo?0M#pVvy!X=9WHD0r^@Kl{@oOjhVw= zFyM-q=L(v;{R=@sajnciVv5LLwSOC_dGpVFr5;FesW3mx8ULo?9W$3_Jykv-AwIrf z;!>YOGwphSLu(+D3>g^t2y;6)Mv=e-I3o=Q{OKp^$f|{AC0Y=XEd~k+2ObMJ^}>E% zPcaII^0-&bVFUiAZ#K&fX&n=|(|dGLbjFn6R`IfX>*90b2FyI>09nk4R;BEwJdyQe zH1AZ!vXs&1=jT=J(qw7b*m(omc7hM~y{%xSE!6JDsQP#x|4_T)#v$fYa=Miq}9>MLG(Cao0klTX1P!6PCM)wasAtZy^^dHRanG3LgL zdj@NM1#3;-qmP1LFv+@Z8Lrpr*<5afQ$?JTM-`+74~2_toy528VES(%s+dXazXzRw zKE>H|tAg~K%JN@@D>&+1U@i@7`Pe3(+90r1N)`hTvW;=#-^$p_y~9zk1>Q2~qoQgz zsf(*4{cbI~h1y*C(w1KVvL+x-n$xi8&S1brci*q@wh+x`{Me+D0P4;MlkQ2v5#|%f zJcI)77*E1veJ%>i{zzG9MS85#CPSUyB;x3ibE*dcVCmN)OWw;Wc-^9b<$mph(k1;* zqxf!~AzUKtS>JrD*0mr`Dd{n9e1p@~t<~OpjfJ1k-(8gpdI;nppzYw~+Xr$`<)-UHyd*UlXPS4_S9ruaQoic)M@x`M9va@U~*kj zOfTjY9oqv|0@QW}uCQ|v*eVETDF^K{m22NuEF5IlDl?U8o4L2Ad4j|(=jpew+Imys ze9G3tRAo5K``n+fw)GKaRC4S{J{Nu$wqb5sH=siIuQE>QS9Tdh-Ih+CnX+v2Pt(m( z=;H(YUXei9j)Ms|cRTmqzegm%Q{(BJ$IiB=U*&9)A^x_?!KMXiqlCvA4Fo}PGi&V* z1oI+-zjK^L9L1@(14y;M2XR`|R9<>NVl_rOlz{!fg{?E@-_P56tr@1$dY}LJn9SH` z_pu#Jh-4FR=#@_MNrOYyL_4Tal7P)}ZLPuE;WTZ?EoV|8Hy0+Z7Ctq|W4EfDL=e2G zIT>+?)8pLAAn8pj+#GTtJ76~&c#&OHotN_G9R|bF(bUS@L2;&1uKk3f6S0D4= z{{^tERYl$PCa?*v)5rcl*0nWJxtAyGs{#(|dU3V4N6^isGrw7DGi3bGtPp#kP6AVXBSOK83SM zR__*=Y6qGhj)wg?bFx`Cc1MD)nhuTH=t)&^7=!Ds>?A<$z{I`{UKW_HN7l(;zf0|~q_<2l*Yr-&62j1HA?i_^zK zS}lBi-y$am@#4jq7cZ=hy5l|qWkZNtUqKd|=;eWw8TXC$DNMQ|h`WVcYb;t-w&1Z z9$QKYnbXj*YzEt`wI2x~+TIMQ%PiO3dl!?s=Eo#TYAfvoQ2{kI&$$MRKPP!pt}i;H zKtC<3eG5INYBaX0EcHkNZWmaNjPs;!&1gInbU1@wB4hF9m>_=ob*T&prh-xFAst7b z*nG-2fs;t?ic*8|xMIuzQ@NA~bg6NKa8|}#wIs{YEAI_1_Ed5AXhwZ6H?)I|C=7{U z+uT~bFo*w>wwQT@nZv`xx>mblQS%P`X;QQN4=5LSQ0#@@R!17wcK^3$sokp|?jANK z;wm+)_hGHK_x180fBZ=5nb)ql3YYI*|6BYPrq-(u?Ytwo%JMe^zrc*SFBoa7{i#l7 z7LscoNd77OkE?m>fo&T#Qu+4$PujsV@q^JNdW8v(nJ)K1*7BpG1fM=j!*Ah#E4i4J z6%O&Y{#5E7Gc3_7N_zjd`&$ctp9ga?_U#s`wC+Equd=v6Js3u5{GJba?)y^_8Cpo2RvOf>%H)2 zHyz7T(|#jsRQDu6+ypOFI$l(~ie3;EH!6Da>g04b*Gp&gRz;0}uaJfO%EJjnh)rVi zdFE3l%m|%YKU=&`Qc60aGGzsDSX;aL%xSZGxzV3$JjrL$$cCT^d1tp5rSJYEC#wlH zuoUvu#a~fG$aF~X$9i>~Te*HlY8Z*}FYvId74Js9xO3_t#(V_Zln1VhO1`>?(Ck;aGs$-KqzEEy@SJ2>lsP`!Saj!`ssZ7MJe{oT|sfw$HH@d0Op@%|9RHj!R&EstDnm(4%idVDVRX6ZI5bd z3cT(Pn5!}bc}JH}WGkpX{v*ORnFgfxpHLa4Y|nlzyFg%XwcUHc>m$AQ=^v`M!zq z4}}9!gagE%AJ_DLF~2`VYX1hj{<_yKMZ(6nEFBp}*3J31)g@R{t8pB(LTC$AaAOf* zB0%{`i;2HnC=gKRLPYAJa5H4@ue9$>!=ZCGRka^y4O9P)=Mze4FBJHpq!*gk@%^d< zpOFrW?k;;h6^-J&npW%X9Cf(VDh6;BAOUlk+X);y*_1^sSwuZh_CG~$@EhllQA&Kc ziB35j{dOv$)e1-*N^BOyq*MDuqf!ng0jzVeLw`)Gg!%h|MvSq0g(^ddLd`G6&x4hi)=zzORn8#|LaAgT3QKpM zDy{HErWQWWb_b4k4%c|gOyHU}_@wk_2tMzn7T0RpsdN!Z!}D;3T)XUd6Lm@#ywr2x zvzg9KLe0QF0+kFF`VqDM3u|Ynw&7Cad@rYM^E?co?{wGMy<`NCLeWf%;QOs_xM-M2mjB+Ls{)2wBIAjKyWB|6Z_BuI2$Td& z*^G(*#9|TWA=m`J!_}ltK?Gmz;x9 z2cevql0lldU`WeK1KSm#cx{C~L4e^_nZoO$_VO8!rRk_9z*T5sqt@aQNvl;Qj!B=u zAQ?v+7mCa70^Ou}cP^i8OjoGY9EK;C9rwuoWa4`8Lu|R}8VEav0j67JmCl^8yZ@}0 z{lI_BOm44Ja%H-3vRpcwWA?hz3cP2a+WpjM-F$al!CXaVt(4p?rRufJ9x=|2_Zwrx zSzr!HTur_3DMuZ4tHGzp|HChZDUoCcZbEP!eJm-X_A^+hKfg8}s>bDWFz&PMgLzMN z2cn|S9Vf9@ka8b#9^#V0^b6y8^}6GK?KTSR``g;ia*R&1dHj)T^TO6L<}F2X5*nQ$OQ> zyCR>2%z$JcOsCw-z$`0MYVV|PzTL1ves)(r8X5Y0dL**MebIO8G`wfw0qYWHp4VCt;>Uqgz+s8Wm6ZjT4ON*-)j!-96?A`}-=bJZz%mCj zmy62cO{RK+uHubWmgXDhPiX1fmD+>Jkh0*((?O75}BD0b5<(58uHuHgPtY z0w0{GWI%T3&sNiCmzD*3aa&8}fd(zpS+pQn{*j4@K{C-z-P5Vwha80@tzd!4KkmO* z@7*ZJ0A|YuW9g}lBx7Ubts7j%Nush=zi(6Ic?v66xs#cGqt;?};!mwNJj?npn@=hh zikG&}VQ*A7`b}j7>W`TQn_^X>yqj+z6(!@DI0l`aHYPCR?|c$R8N==suX2$}*%sg2 zFTU_0jJc`u)~WI~DZbHk^^#@3{uWpHsHGeArn+u?u2HRqFKNIVQnk8IwH$TrK0PnA zF;*J&U;E{AAHPB0H@WmP-}u)oSLx*blpg@5n~7RoCDm5-14GsKqjGbi9#$qFO`E)s z`R`Kd3*BuV!ebaz*ag^eC#^~}Yt`!-QpC(Lmft!&$`C~6fj9-k#`7LFCF7`w!Qk4h z_R!lV$9a3THvQbGQU%FRF{8IKP*3b>Y@nH3jd0H!tHvs$+!9bjL3bjX*Gn)K4TTaI z!!&=GxqmM$$OAaGT|Glw*LtQq z8e4&O=*r&Yr&hW@)Y(sx1GmRSuW|}_)Me~%R8QcNDHq(LzXV@d&mTTB&Xxncmjo{9 z61h&&#}3ukuEJ$|$(dN)(~$PsmR?*Ax-~}*mKDOdvz!7K-Jh0`x60dhCA!^SY)*LJ zY*LkRJR26P#aT7}7CCNRT+^;Fd*_Fkup%regyy5UNS{&WOOB>&?*@9xD<0y_)OMe+rZhsDM?d2rbooxWb(GUp?M z{;=bPjBRx&xdeg$*j#si&HCndzreHM-td!rSlsUAVnl3)N54CuxD46KN~1P{hMtRI zOP?(-tgDA(7k6qjCg`Mn5)X6!czPN{@bWM?>1wJ>`6d|IRUd5aZmii3?(G^iP_iHIjqRqo3`-w$1_87a`Gh9XRCA6XNl!& zty$2>4(rTA-Q-Ib6QckVauUUA8lovHI-X1$v`751wLRn34y>JK7(#F8659E0imp06 zc|W>Q@6f4}gbQ3m9j;W@PpN&CqJ7RZI6!D2>NR<|CXB%62`=k3DHChfYSxPe6M#{k zFG-ezfrk)r(OMpLL4 z;n+NGE#I6uN870NQ zg)IMJyFW~D>_T;w<2KHn>$5)1s>O^=Onb5F%YGZrPasNaff3(BNau5n(2@5ba&%r$ zlj4?UiPTTB-)P{met_egnL?;db1rC}9ke8p_`$y}HG?T(e5Br{`$HnCxEM(H;1+YJ zQLi57an?v?Y#8vhi(92u8K`#m8 z&#k-*&11Wkan*HhI{1^&wB|AluRoamr$EXN(3hJAfp5#7-S(IP+*(U-H=93#+7G)N zl)N9*>X$1m!ne?AwGC2j_eR~U?y~rGcZSUsOopgWYpLd?$CSL}>qqRT$#(~Z+aE&L zKGp&IWbSsFH<|~KP2;btFp7V+u5aYh(48@`%W-La!Sc}7-a8>}D!svC45i@N;ZaXI zac13TL4b?Fg6LD90thfazU_oDuFDg=VrGHIZ@vtwuF&BA9ELYQ4;y&f*JI9>{QdJH zno{)EX8~e7dL4qoMzLx z`3XTC5ABrUdsm+jY@W|Vw!H_12AZqdl!F!3vMl+ApgR2X8tz}hQ{ zIduVYSO)>Dx>g(>!=t;kX$IkM9?$H!G6nG3TaN9o4CbiOYLsjUtQlv3leO_*qf11q z%&)jzU!oa|+&jl0-0-+-Y)CmYfrV||ZF|Blw5umov<#CJJ`7KKOKSN@Y!Zr0$p*spsKorp@ z0>7i?T9=Q1^3d4mIum{gVTCC0a1Qdd6DOVc%>$)3g|#~HOJedTI`q)XSvkksFE~D@ zZ|`P;vJIE~PX!iEJZ=-&_|37*el6#2w&;W>6P33=3E-*6m5+F%pt`qJggfjF)Gp=? zYi!?vucZoREh9c;K00_>&DZIVH|SmT_WyE-`nelI3epa@u!5mIr@{Puwo82vGP}G=OSI^pORV@^P1(mzf$qKKW0TVdQ z0zICuoIN8&3C1)|r{G^uc|Y>M9N>CJ_Oks_t8hu=y&3R=Y}0AL9K69jGb2L@heAyq zn1ZwFoEi8XF=MqLk@eoh+??%5emK@uV07HBlTThrqp=n=Rl7nCoMxLHlw^3+%2&dV zmtF)&Txa4*l$ULe!_@VAyA#UkVH7IUeG9YEI2c_yNQ5V=b~PxR@0i`-@g&nYs5|)d z_QX|AgiEK05lSm_TEPes{-vM zFw1ki9U7&Yz_kE_Y6;!`(S$f*0}h8d6&SWHHs4?t+;TelqJHM-4ho&9kx&*ye%G`z zj7;C;xc*}~(~4$3Qz5DC8}eSypz?s~(Pz^Fq1k*DXBvFUXIjmwp>(MnZ78n}Drd~1 z?}AdgK=(95E12t}Opm^SQTTY(NwnzcLS{^h!WYaCt0|7g+VPbjUC>Id-_W!+8gIiB zr)!`lqouel3WkJEIpm!4(UNxFFs-9E4QfM(46R0^I=6Z7OBDP_WD?t?(fQ^4OgA>c z%o=CVN-S=9+ZXP_(az_$Fk8bnVrtq?E*-+7(gsgqxHLyMi@$c`pf)1C4TMUq^noNR z3<{J_RHcd~JkI-h2Hj>8#m)ktLM-84xO-$II&99!)?$V5vPKX8M^=-}mYb_Djoatz zQSCOxWGVrMMKE^|sa;0NSxP*`K8nRg$&=dc4F2`6H1cG_&fv z&v*CDGu^_7z-VP4P-7PEDJUGt^|3qXhO4)Q-CC8wLb){NS{dQy$!xr)a>=7x$@2`9 zISEJtp{EH5+-3DV728nW<^$G!Os`u4l!=K0IW!##+dEp_0nrqpxayO(ho!n`YY}cA z4K%T?oL9yspEjRUxoed4${4)d9@S{}&Z5id76)?6znuxxX1=uqAWJmxsHs0T@f$n~8+(bIdih(cmWcYMy2 zi3mij-r5)}drzgnDF(hs10gp5nO`1!Kg!ejVRCkk-tt1+jdQJ{xLJmkdV>^BjTyDl z^xdI2pe!dRUmc>PaRyr7Q;O0qe0HDl<<7BW%L4Qi+4oHG1asd6Lri~NCKJv53y03a z12ep>GX*exoixaB8C=uPiK)PKG39ffTIV>vz+7i`fmuy6s|m>TT0IoBmEE6}^i1NO zOgXpFu%N+7ms8f@yE`)orawF40R+8Ay@WMd~?_56S&~%dc;7I}bg^jbNG0@7|dVK#I3cTZd_q(~KD5km) zuCWC0xrT$1ga8~mUEU?4@E++&9Nvm>@~J&z?F!Sv?HFStnU|qy0+h*fLe`A<5~cBA z!(2U7YH420ce55C<>5!6608N+W;qkS~G`UZo_KQu{^xfX$RvR^X-}q+zdW!$w=8>|Jm&weloI zXo=RNV0ScTv0bS`r1v@u|I$~J;qDsx((m^$2B{V`&F-N{Ooy}9pp@>$xCH2MjpWnF zx?WcVgGezUmj`_%27`p4Whr-*ull_(B%Cr9R+T#C%Y`lla3*_o$K!l0(P|fY0j28E zy&=Bq5O@Zroz_oILm!1gk((Y#OBId7aa+ROyiL1KQBX!IlGJ8pj*Ql$wwb{<#Xty! z8qD<{d_y`5?)}ElAYmLgXykHzU0 zM7NkHjcXJt(>gF?gz8>Is`?gV-ytxSlF#irN><=bP`N~veiXZu>m~FKb`Qf0!8$5l9c(_=2N%DmRv^0COm6bqy{0 ze7na2aV7=Apk%`II9AJt)@101$n(M;tU!iKjIN_|BPW`25$rfGvK93kg$P8~6_&x* zh1YttHcLQH&+@F#+OrRjc~=Hr#$gn|Kw_VtBx@ORV#){E2Q{@W>%6WfM;wM@h53W{ z?Tso)tY#F5IP6gxCk>0|b4zVj#oON3Pq#MPgeNU(wDC04)JIk8vqjyi&Sv9PvGh5< zN~0v<)fma9*xEI_bV*80b(U9L!1+Gcqj_PA50K`vvzlOf@B%n<-g zX{>cu=f%QzR&`&>eaAfI;bd_qC&(`xTkr?9R#+rxSGs4cZ`)mmj{V^B0)=ZYu(+j~sg` zXHkG{Qf!w6ub1rdMI0x1WR(p|Yx(n!64%^tQV@-uOM8Y*>>#UC93NE0W1 zlSPGHwo!kNu2lTRxygX(x9*E=fEqe^(xr3)_@>=K`10pjyn*j13T2O2Ry?X}(8!_%`H@YQpV|yK zkB`=3I2Ml}0cV&Ew#A{)P$6eTaVO3p^~R29VoHM7lq67us0s~Orp z&1!QA@!#J9)hgW@Yi#DVnQMyem*#8?!E}hK5*;+S0^SLt(`Burg(f}cgT zEb4s?!p@0-gJL3SeN$-PQ9T*K`H$Sg@iVs;I5-)-Q*-U|Qd%iE=Cp3LP#keFtpMs2 zJ*HrAYD~Vh1xD2%Ty-5j*uUck0{d2t&vSt-cbA9Kug)Sv>;-(cA~)!48uw`&t*8A> zh9{)2&*IQLr>eb*3D^!h`=1Oc_m>Vaxyk8uF!vkIy_~cyI0wgOzv3iwx+bwfBWxHo zfhyzJcTD_X^7K35akUyzBFP7p_fqC%=}xq3@W7<$ywQqMi!^NbOYrZM6OPda04FOJ ztt(7ZY$@G}EG#3fn)$idJ5Tri>23kq*~bge;at1byCbuhPj}BJ)s4u?4%Nt^ctay` z+uYkI7oi+;ZoF$`m`AJ(2m*>ct(^vk@HMZ#tG2% zTW}zTo7Pu)v}d=%bVmw`px8g45!&Uc&jtUGKLXTy(>nb&0w(IMxg=}5G_0IY_D2Hm$1qJt>uy4}J)z!1z?FW^(` z{Y*jRj0<^_tTa~9kHt(Y3rUor%K5aia%F$H?ux2JzVA8_BC8gKdaam z6qKWVai^TUtF7ZKZ=lBjYxRvx&rufkUz~NmFMyaF3b86MosMN>8f0 z#VYaYweNeaoUBV05#W6v*V7hDm8m`F^Z=2)oPd`Vz7lZWXINMa@B8HwH|Ec{*kvM1 zVMnQRkL14U#xPEodNyUOYTOOoS|)duBCU_I$15V%&HL&vtOU_IwCp}G;S10VDxLc5 zoq?Dj39a|}T!{@7c*-eFcfG|WGi~d7Wll48AOY~n*BV-%?&$uv1bE%^+gOMfI``tU zd<>z9>jW_-pF6*rtU<-~s09H^dtw}#=-c#%Mix_8H2i}$v7qiVSC4Jm3*VM#@hV=+v1bk~&3X>=8|n)Xwh-c#)vTVZ zIl4+go_!%ArsNo9%I)SUMBdpE)8couFkq{OzVM1Ol8jd^-3?i&EycXNER5cotzRhw z*`35Auexj8o5SO=8ypxmo+p7Ek4@?BZUn>za+^8^etThr&5HmpGQ5M!FZfWPQsW@f zZ<`|gM%z^@Xm{S;`}(UQDj2V+`m+sc)SFt<<*REZop$tACGAytZe%``WVjxDYZu`iXm z?bNuz<71}E7(`BkZZjnKkF>vG^-oIaBrZ8OQ6g6Qin zOZ#rUnkP&oS~&@ca7{s8I9Ol-n)%RdbDem?k;;S8SHta^wc&&xa-CpcpouK^$ur)m zErA~{CdPa7AU*}XRW6>adhec|MmWt3oRIwU0p}%t5=zmCgrTwZ5OOqQ6 z0}XPV`eb&d+0d(+e0_m&75TrPz_a<59YHOjmbr&jf~+w)~Qe!{Lpw@|IPPH~oe0_UI=lt(6R1zc3N zvvS}1;7S*&=cXFQt+XD1#TM*JEo3$khMpfcLfsoA`YOqEs0>6#Q;`y73ZYOba*Khx z1L!no+8UJO*$WzE{OHssHd%t^dYgE))zJ8rT`f}lhyCX8>CfiNzKs(HTl^D8A(_f( zb#&ct-U!r7eEF=X1`d~(NAW1ImhQZ1Q~8&FPG&f{7nTVD1!tM~Y;PNKcFDyZwkLVn zYE&sLqH$emOQ$F6-L2#@SL%Q!jqpxp7eg+uv%D?*X5o#W@-K5HaiuK{70DTBImP^N zXjdP?NqV22dDkiq@n0ZTa|&VWCh#R9(IjjZ`GY_AH*+7x26I*`*5yk@r9puzyr(LO z{5ux-*)oxUe1!PG)FAP$AEfg6-=4e?j6i%Udwzm}ag4$mGXP0N2AeH9OpB=L-|FjT zxovovsckgLuVNB}417}q@vijy^nhYPB>0jr=+x5k(BXPIDPN>B-AK{7noCx*@wPcmhp=3Jl-4&=`*{MVjI~_{g8|o7rM2igs%~@v#My2{U zr(m`ol(R{N>Bd2J6)rWUx&VL#4DK%uiPUEKQVTeFmh8YB5T#giRk%3_m+){CudFi> zLGJ^MogZR-3Cu|qq%c7Q7A3-#W!Q9d4p2R7EmXaehA#=@BN|(aTFBO#kAW{T!mcf%ahE#GJ&eivRche| zP+jzA4muUs>-r+OumrQn&)2L$0CchMlB73%o!k|QH+0?<9gDa)>;AFHa-`KCvC8u3 zG`~~-YOHD?!|`yjm#BE;b`5P*z&~t=OX;#;Os( zS=ez0DhLx%nYBOm5q*8kHpCU=)^nxk31u8459WFNr(*0zjI zJM{fRok6|r5I2rJg7BX{#QMGI%^6>|>dl3@+@~IUmtV3JfP)=mn^$;Bpg=r487ou4 z&e>ZU?G!t$Tz9ET&ixAM1mR9(|Ly0XaRXLw$h&JT{E25NHY zUWu(3$LMt(j&3)5c@Eq1MqRQBr9Xv?)aMIOwjNv%c2>X3Z@b~)Dyb$#6nh|-U=lZ7|iyCt3>izNf0U_A8j7shaDdnVrYbL zT5PJpq)LaZS?S$yXq$bXwWP4P;nGHuUkUu#Z$2exd{E3CU#@wCb$C7kbMjZ}WOC0? zYn*{hX8BFcN8|-^ne5m;6?sKtc|}CRHQ|M-2Hf%H^|ey@{4KZfq_tZbFKhiGZ1d)7 zlvzqgSi9#~W(r7(V_YUkb)PJ*lCHoPlqt{Gnxq3l3F`**y6hzXs_dFJ#eh%-VrB!1c{H{qaYGxnQeLfP-L+ij0|wnl-8?;P6?AuU0!LcpHUN|nlRXf46VzpD}~ zOCeO)d?tW&mK;`wq{RXg*)KXBUK+|vIvrM2B8Wd9+o(4+&^TxV6G?#c^gQs-3YH%r z1<)Txe2k)vHiNwKR2MUCUt1%hfJ8Afg=eLRnLY-#y*LUXt$2QpHkfxex;{GEav6D! zU^NGDid2a%(d=8fiQ6YwpGSOfjru#K-cavhb)|5YmrW&t(Dpx>)#l97(2y~;)?ow- zSv}la-d|GBpFRuMu`H4Q?G};GIr-S(L0?XPPy5YkjMl0rI!WkAvt&{Iu^CUd*1yhE z2|$h!nMN*CO|j!BMJwcXpNN^w0^*Knoh86(1pZ_k!U?)(d>$id{#J0r>L`#a6Xyst z|D-YVS<^-Q)t~^N#-akR1^s+O4W>H3ybrs$ur~s!Fbw34z7WiG(n=|&QT*#s0c?j| zNq@kN+VXNIomupofQ1Oy>Hv=0W3_CflM)7UlTCT9A_Dij#(6!V3)X)VtGOjcjUV3KPh~F3&t{X7C;&M{1bH-__~lF((a2_Yet3w18&bw4sHnY zzdn&hd_4Az-n}_oWGJ33iI>)>8z|#@*g9SBw%-6VyzP@21G zqWhHWa~~6fC!3n_>vW=czY~Jj6U8m{lYh38DyU3=Lr|#rw=t2e89|D|hqCu}bunf3 z{xo15iq4CC6`FTE+($arg^%#?;8za%c7atc^q)GkNOhQIj`ymna#BngA6b`iVoEwO z(!Yw@h)B0)%+!F^$X==-60XGWE9tAUgAGHNceccZc(0{{|^o9~ZcG{)BVHufWM9jH<}TA9Ge<9Yk#cTp`U*C7aC|4?2= z7p`$m@H$iEWOD05PqVw))a--Q+{?vYCu#OOYtQoeGNP4w%WihdfuV8Yq%Q)aI)@2z zC(}k+$lF`uS2e7KrO12$9=F2;@(Ip*m-+V=TIwy5vHu)R9jJ{q5N_!ZA%$$TSenP@ zoyQiUwmq(xWPp{rL{MERdA71N*GhIKgO`T&Su9p-RXhNLV$$3QmK8VSt?ktUK(yx|}EDzEAd2EB_dWVNl zQl|5h>5k?p`^nxn>cVJr0wfd|WTYfzd6T%a=Jd%29xzk3 zNR-|7s61mmx7F^?nYvIPJ4nx4|GSIfZ?QenOViVJc^k*1S}K)a1Idsu%J9h3^SM8$ zl$GG|LIEybY3A*YcmgJ z3k-|%N>(1u4Q_LRHd~vs-lTXWTMc>me8BNLX7%v^>wM&eKRUK}=KkVaxs26a4+fS* z@(kVKc!TV#RYdUV&{@!jRK5h?B$Wah?FyL}c(@rJkyS7m;2{JaW0|E0q$JZg>@Y-u z31myP_KKzCUI1M=h3Da3t>kgLjdfw6ry0<D|91IL=Q9pu%&|ue3f~ z`sh}IbLi+G^7Y??r5suYJ(VwN`6N1Gt>r=K4uLi1D~k9HSza<-Z-bmhKXm6<>|Wc; zX>76V4Ame1n7N}VZzsKZ+);^Bm@92>Q9cjf9t5M4jQHfd`)#bRLwzVgAHB#P)K1vI zfRj>PX&jEIi=Z_6QjNL_0#gd9B#H|xx>z-bT}iF0E@ZaeP#7|gQ(Gtd`jM!ls4Ul1 zNCVg=R zAwHMw(tpajF?v!b0G^8!8wHhJ(9rXbzHgRkE|o66&`)hfhz!)jnM734(RU&zoUSx+ z6vItEon-Y&SuMCw0mTiMO0rqxNIGB$`-=^FW&$V;9vcJG>T!?HV1TLx%5>A7+y_8d z+lRW+l2dWeMoFOk7mc;({NX4z5XV5Tv_?)Mzhg%>Zu&1Woh$w1q$JcUVB2Hw%^N>6 zt@hR{Q7_MNqh-RPmr@S|!EW#gi@OgicS|jwnFUs6rnfF87YH_}p7euXzqWHh(a4 zza3-?@13z(Fb7Ds22959YZEd(9+KPzWUt0@Q&=MyJY<&Gj2?@~I3JJodL0Wwmvrs4 zb25cd07G&N8T@1IW>Ffg>%=kKrJ^V zv)k0FcicSh!HmK)FF4vMp< zDps#8Vtc_c*aFqY>&m@oXZnf&kv6Y-lZ>I68Fz6p5TMswO6g}%hu+hjp&uP1u}@m~ zTwFpT=XD$W*-v4mJCuZ4>oP<_rU!-~@ipque{!h%=COS&YA^*7a>tPF?@yNw-Yh*! zx}Iz@lvJ8(3I}7Smrpt1mEIIH;1h#ycd6;hg8t6P=svi@{b4&Djj7~ONuaudgZLJ3 z#R5{_Jk_v5rt8$p;#=l&uo0Uz@)8&g7tmr5_qAxd08Evxn=3iWTHT-T&Zlfb&C8sJ?G{C_%gm%hE~ zM?XDCCmG(|6syQa%iu5Ehi5PQ=-zM_7GE{)RDEEU%ol3CTBoA9A8LfB%@lIm&agv1Who;}KNA5NX$K-NfV-y0{38-$-8YpWcyjPzf(ITS93p8W61QCIHigYIwH zMwj(yQmkqvbbF(1IFttMFVwm{bg=g6+RM4dpKos4fH04C>h-3^N23}wUl`N5=i0`Z z&S758Yk0v0*cnK=&RGL4?VP)wkB${UHbB;kBDkoHO!pk!R1It%ogeX}U*d17l`j7^ zJ3up4WRcKjOzYyYkOGFp{8e{sNITLgRkF8XQn!{%Ej>xSei(JfUbhmR@6~#(C-3@g zGpcY~TJ=ni+V0bDN^VV;clM{qhpe9K={1=p@)g}&%j>3%}}vec&g8#&tK z7K?n}ReoK#v+(W1ZN9%=X3Sl1{QJ0zFEnlgHS_1SVOHI1nOeoVP4SKCXd1LGzV1T2 z$a`O{s21l=ylSF)@h*((R-jY-yYUb%N-96XW70#!ivz9``P1AT6DL$&F3PUFy;v%1k58so^Y)bqCWI6pP&$Q}SP^xIIV?0|8^TVix zUE&WmC~u)~)i>e~E~yPDoli)d+MY+$GYqTf_kSR(kE;?7afTYPl`v>IeTrlHPJDja zQYID1v@rYp;M2IZ+SNbM_A}{4D1_%!JSbbEz}T%T0F29r?MG_@Nte^J8Ielw2c zJ9@W^FkWwrNYBpk)~SD*&;3UIBBv5{ev;dUd+rnoG{}HM;E~k#>Zu~3eaFp2Qlf{Y z>F*DH%KF*g|lF;_F5Ta6mZ%AhMb0x!aOZR2b4c51L4 zN&=+D&iy}I!dxDi4d)_RGu4?*3mxB1*EapyOL&9q;BT>-7pqwwoJ&NQIpk6l)MPvo z0M8<>aq*-iC@|im6+()&v8K0iUrZ0jMG+PhdEv-=#{=|c8uU)%v|CylIN>53z{RBr zQ&Q<`<`Q5)So;wa3l7Ra!SW-QeH?HUiqy}*nd_?g8)*;g*GTmzs`&5z;ov1Kbyn?2 z7KWlA)bPsuRD0qz3%?-fPXNPkEzhz0+)qHZTYmRCVjzb}CaAg0ts%M4cqTyqIineG@TY!2m8r{IG^8wN z#JZ;`_*mHAz>WmXQp*=ZE!RWV;R@i#b}j>J|ng>B)FevKd2v>*@fudSD> zw_azSo=7kg@R^(``1Q{fa>301{q}#Q@i%|-zq;|iYvF$_!~fbzumt{hU-uqMtc;O>k2qAE~m1?VA6ZJ&qv+dp~!T*Q;;_6V|2@4=kD$e!Qe7uPJMvb5cQ*s&fOY zWw@1PTReCZ?9_J>)xlnrY>U@XG2EeD&@|B(V%L_jZ)r>h17*`AfszyfEimURw@VuP zhy+ncvQgj^wf69gD85lsJ~yJurCD|0B!+a+9AL2V&y zydlQWkXKR4@q>M>?e2N6crBLp%acXtu_$Y&BZDZp+>K%=@Q)+%5fd!zLMluxvyucQ4X3Z5U__KHdl>lI>f(4dS5Z}c%b zi~~MC-`41R{UeLOAL}HC4VKzqBW5=py!uL*!8kgPW?EM)aS|(b;A?8z5ZpEL&7QGW zQ${9N2Bj&$XR&=y%WS-aj9G)xglsX}lv`uAEEJdyY;qd<+v*?ZQyH=h^Ps#>S}`(B z)t?UvmrxToPhSfg8W))gU{Q=r2?%yvCWw1@ZTC#FqgLo?qxhxv7bmJZ=~k>rNjG0g z2A1C3d_Hxw6DF#HH4mYGBd8AdDF0u25@i=klX?n;W^x#@O*BWU7`0RaHtqvWwNtff zwiLr&w*+Uk+Xrn#OCy*dkp!?SuIgE=Z>0(y^k1Ou@xeA%4tE`TKu&8Bg_!gU1#R7t zU2L|c>MCvX9-k_GY@g#Q4 zuQ|hPmgByn7K;g5heKQ(mOwtJwwWqwmH}e|@roW-11d25%Ap~Q-UjU*GM)H8XBy=N zN|SP`_IjwpO?%>3W>rx;s`_fz~pGV7y!Ly4kmlXU0@AnL+P=`IF`XILTjn@3wuVro_aelBL_!`pO60dP*zT+nS3K+*$K$x_J zwAjExV_QS*N_L0Qq{@D~`c`bc#qPURjih(rV1Db6Dj7LmGV>?Y=+|m36?i;c(TV3= zO!(A_G>bWe<{A^HnG;m~jjEWYl{{gwTWJWd#c&iID9zcdz&Fqg@z`+G>XEll^#tPw z2-dC(&CNQ`5807X^pl{x#ioYjgvW*16ZViSGoN^8hR=3J>uj%G&4SV-pX%JKr9%4k zyM*6ZX9-GA@48I8nvixxx#R0)pG%V%>1Axe9PRr*qE`G0S@z*TH;dWYtuOSY^tWF709|ebc~&HS%qcGbFJTPUpj->A5%K^_kh$q?BIwojB$Y zxx9<^KeMg_S+;jySD%;tpW4R+-IheZ`79H?b~Rv zYQzzR)4R3IxBkeOw`;5}Qmg%g7LQ0CpQ>mIDLz$FnB0}~EC?P&Dh66G&Kp9U=RW|YLTWmU$7 z$%=e@$t3b08fryUIfTmTqF`n`nbua)w$CWy_gpY3X-C4l!?Pzsml6Y3*M0=jaM&% zQ^I%rwIYrl#(&Y#Bb=iT$i4elVY@^5?w&~>e5RPAhPf}QV6;EX9e{p-n9fgn<%S&Z z|LKg$;P}_srY~x|UyLHgr6qy-tS*M#j0s0Ho z?pw|NjB26jl7l6OpsG#?VA;zPUpo)F)AVEy;?#d^gd@tf=V-Mna+&J--G&*7x zMw-Dx{T?P-W8cP=1kraV*4$yS6T4j`P!0e}8}E$!`>5I6;)^z$IOv(7QE> zzY_r=i)vc~;$dJIjYd&3ef<|I6%F`Ilar8;Z)_i$QLIAVtK|`dq$hr@b=P$Z2Fu>#DE$Zw$6{e^COa1|>TQa-^g{HvpDP!@7k2$fHQ* zPUzV`=tzeWR0i-*bFAZV4vGb5TeiJx5Xxr8;0IdU?i*OZ{{T5KSI?=!V*TL$p%MfeQM`-v(pd9!JDV3_ zS(}>2qmHxGcXMJB+m_j6YrkAZ4G!x&~ zHhzF||G&Uhc>Er7s}t;c4gY{b5F99igV;1-dQ50T(Y@#;RVb$2S(^R}OCcKnWJ%-` z^}%)u)NEL9{GW;t`H25X;=!JA|J{$l`vei#1BUL}E&UIa^XFz?GNFG}JwZqeuure$ zbLwjGug&jYz&_*;l=4^879j|Ynjxn`i`~v+Gq?`}k|{0A{zGlm=!GR;B*FTBlupOs}9MYzdVWL5zJRK^dPnj(BO^ZxMQ+sL0m**|{mERPFvnGJhfp@eVjEM=+#^mg+xfj(A3dH`>Bpg52a{ zbA|pZ5)?ctqSuE@Q2*0lh}}O>8W8*J;{9qjrsd$w}quhbSNQU#}5lPVRH{T5R|`WnT*IX#XcCOldzBhOUfxsR{Cj52nK`r0 ztU14L?|tf>8|jrz5#G6f#a87$`$P&TLe|=cZUC2gD#0{N05F)Pp z$bAL&vO#iUk$khm#DqD=jAbzrz5MyPG7K6{D$C~jM(;dRFP_a1ur*At)@R7qLXm3o z5z8G@e6O8`F8b7IqfH%8j7EO6nR&HKKnGI+x)RteYfn?RT4$mKOxTiq(f*D|aDUJj zE7o;hZ6`Vn*>}8eH0|BFerdaRR@Z?st3N(wHPmUfnpRGbkQKj=S<#Z>RTVb4tm74a zqXE2HQp7`3SG2>96 zMGct;@LACMo{6h9`ywvzSR|V{54JKCu_sMpoGU^iXm}|iJ55rhDa=mis{u>{Wl?Hc zaJt(i%0wP#gj0ppD$`dv7x(80wwArKIORPV=&Q$T-j4#iiKyN2dF+gR*U52;O6wLu zreTFHrbXdAX-Bg{QF}#!NBeQAT-9kFiDsQI z2cz?~zOxoxRygU2lP>EyRYSou+q6Q53gP!RmHx7LD;qP15!Zy*l^DY=rq)5Ti*68_ zO(Twr{z6eC7u5q92GX|-$GGwCfgh2eg5F7m0^ea5su9TXop9=WCkYy=`_>b}Z)&y~ znzE{Gp{jfQS}98cBr-F%25`Jy_R(KCaO1=mc_mOeRCe+T>~*Qkt-DbvY4RiM|4?2> z5cBC~iH}ShBaLra(G{GFI)@oTy*h9-k3~$#doOI*2>dSvt7pnd6mcbod%neh4#zT+ z^m8$HN8s0|L#{~VoacePlKI4$gxoM+Nd!IZJX4`sC1vJIi%rQ`#J%L<^8!1FjHsFc zMzm*Vg!8Ioc|MZ2xu)|Q0++d2IW)rmc>JN7+Bz6-oqs3d;%CN#sH*$u6g_jAZj-^o zRrQOzySj|}vJn3@-;U7ZNg0PWTpa;nG@MbXFuzwV{Yi-z9S8|2^q-8fhPR&^GV}MB z7OPoikZk!U%$i~;ebqgrbpsC*v~ux6Nov4MzE05kg3ztfh=L=-e%C_cHvNU@WJmJW zY+fxaOCf=nr;w@~?6T5?z6??Uo^&4b5roLzVSQ5p^0 zE^#_KlnN%19vso9$%TU@={^reb)#pV$c+o<;bJfyXZGR-Fo|Vwm^@TKk~a21GP^&c zd?gRH6XkYxFPfetw@5B87_ZIsuJ7G*MQirO+={^+ZIU5U-hZ#!KpqW5Ed{&z4K@hU z@q&5Vk*CkyUm4Z_cmeBeNkns`8VouG_g2|N`hU#MK5lSqT3|_HA2E+5TQkkmQ8#F@ z-$gZiXOiMfeT%%s2L&&&0KBkBeRG z;OeM>+GLM?p|$|-MWS)7OfiLgHwjn|{Gd@KH+pvzsj&9){>J&tYP5>D^8nA;i5+;= z#aUc=CUp&I*i`YCgw9DK!ViAe0a|f%P@TE74d`qBc0}$;CKvBonEIfL7-9Ourp2l< z7K8LA!wHZdR16l1#<|+gsdqTK36E4MZD-oD+)mox7jF7wf@D{~=M*eOht5}!1Ka*4 zc7Rk?oAtO)@e7~Tr9*>#D$!po^m$fyzD}>h0EtE5^^9l4^(V=WY|$=sKCUqQiX&v> z#e?Wm3AKir!rQbt&>jB3jrGMus&eMNjMK;9lpNt&Y;oLr9*I8d%3)$uVu!k|FxM+H zp6S;c&y=fBP7?dSHYY3kiH|M-8AJVAZ1QVZDn$y_LTfYCQZvo0$8oG0J&~4;(7c?s zvD%co`ML6S>~#!yxCZ+C#}#Pc+uV4b^0cm-o=Zg0(Ay8Oa-+&>hxS-GElP{!S`0Qo z`wC4x+164y2^k?LhKLGbj6GT|3J6PtPGM}N4_t;7BexZ8CZH0PUa(#df5eW$%jSsxO|42S?H7+%@BgQYa^At-V)Nj!** zYcZOj*?r6|Ud>8Oj`{lI@hdCCH4(wKPCCcaFN$I@dfsULe zB!nvAuUMT^2CbP6=__Xs6)oHz@$(mPoZw87c1k>MAW|heLzbK)K>a7wbSG_>2=8RP zLQVP7l#=;dfb;&#v;Ag3mROG!fKM4DbK>k)^S@qbeC~ErA=#ecMKs2n3Q5>hV1Ibq ze0l|FkWW<(v6f4N_7x;E6;nF;;KVwRKv3CUwl5u2 zP@ev%FyzMci0qPSfoi-zvEF&yCh*}FGf`=xpjTBrV?%U-KvFAh2%M;oE6UT2ZnWwg zPwp{>`}pWwqo6wE%o$A;@4-nOVavYYndUDvG<%vP+;@82>^7VFHg~vpv&y-QUT8UR z2`f_L)_1b+FU3CYMDr8EDX!qq{R)QF@)33MD$ZZJgKIEh8MokKdb|bs=Ew3X!z0{v z;l~G)FXcVr`LTPw>jjRpYMZB>Y^JK4=-^&QBSCPmSBOg}`XA%FCzZsYc(*jd=VYthmk>tS7>v3fo`gPo zoZ4n}*@rY%`;Imriu$fVlCR|>7HS;q?_tqZkJN=f*VGyIIVpT1#ts)AJM8N{94+Xi zKa18N@5NN2tVkyAg-sJIV%$AFJ>f$77;-qoqfdRv?Tq&)j2HU@kV~FMNy(g)ODop9Q?X-WG|Yo{v<_ zaXn3`1c~J5$Sem>W8?Br0{5akUA&yNFNXf{SJZxc-8Pnr-vORr0GTOcpP5Ikv@l&aQn2%Xz9!t?#>3 zPP^#^UF*K`8V>m%3!RC30Kr7fr9X0AwF0}}xTt}U_rKUIj3Q*^#XesQ#l!v0FuO}3a#*2r z(dl(AQ=Nv)>Vb~sNLTNx%55D)*LIsS#-d*lvEyfJX3N&h7Qj6@J!c3l!+VwWD#Y(- z+VQ8u>vUtzlY01_*IP-`^<-585!2_y6?K`{O`$Nyr8lEX9#J0(8*4VS_+%Z&KuWj-ekAS6kK3F;40s0or-#*#T zbWh4m@n|AE1Flowd(`SyPa`xNqpRGb7;%4ZWGqs3dd6Q6usoCElp&hnrc^!yZ`C*fPwoIE+ zSEL)hZhR7f=FaW#q9aD_H5PZk0z=Dx{y|*TmZ<D9y-=nGs zD&QStSq;D**FQ11b)9VQ+06;wFIijdPIJzU!hOCFs?mS+N*==LESykgxp@_BRb$YO z88LB>t8r|xo>z5WwD>_eyEfi#L<$#CpR=(mb>ohdn{sz)<_;blvy9e#Ti@0KD=2Xk@CS&LJgRDAO5<~}>A&DYCA3#1TlMI#}##7iIU za{cjr<-x-#P@~F$!Drsx#7Z$5D=6jiEBN$P5ka2yZsE!um6%?)kNBNT<=KQi;8H71 z9CdPz$8b=}d1Z_6Y9-F5>u$lb)FLEHn>}6`!uOTJJD=Giv}CwReI7MC*rGaZZT(OL zsmHe6p_-Y9v$B`#gT(_U#QObSXzDcdISMJIZTh?YRvb287c%eK0dn>e7$WUcifp+5Ox-@|Mb$kn7BbqMvdlH+^;(xcThJfbJw z4|%UjQ9c*st45Nqs4GxfW})N6{wkAX4NtemvDf$#QAi+cM7xrwU-V3 zwwE!*boNgRAk=f#tl7UEYz<<1Zve6lck_PXFu`lg)SKlx-v4ut4+j5ZAClR5CO3M61_x~+~iLzX88c}>B9BKI- z>&MkNpz{ltYyf^Xz#MdqVT-F^Z7SBLJL?y!i_18ne1UWYr6DywFz|YQoXE%fcY$Qz z&l1fwmdCtt|1)kGdR{U=R||32nxJajKmQ92>9KC!KH<1<$CrOLkZHC4HcR&%Xq=zu z0sMY0ZNn4%XXHZ$1;NW&>iQyPS~t|-?;+F%-sq>lM4=KE2WLvK0`flBLHs#`Ow-lA zV~qdmfdAeg?xD~J(cc%6kz`R%ce_ifT7zko-n#TCSp3ZH=ZItv(x9M2lZ{Jf?8X%^ z>GZjlp9ri*EDot;E7uVK8A&J-7@Ycj*we)e+dZV40kUYAklYS;ONO<(A# zv)Wv|*bSNbZAQEnpCVNPp>kxs_#nKIQgi0(|DC88DuZT>YG&p|xIz*0zxrf4$Mf}a v2`F2W2M@BWt1O!n8oSBAUepN=Hr{=>Bto$RpW=T11oJQk-MdqB+cn`oFR0p+ literal 0 HcmV?d00001 diff --git a/content/copilot/about-github-copilot/github-copilot-features.md b/content/copilot/about-github-copilot/github-copilot-features.md index 2de828c8bc8e..948d5b2d622d 100644 --- a/content/copilot/about-github-copilot/github-copilot-features.md +++ b/content/copilot/about-github-copilot/github-copilot-features.md @@ -62,6 +62,10 @@ For more information about {% data variables.product.prodname_copilot_edits_shor Enhance {% data variables.product.prodname_copilot_chat_short %} responses by providing contextual details on your preferences, tools, and requirements. For more information, see [AUTOTITLE](/copilot/customizing-copilot/about-customizing-github-copilot-chat-responses). +### {% data variables.product.prodname_copilot_desktop_short %} ({% data variables.release-phases.public_preview %}) + +Automatically generate commit messages and descriptions with {% data variables.product.prodname_copilot_desktop_short %} based on the changes you make to your project. + ### {% data variables.product.prodname_copilot_short %} knowledge bases _({% data variables.product.prodname_copilot_enterprise_short %} only)_ Create and manage collections of documentation to use as context for chatting with {% data variables.product.prodname_copilot_short %}. When you ask a question in {% data variables.product.prodname_copilot_chat_dotcom_short %} or in {% data variables.product.prodname_vscode_shortname %}, you can specify a knowledge base as the context for your question. For more information, see [AUTOTITLE](/copilot/customizing-copilot/managing-copilot-knowledge-bases). diff --git a/content/copilot/managing-copilot/managing-copilot-for-your-enterprise/managing-policies-and-features-for-copilot-in-your-enterprise.md b/content/copilot/managing-copilot/managing-copilot-for-your-enterprise/managing-policies-and-features-for-copilot-in-your-enterprise.md index 0a80a1517e89..16dcdd6e19f4 100644 --- a/content/copilot/managing-copilot/managing-copilot-for-your-enterprise/managing-policies-and-features-for-copilot-in-your-enterprise.md +++ b/content/copilot/managing-copilot/managing-copilot-for-your-enterprise/managing-policies-and-features-for-copilot-in-your-enterprise.md @@ -29,6 +29,7 @@ You can configure any of the following policies for your enterprise: * [Additional {% data variables.product.prodname_copilot_short %} premium requests](#additional-copilot-premium-requests) * [{% data variables.product.prodname_copilot_short %} in {% data variables.product.prodname_dotcom_the_website %}](#copilot-in-githubcom) * [{% data variables.product.prodname_copilot_cli %}](#github-copilot-in-the-cli) +* [{% data variables.product.prodname_copilot_desktop_short %} ({% data variables.release-phases.public_preview %})](#copilot-in-github-desktop-public-preview) * [{% data variables.product.prodname_copilot_chat %} in the IDE](#github-copilot-chat-in-the-ide) * [Editor preview features](#editor-preview-features) * [{% data variables.product.prodname_copilot_mobile %}](#github-copilot-chat-in-github-mobile) @@ -60,6 +61,10 @@ If you enable "{% data variables.product.prodname_copilot_short %} in {% data va {% data variables.product.prodname_copilot_cli %} is an extension for {% data variables.product.prodname_cli %} which provides a chat-like interface in the terminal. You can ask {% data variables.product.prodname_copilot %} for command suggestions, or for explanations of commands they run. +### {% data variables.product.prodname_copilot_desktop_short %} ({% data variables.release-phases.public_preview %}) + +You can generate commit messages and descriptions in {% data variables.product.prodname_desktop %} based on the changes you make to your project. + ### {% data variables.product.prodname_copilot_chat %} in the IDE You can chat with {% data variables.product.prodname_copilot %} in your IDE to get code suggestions and answers to coding-related questions without context switching. diff --git a/content/copilot/managing-copilot/managing-github-copilot-in-your-organization/managing-policies-for-copilot-in-your-organization.md b/content/copilot/managing-copilot/managing-github-copilot-in-your-organization/managing-policies-for-copilot-in-your-organization.md index 77415f78f51d..d3efbecf0fd2 100644 --- a/content/copilot/managing-copilot/managing-github-copilot-in-your-organization/managing-policies-for-copilot-in-your-organization.md +++ b/content/copilot/managing-copilot/managing-github-copilot-in-your-organization/managing-policies-for-copilot-in-your-organization.md @@ -33,6 +33,7 @@ Organization owners can set policies to govern how {% data variables.product.pro * Using images in {% data variables.product.prodname_copilot_chat_short %} (available in {% data variables.product.prodname_vscode_shortname %} and {% data variables.product.prodname_vs %}) * {% data variables.product.prodname_copilot_mobile_short %} * {% data variables.product.prodname_copilot_cli_short %} and {% data variables.product.prodname_windows_terminal %} +* {% data variables.product.prodname_copilot_desktop_short %} ({% data variables.release-phases.public_preview %}) * Suggestions matching public code * Access to alternative models for {% data variables.product.prodname_copilot_short %} * Anthropic {% data variables.copilot.copilot_claude_sonnet %} in {% data variables.product.prodname_copilot_short %} diff --git a/content/desktop/making-changes-in-a-branch/committing-and-reviewing-changes-to-your-project-in-github-desktop.md b/content/desktop/making-changes-in-a-branch/committing-and-reviewing-changes-to-your-project-in-github-desktop.md index 02f9adb3e487..78468ba220bb 100644 --- a/content/desktop/making-changes-in-a-branch/committing-and-reviewing-changes-to-your-project-in-github-desktop.md +++ b/content/desktop/making-changes-in-a-branch/committing-and-reviewing-changes-to-your-project-in-github-desktop.md @@ -99,14 +99,17 @@ To discard a group of changed lines, right-click the vertical bar to the right o ## Write a commit message and push your changes -Once you're satisfied with the changes you've chosen to include in your commit, write your commit message and push your changes. If you've collaborated on a commit, you can also attribute a commit to more than one author. +Once you're satisfied with the changes you've chosen to include in your commit, you need to describe your commit and push your changes. If you've collaborated on a commit, you can also attribute a commit to more than one author. > [!NOTE] > {% data reusables.desktop.tags-push-with-commits %} For more information, see [AUTOTITLE](/desktop/managing-commits/managing-tags-in-github-desktop). -{% data reusables.desktop.commit-message %} +1. At the bottom of the list of changes, next to your profile picture, describe your commit: + * If you have access to {% data variables.product.prodname_copilot %} and you are using [{% data variables.product.prodname_desktop %} beta](https://desktop.github.com/beta/), you can automatically create a commit message and details based on the changes you made. Click {% octicon "copilot" aria-label="Generate commit message with Copilot" %}. + * Alternatively, type your own short, meaningful commit message in the Summary field. You can also add more information about the change in the Description field. + + ![Screenshot of the "Changes" tab. The "Summary" field and "Generate commit message with Copilot" button are outlined in orange.](/assets/images/help/desktop/create-commit-details.png) - ![Screenshot of the "Changes" tab in the sidebar. To the right of a profile picture, a text field containing a commit message is outlined in orange.](/assets/images/help/desktop/commit-message.png) 1. Optionally, to attribute a commit to another author, click the add co-authors icon and type the username(s) you want to include. ![Screenshot of the "Changes" tab. In the corner of the "Description" field, the icon for adding a co-author is outlined in orange.](/assets/images/help/desktop/add-co-author-commit.png) From c60189f37fc11f68af6fbb57002de20fc6e50146 Mon Sep 17 00:00:00 2001 From: Kensuke Nagae Date: Thu, 17 Apr 2025 06:06:25 +0900 Subject: [PATCH 5/5] Update "Upgrading with an upgrade package" post-upgrade advice (#55301) --- .../performing-an-upgrade/upgrading-with-an-upgrade-package.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/admin/upgrading-your-instance/performing-an-upgrade/upgrading-with-an-upgrade-package.md b/content/admin/upgrading-your-instance/performing-an-upgrade/upgrading-with-an-upgrade-package.md index affbc6dcb204..08ae1e8dc29a 100644 --- a/content/admin/upgrading-your-instance/performing-an-upgrade/upgrading-with-an-upgrade-package.md +++ b/content/admin/upgrading-your-instance/performing-an-upgrade/upgrading-with-an-upgrade-package.md @@ -15,7 +15,7 @@ Using the administrative shell, you can install an upgrade package with the `ghe-upgrade` utility. -If you're running back-to-back feature version upgrades, you must ensure background jobs are complete before proceeding with the following upgrade to a feature release. {% data variables.product.prodname_dotcom %} recommends waiting 24 hours between upgrades to allow any background upgrade tasks to complete before upgrading a second time. See [AUTOTITLE](/admin/upgrading-your-instance/preparing-to-upgrade/overview-of-the-upgrade-process) and [AUTOTITLE](/admin/enterprise-management/updating-the-virtual-machine-and-physical-resources/upgrade-requirements). +If you're running back-to-back feature version upgrades, you must ensure background jobs are complete before proceeding with the following upgrade to a feature release. {% data variables.product.prodname_dotcom %} recommends waiting for any background upgrade tasks to complete before upgrading a second time. See [AUTOTITLE](/admin/upgrading-your-instance/preparing-to-upgrade/overview-of-the-upgrade-process) and [AUTOTITLE](/admin/enterprise-management/updating-the-virtual-machine-and-physical-resources/upgrade-requirements). While you can use a hotpatch to upgrade to the latest patch release within a feature series, you must use an upgrade package to upgrade to a newer feature release. For example, to upgrade from 2.11.10 to 2.12.4 you must use an upgrade package since these are in different feature series.