From 386831ce6826c659f149946ffb16ae4191cefa17 Mon Sep 17 00:00:00 2001 From: Tomoko Tanaka <28242405+tallzeebaa@users.noreply.github.com> Date: Thu, 7 May 2026 11:33:29 +1000 Subject: [PATCH 1/6] Update member name display settings information (#61085) --- ...ging-the-display-of-member-names-in-your-organization.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/content/organizations/managing-organization-settings/managing-the-display-of-member-names-in-your-organization.md b/content/organizations/managing-organization-settings/managing-the-display-of-member-names-in-your-organization.md index fdd55817625f..b455b534dce1 100644 --- a/content/organizations/managing-organization-settings/managing-the-display-of-member-names-in-your-organization.md +++ b/content/organizations/managing-organization-settings/managing-the-display-of-member-names-in-your-organization.md @@ -20,6 +20,12 @@ Organization owners can manage the display of member names in an organization. Changes to the display of usernames within an organization will affect the display of other people's usernames, not your own. Each organization member chooses their own profile name in their settings. For more information, see [AUTOTITLE](/account-and-profile/setting-up-and-managing-your-github-profile/customizing-your-profile/personalizing-your-profile#changing-your-profile-name). +{% ifversion ghec %} +> [!NOTE] +> If your organization is part of an enterprise, an enterprise owner may control whether organizations can manage this setting. For more information, see [AUTOTITLE](/admin/managing-your-enterprise-account/configuring-user-display-names-for-your-enterprise). + +{% endif %} + {% ifversion ghes %} You may not be able to configure this setting for your organization, if an enterprise owner has set a policy at the enterprise level. For more information, see [AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-repository-management-policies-in-your-enterprise#enforcing-a-policy-for-inviting-outside-collaborators-to-repositories).{% endif %} From dd0855c69aa0fcd490c4157f3d326e9b488786bf Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Wed, 6 May 2026 23:16:33 -0700 Subject: [PATCH 2/6] Sync secret scanning data (#61092) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- .../data/pattern-docs/fpt/public-docs.yml | 10 ++++++++++ .../data/pattern-docs/ghec/public-docs.yml | 10 ++++++++++ 2 files changed, 20 insertions(+) diff --git a/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml b/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml index 6b3dfa0a0af9..f5869b131633 100644 --- a/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml +++ b/src/secret-scanning/data/pattern-docs/fpt/public-docs.yml @@ -4946,6 +4946,16 @@ hasExtendedMetadata: false base64Supported: false isduplicate: false +- provider: VolcEngine + supportedSecret: VolcEngine Ark API Key + secretType: volcengine_ark_api_key + isPublic: true + isPrivateWithGhas: false + hasPushProtection: false + hasValidityCheck: false + hasExtendedMetadata: false + base64Supported: false + isduplicate: false - provider: Wakatime supportedSecret: WakaTime API Key secretType: wakatime_api_key diff --git a/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml b/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml index 6b3dfa0a0af9..f5869b131633 100644 --- a/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml +++ b/src/secret-scanning/data/pattern-docs/ghec/public-docs.yml @@ -4946,6 +4946,16 @@ hasExtendedMetadata: false base64Supported: false isduplicate: false +- provider: VolcEngine + supportedSecret: VolcEngine Ark API Key + secretType: volcengine_ark_api_key + isPublic: true + isPrivateWithGhas: false + hasPushProtection: false + hasValidityCheck: false + hasExtendedMetadata: false + base64Supported: false + isduplicate: false - provider: Wakatime supportedSecret: WakaTime API Key secretType: wakatime_api_key From 6882b7fb7a91732d4721d3c34c4e99fe0164494e Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Thu, 7 May 2026 04:04:21 -0700 Subject: [PATCH 3/6] Update docs changelog (for PR #61046) (#61103) Co-authored-by: github-actions[bot] Co-authored-by: Sophie <29382425+sophietheking@users.noreply.github.com> Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> --- CHANGELOG.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index a5ccef7e9cdd..3da6400a76da 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,14 @@ # Docs changelog +**7 May 2026** + +Enterprise administrators can now centrally manage plugin standards for Copilot CLI. We added two new articles: + +* A conceptual article explaining how enterprise plugin standards work: [About enterprise-managed plugin standards for Copilot CLI](https://docs.github.com/en/copilot/concepts/agents/copilot-cli/about-enterprise-plugin-standards) +* A how-to article for configuring available marketplaces and default-enabled plugins: [Configuring enterprise plugin standards for Copilot CLI](https://docs.github.com/en/copilot/how-tos/administer-copilot/manage-for-enterprise/manage-agents/configure-enterprise-plugin-standards) + +
+ **23 April 2026** We added documentation for the new `gh skill` command (public preview), which you can use to discover, install, update, and publish agent skills directly from GitHub CLI. From a90b4a4b85af4ad8e1a5b01eab5eece2d0606d95 Mon Sep 17 00:00:00 2001 From: astropedrito <96799026+astropedrito@users.noreply.github.com> Date: Thu, 7 May 2026 13:04:26 +0200 Subject: [PATCH 4/6] Update support hours information in documentation (#61013) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- .../learning-about-github-support/about-github-support.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/support/learning-about-github-support/about-github-support.md b/content/support/learning-about-github-support/about-github-support.md index c4cf477fc15a..d7c85eae60bd 100644 --- a/content/support/learning-about-github-support/about-github-support.md +++ b/content/support/learning-about-github-support/about-github-support.md @@ -141,7 +141,7 @@ To learn more about training options, including customized trainings, see [{% da ### Support in English -For standard non-urgent issues, we offer support in English 24 hours per day, 5 days per week, excluding weekends and national U.S. holidays. The standard response time is 24 hours. +For standard non-urgent issues, we offer support in English 24 hours per day, 5 days per week, excluding weekends and national U.S. holidays. {% ifversion ghes %} For urgent issues, we are available 24 hours per day, 7 days per week, even during national U.S. holidays. From 6720e5e1219da6fb53ee0d495481808c5a19fa00 Mon Sep 17 00:00:00 2001 From: Copilot <198982749+Copilot@users.noreply.github.com> Date: Thu, 7 May 2026 08:07:16 -0500 Subject: [PATCH 5/6] docs: expose self-service fork detachment for fpt/ghec users (#60628) Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: crwaters16 <78226508+crwaters16@users.noreply.github.com> Co-authored-by: Anne-Marie <102995847+am-stead@users.noreply.github.com> Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> --- .../working-with-forks/detaching-a-fork.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/content/pull-requests/collaborating-with-pull-requests/working-with-forks/detaching-a-fork.md b/content/pull-requests/collaborating-with-pull-requests/working-with-forks/detaching-a-fork.md index 0830fe84ec9a..c0dbeb67313f 100644 --- a/content/pull-requests/collaborating-with-pull-requests/working-with-forks/detaching-a-fork.md +++ b/content/pull-requests/collaborating-with-pull-requests/working-with-forks/detaching-a-fork.md @@ -10,7 +10,7 @@ category: - Work with forks --- -{% ifversion ghes > 3.16 %} +{% ifversion fpt or ghec or ghes > 3.16 %} ## Converting a fork into a standalone repository @@ -21,9 +21,13 @@ To turn your fork into a standalone repository, you can leave the fork network e > * All git commit metadata will be preserved. Commits may become eligible to be counted as contributions if they meet certain criteria. For more information, see [AUTOTITLE](/account-and-profile/setting-up-and-managing-your-github-profile/managing-contribution-settings-on-your-profile/why-are-my-contributions-not-showing-up-on-my-profile#your-local-git-commit-email-isnt-connected-to-your-account). > * Leaving the fork network is **permanent** and the new repository **cannot** be reconnected to the fork network. +{% ifversion ghes %} + > [!NOTE] > If you are unable to detach a fork, contact your site administrator. +{% endif %} + ## Leaving the fork network You can only detach forks with the leave network option when: @@ -42,7 +46,7 @@ While the fork is being detached, some operations will be briefly unavailable un {% endif %} -## Manually Leaving the fork network +## Manually leaving the fork network To turn your fork into a standalone repository, you can clone the fork, use the clone to create a new repository, and then delete the fork removing the connection to the original network. From 9b7fb6a029f5780e19edd191f477b0754a5aa650 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Thu, 7 May 2026 06:37:20 -0700 Subject: [PATCH 6/6] Update OpenAPI Description (#61094) Co-authored-by: Anne-Marie <102995847+am-stead@users.noreply.github.com> --- content/rest/code-security/configurations.md | 2 +- .../credential-authorizations.md | 11 +++ content/rest/enterprise-admin/index.md | 1 + .../server-to-server-permissions.json | 17 ++++ .../server-to-server-rest.json | 6 ++ .../ghec-2022-11-28/user-to-server-rest.json | 6 ++ .../server-to-server-permissions.json | 17 ++++ .../server-to-server-rest.json | 6 ++ .../ghec-2026-03-10/user-to-server-rest.json | 6 ++ src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/issues.json | 19 ++++ src/rest/data/fpt-2026-03-10/issues.json | 19 ++++ .../ghec-2022-11-28/enterprise-admin.json | 96 +++++++++++++++++++ src/rest/data/ghec-2022-11-28/issues.json | 19 ++++ .../ghec-2026-03-10/enterprise-admin.json | 96 +++++++++++++++++++ src/rest/data/ghec-2026-03-10/issues.json | 19 ++++ .../data/ghes-3.15-2022-11-28/issues.json | 19 ++++ .../data/ghes-3.16-2022-11-28/issues.json | 19 ++++ .../data/ghes-3.17-2022-11-28/issues.json | 19 ++++ .../data/ghes-3.18-2022-11-28/issues.json | 19 ++++ .../data/ghes-3.19-2022-11-28/issues.json | 19 ++++ .../data/ghes-3.20-2022-11-28/issues.json | 19 ++++ src/rest/lib/config.json | 2 +- src/webhooks/lib/config.json | 2 +- 24 files changed, 456 insertions(+), 4 deletions(-) create mode 100644 content/rest/enterprise-admin/credential-authorizations.md diff --git a/content/rest/code-security/configurations.md b/content/rest/code-security/configurations.md index cbd6afefa5d9..f8d89a903044 100644 --- a/content/rest/code-security/configurations.md +++ b/content/rest/code-security/configurations.md @@ -6,7 +6,7 @@ intro: >- versions: # DO NOT MANUALLY EDIT. CHANGES WILL BE OVERWRITTEN BY A 🤖 fpt: '*' ghec: '*' - ghes: '>=3.15' + ghes: '*' autogenerated: rest allowTitleToDifferFromFilename: true category: diff --git a/content/rest/enterprise-admin/credential-authorizations.md b/content/rest/enterprise-admin/credential-authorizations.md new file mode 100644 index 000000000000..75cd32ddf9cd --- /dev/null +++ b/content/rest/enterprise-admin/credential-authorizations.md @@ -0,0 +1,11 @@ +--- +title: REST API endpoints for enterprise credential authorizations +shortTitle: Credential authorizations +intro: Use the REST API to manage enterprise credential authorizations. +versions: # DO NOT MANUALLY EDIT. CHANGES WILL BE OVERWRITTEN BY A 🤖 + ghec: '*' +autogenerated: rest +allowTitleToDifferFromFilename: true +--- + + diff --git a/content/rest/enterprise-admin/index.md b/content/rest/enterprise-admin/index.md index 6b15711773c8..4404967c1bec 100644 --- a/content/rest/enterprise-admin/index.md +++ b/content/rest/enterprise-admin/index.md @@ -17,6 +17,7 @@ children: - /audit-log - /bypass-requests - /code-security-and-analysis + - /credential-authorizations - /custom-properties - /custom-properties-for-orgs - /enterprise-roles diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index d1ea0a96992b..c9fb081a3782 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -447,6 +447,23 @@ } ] }, + "enterprise_credentials": { + "title": "Enterprise credentials", + "displayTitle": "Enterprise permissions for \"Enterprise credentials\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "revoke-all-credential-authorizations-for-an-enterprise", + "subcategory": "credential-authorizations", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "enterprise_custom_properties_for_organizations": { "title": "Enterprise custom properties for organizations", "displayTitle": "Enterprise permissions for \"Enterprise custom properties for organizations\"", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json index b5d70af3d81e..5641cee53065 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json @@ -2898,6 +2898,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/consumed-licenses" }, + { + "slug": "revoke-all-credential-authorizations-for-an-enterprise", + "subcategory": "credential-authorizations", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all" + }, { "slug": "get-all-enterprise-roles-for-an-enterprise", "subcategory": "enterprise-roles", diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index ee0d4a4d7d81..b38e3384c78e 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -3146,6 +3146,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/consumed-licenses" }, + { + "slug": "revoke-all-credential-authorizations-for-an-enterprise", + "subcategory": "credential-authorizations", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all" + }, { "slug": "get-all-enterprise-roles-for-an-enterprise", "subcategory": "enterprise-roles", diff --git a/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json b/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json index d1ea0a96992b..c9fb081a3782 100644 --- a/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2026-03-10/server-to-server-permissions.json @@ -447,6 +447,23 @@ } ] }, + "enterprise_credentials": { + "title": "Enterprise credentials", + "displayTitle": "Enterprise permissions for \"Enterprise credentials\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "revoke-all-credential-authorizations-for-an-enterprise", + "subcategory": "credential-authorizations", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "enterprise_custom_properties_for_organizations": { "title": "Enterprise custom properties for organizations", "displayTitle": "Enterprise permissions for \"Enterprise custom properties for organizations\"", diff --git a/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json b/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json index b5d70af3d81e..5641cee53065 100644 --- a/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2026-03-10/server-to-server-rest.json @@ -2898,6 +2898,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/consumed-licenses" }, + { + "slug": "revoke-all-credential-authorizations-for-an-enterprise", + "subcategory": "credential-authorizations", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all" + }, { "slug": "get-all-enterprise-roles-for-an-enterprise", "subcategory": "enterprise-roles", diff --git a/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json b/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json index ee0d4a4d7d81..b38e3384c78e 100644 --- a/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2026-03-10/user-to-server-rest.json @@ -3146,6 +3146,12 @@ "verb": "get", "requestPath": "/enterprises/{enterprise}/consumed-licenses" }, + { + "slug": "revoke-all-credential-authorizations-for-an-enterprise", + "subcategory": "credential-authorizations", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all" + }, { "slug": "get-all-enterprise-roles-for-an-enterprise", "subcategory": "enterprise-roles", diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 1ccc0c154967..1ccdce06ae36 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "12330abe1a9651268439945b92312855bb071532" + "sha": "d0fa019e82a366eaa70a2b6238076d5b3c427c2c" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/issues.json b/src/rest/data/fpt-2022-11-28/issues.json index feac40bcd0a4..dfe49614179f 100644 --- a/src/rest/data/fpt-2022-11-28/issues.json +++ b/src/rest/data/fpt-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/fpt-2026-03-10/issues.json b/src/rest/data/fpt-2026-03-10/issues.json index 6b5c313775b5..34c33e04f6f7 100644 --- a/src/rest/data/fpt-2026-03-10/issues.json +++ b/src/rest/data/fpt-2026-03-10/issues.json @@ -9355,6 +9355,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghec-2022-11-28/enterprise-admin.json b/src/rest/data/ghec-2022-11-28/enterprise-admin.json index de91480fd5eb..d6456841a252 100644 --- a/src/rest/data/ghec-2022-11-28/enterprise-admin.json +++ b/src/rest/data/ghec-2022-11-28/enterprise-admin.json @@ -2721,6 +2721,102 @@ } } ], + "credential-authorizations": [ + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all", + "title": "Revoke all credential authorizations for an enterprise", + "category": "enterprise-admin", + "subcategory": "credential-authorizations", + "parameters": [ + { + "name": "enterprise", + "description": "

The slug version of the enterprise name.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "boolean", + "name": "revoke_credentials", + "description": "

Whether to also destroy the actual credentials (PATs and SSH keys) owned by\nenterprise members. This option is only available for Enterprise Managed User\n(EMU) enterprises. When set to true, all PATs (v1 and v2) and SSH keys owned\nby enterprise members will be destroyed in addition to the credential authorizations.

", + "default": false + } + ], + "descriptionHTML": "

Revokes all credential authorizations for all organizations within the enterprise.\nThis includes any guest, outside, or repository collaborators.

\n

For Enterprise Managed User (EMU) enterprises, you can optionally also destroy all\ncredentials (PATs v1, PATs v2, and SSH keys) owned by enterprise members by setting\nthe revoke_credentials parameter to true.

\n

This operation is performed asynchronously. A background job will be queued to process\nthe revocations.

\n

Warning

\n

\nIf you use a personal access token to call this endpoint, that token may also be\nrevoked or destroyed as part of this operation.

\n
\n

The authenticated user must be an enterprise owner or have the write_enterprise_credentials permission to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the admin:enterprise scope to use this endpoint.

", + "codeExamples": [ + { + "request": { + "contentType": "application/json", + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "bodyParameters": { + "revoke_credentials": false + }, + "parameters": { + "enterprise": "ENTERPRISE" + } + }, + "response": { + "statusCode": "202", + "contentType": "application/json", + "description": "

Accepted - The revocation request has been queued

", + "example": { + "message": "Credential authorization revocation has been queued" + }, + "schema": { + "type": "object", + "properties": { + "message": { + "type": "string", + "description": "A message indicating the revocation has been queued" + }, + "warning": { + "type": "string", + "description": "A warning message if the token used for this request may be revoked" + } + } + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "202", + "description": "

Accepted - The revocation request has been queued

" + }, + { + "httpStatusCode": "403", + "description": "

Forbidden

" + }, + { + "httpStatusCode": "404", + "description": "

Resource not found

" + }, + { + "httpStatusCode": "422", + "description": "

Validation error - The revoke_credentials option is only available for EMU enterprises

" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": false, + "permissions": [ + { + "\"Enterprise credentials\" enterprise permissions": "write" + } + ], + "disabledForPatV2": true + } + } + ], "custom-properties": [ { "serverUrl": "https://api.github.com", diff --git a/src/rest/data/ghec-2022-11-28/issues.json b/src/rest/data/ghec-2022-11-28/issues.json index 532462f56f40..f16986045357 100644 --- a/src/rest/data/ghec-2022-11-28/issues.json +++ b/src/rest/data/ghec-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghec-2026-03-10/enterprise-admin.json b/src/rest/data/ghec-2026-03-10/enterprise-admin.json index de91480fd5eb..d6456841a252 100644 --- a/src/rest/data/ghec-2026-03-10/enterprise-admin.json +++ b/src/rest/data/ghec-2026-03-10/enterprise-admin.json @@ -2721,6 +2721,102 @@ } } ], + "credential-authorizations": [ + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/enterprises/{enterprise}/credential-authorizations/revoke-all", + "title": "Revoke all credential authorizations for an enterprise", + "category": "enterprise-admin", + "subcategory": "credential-authorizations", + "parameters": [ + { + "name": "enterprise", + "description": "

The slug version of the enterprise name.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [ + { + "type": "boolean", + "name": "revoke_credentials", + "description": "

Whether to also destroy the actual credentials (PATs and SSH keys) owned by\nenterprise members. This option is only available for Enterprise Managed User\n(EMU) enterprises. When set to true, all PATs (v1 and v2) and SSH keys owned\nby enterprise members will be destroyed in addition to the credential authorizations.

", + "default": false + } + ], + "descriptionHTML": "

Revokes all credential authorizations for all organizations within the enterprise.\nThis includes any guest, outside, or repository collaborators.

\n

For Enterprise Managed User (EMU) enterprises, you can optionally also destroy all\ncredentials (PATs v1, PATs v2, and SSH keys) owned by enterprise members by setting\nthe revoke_credentials parameter to true.

\n

This operation is performed asynchronously. A background job will be queued to process\nthe revocations.

\n

Warning

\n

\nIf you use a personal access token to call this endpoint, that token may also be\nrevoked or destroyed as part of this operation.

\n
\n

The authenticated user must be an enterprise owner or have the write_enterprise_credentials permission to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the admin:enterprise scope to use this endpoint.

", + "codeExamples": [ + { + "request": { + "contentType": "application/json", + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "bodyParameters": { + "revoke_credentials": false + }, + "parameters": { + "enterprise": "ENTERPRISE" + } + }, + "response": { + "statusCode": "202", + "contentType": "application/json", + "description": "

Accepted - The revocation request has been queued

", + "example": { + "message": "Credential authorization revocation has been queued" + }, + "schema": { + "type": "object", + "properties": { + "message": { + "type": "string", + "description": "A message indicating the revocation has been queued" + }, + "warning": { + "type": "string", + "description": "A warning message if the token used for this request may be revoked" + } + } + } + } + } + ], + "statusCodes": [ + { + "httpStatusCode": "202", + "description": "

Accepted - The revocation request has been queued

" + }, + { + "httpStatusCode": "403", + "description": "

Forbidden

" + }, + { + "httpStatusCode": "404", + "description": "

Resource not found

" + }, + { + "httpStatusCode": "422", + "description": "

Validation error - The revoke_credentials option is only available for EMU enterprises

" + } + ], + "previews": [], + "progAccess": { + "userToServerRest": true, + "serverToServer": true, + "fineGrainedPat": false, + "permissions": [ + { + "\"Enterprise credentials\" enterprise permissions": "write" + } + ], + "disabledForPatV2": true + } + } + ], "custom-properties": [ { "serverUrl": "https://api.github.com", diff --git a/src/rest/data/ghec-2026-03-10/issues.json b/src/rest/data/ghec-2026-03-10/issues.json index 1b387e8e0473..6ded01c4c697 100644 --- a/src/rest/data/ghec-2026-03-10/issues.json +++ b/src/rest/data/ghec-2026-03-10/issues.json @@ -9355,6 +9355,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghes-3.15-2022-11-28/issues.json b/src/rest/data/ghes-3.15-2022-11-28/issues.json index 1b4dde16b685..764f31b92930 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.15-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghes-3.16-2022-11-28/issues.json b/src/rest/data/ghes-3.16-2022-11-28/issues.json index 760aad9f3b47..74e0b1f79fa1 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.16-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghes-3.17-2022-11-28/issues.json b/src/rest/data/ghes-3.17-2022-11-28/issues.json index 7e61bd3714df..685409249928 100644 --- a/src/rest/data/ghes-3.17-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.17-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghes-3.18-2022-11-28/issues.json b/src/rest/data/ghes-3.18-2022-11-28/issues.json index 55ed753afa3b..76ccde7bbc12 100644 --- a/src/rest/data/ghes-3.18-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.18-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghes-3.19-2022-11-28/issues.json b/src/rest/data/ghes-3.19-2022-11-28/issues.json index a8a3be6ede41..504fb5248d64 100644 --- a/src/rest/data/ghes-3.19-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.19-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/data/ghes-3.20-2022-11-28/issues.json b/src/rest/data/ghes-3.20-2022-11-28/issues.json index e3ffa043fc8b..1918ea1d3636 100644 --- a/src/rest/data/ghes-3.20-2022-11-28/issues.json +++ b/src/rest/data/ghes-3.20-2022-11-28/issues.json @@ -9750,6 +9750,25 @@ "name": "assignees", "description": "

Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise.

" }, + { + "type": "array of objects", + "name": "issue_field_values", + "description": "

An array of issue field values to set on this issue. Each field value must include the field ID and the value to set. Issue fields are only available for organization-owned repositories with the feature enabled. Field values are silently dropped otherwise.

", + "childParamsGroups": [ + { + "type": "integer", + "name": "field_id", + "description": "

The ID of the issue field to set

", + "isRequired": true + }, + { + "type": "string or number", + "name": "value", + "description": "

The value to set for the field

", + "isRequired": true + } + ] + }, { "type": "string or null", "name": "type", diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 2412fd4706dd..d45b4b9042b8 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -52,5 +52,5 @@ ] } }, - "sha": "12330abe1a9651268439945b92312855bb071532" + "sha": "d0fa019e82a366eaa70a2b6238076d5b3c427c2c" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index 28574f6f1461..936829caeb00 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "12330abe1a9651268439945b92312855bb071532" + "sha": "d0fa019e82a366eaa70a2b6238076d5b3c427c2c" } \ No newline at end of file