1
0
mirror of synced 2026-01-06 15:01:04 -05:00

Merge pull request #8920 from github/repo-sync

repo sync
This commit is contained in:
Octomerger Bot
2021-08-10 10:27:49 +10:00
committed by GitHub
2 changed files with 14 additions and 11 deletions

View File

@@ -10,18 +10,19 @@ on:
- '.github/actions-scripts/**'
- '.github/workflows/**'
- '.github/CODEOWNERS'
- 'app.json'
- 'assets/fonts/**'
- 'data/graphql/**'
- 'Dockerfile*'
- 'lib/graphql/**'
- 'lib/redirects/**'
- 'lib/rest/**'
- 'lib/webhooks/**'
- 'lib/search/indexes/**'
- 'package*.json'
- 'Procfile'
- 'scripts/**'
- 'translations/**'
- 'package*.json'
- 'app.json'
- 'Procfile'
jobs:
triage:
@@ -71,18 +72,19 @@ jobs:
- '.github/actions-scripts/**'
- '.github/workflows/**'
- '.github/CODEOWNERS'
- 'app.json'
- 'assets/fonts/**'
- 'data/graphql/**'
- 'Dockerfile*'
- 'lib/graphql/**'
- 'lib/redirects/**'
- 'lib/rest/**'
- 'lib/webhooks/**'
- 'lib/search/indexes/**'
- 'package*.json'
- 'Procfile'
- 'scripts/**'
- 'translations/**'
- 'package*.json'
- 'app.json'
- 'Procfile'
# When there are changes to files we can't accept
# and no review exists,leave a REQUEST_CHANGES review
@@ -97,18 +99,19 @@ jobs:
'.github/actions-scripts/**',
'.github/workflows/**',
'.github/CODEOWNERS',
'app.json',
'assets/fonts/**',
'data/graphql/**',
'Dockerfile*',
'lib/graphql/**',
'lib/redirects/**',
'lib/rest/**',
'lib/webhooks/**',
'lib/search/indexes/**'
'scripts/**',
'translations/**',
'lib/search/indexes/**',
'package*.json',
'app.json',
'Procfile'
'scripts/**',
'translations/**'
]
const badFiles = badFilesArr.join('\n')

View File

@@ -19,7 +19,7 @@ redirect_from:
Organization owners can manage which repositories a codespace can access.
By default, a codespace can only access the repository where it was created. When you enable access and security for a repository owned by your organization, any codespaces that are created for that repository will also have read and write permissions to all other repositories the organization owns and the codespace creator has permissions to access. If you want to restrict the repositories a codespace can access, you can limit to it to either the repository where the codespace was created, or to specific repositories. You should only enable access and security for repositories you trust.
By default, a codespace can only access the repository where it was created. When you enable access and security for a repository owned by your organization, any codespaces that are created for that repository will also have read permissions to all other repositories the organization owns and the codespace creator has permissions to access. If you want to restrict the repositories a codespace can access, you can limit access to either the repository where the codespace was created, or to specific repositories. You should only enable access and security for repositories you trust.
To manage which users in your organization can use {% data variables.product.prodname_codespaces %}, see "[Managing user permissions for your organization](/codespaces/managing-codespaces-for-your-organization/managing-user-permissions-for-your-organization)."