From 49ee805977f0662eee834a386ac8c9c84c87b633 Mon Sep 17 00:00:00 2001 From: Grace Park Date: Mon, 9 Aug 2021 16:57:25 -0700 Subject: [PATCH 1/2] Add Dockerfile.openapi_decorator to unallowed contributor list (#20733) * add Dockerfile.openapi_decorator to unallowed contributor list * adding Dockerfile.openapi_decorator to badFilesArr * Add to paths as well * Update .github/workflows/triage-unallowed-contributions.yml Co-authored-by: Kevin Heis * Update .github/workflows/triage-unallowed-contributions.yml Co-authored-by: Kevin Heis * Update .github/workflows/triage-unallowed-contributions.yml Co-authored-by: Kevin Heis Co-authored-by: Kevin Heis --- .../triage-unallowed-contributions.yml | 23 +++++++++++-------- 1 file changed, 13 insertions(+), 10 deletions(-) diff --git a/.github/workflows/triage-unallowed-contributions.yml b/.github/workflows/triage-unallowed-contributions.yml index f5e519d28d..a95426d09c 100644 --- a/.github/workflows/triage-unallowed-contributions.yml +++ b/.github/workflows/triage-unallowed-contributions.yml @@ -10,18 +10,19 @@ on: - '.github/actions-scripts/**' - '.github/workflows/**' - '.github/CODEOWNERS' + - 'app.json' - 'assets/fonts/**' - 'data/graphql/**' + - 'Dockerfile*' - 'lib/graphql/**' - 'lib/redirects/**' - 'lib/rest/**' - 'lib/webhooks/**' - 'lib/search/indexes/**' + - 'package*.json' + - 'Procfile' - 'scripts/**' - 'translations/**' - - 'package*.json' - - 'app.json' - - 'Procfile' jobs: triage: @@ -71,18 +72,19 @@ jobs: - '.github/actions-scripts/**' - '.github/workflows/**' - '.github/CODEOWNERS' + - 'app.json' - 'assets/fonts/**' - 'data/graphql/**' + - 'Dockerfile*' - 'lib/graphql/**' - 'lib/redirects/**' - 'lib/rest/**' - 'lib/webhooks/**' - 'lib/search/indexes/**' + - 'package*.json' + - 'Procfile' - 'scripts/**' - 'translations/**' - - 'package*.json' - - 'app.json' - - 'Procfile' # When there are changes to files we can't accept # and no review exists,leave a REQUEST_CHANGES review @@ -97,18 +99,19 @@ jobs: '.github/actions-scripts/**', '.github/workflows/**', '.github/CODEOWNERS', + 'app.json', 'assets/fonts/**', 'data/graphql/**', + 'Dockerfile*', 'lib/graphql/**', 'lib/redirects/**', 'lib/rest/**', 'lib/webhooks/**', - 'lib/search/indexes/**' - 'scripts/**', - 'translations/**', + 'lib/search/indexes/**', 'package*.json', - 'app.json', 'Procfile' + 'scripts/**', + 'translations/**' ] const badFiles = badFilesArr.join('\n') From abc77c936f43febc8e96d8144fad629915725de4 Mon Sep 17 00:00:00 2001 From: Amy Burns Date: Mon, 9 Aug 2021 20:07:37 -0400 Subject: [PATCH 2/2] removing "And write" permissions for codespaces org docs (#20728) * removing "And write" permissions * Update content/codespaces/managing-codespaces-for-your-organization/managing-access-and-security-for-your-organizations-codespaces.md Co-authored-by: Felicity Chapman Co-authored-by: Felicity Chapman --- ...ing-access-and-security-for-your-organizations-codespaces.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/codespaces/managing-codespaces-for-your-organization/managing-access-and-security-for-your-organizations-codespaces.md b/content/codespaces/managing-codespaces-for-your-organization/managing-access-and-security-for-your-organizations-codespaces.md index d2349d13c4..13d3bfb989 100644 --- a/content/codespaces/managing-codespaces-for-your-organization/managing-access-and-security-for-your-organizations-codespaces.md +++ b/content/codespaces/managing-codespaces-for-your-organization/managing-access-and-security-for-your-organizations-codespaces.md @@ -19,7 +19,7 @@ redirect_from: Organization owners can manage which repositories a codespace can access. -By default, a codespace can only access the repository where it was created. When you enable access and security for a repository owned by your organization, any codespaces that are created for that repository will also have read and write permissions to all other repositories the organization owns and the codespace creator has permissions to access. If you want to restrict the repositories a codespace can access, you can limit to it to either the repository where the codespace was created, or to specific repositories. You should only enable access and security for repositories you trust. +By default, a codespace can only access the repository where it was created. When you enable access and security for a repository owned by your organization, any codespaces that are created for that repository will also have read permissions to all other repositories the organization owns and the codespace creator has permissions to access. If you want to restrict the repositories a codespace can access, you can limit access to either the repository where the codespace was created, or to specific repositories. You should only enable access and security for repositories you trust. To manage which users in your organization can use {% data variables.product.prodname_codespaces %}, see "[Managing user permissions for your organization](/codespaces/managing-codespaces-for-your-organization/managing-user-permissions-for-your-organization)."