Update audit log event data (#55945)
Co-authored-by: Felicity Chapman <felicitymay@github.com>
This commit is contained in:
@@ -3299,6 +3299,16 @@
|
||||
"description": "A request to bypass secret scanning push protection was approved by a user.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/push-protection-for-repositories-and-organizations#managing-requests-to-bypass-push-protection"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.cancel",
|
||||
"description": "A user canceled a request to bypass secret scanning push protection.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.complete",
|
||||
"description": "A user pushed a commit containing a secret for which there is an approved secret scanning push protection bypass request.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.deny",
|
||||
"description": "A request to bypass secret scanning push protection was denied by a user.",
|
||||
|
||||
@@ -349,6 +349,16 @@
|
||||
"description": "The trial of GitHub Enterprise Cloud expired.",
|
||||
"docs_reference_links": "/admin/overview/setting-up-a-trial-of-github-enterprise-cloud"
|
||||
},
|
||||
{
|
||||
"action": "business.github_models_billing_disabled",
|
||||
"description": "GitHub Models billing was disabled for the business.",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "business.github_models_billing_enabled",
|
||||
"description": "GitHub Models billing was enabled for the business.",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "business.import_license_usage",
|
||||
"description": "License usage information was imported from a GitHub Enterprise Server instance to an enterprise account on GitHub.com.",
|
||||
@@ -4039,6 +4049,16 @@
|
||||
"description": "A request to bypass secret scanning push protection was approved by a user.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/push-protection-for-repositories-and-organizations#managing-requests-to-bypass-push-protection"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.cancel",
|
||||
"description": "A user canceled a request to bypass secret scanning push protection.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.complete",
|
||||
"description": "A user pushed a commit containing a secret for which there is an approved secret scanning push protection bypass request.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.deny",
|
||||
"description": "A request to bypass secret scanning push protection was denied by a user.",
|
||||
|
||||
@@ -3299,6 +3299,16 @@
|
||||
"description": "A request to bypass secret scanning push protection was approved by a user.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/push-protection-for-repositories-and-organizations#managing-requests-to-bypass-push-protection"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.cancel",
|
||||
"description": "A user canceled a request to bypass secret scanning push protection.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.complete",
|
||||
"description": "A user pushed a commit containing a secret for which there is an approved secret scanning push protection bypass request.",
|
||||
"docs_reference_links": "/code-security/secret-scanning/working-with-push-protection#requesting-bypass-privileges-when-working-with-the-command-line"
|
||||
},
|
||||
{
|
||||
"action": "secret_scanning_push_protection_request.deny",
|
||||
"description": "A request to bypass secret scanning push protection was denied by a user.",
|
||||
|
||||
@@ -599,6 +599,11 @@
|
||||
"description": "N/A",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "copilot.user_access_revoked",
|
||||
"description": "N/A",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "custom_hosted_runner.create",
|
||||
"description": "N/A",
|
||||
|
||||
@@ -309,6 +309,11 @@
|
||||
"description": "N/A",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "copilot.user_access_revoked",
|
||||
"description": "N/A",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "custom_hosted_runner.create",
|
||||
"description": "N/A",
|
||||
|
||||
@@ -209,6 +209,11 @@
|
||||
"description": "N/A",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "copilot.user_access_revoked",
|
||||
"description": "N/A",
|
||||
"docs_reference_links": "N/A"
|
||||
},
|
||||
{
|
||||
"action": "custom_hosted_runner.create",
|
||||
"description": "N/A",
|
||||
|
||||
@@ -3,5 +3,5 @@
|
||||
"apiOnlyEvents": "This event is not available in the web interface, only via the REST API, audit log streaming, or JSON/CSV exports.",
|
||||
"apiRequestEvent": "This event is only available via audit log streaming."
|
||||
},
|
||||
"sha": "e14b4ba692f0019ca81fd2843ae8445239cf480e"
|
||||
"sha": "a44fbc883ed2e0f27e21ba9a5d5f3859f77d3b74"
|
||||
}
|
||||
Reference in New Issue
Block a user