Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
GitHub Docs
The REST API is now versioned.For more information, see "About API versioning."

REST API endpoints for rules

Use the REST API to manage rulesets for repositories. Rulesets control how people can interact with selected branches and tags in a repository.

Get rules for a branch

Returns all active rules that apply to the specified branch. The branch does not need to exist; rules that would applyto a branch with that name will be returned. All active rules that apply will be returned, regardless of the levelat which they are configured (e.g. repository or organization). Rules in rulesets with "evaluate" or "disabled"enforcement statuses are not returned.

Fine-grained access tokens for "Get rules for a branch"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Metadata" repository permissions (read)

This endpoint can be used without authentication or the aforementioned permissions if only public resources are requested.

Parameters for "Get rules for a branch"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

branchstringRequired

The name of the branch. Cannot contain wildcard characters. To use wildcard characters in branch names, usethe GraphQL API.

Query parameters
Name, Type, Description
per_pageinteger

The number of results per page (max 100). For more information, see "Using pagination in the REST API."

Default:30

pageinteger

The page number of the results to fetch. For more information, see "Using pagination in the REST API."

Default:1

HTTP response status codes for "Get rules for a branch"

Status codeDescription
200

OK

Code samples for "Get rules for a branch"

Request example

get/repos/{owner}/{repo}/rules/branches/{branch}
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rules/branches/BRANCH

Response

Status: 200
[ { "type": "commit_message_pattern", "ruleset_source_type": "Repository", "ruleset_source": "monalisa/my-repo", "ruleset_id": 42, "parameters": { "operator": "starts_with", "pattern": "issue" } }, { "type": "commit_author_email_pattern", "ruleset_source_type": "Organization", "ruleset_source": "my-org", "ruleset_id": 73, "parameters": { "operator": "contains", "pattern": "github" } }]

Get all repository rulesets

Get all the rulesets for a repository.

Fine-grained access tokens for "Get all repository rulesets"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Metadata" repository permissions (read)

This endpoint can be used without authentication or the aforementioned permissions if only public resources are requested.

Parameters for "Get all repository rulesets"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

Query parameters
Name, Type, Description
per_pageinteger

The number of results per page (max 100). For more information, see "Using pagination in the REST API."

Default:30

pageinteger

The page number of the results to fetch. For more information, see "Using pagination in the REST API."

Default:1

includes_parentsboolean

Include rulesets configured at higher levels that apply to this repository

Default:true

targetsstring

A comma-separated list of rule targets to filter by.If provided, only rulesets that apply to the specified targets will be returned.For example,branch,tag,push.

HTTP response status codes for "Get all repository rulesets"

Status codeDescription
200

OK

404

Resource not found

500

Internal Error

Code samples for "Get all repository rulesets"

Request example

get/repos/{owner}/{repo}/rulesets
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets

Response

Status: 200
[ { "id": 42, "name": "super cool ruleset", "source_type": "Repository", "source": "monalisa/my-repo", "enforcement": "enabled", "node_id": "RRS_lACkVXNlcgQB", "_links": { "self": { "href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42" }, "html": { "href": "https://github.com/monalisa/my-repo/rules/42" } }, "created_at": "2023-07-15T08:43:03Z", "updated_at": "2023-08-23T16:29:47Z" }, { "id": 314, "name": "Another ruleset", "source_type": "Repository", "source": "monalisa/my-repo", "enforcement": "enabled", "node_id": "RRS_lACkVXNlcgQQ", "_links": { "self": { "href": "https://api.github.com/repos/monalisa/my-repo/rulesets/314" }, "html": { "href": "https://github.com/monalisa/my-repo/rules/314" } }, "created_at": "2023-08-15T08:43:03Z", "updated_at": "2023-09-23T16:29:47Z" }]

Create a repository ruleset

Create a ruleset for a repository.

Fine-grained access tokens for "Create a repository ruleset"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Administration" repository permissions (write)

Parameters for "Create a repository ruleset"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

Body parameters
Name, Type, Description
namestringRequired

The name of the ruleset.

targetstring

The target of the ruleset

Default:branch

Can be one of:branch,tag,push

enforcementstringRequired

The enforcement level of the ruleset.evaluate allows admins to test rules before enforcing them. Admins can view insights on the Rule Insights page (evaluate is only available with GitHub Enterprise).

Can be one of:disabled,active,evaluate

bypass_actorsarray of objects

The actors that can bypass the rules in this ruleset

Name, Type, Description
actor_idinteger or null

The ID of the actor that can bypass a ruleset. Required forIntegration,RepositoryRole, andTeam actor types. Ifactor_type isOrganizationAdmin, this should be1. Ifactor_type isDeployKey, this should be null.OrganizationAdmin is not applicable for personal repositories.

actor_typestringRequired

The type of actor that can bypass a ruleset.

Can be one of:Integration,OrganizationAdmin,RepositoryRole,Team,DeployKey

bypass_modestring

When the specified actor can bypass the ruleset.pull_request means that an actor can only bypass rules on pull requests.pull_request is not applicable for theDeployKey actor type. Also,pull_request is only applicable to branch rulesets. Whenbypass_mode isexempt, rules will not be run for that actor and a bypass audit entry will not be created.

Default:always

Can be one of:always,pull_request,exempt

conditionsobject

Parameters for a repository ruleset ref name condition

Name, Type, Description
ref_nameobject
Name, Type, Description
includearray of strings

Array of ref names or patterns to include. One of these patterns must match for the condition to pass. Also accepts~DEFAULT_BRANCH to include the default branch or~ALL to include all branches.

excludearray of strings

Array of ref names or patterns to exclude. The condition will not pass if any of these patterns match.

rulesarray of objects

An array of rules within the ruleset.

Name, Type, Description
creationobject

Only allow users with bypass permission to create matching refs.

Name, Type, Description
typestringRequired

Value:creation

updateobject

Only allow users with bypass permission to update matching refs.

Name, Type, Description
typestringRequired

Value:update

parametersobject
Name, Type, Description
update_allows_fetch_and_mergebooleanRequired

Branch can pull changes from its upstream repository

deletionobject

Only allow users with bypass permissions to delete matching refs.

Name, Type, Description
typestringRequired

Value:deletion

required_linear_historyobject

Prevent merge commits from being pushed to matching refs.

Name, Type, Description
typestringRequired

Value:required_linear_history

merge_queueobject

Merges must be performed via a merge queue.

Name, Type, Description
typestringRequired

Value:merge_queue

parametersobject
Name, Type, Description
check_response_timeout_minutesintegerRequired

Maximum time for a required status check to report a conclusion. After this much time has elapsed, checks that have not reported a conclusion will be assumed to have failed

grouping_strategystringRequired

When set to ALLGREEN, the merge commit created by merge queue for each PR in the group must pass all required checks to merge. When set to HEADGREEN, only the commit at the head of the merge group, i.e. the commit containing changes from all of the PRs in the group, must pass its required checks to merge.

Can be one of:ALLGREEN,HEADGREEN

max_entries_to_buildintegerRequired

Limit the number of queued pull requests requesting checks and workflow runs at the same time.

max_entries_to_mergeintegerRequired

The maximum number of PRs that will be merged together in a group.

merge_methodstringRequired

Method to use when merging changes from queued pull requests.

Can be one of:MERGE,SQUASH,REBASE

min_entries_to_mergeintegerRequired

The minimum number of PRs that will be merged together in a group.

min_entries_to_merge_wait_minutesintegerRequired

The time merge queue should wait after the first PR is added to the queue for the minimum group size to be met. After this time has elapsed, the minimum group size will be ignored and a smaller group will be merged.

required_deploymentsobject

Choose which environments must be successfully deployed to before refs can be pushed into a ref that matches this rule.

Name, Type, Description
typestringRequired

Value:required_deployments

parametersobject
Name, Type, Description
required_deployment_environmentsarray of stringsRequired

The environments that must be successfully deployed to before branches can be merged.

required_signaturesobject

Commits pushed to matching refs must have verified signatures.

Name, Type, Description
typestringRequired

Value:required_signatures

pull_requestobject

Require all commits be made to a non-target branch and submitted via a pull request before they can be merged.

Name, Type, Description
typestringRequired

Value:pull_request

parametersobject
Name, Type, Description
allowed_merge_methodsarray of strings

Array of allowed merge methods. Allowed values includemerge,squash, andrebase. At least one option must be enabled.Supported values are:merge,squash,rebase

dismiss_stale_reviews_on_pushbooleanRequired

New, reviewable commits pushed will dismiss previous pull request review approvals.

require_code_owner_reviewbooleanRequired

Require an approving review in pull requests that modify files that have a designated code owner.

require_last_push_approvalbooleanRequired

Whether the most recent reviewable push must be approved by someone other than the person who pushed it.

required_approving_review_countintegerRequired

The number of approving reviews that are required before a pull request can be merged.

required_review_thread_resolutionbooleanRequired

All conversations on code must be resolved before a pull request can be merged.

required_reviewersarray of objects

Note

required_reviewers is in beta and subject to change.

A collection of reviewers and associated file patterns. Each reviewer has a list of file patterns which determine the files that reviewer is required to review.

Name, Type, Description
file_patternsarray of stringsRequired

Array of file patterns. Pull requests which change matching files must be approved by the specified team. File patterns use fnmatch syntax.

minimum_approvalsintegerRequired

Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional.

reviewerobjectRequired

A required reviewing team

Name, Type, Description
idintegerRequired

ID of the reviewer which must review changes to matching files.

typestringRequired

The type of the reviewer

Value:Team

required_status_checksobject

Choose which status checks must pass before the ref is updated. When enabled, commits must first be pushed to another ref where the checks pass.

Name, Type, Description
typestringRequired

Value:required_status_checks

parametersobject
Name, Type, Description
do_not_enforce_on_createboolean

Allow repositories and branches to be created if a check would otherwise prohibit it.

required_status_checksarray of objectsRequired

Status checks that are required.

Name, Type, Description
contextstringRequired

The status check context name that must be present on the commit.

integration_idinteger

The optional integration ID that this status check must originate from.

strict_required_status_checks_policybooleanRequired

Whether pull requests targeting a matching branch must be tested with the latest code. This setting will not take effect unless at least one status check is enabled.

non_fast_forwardobject

Prevent users with push access from force pushing to refs.

Name, Type, Description
typestringRequired

Value:non_fast_forward

commit_message_patternobject

Parameters to be used for the commit_message_pattern rule

Name, Type, Description
typestringRequired

Value:commit_message_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

commit_author_email_patternobject

Parameters to be used for the commit_author_email_pattern rule

Name, Type, Description
typestringRequired

Value:commit_author_email_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

committer_email_patternobject

Parameters to be used for the committer_email_pattern rule

Name, Type, Description
typestringRequired

Value:committer_email_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

branch_name_patternobject

Parameters to be used for the branch_name_pattern rule

Name, Type, Description
typestringRequired

Value:branch_name_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

tag_name_patternobject

Parameters to be used for the tag_name_pattern rule

Name, Type, Description
typestringRequired

Value:tag_name_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

file_path_restrictionobject

Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.

Name, Type, Description
typestringRequired

Value:file_path_restriction

parametersobject
Name, Type, Description
restricted_file_pathsarray of stringsRequired

The file paths that are restricted from being pushed to the commit graph.

max_file_path_lengthobject

Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.

Name, Type, Description
typestringRequired

Value:max_file_path_length

parametersobject
Name, Type, Description
max_file_path_lengthintegerRequired

The maximum amount of characters allowed in file paths.

file_extension_restrictionobject

Prevent commits that include files with specified file extensions from being pushed to the commit graph.

Name, Type, Description
typestringRequired

Value:file_extension_restriction

parametersobject
Name, Type, Description
restricted_file_extensionsarray of stringsRequired

The file extensions that are restricted from being pushed to the commit graph.

max_file_sizeobject

Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.

Name, Type, Description
typestringRequired

Value:max_file_size

parametersobject
Name, Type, Description
max_file_sizeintegerRequired

The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).

workflowsobject

Require all changes made to a targeted branch to pass the specified workflows before they can be merged.

Name, Type, Description
typestringRequired

Value:workflows

parametersobject
Name, Type, Description
do_not_enforce_on_createboolean

Allow repositories and branches to be created if a check would otherwise prohibit it.

workflowsarray of objectsRequired

Workflows that must pass for this rule to pass.

Name, Type, Description
pathstringRequired

The path to the workflow file

refstring

The ref (branch or tag) of the workflow file to use

repository_idintegerRequired

The ID of the repository where the workflow is defined

shastring

The commit SHA of the workflow file to use

code_scanningobject

Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.

Name, Type, Description
typestringRequired

Value:code_scanning

parametersobject
Name, Type, Description
code_scanning_toolsarray of objectsRequired

Tools that must provide code scanning results for this rule to pass.

Name, Type, Description
alerts_thresholdstringRequired

The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see "About code scanning alerts."

Can be one of:none,errors,errors_and_warnings,all

security_alerts_thresholdstringRequired

The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see "About code scanning alerts."

Can be one of:none,critical,high_or_higher,medium_or_higher,all

toolstringRequired

The name of a code scanning tool

copilot_code_reviewobject

Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.

Name, Type, Description
typestringRequired

Value:copilot_code_review

parametersobject
Name, Type, Description
review_draft_pull_requestsboolean

Copilot automatically reviews draft pull requests before they are marked as ready for review.

review_on_pushboolean

Copilot automatically reviews each new push to the pull request.

HTTP response status codes for "Create a repository ruleset"

Status codeDescription
201

Created

404

Resource not found

500

Internal Error

Code samples for "Create a repository ruleset"

Request example

post/repos/{owner}/{repo}/rulesets
curl -L \ -X POST \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets \ -d '{"name":"super cool ruleset","target":"branch","enforcement":"active","bypass_actors":[{"actor_id":234,"actor_type":"Team","bypass_mode":"always"}],"conditions":{"ref_name":{"include":["refs/heads/main","refs/heads/master"],"exclude":["refs/heads/dev*"]}},"rules":[{"type":"commit_author_email_pattern","parameters":{"operator":"contains","pattern":"github"}}]}'

Response

Status: 201
{ "id": 42, "name": "super cool ruleset", "target": "branch", "source_type": "Repository", "source": "monalisa/my-repo", "enforcement": "active", "bypass_actors": [ { "actor_id": 234, "actor_type": "Team", "bypass_mode": "always" } ], "conditions": { "ref_name": { "include": [ "refs/heads/main", "refs/heads/master" ], "exclude": [ "refs/heads/dev*" ] } }, "rules": [ { "type": "commit_author_email_pattern", "parameters": { "operator": "contains", "pattern": "github" } } ], "node_id": "RRS_lACkVXNlcgQB", "_links": { "self": { "href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42" }, "html": { "href": "https://github.com/monalisa/my-repo/rules/42" } }, "created_at": "2023-07-15T08:43:03Z", "updated_at": "2023-08-23T16:29:47Z"}

Get a repository ruleset

Get a ruleset for a repository.

Note: To prevent leaking sensitive information, thebypass_actors property is only returned if the usermaking the API request has write access to the ruleset.

Fine-grained access tokens for "Get a repository ruleset"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Metadata" repository permissions (read)

This endpoint can be used without authentication or the aforementioned permissions if only public resources are requested.

Parameters for "Get a repository ruleset"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

ruleset_idintegerRequired

The ID of the ruleset.

Query parameters
Name, Type, Description
includes_parentsboolean

Include rulesets configured at higher levels that apply to this repository

Default:true

HTTP response status codes for "Get a repository ruleset"

Status codeDescription
200

OK

404

Resource not found

500

Internal Error

Code samples for "Get a repository ruleset"

Request example

get/repos/{owner}/{repo}/rulesets/{ruleset_id}
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID

Response

Status: 200
{ "id": 42, "name": "super cool ruleset", "target": "branch", "source_type": "Repository", "source": "monalisa/my-repo", "enforcement": "active", "bypass_actors": [ { "actor_id": 234, "actor_type": "Team", "bypass_mode": "always" } ], "conditions": { "ref_name": { "include": [ "refs/heads/main", "refs/heads/master" ], "exclude": [ "refs/heads/dev*" ] } }, "rules": [ { "type": "commit_author_email_pattern", "parameters": { "operator": "contains", "pattern": "github" } } ], "node_id": "RRS_lACkVXNlcgQB", "_links": { "self": { "href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42" }, "html": { "href": "https://github.com/monalisa/my-repo/rules/42" } }, "created_at": "2023-07-15T08:43:03Z", "updated_at": "2023-08-23T16:29:47Z"}

Update a repository ruleset

Update a ruleset for a repository.

Fine-grained access tokens for "Update a repository ruleset"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Administration" repository permissions (write)

Parameters for "Update a repository ruleset"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

ruleset_idintegerRequired

The ID of the ruleset.

Body parameters
Name, Type, Description
namestring

The name of the ruleset.

targetstring

The target of the ruleset

Can be one of:branch,tag,push

enforcementstring

The enforcement level of the ruleset.evaluate allows admins to test rules before enforcing them. Admins can view insights on the Rule Insights page (evaluate is only available with GitHub Enterprise).

Can be one of:disabled,active,evaluate

bypass_actorsarray of objects

The actors that can bypass the rules in this ruleset

Name, Type, Description
actor_idinteger or null

The ID of the actor that can bypass a ruleset. Required forIntegration,RepositoryRole, andTeam actor types. Ifactor_type isOrganizationAdmin, this should be1. Ifactor_type isDeployKey, this should be null.OrganizationAdmin is not applicable for personal repositories.

actor_typestringRequired

The type of actor that can bypass a ruleset.

Can be one of:Integration,OrganizationAdmin,RepositoryRole,Team,DeployKey

bypass_modestring

When the specified actor can bypass the ruleset.pull_request means that an actor can only bypass rules on pull requests.pull_request is not applicable for theDeployKey actor type. Also,pull_request is only applicable to branch rulesets. Whenbypass_mode isexempt, rules will not be run for that actor and a bypass audit entry will not be created.

Default:always

Can be one of:always,pull_request,exempt

conditionsobject

Parameters for a repository ruleset ref name condition

Name, Type, Description
ref_nameobject
Name, Type, Description
includearray of strings

Array of ref names or patterns to include. One of these patterns must match for the condition to pass. Also accepts~DEFAULT_BRANCH to include the default branch or~ALL to include all branches.

excludearray of strings

Array of ref names or patterns to exclude. The condition will not pass if any of these patterns match.

rulesarray of objects

An array of rules within the ruleset.

Name, Type, Description
creationobject

Only allow users with bypass permission to create matching refs.

Name, Type, Description
typestringRequired

Value:creation

updateobject

Only allow users with bypass permission to update matching refs.

Name, Type, Description
typestringRequired

Value:update

parametersobject
Name, Type, Description
update_allows_fetch_and_mergebooleanRequired

Branch can pull changes from its upstream repository

deletionobject

Only allow users with bypass permissions to delete matching refs.

Name, Type, Description
typestringRequired

Value:deletion

required_linear_historyobject

Prevent merge commits from being pushed to matching refs.

Name, Type, Description
typestringRequired

Value:required_linear_history

merge_queueobject

Merges must be performed via a merge queue.

Name, Type, Description
typestringRequired

Value:merge_queue

parametersobject
Name, Type, Description
check_response_timeout_minutesintegerRequired

Maximum time for a required status check to report a conclusion. After this much time has elapsed, checks that have not reported a conclusion will be assumed to have failed

grouping_strategystringRequired

When set to ALLGREEN, the merge commit created by merge queue for each PR in the group must pass all required checks to merge. When set to HEADGREEN, only the commit at the head of the merge group, i.e. the commit containing changes from all of the PRs in the group, must pass its required checks to merge.

Can be one of:ALLGREEN,HEADGREEN

max_entries_to_buildintegerRequired

Limit the number of queued pull requests requesting checks and workflow runs at the same time.

max_entries_to_mergeintegerRequired

The maximum number of PRs that will be merged together in a group.

merge_methodstringRequired

Method to use when merging changes from queued pull requests.

Can be one of:MERGE,SQUASH,REBASE

min_entries_to_mergeintegerRequired

The minimum number of PRs that will be merged together in a group.

min_entries_to_merge_wait_minutesintegerRequired

The time merge queue should wait after the first PR is added to the queue for the minimum group size to be met. After this time has elapsed, the minimum group size will be ignored and a smaller group will be merged.

required_deploymentsobject

Choose which environments must be successfully deployed to before refs can be pushed into a ref that matches this rule.

Name, Type, Description
typestringRequired

Value:required_deployments

parametersobject
Name, Type, Description
required_deployment_environmentsarray of stringsRequired

The environments that must be successfully deployed to before branches can be merged.

required_signaturesobject

Commits pushed to matching refs must have verified signatures.

Name, Type, Description
typestringRequired

Value:required_signatures

pull_requestobject

Require all commits be made to a non-target branch and submitted via a pull request before they can be merged.

Name, Type, Description
typestringRequired

Value:pull_request

parametersobject
Name, Type, Description
allowed_merge_methodsarray of strings

Array of allowed merge methods. Allowed values includemerge,squash, andrebase. At least one option must be enabled.Supported values are:merge,squash,rebase

dismiss_stale_reviews_on_pushbooleanRequired

New, reviewable commits pushed will dismiss previous pull request review approvals.

require_code_owner_reviewbooleanRequired

Require an approving review in pull requests that modify files that have a designated code owner.

require_last_push_approvalbooleanRequired

Whether the most recent reviewable push must be approved by someone other than the person who pushed it.

required_approving_review_countintegerRequired

The number of approving reviews that are required before a pull request can be merged.

required_review_thread_resolutionbooleanRequired

All conversations on code must be resolved before a pull request can be merged.

required_reviewersarray of objects

Note

required_reviewers is in beta and subject to change.

A collection of reviewers and associated file patterns. Each reviewer has a list of file patterns which determine the files that reviewer is required to review.

Name, Type, Description
file_patternsarray of stringsRequired

Array of file patterns. Pull requests which change matching files must be approved by the specified team. File patterns use fnmatch syntax.

minimum_approvalsintegerRequired

Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional.

reviewerobjectRequired

A required reviewing team

Name, Type, Description
idintegerRequired

ID of the reviewer which must review changes to matching files.

typestringRequired

The type of the reviewer

Value:Team

required_status_checksobject

Choose which status checks must pass before the ref is updated. When enabled, commits must first be pushed to another ref where the checks pass.

Name, Type, Description
typestringRequired

Value:required_status_checks

parametersobject
Name, Type, Description
do_not_enforce_on_createboolean

Allow repositories and branches to be created if a check would otherwise prohibit it.

required_status_checksarray of objectsRequired

Status checks that are required.

Name, Type, Description
contextstringRequired

The status check context name that must be present on the commit.

integration_idinteger

The optional integration ID that this status check must originate from.

strict_required_status_checks_policybooleanRequired

Whether pull requests targeting a matching branch must be tested with the latest code. This setting will not take effect unless at least one status check is enabled.

non_fast_forwardobject

Prevent users with push access from force pushing to refs.

Name, Type, Description
typestringRequired

Value:non_fast_forward

commit_message_patternobject

Parameters to be used for the commit_message_pattern rule

Name, Type, Description
typestringRequired

Value:commit_message_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

commit_author_email_patternobject

Parameters to be used for the commit_author_email_pattern rule

Name, Type, Description
typestringRequired

Value:commit_author_email_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

committer_email_patternobject

Parameters to be used for the committer_email_pattern rule

Name, Type, Description
typestringRequired

Value:committer_email_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

branch_name_patternobject

Parameters to be used for the branch_name_pattern rule

Name, Type, Description
typestringRequired

Value:branch_name_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

tag_name_patternobject

Parameters to be used for the tag_name_pattern rule

Name, Type, Description
typestringRequired

Value:tag_name_pattern

parametersobject
Name, Type, Description
namestring

How this rule will appear to users.

negateboolean

If true, the rule will fail if the pattern matches.

operatorstringRequired

The operator to use for matching.

Can be one of:starts_with,ends_with,contains,regex

patternstringRequired

The pattern to match with.

file_path_restrictionobject

Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.

Name, Type, Description
typestringRequired

Value:file_path_restriction

parametersobject
Name, Type, Description
restricted_file_pathsarray of stringsRequired

The file paths that are restricted from being pushed to the commit graph.

max_file_path_lengthobject

Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.

Name, Type, Description
typestringRequired

Value:max_file_path_length

parametersobject
Name, Type, Description
max_file_path_lengthintegerRequired

The maximum amount of characters allowed in file paths.

file_extension_restrictionobject

Prevent commits that include files with specified file extensions from being pushed to the commit graph.

Name, Type, Description
typestringRequired

Value:file_extension_restriction

parametersobject
Name, Type, Description
restricted_file_extensionsarray of stringsRequired

The file extensions that are restricted from being pushed to the commit graph.

max_file_sizeobject

Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.

Name, Type, Description
typestringRequired

Value:max_file_size

parametersobject
Name, Type, Description
max_file_sizeintegerRequired

The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS).

workflowsobject

Require all changes made to a targeted branch to pass the specified workflows before they can be merged.

Name, Type, Description
typestringRequired

Value:workflows

parametersobject
Name, Type, Description
do_not_enforce_on_createboolean

Allow repositories and branches to be created if a check would otherwise prohibit it.

workflowsarray of objectsRequired

Workflows that must pass for this rule to pass.

Name, Type, Description
pathstringRequired

The path to the workflow file

refstring

The ref (branch or tag) of the workflow file to use

repository_idintegerRequired

The ID of the repository where the workflow is defined

shastring

The commit SHA of the workflow file to use

code_scanningobject

Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.

Name, Type, Description
typestringRequired

Value:code_scanning

parametersobject
Name, Type, Description
code_scanning_toolsarray of objectsRequired

Tools that must provide code scanning results for this rule to pass.

Name, Type, Description
alerts_thresholdstringRequired

The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see "About code scanning alerts."

Can be one of:none,errors,errors_and_warnings,all

security_alerts_thresholdstringRequired

The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see "About code scanning alerts."

Can be one of:none,critical,high_or_higher,medium_or_higher,all

toolstringRequired

The name of a code scanning tool

copilot_code_reviewobject

Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.

Name, Type, Description
typestringRequired

Value:copilot_code_review

parametersobject
Name, Type, Description
review_draft_pull_requestsboolean

Copilot automatically reviews draft pull requests before they are marked as ready for review.

review_on_pushboolean

Copilot automatically reviews each new push to the pull request.

HTTP response status codes for "Update a repository ruleset"

Status codeDescription
200

OK

404

Resource not found

500

Internal Error

Code samples for "Update a repository ruleset"

Request example

put/repos/{owner}/{repo}/rulesets/{ruleset_id}
curl -L \ -X PUT \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID \ -d '{"name":"super cool ruleset","target":"branch","enforcement":"active","bypass_actors":[{"actor_id":234,"actor_type":"Team","bypass_mode":"always"}],"conditions":{"ref_name":{"include":["refs/heads/main","refs/heads/master"],"exclude":["refs/heads/dev*"]}},"rules":[{"type":"commit_author_email_pattern","parameters":{"operator":"contains","pattern":"github"}}]}'

Response

Status: 200
{ "id": 42, "name": "super cool ruleset", "target": "branch", "source_type": "Repository", "source": "monalisa/my-repo", "enforcement": "active", "bypass_actors": [ { "actor_id": 234, "actor_type": "Team", "bypass_mode": "always" } ], "conditions": { "ref_name": { "include": [ "refs/heads/main", "refs/heads/master" ], "exclude": [ "refs/heads/dev*" ] } }, "rules": [ { "type": "commit_author_email_pattern", "parameters": { "operator": "contains", "pattern": "github" } } ], "node_id": "RRS_lACkVXNlcgQB", "_links": { "self": { "href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42" }, "html": { "href": "https://github.com/monalisa/my-repo/rules/42" } }, "created_at": "2023-07-15T08:43:03Z", "updated_at": "2023-08-23T16:29:47Z"}

Delete a repository ruleset

Delete a ruleset for a repository.

Fine-grained access tokens for "Delete a repository ruleset"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Administration" repository permissions (write)

Parameters for "Delete a repository ruleset"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

ruleset_idintegerRequired

The ID of the ruleset.

HTTP response status codes for "Delete a repository ruleset"

Status codeDescription
204

No Content

404

Resource not found

500

Internal Error

Code samples for "Delete a repository ruleset"

Request example

delete/repos/{owner}/{repo}/rulesets/{ruleset_id}
curl -L \ -X DELETE \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID

Response

Status: 204

Get repository ruleset history

Get the history of a repository ruleset.

Fine-grained access tokens for "Get repository ruleset history"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Administration" repository permissions (write)

Parameters for "Get repository ruleset history"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

ruleset_idintegerRequired

The ID of the ruleset.

Query parameters
Name, Type, Description
per_pageinteger

The number of results per page (max 100). For more information, see "Using pagination in the REST API."

Default:30

pageinteger

The page number of the results to fetch. For more information, see "Using pagination in the REST API."

Default:1

HTTP response status codes for "Get repository ruleset history"

Status codeDescription
200

OK

404

Resource not found

500

Internal Error

Code samples for "Get repository ruleset history"

Request example

get/repos/{owner}/{repo}/rulesets/{ruleset_id}/history
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID/history

Response

Status: 200
[ { "version_id": 3, "actor": { "id": 1, "type": "User" }, "updated_at": "2024-010-23T16:29:47Z" }, { "version_id": 2, "actor": { "id": 2, "type": "User" }, "updated_at": "2024-09-23T16:29:47Z" }, { "version_id": 1, "actor": { "id": 1, "type": "User" }, "updated_at": "2024-08-23T16:29:47Z" }]

Get repository ruleset version

Get a version of a repository ruleset.

Fine-grained access tokens for "Get repository ruleset version"

This endpoint works with the following fine-grained token types:

The fine-grained token must have the following permission set:

  • "Administration" repository permissions (write)

Parameters for "Get repository ruleset version"

Headers
Name, Type, Description
acceptstring

Setting toapplication/vnd.github+json is recommended.

Path parameters
Name, Type, Description
ownerstringRequired

The account owner of the repository. The name is not case sensitive.

repostringRequired

The name of the repository without the.git extension. The name is not case sensitive.

ruleset_idintegerRequired

The ID of the ruleset.

version_idintegerRequired

The ID of the version

HTTP response status codes for "Get repository ruleset version"

Status codeDescription
200

OK

404

Resource not found

500

Internal Error

Code samples for "Get repository ruleset version"

Request example

get/repos/{owner}/{repo}/rulesets/{ruleset_id}/history/{version_id}
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID/history/VERSION_ID

Response

Status: 200
[ { "version_id": 3, "actor": { "id": 1, "type": "User" }, "updated_at": "2024-010-23T16:29:47Z", "state": { "id": 42, "name": "super cool ruleset", "target": "branch", "source_type": "Repository", "source": "monalisa/my-repo", "enforcement": "active", "bypass_actors": [ { "actor_id": 234, "actor_type": "Team", "bypass_mode": "always" } ], "conditions": { "ref_name": { "include": [ "refs/heads/main", "refs/heads/master" ], "exclude": [ "refs/heads/dev*" ] } }, "rules": [ { "type": "commit_author_email_pattern", "parameters": { "operator": "contains", "pattern": "github" } } ] } }]

[8]ページ先頭

©2009-2025 Movatter.jp