Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
37 changes: 37 additions & 0 deletions github/actions_permissions_enterprise.go
Original file line number Diff line number Diff line change
Expand Up @@ -375,3 +375,40 @@ func (s *ActionsService) UpdatePrivateRepoForkPRWorkflowSettingsInEnterprise(ctx

return s.client.Do(ctx, req, nil)
}

// GetEnterpriseForkPRContributorApprovalPermissions gets the fork PR contributor approval policy for an enterprise.
//
// GitHub API docs: https://docs.github.com/enterprise-cloud@latest/rest/actions/permissions#get-fork-pr-contributor-approval-permissions-for-an-enterprise
//
//meta:operation GET /enterprises/{enterprise}/actions/permissions/fork-pr-contributor-approval
func (s *ActionsService) GetEnterpriseForkPRContributorApprovalPermissions(ctx context.Context, enterprise string) (*ContributorApprovalPermissions, *Response, error) {
u := fmt.Sprintf("enterprises/%v/actions/permissions/fork-pr-contributor-approval", enterprise)

req, err := s.client.NewRequest("GET", u, nil)
if err != nil {
return nil, nil, err
}

policy := new(ContributorApprovalPermissions)
resp, err := s.client.Do(ctx, req, policy)
if err != nil {
return nil, resp, err
}

return policy, resp, nil
}

// UpdateEnterpriseForkPRContributorApprovalPermissions sets the fork PR contributor approval policy for an enterprise.
//
// GitHub API docs: https://docs.github.com/enterprise-cloud@latest/rest/actions/permissions#set-fork-pr-contributor-approval-permissions-for-an-enterprise
//
//meta:operation PUT /enterprises/{enterprise}/actions/permissions/fork-pr-contributor-approval
func (s *ActionsService) UpdateEnterpriseForkPRContributorApprovalPermissions(ctx context.Context, enterprise string, policy ContributorApprovalPermissions) (*Response, error) {
u := fmt.Sprintf("enterprises/%v/actions/permissions/fork-pr-contributor-approval", enterprise)
req, err := s.client.NewRequest("PUT", u, policy)
if err != nil {
return nil, err
}

return s.client.Do(ctx, req, nil)
}
72 changes: 72 additions & 0 deletions github/actions_permissions_enterprise_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -603,3 +603,75 @@ func TestActionsService_UpdatePrivateRepoForkPRWorkflowSettingsInEnterprise(t *t
return client.Actions.UpdatePrivateRepoForkPRWorkflowSettingsInEnterprise(ctx, "e", input)
})
}

func TestActionsService_GetEnterpriseForkPRContributorApprovalPermissions(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)

mux.HandleFunc("/enterprises/e/actions/permissions/fork-pr-contributor-approval", func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, "GET")
fmt.Fprint(w, `{"approval_policy": "require_approval"}`)
})

ctx := t.Context()
policy, _, err := client.Actions.GetEnterpriseForkPRContributorApprovalPermissions(ctx, "e")
if err != nil {
t.Errorf("Actions.GetEnterpriseForkPRContributorApprovalPermissions returned error: %v", err)
}
want := &ContributorApprovalPermissions{ApprovalPolicy: "require_approval"}
if !cmp.Equal(policy, want) {
t.Errorf("Actions.GetEnterpriseForkPRContributorApprovalPermissions returned %+v, want %+v", policy, want)
}

const methodName = "GetEnterpriseForkPRContributorApprovalPermissions"
testBadOptions(t, methodName, func() (err error) {
_, _, err = client.Actions.GetEnterpriseForkPRContributorApprovalPermissions(ctx, "\n")
return err
})

testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
got, resp, err := client.Actions.GetEnterpriseForkPRContributorApprovalPermissions(ctx, "e")
if got != nil {
t.Errorf("testNewRequestAndDoFailure %v = %#v, want nil", methodName, got)
}
return resp, err
})
}

func TestActionsService_UpdateEnterpriseForkPRContributorApprovalPermissions(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)

input := ContributorApprovalPermissions{ApprovalPolicy: "require_approval"}

mux.HandleFunc("/enterprises/e/actions/permissions/fork-pr-contributor-approval", func(w http.ResponseWriter, r *http.Request) {
v := new(ContributorApprovalPermissions)
assertNilError(t, json.NewDecoder(r.Body).Decode(v))

testMethod(t, r, "PUT")
if !cmp.Equal(v, &input) {
t.Errorf("Request body = %+v, want %+v", v, &input)
}
w.WriteHeader(http.StatusNoContent)
})

ctx := t.Context()
resp, err := client.Actions.UpdateEnterpriseForkPRContributorApprovalPermissions(ctx, "e", input)
if err != nil {
t.Errorf("Actions.UpdateEnterpriseForkPRContributorApprovalPermissions returned error: %v", err)
}

if resp.StatusCode != http.StatusNoContent {
t.Errorf("Actions.UpdateEnterpriseForkPRContributorApprovalPermissions = %v, want %v", resp.StatusCode, http.StatusNoContent)
}

const methodName = "UpdateEnterpriseForkPRContributorApprovalPermissions"
testBadOptions(t, methodName, func() (err error) {
_, err = client.Actions.UpdateEnterpriseForkPRContributorApprovalPermissions(ctx, "\n", input)
return err
})

testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
return client.Actions.UpdateEnterpriseForkPRContributorApprovalPermissions(ctx, "e", input)
})
}
37 changes: 37 additions & 0 deletions github/actions_permissions_orgs.go
Original file line number Diff line number Diff line change
Expand Up @@ -483,3 +483,40 @@ func (s *ActionsService) UpdatePrivateRepoForkPRWorkflowSettingsInOrganization(c

return s.client.Do(ctx, req, nil)
}

// GetOrganizationForkPRContributorApprovalPermissions gets the fork PR contributor approval policy for an organization.
//
// GitHub API docs: https://docs.github.com/rest/actions/permissions#get-fork-pr-contributor-approval-permissions-for-an-organization
//
//meta:operation GET /orgs/{org}/actions/permissions/fork-pr-contributor-approval
func (s *ActionsService) GetOrganizationForkPRContributorApprovalPermissions(ctx context.Context, org string) (*ContributorApprovalPermissions, *Response, error) {
u := fmt.Sprintf("orgs/%v/actions/permissions/fork-pr-contributor-approval", org)

req, err := s.client.NewRequest("GET", u, nil)
if err != nil {
return nil, nil, err
}

policy := new(ContributorApprovalPermissions)
resp, err := s.client.Do(ctx, req, policy)
if err != nil {
return nil, resp, err
}

return policy, resp, nil
}

// UpdateOrganizationForkPRContributorApprovalPermissions sets the fork PR contributor approval policy for an organization.
//
// GitHub API docs: https://docs.github.com/rest/actions/permissions#set-fork-pr-contributor-approval-permissions-for-an-organization
//
//meta:operation PUT /orgs/{org}/actions/permissions/fork-pr-contributor-approval
func (s *ActionsService) UpdateOrganizationForkPRContributorApprovalPermissions(ctx context.Context, org string, policy ContributorApprovalPermissions) (*Response, error) {
u := fmt.Sprintf("orgs/%v/actions/permissions/fork-pr-contributor-approval", org)
req, err := s.client.NewRequest("PUT", u, policy)
if err != nil {
return nil, err
}

return s.client.Do(ctx, req, nil)
}
72 changes: 72 additions & 0 deletions github/actions_permissions_orgs_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -773,3 +773,75 @@ func TestActionsService_UpdatePrivateRepoForkPRWorkflowSettingsInOrganization(t
return client.Actions.UpdatePrivateRepoForkPRWorkflowSettingsInOrganization(ctx, "o", input)
})
}

func TestActionsService_GetOrganizationForkPRContributorApprovalPermissions(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)

mux.HandleFunc("/orgs/o/actions/permissions/fork-pr-contributor-approval", func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, "GET")
fmt.Fprint(w, `{"approval_policy": "require_approval"}`)
})

ctx := t.Context()
policy, _, err := client.Actions.GetOrganizationForkPRContributorApprovalPermissions(ctx, "o")
if err != nil {
t.Errorf("Actions.GetOrganizationForkPRContributorApprovalPermissions returned error: %v", err)
}
want := &ContributorApprovalPermissions{ApprovalPolicy: "require_approval"}
if !cmp.Equal(policy, want) {
t.Errorf("Actions.GetOrganizationForkPRContributorApprovalPermissions returned %+v, want %+v", policy, want)
}

const methodName = "GetOrganizationForkPRContributorApprovalPermissions"
testBadOptions(t, methodName, func() (err error) {
_, _, err = client.Actions.GetOrganizationForkPRContributorApprovalPermissions(ctx, "\n")
return err
})

testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
got, resp, err := client.Actions.GetOrganizationForkPRContributorApprovalPermissions(ctx, "o")
if got != nil {
t.Errorf("testNewRequestAndDoFailure %v = %#v, want nil", methodName, got)
}
return resp, err
})
}

func TestActionsService_UpdateOrganizationForkPRContributorApprovalPermissions(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)

input := ContributorApprovalPermissions{ApprovalPolicy: "require_approval"}

mux.HandleFunc("/orgs/o/actions/permissions/fork-pr-contributor-approval", func(w http.ResponseWriter, r *http.Request) {
v := new(ContributorApprovalPermissions)
assertNilError(t, json.NewDecoder(r.Body).Decode(v))

testMethod(t, r, "PUT")
if !cmp.Equal(v, &input) {
t.Errorf("Request body = %+v, want %+v", v, &input)
}
w.WriteHeader(http.StatusNoContent)
})

ctx := t.Context()
resp, err := client.Actions.UpdateOrganizationForkPRContributorApprovalPermissions(ctx, "o", input)
if err != nil {
t.Errorf("Actions.UpdateOrganizationForkPRContributorApprovalPermissions returned error: %v", err)
}

if resp.StatusCode != http.StatusNoContent {
t.Errorf("Actions.UpdateOrganizationForkPRContributorApprovalPermissions = %v, want %v", resp.StatusCode, http.StatusNoContent)
}

const methodName = "UpdateOrganizationForkPRContributorApprovalPermissions"
testBadOptions(t, methodName, func() (err error) {
_, err = client.Actions.UpdateOrganizationForkPRContributorApprovalPermissions(ctx, "\n", input)
return err
})

testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
return client.Actions.UpdateOrganizationForkPRContributorApprovalPermissions(ctx, "o", input)
})
}
10 changes: 10 additions & 0 deletions github/actions_workflows.go
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,16 @@ type WorkflowsPermissionsOpt struct {
RequireApprovalForForkPRWorkflows *bool `json:"require_approval_for_fork_pr_workflows,omitempty"`
}

// ContributorApprovalPermissions represents the policy that controls
// when fork PR workflows require approval from a maintainer.
type ContributorApprovalPermissions struct {
ApprovalPolicy string `json:"approval_policy"`
}

func (p ContributorApprovalPermissions) String() string {
return Stringify(p)
}

// ListWorkflows lists all workflows in a repository.
//
// GitHub API docs: https://docs.github.com/rest/actions/workflows#list-repository-workflows
Expand Down
11 changes: 11 additions & 0 deletions github/github-stringify_test.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

37 changes: 37 additions & 0 deletions github/repos_actions_permissions.go
Original file line number Diff line number Diff line change
Expand Up @@ -190,3 +190,40 @@ func (s *RepositoriesService) UpdatePrivateRepoForkPRWorkflowSettings(ctx contex

return s.client.Do(ctx, req, nil)
}

// GetForkPRContributorApprovalPermissions gets the fork PR contributor approval policy for a repository.
//
// GitHub API docs: https://docs.github.com/rest/actions/permissions#get-fork-pr-contributor-approval-permissions-for-a-repository
//
//meta:operation GET /repos/{owner}/{repo}/actions/permissions/fork-pr-contributor-approval
func (s *ActionsService) GetForkPRContributorApprovalPermissions(ctx context.Context, owner, repo string) (*ContributorApprovalPermissions, *Response, error) {
u := fmt.Sprintf("repos/%v/%v/actions/permissions/fork-pr-contributor-approval", owner, repo)

req, err := s.client.NewRequest("GET", u, nil)
if err != nil {
return nil, nil, err
}

policy := new(ContributorApprovalPermissions)
resp, err := s.client.Do(ctx, req, policy)
if err != nil {
return nil, resp, err
}

return policy, resp, nil
}

// UpdateForkPRContributorApprovalPermissions sets the fork PR contributor approval policy for a repository.
//
// GitHub API docs: https://docs.github.com/rest/actions/permissions#set-fork-pr-contributor-approval-permissions-for-a-repository
//
//meta:operation PUT /repos/{owner}/{repo}/actions/permissions/fork-pr-contributor-approval
func (s *ActionsService) UpdateForkPRContributorApprovalPermissions(ctx context.Context, owner, repo string, policy ContributorApprovalPermissions) (*Response, error) {
u := fmt.Sprintf("repos/%v/%v/actions/permissions/fork-pr-contributor-approval", owner, repo)
req, err := s.client.NewRequest("PUT", u, policy)
if err != nil {
return nil, err
}

return s.client.Do(ctx, req, nil)
}
72 changes: 72 additions & 0 deletions github/repos_actions_permissions_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -345,3 +345,75 @@ func TestRepositoriesService_UpdatePrivateRepoForkPRWorkflowSettings(t *testing.
return client.Repositories.UpdatePrivateRepoForkPRWorkflowSettings(ctx, "o", "r", input)
})
}

func TestActionsService_GetForkPRContributorApprovalPermissions(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)

mux.HandleFunc("/repos/o/r/actions/permissions/fork-pr-contributor-approval", func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, "GET")
fmt.Fprint(w, `{"approval_policy": "require_approval"}`)
})

ctx := t.Context()
policy, _, err := client.Actions.GetForkPRContributorApprovalPermissions(ctx, "o", "r")
if err != nil {
t.Errorf("Actions.GetForkPRContributorApprovalPermissions returned error: %v", err)
}
want := &ContributorApprovalPermissions{ApprovalPolicy: "require_approval"}
if !cmp.Equal(policy, want) {
t.Errorf("Actions.GetForkPRContributorApprovalPermissions returned %+v, want %+v", policy, want)
}

const methodName = "GetForkPRContributorApprovalPermissions"
testBadOptions(t, methodName, func() (err error) {
_, _, err = client.Actions.GetForkPRContributorApprovalPermissions(ctx, "\n", "\n")
return err
})

testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
got, resp, err := client.Actions.GetForkPRContributorApprovalPermissions(ctx, "o", "r")
if got != nil {
t.Errorf("testNewRequestAndDoFailure %v = %#v, want nil", methodName, got)
}
return resp, err
})
}

func TestActionsService_UpdateForkPRContributorApprovalPermissions(t *testing.T) {
t.Parallel()
client, mux, _ := setup(t)

input := ContributorApprovalPermissions{ApprovalPolicy: "require_approval"}

mux.HandleFunc("/repos/o/r/actions/permissions/fork-pr-contributor-approval", func(w http.ResponseWriter, r *http.Request) {
v := new(ContributorApprovalPermissions)
assertNilError(t, json.NewDecoder(r.Body).Decode(v))

testMethod(t, r, "PUT")
if !cmp.Equal(v, &input) {
t.Errorf("Request body = %+v, want %+v", v, &input)
}
w.WriteHeader(http.StatusNoContent)
})

ctx := t.Context()
resp, err := client.Actions.UpdateForkPRContributorApprovalPermissions(ctx, "o", "r", input)
if err != nil {
t.Errorf("Actions.UpdateForkPRContributorApprovalPermissions returned error: %v", err)
}

if resp.StatusCode != http.StatusNoContent {
t.Errorf("Actions.UpdateForkPRContributorApprovalPermissions = %v, want %v", resp.StatusCode, http.StatusNoContent)
}

const methodName = "UpdateForkPRContributorApprovalPermissions"
testBadOptions(t, methodName, func() (err error) {
_, err = client.Actions.UpdateForkPRContributorApprovalPermissions(ctx, "\n", "\n", input)
return err
})

testNewRequestAndDoFailure(t, methodName, client, func() (*Response, error) {
return client.Actions.UpdateForkPRContributorApprovalPermissions(ctx, "o", "r", input)
})
}
Loading