diff --git a/content/github-models/integrating-ai-models-into-your-development-workflow.md b/content/github-models/integrating-ai-models-into-your-development-workflow.md index af238b281752..3aae5c7b137a 100644 --- a/content/github-models/integrating-ai-models-into-your-development-workflow.md +++ b/content/github-models/integrating-ai-models-into-your-development-workflow.md @@ -56,18 +56,20 @@ jobs: runs-on: ubuntu-latest steps: - name: Call AI model - run: | - curl -X POST "https://models.inference.ai.azure.com/chat/completions" \ - -H "Content-Type: application/json" \ - -H "Authorization: Bearer ${{ secrets.GITHUB_TOKEN }}" \ - -d '{ - "messages": [ + env: + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} + run: | + curl "https://models.github.ai/inference/chat/completions" \ + -H "Content-Type: application/json" \ + -H "Authorization: Bearer $GITHUB_TOKEN" \ + -d '{ + "messages": [ { "role": "user", "content": "Explain the concept of recursion." } ], - "model": "gpt-4o" + "model": "openai/gpt-4o" }' ``` diff --git a/data/features/bulk-code-scanning-query-suite.yml b/data/features/bulk-code-scanning-query-suite.yml deleted file mode 100644 index 50759dd242f5..000000000000 --- a/data/features/bulk-code-scanning-query-suite.yml +++ /dev/null @@ -1,7 +0,0 @@ -# Reference: #10637 -# Select a query suite when enabling code scanning in bulk - -versions: - fpt: '*' - ghec: '*' - ghes: '>3.10' diff --git a/data/features/code-security-wording-only-enterprise.yml b/data/features/code-security-wording-only-enterprise.yml deleted file mode 100644 index e269f91f41c8..000000000000 --- a/data/features/code-security-wording-only-enterprise.yml +++ /dev/null @@ -1,5 +0,0 @@ -# Reference: 16625 - -versions: - ghec: '*' - ghes: '>= 3.15' diff --git a/data/features/code-security-wording-only.yml b/data/features/code-security-wording-only.yml deleted file mode 100644 index 875e0023be02..000000000000 --- a/data/features/code-security-wording-only.yml +++ /dev/null @@ -1,6 +0,0 @@ -# Reference: 16288 - -versions: - fpt: '*' - ghec: '*' - ghes: '>= 3.16' diff --git a/data/features/dependabot-alerts-ghes-enablement.yml b/data/features/dependabot-alerts-ghes-enablement.yml deleted file mode 100644 index 63fbfa92fbd9..000000000000 --- a/data/features/dependabot-alerts-ghes-enablement.yml +++ /dev/null @@ -1,4 +0,0 @@ -# Reference: issue #8959 -# Dependabot Alerts enablement at the repo, org and enterprise level for GHES -versions: - ghes: '>= 3.9' diff --git a/data/features/ghas-committers-calculator.yml b/data/features/ghas-committers-calculator.yml deleted file mode 100644 index c948d9cbc956..000000000000 --- a/data/features/ghas-committers-calculator.yml +++ /dev/null @@ -1,2 +0,0 @@ -versions: - ghes: '*' diff --git a/data/features/global-nav-update.yml b/data/features/global-nav-update.yml deleted file mode 100644 index 7fe8f9e3fb2f..000000000000 --- a/data/features/global-nav-update.yml +++ /dev/null @@ -1,7 +0,0 @@ -# Reference: #10533. -# Documentation for the global navigation opt-out public beta - -versions: - fpt: '*' - ghec: '*' - ghes: '>3.11' diff --git a/data/features/secret-scanning-audit-log-custom-patterns.yml b/data/features/secret-scanning-audit-log-custom-patterns.yml deleted file mode 100644 index d80d366fd6ca..000000000000 --- a/data/features/secret-scanning-audit-log-custom-patterns.yml +++ /dev/null @@ -1,7 +0,0 @@ -# Reference: #6615. -# Documentation for new audit log events for custom patterns for secret scanning. -# Ref 17108 Advanced Security available to Team plans -versions: - fpt: '*' - ghec: '*' - ghes: '>=3.5' diff --git a/data/features/secret-scanning-custom-pattern-push-protection-audit.yml b/data/features/secret-scanning-custom-pattern-push-protection-audit.yml deleted file mode 100644 index e08e26ab92cf..000000000000 --- a/data/features/secret-scanning-custom-pattern-push-protection-audit.yml +++ /dev/null @@ -1,7 +0,0 @@ -# Reference: #8786 -# Adding push protection for custom patterns (enable/disable) as audit log events -# Ref 17108 Advanced Security available to Team plans -versions: - fpt: '*' - ghec: '*' - ghes: '> 3.8' diff --git a/data/features/security-overview-displayed-alerts.yml b/data/features/security-overview-displayed-alerts.yml deleted file mode 100644 index 938374e2e755..000000000000 --- a/data/features/security-overview-displayed-alerts.yml +++ /dev/null @@ -1,7 +0,0 @@ -# Reference: #7114. -# Documentation for security overview availability to all enterprise accounts. -# Ref 17108 Advanced Security available to Team plans -versions: - fpt: '*' - ghec: '*' - ghes: '>=3.7' diff --git a/data/features/security-overview-enterprise-codeql-pr-alerts.yml b/data/features/security-overview-enterprise-codeql-pr-alerts.yml deleted file mode 100644 index a144a3632375..000000000000 --- a/data/features/security-overview-enterprise-codeql-pr-alerts.yml +++ /dev/null @@ -1,6 +0,0 @@ -# Reference: #14348 -# Documentation for enterprise-level CodeQL PR alerts report -versions: - fpt: '*' - ghes: '> 3.14' - ghec: '*' diff --git a/data/reusables/actions/self-hosted-runner-description.md b/data/reusables/actions/self-hosted-runner-description.md deleted file mode 100644 index e69de29bb2d1..000000000000 diff --git a/data/reusables/advanced-security/about-ghas-organization-policy.md b/data/reusables/advanced-security/about-ghas-organization-policy.md deleted file mode 100644 index 9f47d938a9a3..000000000000 --- a/data/reusables/advanced-security/about-ghas-organization-policy.md +++ /dev/null @@ -1,5 +0,0 @@ -{% data variables.product.github %} bills for {% data variables.product.prodname_AS %} products on a per-committer basis. See [AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/about-billing-for-github-advanced-security#managing-committers-and-costs). - -You can enforce a policy that controls whether repository administrators are allowed to enable features for {% data variables.product.prodname_advanced_security %} in an organization's repositories. You can configure a policy for all organizations owned by your enterprise account, or for individual organizations that you choose. - -Disallowing {% data variables.product.prodname_GH_cs_or_sp %} for an organization prevents repository administrators from enabling {% data variables.product.prodname_GH_cs_or_sp %} features for additional repositories, but does not disable the features for repositories where the features are already enabled. diff --git a/data/reusables/copilot/custom-instructions-note.md b/data/reusables/copilot/custom-instructions-note.md deleted file mode 100644 index 75323e21f986..000000000000 --- a/data/reusables/copilot/custom-instructions-note.md +++ /dev/null @@ -1 +0,0 @@ -> [!NOTE] Custom instructions are currently supported for {% data variables.product.prodname_copilot_chat_short %} in {% data variables.product.prodname_vs %}, {% data variables.product.prodname_vscode_shortname %} and on the {% data variables.product.github %} website. diff --git a/data/reusables/copilot/repository-vs-personal-instructions-note.md b/data/reusables/copilot/repository-vs-personal-instructions-note.md deleted file mode 100644 index e2370d01e66e..000000000000 --- a/data/reusables/copilot/repository-vs-personal-instructions-note.md +++ /dev/null @@ -1 +0,0 @@ -> [!NOTE] Personal custom instructions take priority over repository custom instructions, but both are incorporated into the final prompt provided to {% data variables.product.prodname_copilot_chat_short %}. Whenever possible, you should avoid providing conflicting personal and repository instructions. diff --git a/data/reusables/pages/about-private-publishing.md b/data/reusables/pages/about-private-publishing.md deleted file mode 100644 index eee4addbe8c9..000000000000 --- a/data/reusables/pages/about-private-publishing.md +++ /dev/null @@ -1,5 +0,0 @@ -{% ifversion fpt %} -You can create {% data variables.product.prodname_pages %} sites that are publicly available on the internet. Organizations that use {% data variables.product.prodname_ghe_cloud %} can also publish sites privately by managing access control for the site. -{% elsif ghec %} -Unless your enterprise uses {% data variables.product.prodname_emus %}, you can choose to publish project sites publicly or privately by managing access control for the site. -{% endif %} diff --git a/data/reusables/security-campaigns/too-many-alerts.md b/data/reusables/security-campaigns/too-many-alerts.md deleted file mode 100644 index ad7fee69dd51..000000000000 --- a/data/reusables/security-campaigns/too-many-alerts.md +++ /dev/null @@ -1 +0,0 @@ -Alerts will be omitted to until there are 1000 or fewer alerts remaining. Alerts in repositories with recent pushes are prioritized for inclusion in the campaign.