From 4faa3d5513c4610e78ced7c0744cdecabf2b4687 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 00:07:02 +0000 Subject: [PATCH 01/12] codegen metadata --- .stats.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.stats.yml b/.stats.yml index cca37c7..e42f52e 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8f6ee769411e2d21a2f437d49eb2f16880fcef0db52ac1985f2a3963af45f6a0.yml -openapi_spec_hash: 28f2d9d7e36f1f0ecd13052054449249 -config_hash: 3f1278a7a2a9285f57e81f148743e99e +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8426aa204132f89d5d5f32747d82c2986f826c9acd0e5367010f04aaaf63f9e2.yml +openapi_spec_hash: e5e60a2fab845cf1d4a0637bf4d63790 +config_hash: 120c7d12a3f057e636ca5d9fb9eeb205 From 04969a38173ca22010780ab4b41b0bb8a4414eb7 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 16:31:00 +0000 Subject: [PATCH 02/12] feat(api): add WARMPOOL_ADMIN/WARMPOOL_VIEWER to ResourceRole --- .stats.yml | 4 ++-- src/resources/shared.ts | 4 +++- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/.stats.yml b/.stats.yml index e42f52e..91f8caf 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8426aa204132f89d5d5f32747d82c2986f826c9acd0e5367010f04aaaf63f9e2.yml -openapi_spec_hash: e5e60a2fab845cf1d4a0637bf4d63790 +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-cdd6702acb1ed8cc46e6f890808cdd543d75f66676afcaf6f823485e1b88bbce.yml +openapi_spec_hash: 03d0cd81b156a89c6a37fc4de3ff48be config_hash: 120c7d12a3f057e636ca5d9fb9eeb205 diff --git a/src/resources/shared.ts b/src/resources/shared.ts index 54fc29f..536a56d 100644 --- a/src/resources/shared.ts +++ b/src/resources/shared.ts @@ -252,7 +252,9 @@ export type ResourceRole = | 'RESOURCE_ROLE_SNAPSHOT_RUNNER' | 'RESOURCE_ROLE_WEBHOOK_ADMIN' | 'RESOURCE_ROLE_WEBHOOK_VIEWER' - | 'RESOURCE_ROLE_WARMPOOL_RUNNER'; + | 'RESOURCE_ROLE_WARMPOOL_RUNNER' + | 'RESOURCE_ROLE_WARMPOOL_ADMIN' + | 'RESOURCE_ROLE_WARMPOOL_VIEWER'; export type ResourceType = | 'RESOURCE_TYPE_UNSPECIFIED' From 9e28ce0fe6997b5209202c8f8ed912378b40af58 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 18:22:00 +0000 Subject: [PATCH 03/12] codegen metadata --- .stats.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.stats.yml b/.stats.yml index 91f8caf..b9c527b 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-cdd6702acb1ed8cc46e6f890808cdd543d75f66676afcaf6f823485e1b88bbce.yml -openapi_spec_hash: 03d0cd81b156a89c6a37fc4de3ff48be +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-647a751fe24c378b5e6b20c15a5c779816228f8bae7c3908086747670740d436.yml +openapi_spec_hash: 22107d4d4f497dd47eb6383657dfc4ba config_hash: 120c7d12a3f057e636ca5d9fb9eeb205 From 1451c466af8c2f1a3b098090a98b958d94eb9024 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Mon, 16 Feb 2026 07:32:12 +0000 Subject: [PATCH 04/12] feat(api): add runner_side_agent capability to runners --- .stats.yml | 4 ++-- src/resources/runners/runners.ts | 3 ++- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/.stats.yml b/.stats.yml index b9c527b..58f2e0c 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-647a751fe24c378b5e6b20c15a5c779816228f8bae7c3908086747670740d436.yml -openapi_spec_hash: 22107d4d4f497dd47eb6383657dfc4ba +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8d8770b1ff17fc5fde74134b1075b82730df35293b6da9d9352c82b1318a5fcd.yml +openapi_spec_hash: 6f9ca02497d5d958fd26e108ddfcb30b config_hash: 120c7d12a3f057e636ca5d9fb9eeb205 diff --git a/src/resources/runners/runners.ts b/src/resources/runners/runners.ts index 2e8ebd6..31deff2 100644 --- a/src/resources/runners/runners.ts +++ b/src/resources/runners/runners.ts @@ -622,7 +622,8 @@ export type RunnerCapability = | 'RUNNER_CAPABILITY_ENVIRONMENT_SNAPSHOT' | 'RUNNER_CAPABILITY_PREBUILDS_BEFORE_SNAPSHOT_TRIGGER' | 'RUNNER_CAPABILITY_LIST_SCM_ORGANIZATIONS' - | 'RUNNER_CAPABILITY_CHECK_REPOSITORY_ACCESS'; + | 'RUNNER_CAPABILITY_CHECK_REPOSITORY_ACCESS' + | 'RUNNER_CAPABILITY_RUNNER_SIDE_AGENT'; export interface RunnerConfiguration { /** From 22a299d9601d9277f13a67f2106c3a4cc0441038 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 11:31:36 +0000 Subject: [PATCH 05/12] codegen metadata --- .stats.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.stats.yml b/.stats.yml index 58f2e0c..659ee8d 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8d8770b1ff17fc5fde74134b1075b82730df35293b6da9d9352c82b1318a5fcd.yml -openapi_spec_hash: 6f9ca02497d5d958fd26e108ddfcb30b -config_hash: 120c7d12a3f057e636ca5d9fb9eeb205 +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8b950be488319320d56c79d283249f44a7c93230ac1aa59501e53f0638c5c654.yml +openapi_spec_hash: 759b2934961cbba17d9d6adc80abe978 +config_hash: 93f6a624f50b6a337afe6e7d02fd2d9f From 0faaa331b86b2c1ba3ad680e2a7a1d95eb1c40e9 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 16:53:01 +0000 Subject: [PATCH 06/12] codegen metadata --- .stats.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.stats.yml b/.stats.yml index 659ee8d..120dfe4 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8b950be488319320d56c79d283249f44a7c93230ac1aa59501e53f0638c5c654.yml -openapi_spec_hash: 759b2934961cbba17d9d6adc80abe978 -config_hash: 93f6a624f50b6a337afe6e7d02fd2d9f +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-6bfb10e82813fa3415f7ce350424221418b6fde16c3ec547c64ad46b68947277.yml +openapi_spec_hash: dea4ce60942cfbc15257e7c5dd57ee54 +config_hash: 318f17b933356b2580853e0380080816 From fd12303e87a280fda1e2f8d84bf328b941393405 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 17:41:38 +0000 Subject: [PATCH 07/12] chore(internal/client): fix form-urlencoded requests --- src/client.ts | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/client.ts b/src/client.ts index 4ea1bc7..4c6c90a 100644 --- a/src/client.ts +++ b/src/client.ts @@ -1076,6 +1076,14 @@ export class Gitpod { (Symbol.iterator in body && 'next' in body && typeof body.next === 'function')) ) { return { bodyHeaders: undefined, body: Shims.ReadableStreamFrom(body as AsyncIterable) }; + } else if ( + typeof body === 'object' && + headers.values.get('content-type') === 'application/x-www-form-urlencoded' + ) { + return { + bodyHeaders: { 'content-type': 'application/x-www-form-urlencoded' }, + body: this.stringifyQuery(body as Record), + }; } else { return this.#encoder({ body, headers }); } From 08f9dd245a02ef2d831521a86cf72bbb5bdab963 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 09:36:13 +0000 Subject: [PATCH 08/12] feat(api): add auditOnly field to Veto.Exec and ExecutableDenyList --- .stats.yml | 6 +++--- api.md | 1 + src/resources/environments/environments.ts | 6 ++++++ src/resources/organizations/index.ts | 1 + src/resources/organizations/organizations.ts | 2 ++ src/resources/organizations/policies.ts | 14 ++++++++++++++ tests/api-resources/organizations/policies.test.ts | 6 +++++- 7 files changed, 32 insertions(+), 4 deletions(-) diff --git a/.stats.yml b/.stats.yml index 120dfe4..580ffda 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-6bfb10e82813fa3415f7ce350424221418b6fde16c3ec547c64ad46b68947277.yml -openapi_spec_hash: dea4ce60942cfbc15257e7c5dd57ee54 -config_hash: 318f17b933356b2580853e0380080816 +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-cf6d772062952a074c6487c7c272a8dda20a65e238fae2d3163de9b6f4258ae2.yml +openapi_spec_hash: bc02a056a6ab611247ddacc41e4b98a5 +config_hash: 3a29593d2be08d2e9e818d2ac66ef562 diff --git a/api.md b/api.md index 1adbdf7..39ecaee 100644 --- a/api.md +++ b/api.md @@ -429,6 +429,7 @@ Types: - AgentPolicy - CrowdStrikeConfig - ExecutableDenyList +- KernelControlsAction - OrganizationPolicies - SecurityAgentPolicy - PolicyRetrieveResponse diff --git a/src/resources/environments/environments.ts b/src/resources/environments/environments.ts index 2e45ab7..4475f7e 100644 --- a/src/resources/environments/environments.ts +++ b/src/resources/environments/environments.ts @@ -5,6 +5,7 @@ import * as EnvironmentsAPI from './environments'; import * as Shared from '../shared'; import * as ClassesAPI from './classes'; import { ClassListParams, Classes } from './classes'; +import * as PoliciesAPI from '../organizations/policies'; import * as ProjectsAPI from '../projects/projects'; import * as RunnersAPI from '../runners/runners'; import * as AutomationsAPI from './automations/automations'; @@ -1517,6 +1518,11 @@ export namespace Veto { * exec controls executable blocking */ export interface Exec { + /** + * action specifies what action kernel-level controls take on policy violations + */ + action?: PoliciesAPI.KernelControlsAction; + /** * denylist is the list of executable paths or names to block */ diff --git a/src/resources/organizations/index.ts b/src/resources/organizations/index.ts index 4832a94..2889714 100644 --- a/src/resources/organizations/index.ts +++ b/src/resources/organizations/index.ts @@ -73,6 +73,7 @@ export { type AgentPolicy, type CrowdStrikeConfig, type ExecutableDenyList, + type KernelControlsAction, type OrganizationPolicies, type SecurityAgentPolicy, type PolicyRetrieveResponse, diff --git a/src/resources/organizations/organizations.ts b/src/resources/organizations/organizations.ts index 3379e5f..8ad1da7 100644 --- a/src/resources/organizations/organizations.ts +++ b/src/resources/organizations/organizations.ts @@ -57,6 +57,7 @@ import { AgentPolicy, CrowdStrikeConfig, ExecutableDenyList, + KernelControlsAction, OrganizationPolicies, Policies, PolicyRetrieveParams, @@ -1049,6 +1050,7 @@ export declare namespace Organizations { type AgentPolicy as AgentPolicy, type CrowdStrikeConfig as CrowdStrikeConfig, type ExecutableDenyList as ExecutableDenyList, + type KernelControlsAction as KernelControlsAction, type OrganizationPolicies as OrganizationPolicies, type SecurityAgentPolicy as SecurityAgentPolicy, type PolicyRetrieveResponse as PolicyRetrieveResponse, diff --git a/src/resources/organizations/policies.ts b/src/resources/organizations/policies.ts index 99a1f94..2a64d1e 100644 --- a/src/resources/organizations/policies.ts +++ b/src/resources/organizations/policies.ts @@ -156,6 +156,11 @@ export interface CrowdStrikeConfig { * environments. */ export interface ExecutableDenyList { + /** + * action specifies what action kernel-level controls take on policy violations + */ + action?: KernelControlsAction; + /** * enabled controls whether executable blocking is active */ @@ -167,6 +172,14 @@ export interface ExecutableDenyList { executables?: Array; } +/** + * KernelControlsAction defines how a kernel-level policy violation is handled. + */ +export type KernelControlsAction = + | 'KERNEL_CONTROLS_ACTION_UNSPECIFIED' + | 'KERNEL_CONTROLS_ACTION_BLOCK' + | 'KERNEL_CONTROLS_ACTION_AUDIT'; + export interface OrganizationPolicies { /** * agent_policy contains agent-specific policy settings @@ -536,6 +549,7 @@ export declare namespace Policies { type AgentPolicy as AgentPolicy, type CrowdStrikeConfig as CrowdStrikeConfig, type ExecutableDenyList as ExecutableDenyList, + type KernelControlsAction as KernelControlsAction, type OrganizationPolicies as OrganizationPolicies, type SecurityAgentPolicy as SecurityAgentPolicy, type PolicyRetrieveResponse as PolicyRetrieveResponse, diff --git a/tests/api-resources/organizations/policies.test.ts b/tests/api-resources/organizations/policies.test.ts index 0aaa75f..1cdd350 100644 --- a/tests/api-resources/organizations/policies.test.ts +++ b/tests/api-resources/organizations/policies.test.ts @@ -59,7 +59,11 @@ describe('resource policies', () => { defaultEnvironmentImage: 'defaultEnvironmentImage', deleteArchivedEnvironmentsAfter: '+9125115.360s', editorVersionRestrictions: { foo: { allowedVersions: ['string'] } }, - executableDenyList: { enabled: true, executables: ['string'] }, + executableDenyList: { + action: 'KERNEL_CONTROLS_ACTION_UNSPECIFIED', + enabled: true, + executables: ['string'], + }, maximumEnvironmentLifetime: '+9125115.360s', maximumEnvironmentsPerUser: '20', maximumEnvironmentTimeout: '3600s', From 0ff5595a54b7f2cf3a16a49957686b4ed30891c5 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 10:28:26 +0000 Subject: [PATCH 09/12] fix(types): rename ExecutableDenyList to VetoExecPolicy in organization policies --- .stats.yml | 6 +-- api.md | 2 +- src/resources/organizations/index.ts | 2 +- src/resources/organizations/organizations.ts | 4 +- src/resources/organizations/policies.ts | 54 ++++++++++---------- 5 files changed, 33 insertions(+), 35 deletions(-) diff --git a/.stats.yml b/.stats.yml index 580ffda..c0da654 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-cf6d772062952a074c6487c7c272a8dda20a65e238fae2d3163de9b6f4258ae2.yml -openapi_spec_hash: bc02a056a6ab611247ddacc41e4b98a5 -config_hash: 3a29593d2be08d2e9e818d2ac66ef562 +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-5a347cba895791d46a4d3c369e7fef031a03b8f8227e0724c09a087da5e245b5.yml +openapi_spec_hash: 8a302d9b615f3f84087acad858f2605a +config_hash: 469d30a2d44895c8c53a5aac370a56f1 diff --git a/api.md b/api.md index 39ecaee..fedc040 100644 --- a/api.md +++ b/api.md @@ -428,10 +428,10 @@ Types: - AgentPolicy - CrowdStrikeConfig -- ExecutableDenyList - KernelControlsAction - OrganizationPolicies - SecurityAgentPolicy +- VetoExecPolicy - PolicyRetrieveResponse - PolicyUpdateResponse diff --git a/src/resources/organizations/index.ts b/src/resources/organizations/index.ts index 2889714..82cec16 100644 --- a/src/resources/organizations/index.ts +++ b/src/resources/organizations/index.ts @@ -72,10 +72,10 @@ export { Policies, type AgentPolicy, type CrowdStrikeConfig, - type ExecutableDenyList, type KernelControlsAction, type OrganizationPolicies, type SecurityAgentPolicy, + type VetoExecPolicy, type PolicyRetrieveResponse, type PolicyUpdateResponse, type PolicyRetrieveParams, diff --git a/src/resources/organizations/organizations.ts b/src/resources/organizations/organizations.ts index 8ad1da7..9860548 100644 --- a/src/resources/organizations/organizations.ts +++ b/src/resources/organizations/organizations.ts @@ -56,7 +56,6 @@ import * as PoliciesAPI from './policies'; import { AgentPolicy, CrowdStrikeConfig, - ExecutableDenyList, KernelControlsAction, OrganizationPolicies, Policies, @@ -65,6 +64,7 @@ import { PolicyUpdateParams, PolicyUpdateResponse, SecurityAgentPolicy, + VetoExecPolicy, } from './policies'; import * as ScimConfigurationsAPI from './scim-configurations'; import { @@ -1049,10 +1049,10 @@ export declare namespace Organizations { Policies as Policies, type AgentPolicy as AgentPolicy, type CrowdStrikeConfig as CrowdStrikeConfig, - type ExecutableDenyList as ExecutableDenyList, type KernelControlsAction as KernelControlsAction, type OrganizationPolicies as OrganizationPolicies, type SecurityAgentPolicy as SecurityAgentPolicy, + type VetoExecPolicy as VetoExecPolicy, type PolicyRetrieveResponse as PolicyRetrieveResponse, type PolicyUpdateResponse as PolicyUpdateResponse, type PolicyRetrieveParams as PolicyRetrieveParams, diff --git a/src/resources/organizations/policies.ts b/src/resources/organizations/policies.ts index 2a64d1e..62c3924 100644 --- a/src/resources/organizations/policies.ts +++ b/src/resources/organizations/policies.ts @@ -151,27 +151,6 @@ export interface CrowdStrikeConfig { tags?: string; } -/** - * ExecutableDenyList contains executables that are blocked from execution in - * environments. - */ -export interface ExecutableDenyList { - /** - * action specifies what action kernel-level controls take on policy violations - */ - action?: KernelControlsAction; - - /** - * enabled controls whether executable blocking is active - */ - enabled?: boolean; - - /** - * executables is the list of executable paths or names to block - */ - executables?: Array; -} - /** * KernelControlsAction defines how a kernel-level policy violation is handled. */ @@ -274,10 +253,9 @@ export interface OrganizationPolicies { editorVersionRestrictions?: { [key: string]: OrganizationPolicies.EditorVersionRestrictions }; /** - * executable_deny_list contains executables that are blocked from execution in - * environments. + * executable_deny_list contains the veto exec policy for environments. */ - executableDenyList?: ExecutableDenyList; + executableDenyList?: VetoExecPolicy; /** * maximum_environment_lifetime controls for how long environments are allowed to @@ -327,6 +305,27 @@ export interface SecurityAgentPolicy { crowdstrike?: CrowdStrikeConfig; } +/** + * VetoExecPolicy defines the policy for blocking or auditing executable execution + * in environments. + */ +export interface VetoExecPolicy { + /** + * action specifies what action kernel-level controls take on policy violations + */ + action?: KernelControlsAction; + + /** + * enabled controls whether executable blocking is active + */ + enabled?: boolean; + + /** + * executables is the list of executable paths or names to block + */ + executables?: Array; +} + export interface PolicyRetrieveResponse { policies: OrganizationPolicies; } @@ -389,10 +388,9 @@ export interface PolicyUpdateParams { editorVersionRestrictions?: { [key: string]: PolicyUpdateParams.EditorVersionRestrictions }; /** - * executable_deny_list contains executables that are blocked from execution in - * environments. + * executable_deny_list contains the veto exec policy for environments. */ - executableDenyList?: ExecutableDenyList | null; + executableDenyList?: VetoExecPolicy | null; /** * maximum_environment_lifetime controls for how long environments are allowed to @@ -548,10 +546,10 @@ export declare namespace Policies { export { type AgentPolicy as AgentPolicy, type CrowdStrikeConfig as CrowdStrikeConfig, - type ExecutableDenyList as ExecutableDenyList, type KernelControlsAction as KernelControlsAction, type OrganizationPolicies as OrganizationPolicies, type SecurityAgentPolicy as SecurityAgentPolicy, + type VetoExecPolicy as VetoExecPolicy, type PolicyRetrieveResponse as PolicyRetrieveResponse, type PolicyUpdateResponse as PolicyUpdateResponse, type PolicyRetrieveParams as PolicyRetrieveParams, From 516bdbe43b9a2113cf0450a15eebace0cbe01865 Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 16:03:23 +0000 Subject: [PATCH 10/12] codegen metadata --- .stats.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.stats.yml b/.stats.yml index c0da654..9d8e308 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-5a347cba895791d46a4d3c369e7fef031a03b8f8227e0724c09a087da5e245b5.yml -openapi_spec_hash: 8a302d9b615f3f84087acad858f2605a +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-04247bf988645580ef6550363a7279d67d7c844e4310b526b6868be92541199f.yml +openapi_spec_hash: b0f61f1a55a55a187447ff684bf51d3d config_hash: 469d30a2d44895c8c53a5aac370a56f1 From c35663cb7e948afedf70a45f014b0f125ad298af Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:05:40 +0000 Subject: [PATCH 11/12] codegen metadata --- .stats.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.stats.yml b/.stats.yml index 9d8e308..f91b512 100644 --- a/.stats.yml +++ b/.stats.yml @@ -1,4 +1,4 @@ configured_endpoints: 175 -openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-04247bf988645580ef6550363a7279d67d7c844e4310b526b6868be92541199f.yml -openapi_spec_hash: b0f61f1a55a55a187447ff684bf51d3d +openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-1923b5d3865532d64d80c22746aa63991bbf227cf1cbefc8cdb14a374c4c5b89.yml +openapi_spec_hash: 304200ebfa8622f5f6846895528f06e3 config_hash: 469d30a2d44895c8c53a5aac370a56f1 From d47b421958f3c4146384ff10c78e46e14d122efb Mon Sep 17 00:00:00 2001 From: "stainless-app[bot]" <142633134+stainless-app[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:05:56 +0000 Subject: [PATCH 12/12] release: 0.13.0 --- .release-please-manifest.json | 2 +- CHANGELOG.md | 20 ++++++++++++++++++++ package.json | 2 +- src/version.ts | 2 +- 4 files changed, 23 insertions(+), 3 deletions(-) diff --git a/.release-please-manifest.json b/.release-please-manifest.json index 8032c17..ed21d28 100644 --- a/.release-please-manifest.json +++ b/.release-please-manifest.json @@ -1,3 +1,3 @@ { - ".": "0.12.0" + ".": "0.13.0" } diff --git a/CHANGELOG.md b/CHANGELOG.md index cd75877..6590a4f 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,25 @@ # Changelog +## 0.13.0 (2026-02-18) + +Full Changelog: [v0.12.0...v0.13.0](https://github.com/gitpod-io/gitpod-sdk-typescript/compare/v0.12.0...v0.13.0) + +### Features + +* **api:** add auditOnly field to Veto.Exec and ExecutableDenyList ([08f9dd2](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/08f9dd245a02ef2d831521a86cf72bbb5bdab963)) +* **api:** add runner_side_agent capability to runners ([1451c46](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/1451c466af8c2f1a3b098090a98b958d94eb9024)) +* **api:** add WARMPOOL_ADMIN/WARMPOOL_VIEWER to ResourceRole ([04969a3](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/04969a38173ca22010780ab4b41b0bb8a4414eb7)) + + +### Bug Fixes + +* **types:** rename ExecutableDenyList to VetoExecPolicy in organization policies ([0ff5595](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/0ff5595a54b7f2cf3a16a49957686b4ed30891c5)) + + +### Chores + +* **internal/client:** fix form-urlencoded requests ([fd12303](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/fd12303e87a280fda1e2f8d84bf328b941393405)) + ## 0.12.0 (2026-02-11) Full Changelog: [v0.11.0...v0.12.0](https://github.com/gitpod-io/gitpod-sdk-typescript/compare/v0.11.0...v0.12.0) diff --git a/package.json b/package.json index 90ab367..0be4380 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "@gitpod/sdk", - "version": "0.12.0", + "version": "0.13.0", "description": "The official TypeScript library for the Gitpod API", "author": "Gitpod ", "types": "dist/index.d.ts", diff --git a/src/version.ts b/src/version.ts index ce6b899..9d013cc 100644 --- a/src/version.ts +++ b/src/version.ts @@ -1 +1 @@ -export const VERSION = '0.12.0'; // x-release-please-version +export const VERSION = '0.13.0'; // x-release-please-version