Skip to content

Commit c8d2951

Browse files
release: 0.13.0 (#92)
* codegen metadata * feat(api): add WARMPOOL_ADMIN/WARMPOOL_VIEWER to ResourceRole * codegen metadata * feat(api): add runner_side_agent capability to runners * codegen metadata * codegen metadata * chore(internal/client): fix form-urlencoded requests * feat(api): add auditOnly field to Veto.Exec and ExecutableDenyList * fix(types): rename ExecutableDenyList to VetoExecPolicy in organization policies * codegen metadata * codegen metadata * release: 0.13.0 --------- Co-authored-by: stainless-app[bot] <142633134+stainless-app[bot]@users.noreply.github.com>
1 parent e5d4d41 commit c8d2951

File tree

14 files changed

+90
-33
lines changed

14 files changed

+90
-33
lines changed

.release-please-manifest.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
{
2-
".": "0.12.0"
2+
".": "0.13.0"
33
}

.stats.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
configured_endpoints: 175
2-
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-8f6ee769411e2d21a2f437d49eb2f16880fcef0db52ac1985f2a3963af45f6a0.yml
3-
openapi_spec_hash: 28f2d9d7e36f1f0ecd13052054449249
4-
config_hash: 3f1278a7a2a9285f57e81f148743e99e
2+
openapi_spec_url: https://storage.googleapis.com/stainless-sdk-openapi-specs/gitpod%2Fgitpod-1923b5d3865532d64d80c22746aa63991bbf227cf1cbefc8cdb14a374c4c5b89.yml
3+
openapi_spec_hash: 304200ebfa8622f5f6846895528f06e3
4+
config_hash: 469d30a2d44895c8c53a5aac370a56f1

CHANGELOG.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
# Changelog
22

3+
## 0.13.0 (2026-02-18)
4+
5+
Full Changelog: [v0.12.0...v0.13.0](https://github.com/gitpod-io/gitpod-sdk-typescript/compare/v0.12.0...v0.13.0)
6+
7+
### Features
8+
9+
* **api:** add auditOnly field to Veto.Exec and ExecutableDenyList ([08f9dd2](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/08f9dd245a02ef2d831521a86cf72bbb5bdab963))
10+
* **api:** add runner_side_agent capability to runners ([1451c46](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/1451c466af8c2f1a3b098090a98b958d94eb9024))
11+
* **api:** add WARMPOOL_ADMIN/WARMPOOL_VIEWER to ResourceRole ([04969a3](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/04969a38173ca22010780ab4b41b0bb8a4414eb7))
12+
13+
14+
### Bug Fixes
15+
16+
* **types:** rename ExecutableDenyList to VetoExecPolicy in organization policies ([0ff5595](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/0ff5595a54b7f2cf3a16a49957686b4ed30891c5))
17+
18+
19+
### Chores
20+
21+
* **internal/client:** fix form-urlencoded requests ([fd12303](https://github.com/gitpod-io/gitpod-sdk-typescript/commit/fd12303e87a280fda1e2f8d84bf328b941393405))
22+
323
## 0.12.0 (2026-02-11)
424

525
Full Changelog: [v0.11.0...v0.12.0](https://github.com/gitpod-io/gitpod-sdk-typescript/compare/v0.11.0...v0.12.0)

api.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -428,9 +428,10 @@ Types:
428428

429429
- <code><a href="./src/resources/organizations/policies.ts">AgentPolicy</a></code>
430430
- <code><a href="./src/resources/organizations/policies.ts">CrowdStrikeConfig</a></code>
431-
- <code><a href="./src/resources/organizations/policies.ts">ExecutableDenyList</a></code>
431+
- <code><a href="./src/resources/organizations/policies.ts">KernelControlsAction</a></code>
432432
- <code><a href="./src/resources/organizations/policies.ts">OrganizationPolicies</a></code>
433433
- <code><a href="./src/resources/organizations/policies.ts">SecurityAgentPolicy</a></code>
434+
- <code><a href="./src/resources/organizations/policies.ts">VetoExecPolicy</a></code>
434435
- <code><a href="./src/resources/organizations/policies.ts">PolicyRetrieveResponse</a></code>
435436
- <code><a href="./src/resources/organizations/policies.ts">PolicyUpdateResponse</a></code>
436437

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "@gitpod/sdk",
3-
"version": "0.12.0",
3+
"version": "0.13.0",
44
"description": "The official TypeScript library for the Gitpod API",
55
"author": "Gitpod <dev-feedback@gitpod.com>",
66
"types": "dist/index.d.ts",

src/client.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1076,6 +1076,14 @@ export class Gitpod {
10761076
(Symbol.iterator in body && 'next' in body && typeof body.next === 'function'))
10771077
) {
10781078
return { bodyHeaders: undefined, body: Shims.ReadableStreamFrom(body as AsyncIterable<Uint8Array>) };
1079+
} else if (
1080+
typeof body === 'object' &&
1081+
headers.values.get('content-type') === 'application/x-www-form-urlencoded'
1082+
) {
1083+
return {
1084+
bodyHeaders: { 'content-type': 'application/x-www-form-urlencoded' },
1085+
body: this.stringifyQuery(body as Record<string, unknown>),
1086+
};
10791087
} else {
10801088
return this.#encoder({ body, headers });
10811089
}

src/resources/environments/environments.ts

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ import * as EnvironmentsAPI from './environments';
55
import * as Shared from '../shared';
66
import * as ClassesAPI from './classes';
77
import { ClassListParams, Classes } from './classes';
8+
import * as PoliciesAPI from '../organizations/policies';
89
import * as ProjectsAPI from '../projects/projects';
910
import * as RunnersAPI from '../runners/runners';
1011
import * as AutomationsAPI from './automations/automations';
@@ -1517,6 +1518,11 @@ export namespace Veto {
15171518
* exec controls executable blocking
15181519
*/
15191520
export interface Exec {
1521+
/**
1522+
* action specifies what action kernel-level controls take on policy violations
1523+
*/
1524+
action?: PoliciesAPI.KernelControlsAction;
1525+
15201526
/**
15211527
* denylist is the list of executable paths or names to block
15221528
*/

src/resources/organizations/index.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,10 @@ export {
7272
Policies,
7373
type AgentPolicy,
7474
type CrowdStrikeConfig,
75-
type ExecutableDenyList,
75+
type KernelControlsAction,
7676
type OrganizationPolicies,
7777
type SecurityAgentPolicy,
78+
type VetoExecPolicy,
7879
type PolicyRetrieveResponse,
7980
type PolicyUpdateResponse,
8081
type PolicyRetrieveParams,

src/resources/organizations/organizations.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,14 +56,15 @@ import * as PoliciesAPI from './policies';
5656
import {
5757
AgentPolicy,
5858
CrowdStrikeConfig,
59-
ExecutableDenyList,
59+
KernelControlsAction,
6060
OrganizationPolicies,
6161
Policies,
6262
PolicyRetrieveParams,
6363
PolicyRetrieveResponse,
6464
PolicyUpdateParams,
6565
PolicyUpdateResponse,
6666
SecurityAgentPolicy,
67+
VetoExecPolicy,
6768
} from './policies';
6869
import * as ScimConfigurationsAPI from './scim-configurations';
6970
import {
@@ -1048,9 +1049,10 @@ export declare namespace Organizations {
10481049
Policies as Policies,
10491050
type AgentPolicy as AgentPolicy,
10501051
type CrowdStrikeConfig as CrowdStrikeConfig,
1051-
type ExecutableDenyList as ExecutableDenyList,
1052+
type KernelControlsAction as KernelControlsAction,
10521053
type OrganizationPolicies as OrganizationPolicies,
10531054
type SecurityAgentPolicy as SecurityAgentPolicy,
1055+
type VetoExecPolicy as VetoExecPolicy,
10541056
type PolicyRetrieveResponse as PolicyRetrieveResponse,
10551057
type PolicyUpdateResponse as PolicyUpdateResponse,
10561058
type PolicyRetrieveParams as PolicyRetrieveParams,

src/resources/organizations/policies.ts

Lines changed: 32 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -152,20 +152,12 @@ export interface CrowdStrikeConfig {
152152
}
153153

154154
/**
155-
* ExecutableDenyList contains executables that are blocked from execution in
156-
* environments.
155+
* KernelControlsAction defines how a kernel-level policy violation is handled.
157156
*/
158-
export interface ExecutableDenyList {
159-
/**
160-
* enabled controls whether executable blocking is active
161-
*/
162-
enabled?: boolean;
163-
164-
/**
165-
* executables is the list of executable paths or names to block
166-
*/
167-
executables?: Array<string>;
168-
}
157+
export type KernelControlsAction =
158+
| 'KERNEL_CONTROLS_ACTION_UNSPECIFIED'
159+
| 'KERNEL_CONTROLS_ACTION_BLOCK'
160+
| 'KERNEL_CONTROLS_ACTION_AUDIT';
169161

170162
export interface OrganizationPolicies {
171163
/**
@@ -261,10 +253,9 @@ export interface OrganizationPolicies {
261253
editorVersionRestrictions?: { [key: string]: OrganizationPolicies.EditorVersionRestrictions };
262254

263255
/**
264-
* executable_deny_list contains executables that are blocked from execution in
265-
* environments.
256+
* executable_deny_list contains the veto exec policy for environments.
266257
*/
267-
executableDenyList?: ExecutableDenyList;
258+
executableDenyList?: VetoExecPolicy;
268259

269260
/**
270261
* maximum_environment_lifetime controls for how long environments are allowed to
@@ -314,6 +305,27 @@ export interface SecurityAgentPolicy {
314305
crowdstrike?: CrowdStrikeConfig;
315306
}
316307

308+
/**
309+
* VetoExecPolicy defines the policy for blocking or auditing executable execution
310+
* in environments.
311+
*/
312+
export interface VetoExecPolicy {
313+
/**
314+
* action specifies what action kernel-level controls take on policy violations
315+
*/
316+
action?: KernelControlsAction;
317+
318+
/**
319+
* enabled controls whether executable blocking is active
320+
*/
321+
enabled?: boolean;
322+
323+
/**
324+
* executables is the list of executable paths or names to block
325+
*/
326+
executables?: Array<string>;
327+
}
328+
317329
export interface PolicyRetrieveResponse {
318330
policies: OrganizationPolicies;
319331
}
@@ -376,10 +388,9 @@ export interface PolicyUpdateParams {
376388
editorVersionRestrictions?: { [key: string]: PolicyUpdateParams.EditorVersionRestrictions };
377389

378390
/**
379-
* executable_deny_list contains executables that are blocked from execution in
380-
* environments.
391+
* executable_deny_list contains the veto exec policy for environments.
381392
*/
382-
executableDenyList?: ExecutableDenyList | null;
393+
executableDenyList?: VetoExecPolicy | null;
383394

384395
/**
385396
* maximum_environment_lifetime controls for how long environments are allowed to
@@ -535,9 +546,10 @@ export declare namespace Policies {
535546
export {
536547
type AgentPolicy as AgentPolicy,
537548
type CrowdStrikeConfig as CrowdStrikeConfig,
538-
type ExecutableDenyList as ExecutableDenyList,
549+
type KernelControlsAction as KernelControlsAction,
539550
type OrganizationPolicies as OrganizationPolicies,
540551
type SecurityAgentPolicy as SecurityAgentPolicy,
552+
type VetoExecPolicy as VetoExecPolicy,
541553
type PolicyRetrieveResponse as PolicyRetrieveResponse,
542554
type PolicyUpdateResponse as PolicyUpdateResponse,
543555
type PolicyRetrieveParams as PolicyRetrieveParams,

0 commit comments

Comments
 (0)