diff --git a/content/actions/how-tos/manage-runners/use-actions-runner-controller/deploy-runner-scale-sets.md b/content/actions/how-tos/manage-runners/use-actions-runner-controller/deploy-runner-scale-sets.md
index 1861b607827c..6ac597715cb7 100644
--- a/content/actions/how-tos/manage-runners/use-actions-runner-controller/deploy-runner-scale-sets.md
+++ b/content/actions/how-tos/manage-runners/use-actions-runner-controller/deploy-runner-scale-sets.md
@@ -624,9 +624,6 @@ containerMode:
type: "kubernetes-novolume"
```
->[!NOTE]
->When using `kubernetes-novolume` mode, the container must run as `root` to support lifecycle hook operations.
-
#### Troubleshooting Kubernetes mode
When Kubernetes mode is enabled, workflows that are not configured with a container job will fail with an error similar to:
diff --git a/content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/exporting-audit-log-activity-for-your-enterprise.md b/content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/exporting-audit-log-activity-for-your-enterprise.md
index 3cea49a85ad9..37f109b6fcbf 100644
--- a/content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/exporting-audit-log-activity-for-your-enterprise.md
+++ b/content/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/exporting-audit-log-activity-for-your-enterprise.md
@@ -20,9 +20,15 @@ You can export Git events data by downloading a JSON file from your enterprise a
{% data reusables.audit_log.git-events-export-limited %}
-{% data reusables.audit_log.exported-log-keys-and-values %}
+As an alternative to exporting log events, you can use the API to retrieve audit log events. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/using-the-audit-log-api-for-your-enterprise).
+
+### Export limits
+
+{% data reusables.audit_log.audit-log-enterprise-export-limit %}
-As an alternative to exporting log events, you can use the API to retrieve audit log events, or set up {% data variables.product.github %} to stream audit data as events are logged. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/using-the-audit-log-api-for-your-enterprise) and [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).
+### Exported log keys and values
+
+{% data reusables.audit_log.exported-log-keys-and-values %}
## Exporting audit log data
diff --git a/content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization.md b/content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization.md
index c955844de0a9..a09500380abc 100644
--- a/content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization.md
+++ b/content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization.md
@@ -174,6 +174,12 @@ You can identify all events that were performed by a specific access token. For
{% data reusables.audit_log.git-events-export-limited %}
+### Export limits
+
+{% data reusables.audit_log.audit-log-org-export-limit %}
+
+### Exported log keys and values
+
{% data reusables.audit_log.exported-log-keys-and-values %}
{% endif %}
diff --git a/data/reusables/audit_log/audit-log-enterprise-export-limit.md b/data/reusables/audit_log/audit-log-enterprise-export-limit.md
new file mode 100644
index 000000000000..759a247df722
--- /dev/null
+++ b/data/reusables/audit_log/audit-log-enterprise-export-limit.md
@@ -0,0 +1,13 @@
+{% ifversion ghec %}
+
+There is a hard limit when exporting the audit logs for your enterprise. These limits are either:
+
+* **100 MB** compressed file, or
+* **10 minutes** export processing time, or
+* **both**.
+
+To avoid these limits, we recommend filtering the audit log to a smaller dataset before exporting. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/searching-the-audit-log-for-your-enterprise).
+
+If you intend to review a large dataset of audit logs, we recommend streaming your logs to an external data management system. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).
+
+{% endif %}
diff --git a/data/reusables/audit_log/audit-log-org-export-limit.md b/data/reusables/audit_log/audit-log-org-export-limit.md
new file mode 100644
index 000000000000..c836e35aa32f
--- /dev/null
+++ b/data/reusables/audit_log/audit-log-org-export-limit.md
@@ -0,0 +1,15 @@
+{% ifversion fpt or ghec %}
+
+There is a hard limit when exporting the audit logs for your organization. These limits are either:
+
+* **100 MB** compressed file, or
+* **10 minutes** export processing time, or
+* **both**.
+
+To avoid these limits, we recommend reducing the audit log to a smaller dataset before exporting. For more information, see [AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#searching-the-audit-log).
+
+{% ifversion ghec %}
+If you intend to review a large dataset of audit logs, we recommend streaming your logs to an external data management system. For more information, see [AUTOTITLE](/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise).
+{% endif %}
+
+{% endif %}
diff --git a/src/graphql/data/fpt/changelog.json b/src/graphql/data/fpt/changelog.json
index 44071d6261a7..c1f4a98e5d8d 100644
--- a/src/graphql/data/fpt/changelog.json
+++ b/src/graphql/data/fpt/changelog.json
@@ -1,4 +1,22 @@
[
+ {
+ "schemaChanges": [
+ {
+ "title": "The GraphQL schema includes these changes:",
+ "changes": []
+ }
+ ],
+ "previewChanges": [],
+ "upcomingChanges": [
+ {
+ "title": "The following changes will be made to the schema:",
+ "changes": [
+ "
On member User.viewerRelevantRepositories:viewerRelevantRepositories will be removed. Use viewerCopilotChatRepositorySuggestions instead. Effective 2026-10-01.
"
+ ]
+ }
+ ],
+ "date": "2026-05-22"
+ },
{
"schemaChanges": [
{
diff --git a/src/graphql/data/fpt/graphql_upcoming_changes.public.yml b/src/graphql/data/fpt/graphql_upcoming_changes.public.yml
index 05cae13ff2fe..32cdfd9aba68 100644
--- a/src/graphql/data/fpt/graphql_upcoming_changes.public.yml
+++ b/src/graphql/data/fpt/graphql_upcoming_changes.public.yml
@@ -7998,6 +7998,14 @@ upcoming_changes:
date: '2026-07-01T00:00:00+00:00'
criticality: breaking
owner: peter-evans
+ - location: User.viewerRelevantRepositories
+ description:
+ '`viewerRelevantRepositories` will be removed. Use viewerCopilotChatRepositorySuggestions
+ instead.'
+ reason: '`viewerRelevantRepositories` has been renamed to `viewerCopilotChatRepositorySuggestions`.'
+ date: '2026-10-01T00:00:00+00:00'
+ criticality: breaking
+ owner: github/client-apps-platform
- location: Artifact.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
diff --git a/src/graphql/data/fpt/schema.docs.graphql b/src/graphql/data/fpt/schema.docs.graphql
index 29299fd32a86..f991c7077836 100644
--- a/src/graphql/data/fpt/schema.docs.graphql
+++ b/src/graphql/data/fpt/schema.docs.graphql
@@ -4968,7 +4968,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
-type CodeScanningParameters @docsCategory(name: "repos") {
+type CodeScanningParameters {
"""
Tools that must provide code scanning results for this rule to pass.
"""
@@ -4980,7 +4980,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
-input CodeScanningParametersInput @docsCategory(name: "repos") {
+input CodeScanningParametersInput {
"""
Tools that must provide code scanning results for this rule to pass.
"""
@@ -4990,7 +4990,7 @@ input CodeScanningParametersInput @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
-type CodeScanningTool @docsCategory(name: "repos") {
+type CodeScanningTool {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
@@ -5013,7 +5013,7 @@ type CodeScanningTool @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
-input CodeScanningToolInput @docsCategory(name: "repos") {
+input CodeScanningToolInput {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
@@ -43662,7 +43662,7 @@ type PullRequest implements Assignable & Closable & Comment & Labelable & Lockab
"""
Array of allowed merge methods. Allowed values include `merge`, `squash`, and `rebase`. At least one option must be enabled.
"""
-enum PullRequestAllowedMergeMethods @docsCategory(name: "pulls") {
+enum PullRequestAllowedMergeMethods {
"""
Add all commits from the head branch to the base branch with a merge commit.
"""
@@ -55696,7 +55696,7 @@ enum RepositoryRuleOrderField @docsCategory(name: "repos") {
"""
The rule types supported in rulesets
"""
-enum RepositoryRuleType @docsCategory(name: "repos") {
+enum RepositoryRuleType {
"""
Authorization
"""
@@ -57814,7 +57814,7 @@ enum RuleEnforcement @docsCategory(name: "repos") {
"""
Types which can be parameters for `RepositoryRule` objects.
"""
-union RuleParameters @docsCategory(name: "repos") =
+union RuleParameters =
| BranchNamePatternParameters
| CodeScanningParameters
| CommitAuthorEmailPatternParameters
@@ -57836,7 +57836,7 @@ union RuleParameters @docsCategory(name: "repos") =
"""
Specifies the parameters for a `RepositoryRule` object. Only one of the fields should be specified.
"""
-input RuleParametersInput @docsCategory(name: "repos") {
+input RuleParametersInput {
"""
Parameters used for the `branch_name_pattern` rule type
"""
diff --git a/src/graphql/data/fpt/schema.json b/src/graphql/data/fpt/schema.json
index 07c5fbcf19df..ee3b8dbefae7 100644
--- a/src/graphql/data/fpt/schema.json
+++ b/src/graphql/data/fpt/schema.json
@@ -13304,7 +13304,6 @@
"id": "codescanningparameters",
"href": "/graphql/reference/objects#codescanningparameters",
"description": "Choose which tools must provide code scanning results before the reference is\nupdated. When configured, code scanning must be enabled and have results for\nboth the commit and the reference being updated.
",
- "isDeprecated": false,
"fields": [
{
"name": "codeScanningTools",
@@ -13320,7 +13319,6 @@
"id": "codescanningtool",
"href": "/graphql/reference/objects#codescanningtool",
"description": "A tool that must provide code scanning results for this rule to pass.
",
- "isDeprecated": false,
"fields": [
{
"name": "alertsThreshold",
@@ -85567,7 +85565,6 @@
"id": "pullrequestallowedmergemethods",
"href": "/graphql/reference/enums#pullrequestallowedmergemethods",
"description": "Array of allowed merge methods. Allowed values include merge, squash, and rebase. At least one option must be enabled.
",
- "isDeprecated": false,
"values": [
{
"name": "MERGE",
@@ -86709,7 +86706,6 @@
"id": "repositoryruletype",
"href": "/graphql/reference/enums#repositoryruletype",
"description": "The rule types supported in rulesets.
",
- "isDeprecated": false,
"values": [
{
"name": "AUTHORIZATION",
@@ -91185,7 +91181,6 @@
"id": "ruleparameters",
"href": "/graphql/reference/unions#ruleparameters",
"description": "Types which can be parameters for RepositoryRule objects.
",
- "isDeprecated": false,
"possibleTypes": [
{
"name": "BranchNamePatternParameters",
@@ -93386,7 +93381,6 @@
"id": "codescanningparametersinput",
"href": "/graphql/reference/input-objects#codescanningparametersinput",
"description": "Choose which tools must provide code scanning results before the reference is\nupdated. When configured, code scanning must be enabled and have results for\nboth the commit and the reference being updated.
",
- "isDeprecated": false,
"inputFields": [
{
"name": "codeScanningTools",
@@ -93402,7 +93396,6 @@
"id": "codescanningtoolinput",
"href": "/graphql/reference/input-objects#codescanningtoolinput",
"description": "A tool that must provide code scanning results for this rule to pass.
",
- "isDeprecated": false,
"inputFields": [
{
"name": "alertsThreshold",
@@ -100774,7 +100767,6 @@
"id": "ruleparametersinput",
"href": "/graphql/reference/input-objects#ruleparametersinput",
"description": "Specifies the parameters for a RepositoryRule object. Only one of the fields should be specified.
",
- "isDeprecated": false,
"inputFields": [
{
"name": "branchNamePattern",
diff --git a/src/graphql/data/fpt/upcoming-changes.json b/src/graphql/data/fpt/upcoming-changes.json
index 012a481d8882..4404479ddde5 100644
--- a/src/graphql/data/fpt/upcoming-changes.json
+++ b/src/graphql/data/fpt/upcoming-changes.json
@@ -17,6 +17,16 @@
"owner": "github/actions-persistence"
}
],
+ "2026-10-01": [
+ {
+ "location": "User.viewerRelevantRepositories",
+ "description": "viewerRelevantRepositories will be removed. Use viewerCopilotChatRepositorySuggestions instead.
",
+ "reason": "viewerRelevantRepositories has been renamed to viewerCopilotChatRepositorySuggestions.
",
+ "date": "2026-10-01",
+ "criticality": "breaking",
+ "owner": "github/client-apps-platform"
+ }
+ ],
"2026-07-01": [
{
"location": "Team.viewerSubscription",
diff --git a/src/graphql/data/ghec/graphql_upcoming_changes.public.yml b/src/graphql/data/ghec/graphql_upcoming_changes.public.yml
index 05cae13ff2fe..32cdfd9aba68 100644
--- a/src/graphql/data/ghec/graphql_upcoming_changes.public.yml
+++ b/src/graphql/data/ghec/graphql_upcoming_changes.public.yml
@@ -7998,6 +7998,14 @@ upcoming_changes:
date: '2026-07-01T00:00:00+00:00'
criticality: breaking
owner: peter-evans
+ - location: User.viewerRelevantRepositories
+ description:
+ '`viewerRelevantRepositories` will be removed. Use viewerCopilotChatRepositorySuggestions
+ instead.'
+ reason: '`viewerRelevantRepositories` has been renamed to `viewerCopilotChatRepositorySuggestions`.'
+ date: '2026-10-01T00:00:00+00:00'
+ criticality: breaking
+ owner: github/client-apps-platform
- location: Artifact.databaseId
description: '`databaseId` will be removed. Use `fullDatabaseId` instead.'
reason:
diff --git a/src/graphql/data/ghec/schema.docs.graphql b/src/graphql/data/ghec/schema.docs.graphql
index 29299fd32a86..f991c7077836 100644
--- a/src/graphql/data/ghec/schema.docs.graphql
+++ b/src/graphql/data/ghec/schema.docs.graphql
@@ -4968,7 +4968,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
-type CodeScanningParameters @docsCategory(name: "repos") {
+type CodeScanningParameters {
"""
Tools that must provide code scanning results for this rule to pass.
"""
@@ -4980,7 +4980,7 @@ Choose which tools must provide code scanning results before the reference is
updated. When configured, code scanning must be enabled and have results for
both the commit and the reference being updated.
"""
-input CodeScanningParametersInput @docsCategory(name: "repos") {
+input CodeScanningParametersInput {
"""
Tools that must provide code scanning results for this rule to pass.
"""
@@ -4990,7 +4990,7 @@ input CodeScanningParametersInput @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
-type CodeScanningTool @docsCategory(name: "repos") {
+type CodeScanningTool {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
@@ -5013,7 +5013,7 @@ type CodeScanningTool @docsCategory(name: "repos") {
"""
A tool that must provide code scanning results for this rule to pass.
"""
-input CodeScanningToolInput @docsCategory(name: "repos") {
+input CodeScanningToolInput {
"""
The severity level at which code scanning results that raise alerts block a
reference update. For more information on alert severity levels, see "[About code scanning alerts](${externalDocsUrl}/code-security/code-scanning/managing-code-scanning-alerts/about-code-scanning-alerts#about-alert-severity-and-security-severity-levels)."
@@ -43662,7 +43662,7 @@ type PullRequest implements Assignable & Closable & Comment & Labelable & Lockab
"""
Array of allowed merge methods. Allowed values include `merge`, `squash`, and `rebase`. At least one option must be enabled.
"""
-enum PullRequestAllowedMergeMethods @docsCategory(name: "pulls") {
+enum PullRequestAllowedMergeMethods {
"""
Add all commits from the head branch to the base branch with a merge commit.
"""
@@ -55696,7 +55696,7 @@ enum RepositoryRuleOrderField @docsCategory(name: "repos") {
"""
The rule types supported in rulesets
"""
-enum RepositoryRuleType @docsCategory(name: "repos") {
+enum RepositoryRuleType {
"""
Authorization
"""
@@ -57814,7 +57814,7 @@ enum RuleEnforcement @docsCategory(name: "repos") {
"""
Types which can be parameters for `RepositoryRule` objects.
"""
-union RuleParameters @docsCategory(name: "repos") =
+union RuleParameters =
| BranchNamePatternParameters
| CodeScanningParameters
| CommitAuthorEmailPatternParameters
@@ -57836,7 +57836,7 @@ union RuleParameters @docsCategory(name: "repos") =
"""
Specifies the parameters for a `RepositoryRule` object. Only one of the fields should be specified.
"""
-input RuleParametersInput @docsCategory(name: "repos") {
+input RuleParametersInput {
"""
Parameters used for the `branch_name_pattern` rule type
"""
diff --git a/src/graphql/data/ghec/schema.json b/src/graphql/data/ghec/schema.json
index 07c5fbcf19df..ee3b8dbefae7 100644
--- a/src/graphql/data/ghec/schema.json
+++ b/src/graphql/data/ghec/schema.json
@@ -13304,7 +13304,6 @@
"id": "codescanningparameters",
"href": "/graphql/reference/objects#codescanningparameters",
"description": "Choose which tools must provide code scanning results before the reference is\nupdated. When configured, code scanning must be enabled and have results for\nboth the commit and the reference being updated.
",
- "isDeprecated": false,
"fields": [
{
"name": "codeScanningTools",
@@ -13320,7 +13319,6 @@
"id": "codescanningtool",
"href": "/graphql/reference/objects#codescanningtool",
"description": "A tool that must provide code scanning results for this rule to pass.
",
- "isDeprecated": false,
"fields": [
{
"name": "alertsThreshold",
@@ -85567,7 +85565,6 @@
"id": "pullrequestallowedmergemethods",
"href": "/graphql/reference/enums#pullrequestallowedmergemethods",
"description": "Array of allowed merge methods. Allowed values include merge, squash, and rebase. At least one option must be enabled.
",
- "isDeprecated": false,
"values": [
{
"name": "MERGE",
@@ -86709,7 +86706,6 @@
"id": "repositoryruletype",
"href": "/graphql/reference/enums#repositoryruletype",
"description": "The rule types supported in rulesets.
",
- "isDeprecated": false,
"values": [
{
"name": "AUTHORIZATION",
@@ -91185,7 +91181,6 @@
"id": "ruleparameters",
"href": "/graphql/reference/unions#ruleparameters",
"description": "Types which can be parameters for RepositoryRule objects.
",
- "isDeprecated": false,
"possibleTypes": [
{
"name": "BranchNamePatternParameters",
@@ -93386,7 +93381,6 @@
"id": "codescanningparametersinput",
"href": "/graphql/reference/input-objects#codescanningparametersinput",
"description": "Choose which tools must provide code scanning results before the reference is\nupdated. When configured, code scanning must be enabled and have results for\nboth the commit and the reference being updated.
",
- "isDeprecated": false,
"inputFields": [
{
"name": "codeScanningTools",
@@ -93402,7 +93396,6 @@
"id": "codescanningtoolinput",
"href": "/graphql/reference/input-objects#codescanningtoolinput",
"description": "A tool that must provide code scanning results for this rule to pass.
",
- "isDeprecated": false,
"inputFields": [
{
"name": "alertsThreshold",
@@ -100774,7 +100767,6 @@
"id": "ruleparametersinput",
"href": "/graphql/reference/input-objects#ruleparametersinput",
"description": "Specifies the parameters for a RepositoryRule object. Only one of the fields should be specified.
",
- "isDeprecated": false,
"inputFields": [
{
"name": "branchNamePattern",
diff --git a/src/graphql/data/ghec/upcoming-changes.json b/src/graphql/data/ghec/upcoming-changes.json
index 012a481d8882..4404479ddde5 100644
--- a/src/graphql/data/ghec/upcoming-changes.json
+++ b/src/graphql/data/ghec/upcoming-changes.json
@@ -17,6 +17,16 @@
"owner": "github/actions-persistence"
}
],
+ "2026-10-01": [
+ {
+ "location": "User.viewerRelevantRepositories",
+ "description": "viewerRelevantRepositories will be removed. Use viewerCopilotChatRepositorySuggestions instead.
",
+ "reason": "viewerRelevantRepositories has been renamed to viewerCopilotChatRepositorySuggestions.
",
+ "date": "2026-10-01",
+ "criticality": "breaking",
+ "owner": "github/client-apps-platform"
+ }
+ ],
"2026-07-01": [
{
"location": "Team.viewerSubscription",