Use the REST API to manage rulesets for repositories. Rulesets control how people can interact with selected branches and tags in a repository.
Get rules for a branch
Returns all active rules that apply to the specified branch. The branch does not need to exist; rules that would apply to a branch with that name will be returned. All active rules that apply will be returned, regardless of the level at which they are configured (e.g. repository or organization). Rules in rulesets with "evaluate" or "disabled" enforcement statuses are not returned.
Fine-grained access tokens for "Get rules for a branch"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Metadata" repository permissions (read)
This endpoint can be used without authentication or the aforementioned permissions if only public resources are requested.
Parameters for "Get rules for a branch"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
The name of the branch. Cannot contain wildcard characters. To use wildcard characters in branch names, use the GraphQL API. |
| Name, Type, Description |
|---|
The number of results per page (max 100). For more information, see "Using pagination in the REST API." Default: |
The page number of the results to fetch. For more information, see "Using pagination in the REST API." Default: |
HTTP response status codes for "Get rules for a branch"
| Status code | Description |
|---|---|
200 | OK |
Code samples for "Get rules for a branch"
Request example
get
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rules/branches/BRANCH
Response
Status: 200
[
{
"type": "commit_message_pattern",
"ruleset_source_type": "Repository",
"ruleset_source": "monalisa/my-repo",
"ruleset_id": 42,
"parameters": {
"operator": "starts_with",
"pattern": "issue"
}
},
{
"type": "commit_author_email_pattern",
"ruleset_source_type": "Organization",
"ruleset_source": "my-org",
"ruleset_id": 73,
"parameters": {
"operator": "contains",
"pattern": "github"
}
}
]
Get all repository rulesets
Get all the rulesets for a repository.
Fine-grained access tokens for "Get all repository rulesets"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Metadata" repository permissions (read)
This endpoint can be used without authentication or the aforementioned permissions if only public resources are requested.
Parameters for "Get all repository rulesets"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
| Name, Type, Description |
|---|
The number of results per page (max 100). For more information, see "Using pagination in the REST API." Default: |
The page number of the results to fetch. For more information, see "Using pagination in the REST API." Default: |
Include rulesets configured at higher levels that apply to this repository Default: |
A comma-separated list of rule targets to filter by.
If provided, only rulesets that apply to the specified targets will be returned.
For example, |
HTTP response status codes for "Get all repository rulesets"
| Status code | Description |
|---|---|
200 | OK |
404 | Resource not found |
500 | Internal Error |
Code samples for "Get all repository rulesets"
Request example
get
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets
Response
Status: 200
[
{
"id": 42,
"name": "super cool ruleset",
"source_type": "Repository",
"source": "monalisa/my-repo",
"enforcement": "enabled",
"node_id": "RRS_lACkVXNlcgQB",
"_links": {
"self": {
"href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42"
},
"html": {
"href": "https://github.com/monalisa/my-repo/rules/42"
}
},
"created_at": "2023-07-15T08:43:03Z",
"updated_at": "2023-08-23T16:29:47Z"
},
{
"id": 314,
"name": "Another ruleset",
"source_type": "Repository",
"source": "monalisa/my-repo",
"enforcement": "enabled",
"node_id": "RRS_lACkVXNlcgQQ",
"_links": {
"self": {
"href": "https://api.github.com/repos/monalisa/my-repo/rulesets/314"
},
"html": {
"href": "https://github.com/monalisa/my-repo/rules/314"
}
},
"created_at": "2023-08-15T08:43:03Z",
"updated_at": "2023-09-23T16:29:47Z"
}
]
Create a repository ruleset
Create a ruleset for a repository.
Fine-grained access tokens for "Create a repository ruleset"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Administration" repository permissions (write)
Parameters for "Create a repository ruleset"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
| Name, Type, Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The name of the ruleset. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The target of the ruleset Default: Can be one of: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The enforcement level of the ruleset. Can be one of: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The actors that can bypass the rules in this ruleset | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Properties of |
| Name, Type, Description |
|---|
The ID of the actor that can bypass a ruleset. Required for |
The type of actor that can bypass a ruleset. Can be one of: |
When the specified actor can bypass the ruleset. Default: Can be one of: |
conditions object
Parameters for a repository ruleset ref name condition
Properties of conditions
| Name, Type, Description | |||
|---|---|---|---|
| |||
Properties of |
| Name, Type, Description |
|---|
Array of ref names or patterns to include. One of these patterns must match for the condition to pass. Also accepts |
Array of ref names or patterns to exclude. The condition will not pass if any of these patterns match. |
rules array of objects
An array of rules within the ruleset.
Can be one of these objects:
| Name, Type, Description | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Only allow users with bypass permission to create matching refs. | |||||||||||||||||||||
Properties of |
| Name, Type, Description |
|---|
Value: |
update object
Only allow users with bypass permission to update matching refs.
Properties of update
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
Branch can pull changes from its upstream repository |
deletion object
Only allow users with bypass permissions to delete matching refs.
Properties of deletion
| Name, Type, Description |
|---|
Value: |
required_linear_history object
Prevent merge commits from being pushed to matching refs.
Properties of required_linear_history
| Name, Type, Description |
|---|
Value: |
merge_queue object
Merges must be performed via a merge queue.
Properties of merge_queue
| Name, Type, Description | ||||||||
|---|---|---|---|---|---|---|---|---|
Value: | ||||||||
| ||||||||
Properties of |
| Name, Type, Description |
|---|
Maximum time for a required status check to report a conclusion. After this much time has elapsed, checks that have not reported a conclusion will be assumed to have failed |
When set to ALLGREEN, the merge commit created by merge queue for each PR in the group must pass all required checks to merge. When set to HEADGREEN, only the commit at the head of the merge group, i.e. the commit containing changes from all of the PRs in the group, must pass its required checks to merge. Can be one of: |
Limit the number of queued pull requests requesting checks and workflow runs at the same time. |
The maximum number of PRs that will be merged together in a group. |
Method to use when merging changes from queued pull requests. Can be one of: |
The minimum number of PRs that will be merged together in a group. |
The time merge queue should wait after the first PR is added to the queue for the minimum group size to be met. After this time has elapsed, the minimum group size will be ignored and a smaller group will be merged. |
required_deployments object
Choose which environments must be successfully deployed to before refs can be pushed into a ref that matches this rule.
Properties of required_deployments
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The environments that must be successfully deployed to before branches can be merged. |
required_signatures object
Commits pushed to matching refs must have verified signatures.
Properties of required_signatures
| Name, Type, Description |
|---|
Value: |
pull_request object
Require all commits be made to a non-target branch and submitted via a pull request before they can be merged.
Properties of pull_request
| Name, Type, Description | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Value: | |||||||||||||||||
| |||||||||||||||||
Properties of |
| Name, Type, Description | ||||||||
|---|---|---|---|---|---|---|---|---|
Array of allowed merge methods. Allowed values include | ||||||||
New, reviewable commits pushed will dismiss previous pull request review approvals. | ||||||||
Require an approving review in pull requests that modify files that have a designated code owner. | ||||||||
Whether the most recent reviewable push must be approved by someone other than the person who pushed it. | ||||||||
The number of approving reviews that are required before a pull request can be merged. | ||||||||
All conversations on code must be resolved before a pull request can be merged. | ||||||||
Note
A collection of reviewers and associated file patterns. Each reviewer has a list of file patterns which determine the files that reviewer is required to review. | ||||||||
Properties of |
| Name, Type, Description | |||
|---|---|---|---|
Array of file patterns. Pull requests which change matching files must be approved by the specified team. File patterns use fnmatch syntax. | |||
Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional. | |||
A required reviewing team | |||
Properties of |
| Name, Type, Description |
|---|
ID of the reviewer which must review changes to matching files. |
The type of the reviewer Value: |
required_status_checks object
Choose which status checks must pass before the ref is updated. When enabled, commits must first be pushed to another ref where the checks pass.
Properties of required_status_checks
| Name, Type, Description | ||||||||
|---|---|---|---|---|---|---|---|---|
Value: | ||||||||
| ||||||||
Properties of |
| Name, Type, Description | |||
|---|---|---|---|
Allow repositories and branches to be created if a check would otherwise prohibit it. | |||
Status checks that are required. | |||
Properties of |
| Name, Type, Description |
|---|
The status check context name that must be present on the commit. |
The optional integration ID that this status check must originate from. |
strict_required_status_checks_policy boolean Required
Whether pull requests targeting a matching branch must be tested with the latest code. This setting will not take effect unless at least one status check is enabled.
non_fast_forward object
Prevent users with push access from force pushing to refs.
Properties of non_fast_forward
| Name, Type, Description |
|---|
Value: |
commit_message_pattern object
Parameters to be used for the commit_message_pattern rule
Properties of commit_message_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
commit_author_email_pattern object
Parameters to be used for the commit_author_email_pattern rule
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
committer_email_pattern object
Parameters to be used for the committer_email_pattern rule
Properties of committer_email_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
branch_name_pattern object
Parameters to be used for the branch_name_pattern rule
Properties of branch_name_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
tag_name_pattern object
Parameters to be used for the tag_name_pattern rule
Properties of tag_name_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
file_path_restriction object
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
Properties of file_path_restriction
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The file paths that are restricted from being pushed to the commit graph. |
max_file_path_length object
Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
Properties of max_file_path_length
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The maximum amount of characters allowed in file paths. |
file_extension_restriction object
Prevent commits that include files with specified file extensions from being pushed to the commit graph.
Properties of file_extension_restriction
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The file extensions that are restricted from being pushed to the commit graph. |
max_file_size object
Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
Properties of max_file_size
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS). |
workflows object
Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
Properties of workflows
| Name, Type, Description | |||||||||
|---|---|---|---|---|---|---|---|---|---|
Value: | |||||||||
| |||||||||
Properties of |
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Allow repositories and branches to be created if a check would otherwise prohibit it. | |||||
Workflows that must pass for this rule to pass. | |||||
Properties of |
| Name, Type, Description |
|---|
The path to the workflow file |
The ref (branch or tag) of the workflow file to use |
The ID of the repository where the workflow is defined |
The commit SHA of the workflow file to use |
code_scanning object
Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
Properties of code_scanning
| Name, Type, Description | |||||||
|---|---|---|---|---|---|---|---|
Value: | |||||||
| |||||||
Properties of |
| Name, Type, Description | ||||
|---|---|---|---|---|
Tools that must provide code scanning results for this rule to pass. | ||||
Properties of |
| Name, Type, Description |
|---|
The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see "About code scanning alerts." Can be one of: |
The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see "About code scanning alerts." Can be one of: |
The name of a code scanning tool |
copilot_code_review object
Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
Properties of copilot_code_review
| Name, Type, Description | |||
|---|---|---|---|
Value: | |||
| |||
Properties of |
| Name, Type, Description |
|---|
Copilot automatically reviews draft pull requests before they are marked as ready for review. |
Copilot automatically reviews each new push to the pull request. |
HTTP response status codes for "Create a repository ruleset"
| Status code | Description |
|---|---|
201 | Created |
404 | Resource not found |
422 | Validation failed, or the endpoint has been spammed. |
500 | Internal Error |
Code samples for "Create a repository ruleset"
Request example
post
curl -L \
-X POST \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets \
-d '{"name":"super cool ruleset","target":"branch","enforcement":"active","bypass_actors":[{"actor_id":234,"actor_type":"Team","bypass_mode":"always"}],"conditions":{"ref_name":{"include":["refs/heads/main","refs/heads/master"],"exclude":["refs/heads/dev*"]}},"rules":[{"type":"commit_author_email_pattern","parameters":{"operator":"contains","pattern":"github"}}]}'
Response
Status: 201
{
"id": 42,
"name": "super cool ruleset",
"target": "branch",
"source_type": "Repository",
"source": "monalisa/my-repo",
"enforcement": "active",
"bypass_actors": [
{
"actor_id": 234,
"actor_type": "Team",
"bypass_mode": "always"
}
],
"conditions": {
"ref_name": {
"include": [
"refs/heads/main",
"refs/heads/master"
],
"exclude": [
"refs/heads/dev*"
]
}
},
"rules": [
{
"type": "commit_author_email_pattern",
"parameters": {
"operator": "contains",
"pattern": "github"
}
}
],
"node_id": "RRS_lACkVXNlcgQB",
"_links": {
"self": {
"href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42"
},
"html": {
"href": "https://github.com/monalisa/my-repo/rules/42"
}
},
"created_at": "2023-07-15T08:43:03Z",
"updated_at": "2023-08-23T16:29:47Z"
}
Get a repository ruleset
Get a ruleset for a repository.
Note: To prevent leaking sensitive information, the bypass_actors property is only returned if the user
making the API request has write access to the ruleset.
Fine-grained access tokens for "Get a repository ruleset"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Metadata" repository permissions (read)
This endpoint can be used without authentication or the aforementioned permissions if only public resources are requested.
Parameters for "Get a repository ruleset"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
The ID of the ruleset. |
| Name, Type, Description |
|---|
Include rulesets configured at higher levels that apply to this repository Default: |
HTTP response status codes for "Get a repository ruleset"
| Status code | Description |
|---|---|
200 | OK |
404 | Resource not found |
500 | Internal Error |
Code samples for "Get a repository ruleset"
Request example
get
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID
Response
Status: 200
{
"id": 42,
"name": "super cool ruleset",
"target": "branch",
"source_type": "Repository",
"source": "monalisa/my-repo",
"enforcement": "active",
"bypass_actors": [
{
"actor_id": 234,
"actor_type": "Team",
"bypass_mode": "always"
}
],
"conditions": {
"ref_name": {
"include": [
"refs/heads/main",
"refs/heads/master"
],
"exclude": [
"refs/heads/dev*"
]
}
},
"rules": [
{
"type": "commit_author_email_pattern",
"parameters": {
"operator": "contains",
"pattern": "github"
}
}
],
"node_id": "RRS_lACkVXNlcgQB",
"_links": {
"self": {
"href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42"
},
"html": {
"href": "https://github.com/monalisa/my-repo/rules/42"
}
},
"created_at": "2023-07-15T08:43:03Z",
"updated_at": "2023-08-23T16:29:47Z"
}
Update a repository ruleset
Update a ruleset for a repository.
Fine-grained access tokens for "Update a repository ruleset"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Administration" repository permissions (write)
Parameters for "Update a repository ruleset"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
The ID of the ruleset. |
| Name, Type, Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The name of the ruleset. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The target of the ruleset Can be one of: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The enforcement level of the ruleset. Can be one of: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The actors that can bypass the rules in this ruleset | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Properties of |
| Name, Type, Description |
|---|
The ID of the actor that can bypass a ruleset. Required for |
The type of actor that can bypass a ruleset. Can be one of: |
When the specified actor can bypass the ruleset. Default: Can be one of: |
conditions object
Parameters for a repository ruleset ref name condition
Properties of conditions
| Name, Type, Description | |||
|---|---|---|---|
| |||
Properties of |
| Name, Type, Description |
|---|
Array of ref names or patterns to include. One of these patterns must match for the condition to pass. Also accepts |
Array of ref names or patterns to exclude. The condition will not pass if any of these patterns match. |
rules array of objects
An array of rules within the ruleset.
Can be one of these objects:
| Name, Type, Description | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Only allow users with bypass permission to create matching refs. | |||||||||||||||||||||
Properties of |
| Name, Type, Description |
|---|
Value: |
update object
Only allow users with bypass permission to update matching refs.
Properties of update
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
Branch can pull changes from its upstream repository |
deletion object
Only allow users with bypass permissions to delete matching refs.
Properties of deletion
| Name, Type, Description |
|---|
Value: |
required_linear_history object
Prevent merge commits from being pushed to matching refs.
Properties of required_linear_history
| Name, Type, Description |
|---|
Value: |
merge_queue object
Merges must be performed via a merge queue.
Properties of merge_queue
| Name, Type, Description | ||||||||
|---|---|---|---|---|---|---|---|---|
Value: | ||||||||
| ||||||||
Properties of |
| Name, Type, Description |
|---|
Maximum time for a required status check to report a conclusion. After this much time has elapsed, checks that have not reported a conclusion will be assumed to have failed |
When set to ALLGREEN, the merge commit created by merge queue for each PR in the group must pass all required checks to merge. When set to HEADGREEN, only the commit at the head of the merge group, i.e. the commit containing changes from all of the PRs in the group, must pass its required checks to merge. Can be one of: |
Limit the number of queued pull requests requesting checks and workflow runs at the same time. |
The maximum number of PRs that will be merged together in a group. |
Method to use when merging changes from queued pull requests. Can be one of: |
The minimum number of PRs that will be merged together in a group. |
The time merge queue should wait after the first PR is added to the queue for the minimum group size to be met. After this time has elapsed, the minimum group size will be ignored and a smaller group will be merged. |
required_deployments object
Choose which environments must be successfully deployed to before refs can be pushed into a ref that matches this rule.
Properties of required_deployments
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The environments that must be successfully deployed to before branches can be merged. |
required_signatures object
Commits pushed to matching refs must have verified signatures.
Properties of required_signatures
| Name, Type, Description |
|---|
Value: |
pull_request object
Require all commits be made to a non-target branch and submitted via a pull request before they can be merged.
Properties of pull_request
| Name, Type, Description | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Value: | |||||||||||||||||
| |||||||||||||||||
Properties of |
| Name, Type, Description | ||||||||
|---|---|---|---|---|---|---|---|---|
Array of allowed merge methods. Allowed values include | ||||||||
New, reviewable commits pushed will dismiss previous pull request review approvals. | ||||||||
Require an approving review in pull requests that modify files that have a designated code owner. | ||||||||
Whether the most recent reviewable push must be approved by someone other than the person who pushed it. | ||||||||
The number of approving reviews that are required before a pull request can be merged. | ||||||||
All conversations on code must be resolved before a pull request can be merged. | ||||||||
Note
A collection of reviewers and associated file patterns. Each reviewer has a list of file patterns which determine the files that reviewer is required to review. | ||||||||
Properties of |
| Name, Type, Description | |||
|---|---|---|---|
Array of file patterns. Pull requests which change matching files must be approved by the specified team. File patterns use fnmatch syntax. | |||
Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional. | |||
A required reviewing team | |||
Properties of |
| Name, Type, Description |
|---|
ID of the reviewer which must review changes to matching files. |
The type of the reviewer Value: |
required_status_checks object
Choose which status checks must pass before the ref is updated. When enabled, commits must first be pushed to another ref where the checks pass.
Properties of required_status_checks
| Name, Type, Description | ||||||||
|---|---|---|---|---|---|---|---|---|
Value: | ||||||||
| ||||||||
Properties of |
| Name, Type, Description | |||
|---|---|---|---|
Allow repositories and branches to be created if a check would otherwise prohibit it. | |||
Status checks that are required. | |||
Properties of |
| Name, Type, Description |
|---|
The status check context name that must be present on the commit. |
The optional integration ID that this status check must originate from. |
strict_required_status_checks_policy boolean Required
Whether pull requests targeting a matching branch must be tested with the latest code. This setting will not take effect unless at least one status check is enabled.
non_fast_forward object
Prevent users with push access from force pushing to refs.
Properties of non_fast_forward
| Name, Type, Description |
|---|
Value: |
commit_message_pattern object
Parameters to be used for the commit_message_pattern rule
Properties of commit_message_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
commit_author_email_pattern object
Parameters to be used for the commit_author_email_pattern rule
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
committer_email_pattern object
Parameters to be used for the committer_email_pattern rule
Properties of committer_email_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
branch_name_pattern object
Parameters to be used for the branch_name_pattern rule
Properties of branch_name_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
tag_name_pattern object
Parameters to be used for the tag_name_pattern rule
Properties of tag_name_pattern
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Value: | |||||
| |||||
Properties of |
| Name, Type, Description |
|---|
How this rule appears when configuring it. |
If true, the rule will fail if the pattern matches. |
The operator to use for matching. Can be one of: |
The pattern to match with. |
file_path_restriction object
Prevent commits that include changes in specified file and folder paths from being pushed to the commit graph. This includes absolute paths that contain file names.
Properties of file_path_restriction
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The file paths that are restricted from being pushed to the commit graph. |
max_file_path_length object
Prevent commits that include file paths that exceed the specified character limit from being pushed to the commit graph.
Properties of max_file_path_length
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The maximum amount of characters allowed in file paths. |
file_extension_restriction object
Prevent commits that include files with specified file extensions from being pushed to the commit graph.
Properties of file_extension_restriction
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The file extensions that are restricted from being pushed to the commit graph. |
max_file_size object
Prevent commits with individual files that exceed the specified limit from being pushed to the commit graph.
Properties of max_file_size
| Name, Type, Description | ||
|---|---|---|
Value: | ||
| ||
Properties of |
| Name, Type, Description |
|---|
The maximum file size allowed in megabytes. This limit does not apply to Git Large File Storage (Git LFS). |
workflows object
Require all changes made to a targeted branch to pass the specified workflows before they can be merged.
Properties of workflows
| Name, Type, Description | |||||||||
|---|---|---|---|---|---|---|---|---|---|
Value: | |||||||||
| |||||||||
Properties of |
| Name, Type, Description | |||||
|---|---|---|---|---|---|
Allow repositories and branches to be created if a check would otherwise prohibit it. | |||||
Workflows that must pass for this rule to pass. | |||||
Properties of |
| Name, Type, Description |
|---|
The path to the workflow file |
The ref (branch or tag) of the workflow file to use |
The ID of the repository where the workflow is defined |
The commit SHA of the workflow file to use |
code_scanning object
Choose which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated.
Properties of code_scanning
| Name, Type, Description | |||||||
|---|---|---|---|---|---|---|---|
Value: | |||||||
| |||||||
Properties of |
| Name, Type, Description | ||||
|---|---|---|---|---|
Tools that must provide code scanning results for this rule to pass. | ||||
Properties of |
| Name, Type, Description |
|---|
The severity level at which code scanning results that raise alerts block a reference update. For more information on alert severity levels, see "About code scanning alerts." Can be one of: |
The severity level at which code scanning results that raise security alerts block a reference update. For more information on security severity levels, see "About code scanning alerts." Can be one of: |
The name of a code scanning tool |
copilot_code_review object
Request Copilot code review for new pull requests automatically if the author has access to Copilot code review and their premium requests quota has not reached the limit.
Properties of copilot_code_review
| Name, Type, Description | |||
|---|---|---|---|
Value: | |||
| |||
Properties of |
| Name, Type, Description |
|---|
Copilot automatically reviews draft pull requests before they are marked as ready for review. |
Copilot automatically reviews each new push to the pull request. |
HTTP response status codes for "Update a repository ruleset"
| Status code | Description |
|---|---|
200 | OK |
404 | Resource not found |
422 | Validation failed, or the endpoint has been spammed. |
500 | Internal Error |
Code samples for "Update a repository ruleset"
Request example
put
curl -L \
-X PUT \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID \
-d '{"name":"super cool ruleset","target":"branch","enforcement":"active","bypass_actors":[{"actor_id":234,"actor_type":"Team","bypass_mode":"always"}],"conditions":{"ref_name":{"include":["refs/heads/main","refs/heads/master"],"exclude":["refs/heads/dev*"]}},"rules":[{"type":"commit_author_email_pattern","parameters":{"operator":"contains","pattern":"github"}}]}'
Response
Status: 200
{
"id": 42,
"name": "super cool ruleset",
"target": "branch",
"source_type": "Repository",
"source": "monalisa/my-repo",
"enforcement": "active",
"bypass_actors": [
{
"actor_id": 234,
"actor_type": "Team",
"bypass_mode": "always"
}
],
"conditions": {
"ref_name": {
"include": [
"refs/heads/main",
"refs/heads/master"
],
"exclude": [
"refs/heads/dev*"
]
}
},
"rules": [
{
"type": "commit_author_email_pattern",
"parameters": {
"operator": "contains",
"pattern": "github"
}
}
],
"node_id": "RRS_lACkVXNlcgQB",
"_links": {
"self": {
"href": "https://api.github.com/repos/monalisa/my-repo/rulesets/42"
},
"html": {
"href": "https://github.com/monalisa/my-repo/rules/42"
}
},
"created_at": "2023-07-15T08:43:03Z",
"updated_at": "2023-08-23T16:29:47Z"
}
Delete a repository ruleset
Delete a ruleset for a repository.
Fine-grained access tokens for "Delete a repository ruleset"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Administration" repository permissions (write)
Parameters for "Delete a repository ruleset"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
The ID of the ruleset. |
HTTP response status codes for "Delete a repository ruleset"
| Status code | Description |
|---|---|
204 | No Content |
404 | Resource not found |
500 | Internal Error |
Code samples for "Delete a repository ruleset"
Request example
delete
curl -L \
-X DELETE \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID
Response
Get repository ruleset history
Get the history of a repository ruleset.
Fine-grained access tokens for "Get repository ruleset history"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Administration" repository permissions (write)
Parameters for "Get repository ruleset history"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
The ID of the ruleset. |
| Name, Type, Description |
|---|
The number of results per page (max 100). For more information, see "Using pagination in the REST API." Default: |
The page number of the results to fetch. For more information, see "Using pagination in the REST API." Default: |
HTTP response status codes for "Get repository ruleset history"
| Status code | Description |
|---|---|
200 | OK |
404 | Resource not found |
500 | Internal Error |
Code samples for "Get repository ruleset history"
Request example
get
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID/history
Response
Status: 200
[
{
"version_id": 3,
"actor": {
"id": 1,
"type": "User"
},
"updated_at": "2024-10-23T16:29:47Z"
},
{
"version_id": 2,
"actor": {
"id": 2,
"type": "User"
},
"updated_at": "2024-09-23T16:29:47Z"
},
{
"version_id": 1,
"actor": {
"id": 1,
"type": "User"
},
"updated_at": "2024-08-23T16:29:47Z"
}
]
Get repository ruleset version
Get a version of a repository ruleset.
Fine-grained access tokens for "Get repository ruleset version"
This endpoint works with the following fine-grained token types:
- GitHub App user access tokens
- GitHub App installation access tokens
- Fine-grained personal access tokens
The fine-grained token must have the following permission set:
- "Administration" repository permissions (write)
Parameters for "Get repository ruleset version"
| Name, Type, Description |
|---|
Setting to |
| Name, Type, Description |
|---|
The account owner of the repository. The name is not case sensitive. |
The name of the repository without the |
The ID of the ruleset. |
The ID of the version |
HTTP response status codes for "Get repository ruleset version"
| Status code | Description |
|---|---|
200 | OK |
404 | Resource not found |
500 | Internal Error |
Code samples for "Get repository ruleset version"
Request example
get
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2026-03-10" \
https://api.github.com/repos/OWNER/REPO/rulesets/RULESET_ID/history/VERSION_ID
Response
Status: 200
{
"version_id": 3,
"actor": {
"id": 1,
"type": "User"
},
"updated_at": "2024-10-23T16:29:47Z",
"state": {
"id": 42,
"name": "super cool ruleset",
"target": "branch",
"source_type": "Repository",
"source": "monalisa/my-repo",
"enforcement": "active",
"bypass_actors": [
{
"actor_id": 234,
"actor_type": "Team",
"bypass_mode": "always"
}
],
"conditions": {
"ref_name": {
"include": [
"refs/heads/main",
"refs/heads/master"
],
"exclude": [
"refs/heads/dev*"
]
}
},
"rules": [
{
"type": "commit_author_email_pattern",
"parameters": {
"operator": "contains",
"pattern": "github"
}
}
]
}
}