diff --git a/descriptions/api.github.com/api.github.com.2022-11-28.json b/descriptions/api.github.com/api.github.com.2022-11-28.json index 02b0eb4947..eebfa4e009 100644 --- a/descriptions/api.github.com/api.github.com.2022-11-28.json +++ b/descriptions/api.github.com/api.github.com.2022-11-28.json @@ -19168,13 +19168,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -19182,12 +19184,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -49343,7 +49347,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -49479,7 +49483,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -113269,6 +113273,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -130030,7 +130042,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -130039,7 +130051,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -165035,6 +165048,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -165844,6 +165864,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ diff --git a/descriptions/api.github.com/api.github.com.2022-11-28.yaml b/descriptions/api.github.com/api.github.com.2022-11-28.yaml index 44d076a25f..6c6a9a552d 100644 --- a/descriptions/api.github.com/api.github.com.2022-11-28.yaml +++ b/descriptions/api.github.com/api.github.com.2022-11-28.yaml @@ -14203,11 +14203,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -14215,10 +14217,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -36233,7 +36237,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -36327,7 +36331,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -82316,6 +82320,13 @@ components: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access token to view and + manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access token to create, @@ -95771,7 +95782,7 @@ components: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. Required for - `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` + `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -95783,6 +95794,7 @@ components: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -122494,6 +122506,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -123111,6 +123128,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/api.github.com/api.github.com.2026-03-10.json b/descriptions/api.github.com/api.github.com.2026-03-10.json index 05cbeb9c6d..b973371852 100644 --- a/descriptions/api.github.com/api.github.com.2026-03-10.json +++ b/descriptions/api.github.com/api.github.com.2026-03-10.json @@ -19167,13 +19167,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -19181,12 +19183,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -49270,7 +49274,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -49406,7 +49410,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -113120,6 +113124,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -129496,7 +129508,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -129505,7 +129517,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -164609,6 +164622,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -165418,6 +165438,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ diff --git a/descriptions/api.github.com/api.github.com.2026-03-10.yaml b/descriptions/api.github.com/api.github.com.2026-03-10.yaml index 01a3e08888..e5f9a4221a 100644 --- a/descriptions/api.github.com/api.github.com.2026-03-10.yaml +++ b/descriptions/api.github.com/api.github.com.2026-03-10.yaml @@ -14201,11 +14201,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -14213,10 +14215,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -36173,7 +36177,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -36267,7 +36271,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -82191,6 +82195,13 @@ components: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access token to view and + manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access token to create, @@ -95347,7 +95358,7 @@ components: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. Required for - `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` + `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -95359,6 +95370,7 @@ components: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -122148,6 +122160,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -122765,6 +122782,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/api.github.com/api.github.com.json b/descriptions/api.github.com/api.github.com.json index 082264c5e6..dc348d1914 100644 --- a/descriptions/api.github.com/api.github.com.json +++ b/descriptions/api.github.com/api.github.com.json @@ -19214,13 +19214,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -19228,12 +19230,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -49603,7 +49607,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -49739,7 +49743,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -113752,6 +113756,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -131018,7 +131030,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -131027,7 +131039,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -166506,6 +166519,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -167315,6 +167335,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ diff --git a/descriptions/api.github.com/api.github.com.yaml b/descriptions/api.github.com/api.github.com.yaml index b01ef7d8cd..58890e38da 100644 --- a/descriptions/api.github.com/api.github.com.yaml +++ b/descriptions/api.github.com/api.github.com.yaml @@ -14228,11 +14228,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -14240,10 +14242,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -36371,7 +36375,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -36465,7 +36469,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -82606,6 +82610,13 @@ components: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access token to view and + manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access token to create, @@ -96451,7 +96462,7 @@ components: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. Required for - `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` + `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -96463,6 +96474,7 @@ components: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -123563,6 +123575,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -124180,6 +124197,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json index 6f60518eba..0292e31e4b 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json @@ -7923,6 +7923,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -8916,6 +8924,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9763,6 +9779,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10241,6 +10265,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -12289,6 +12321,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13333,6 +13373,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14294,6 +14342,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14966,6 +15022,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -99623,13 +99687,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -99637,12 +99703,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -146894,6 +146962,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -147902,6 +147978,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -210211,7 +210295,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -210220,7 +210304,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -211635,7 +211720,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -211644,7 +211729,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -212856,7 +212942,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -212865,7 +212951,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -214931,7 +215018,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -214940,7 +215027,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -216380,7 +216468,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -216389,7 +216477,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -217597,7 +217686,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -217606,7 +217695,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -307864,7 +307954,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -308328,7 +308418,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -381397,6 +381487,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -534099,7 +534197,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -534108,7 +534206,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -535531,7 +535630,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -535540,7 +535639,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -536601,7 +536701,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -536610,7 +536710,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -538695,7 +538796,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -538704,7 +538805,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -540142,7 +540244,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -540151,7 +540253,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -541208,7 +541311,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -541217,7 +541320,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -612428,6 +612532,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -691743,6 +691855,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -767864,6 +767984,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -770265,6 +770392,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -884405,6 +884539,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -887019,6 +887161,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -889540,6 +889690,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -892061,6 +892219,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -894714,6 +894880,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -897374,6 +897548,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -901671,6 +901853,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1324604,7 +1324794,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1324613,7 +1324803,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1327543,7 +1327734,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1327552,7 +1327743,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1330482,7 +1330674,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1330491,7 +1330683,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml index 2783c9007f..f303100507 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml @@ -4768,6 +4768,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -29044,11 +29051,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -29056,10 +29065,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -49709,8 +49720,8 @@ paths: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, + Required for `Integration`, `RepositoryRole`, `Team`, + and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -49722,6 +49733,7 @@ paths: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -69971,7 +69983,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -70099,7 +70111,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -121207,6 +121219,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -121894,6 +121911,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json index 865dac4670..301528dad1 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json @@ -7859,6 +7859,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -8852,6 +8860,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9699,6 +9715,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10177,6 +10201,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -12208,6 +12240,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13252,6 +13292,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14213,6 +14261,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14885,6 +14941,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -96231,13 +96295,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -96245,12 +96311,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -143129,6 +143197,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -144137,6 +144213,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -204373,7 +204457,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -204382,7 +204466,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -205797,7 +205882,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -205806,7 +205891,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -207018,7 +207104,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -207027,7 +207113,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -209093,7 +209180,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -209102,7 +209189,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -210542,7 +210630,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -210551,7 +210639,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -211759,7 +211848,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -211768,7 +211857,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -301732,7 +301822,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -302196,7 +302286,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -374652,6 +374742,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -523435,7 +523533,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -523444,7 +523542,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -524867,7 +524966,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -524876,7 +524975,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -525937,7 +526037,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -525946,7 +526046,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -528031,7 +528132,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -528040,7 +528141,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -529478,7 +529580,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -529487,7 +529589,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -530544,7 +530647,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -530553,7 +530656,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -601253,6 +601357,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -677643,6 +677755,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -752705,6 +752825,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -755094,6 +755221,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -868272,6 +868406,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -870874,6 +871016,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -873383,6 +873533,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -875892,6 +876050,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -878533,6 +878699,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -881181,6 +881355,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -885454,6 +885636,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1304278,7 +1304468,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1304287,7 +1304477,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1307205,7 +1307396,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1307214,7 +1307405,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1310132,7 +1310324,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1310141,7 +1310333,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml index 907acb7d56..0a8f847319 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml @@ -4736,6 +4736,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -28729,11 +28736,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -28741,10 +28750,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -49342,8 +49353,8 @@ paths: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, + Required for `Integration`, `RepositoryRole`, `Team`, + and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -49355,6 +49366,7 @@ paths: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -69539,7 +69551,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -69667,7 +69679,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -120773,6 +120785,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -121460,6 +121477,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.deref.json index 1eb34b2436..d9efa4e192 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.json @@ -8047,6 +8047,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9040,6 +9048,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9901,6 +9917,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10379,6 +10403,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -12530,6 +12562,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13574,6 +13614,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14535,6 +14583,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15207,6 +15263,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -101701,13 +101765,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -101715,12 +101781,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -149449,6 +149517,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -150457,6 +150533,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -216565,7 +216649,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -216574,7 +216658,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -217989,7 +218074,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -217998,7 +218083,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -219210,7 +219296,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -219219,7 +219305,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -221285,7 +221372,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -221294,7 +221381,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -222734,7 +222822,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -222743,7 +222831,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -223951,7 +224040,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -223960,7 +224049,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -315489,7 +315579,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -315953,7 +316043,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -390164,6 +390254,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -547925,7 +548023,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -547934,7 +548032,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -549357,7 +549456,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -549366,7 +549465,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -550427,7 +550527,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -550436,7 +550536,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -552521,7 +552622,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -552530,7 +552631,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -553968,7 +554070,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -553977,7 +554079,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -555034,7 +555137,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -555043,7 +555146,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -627927,6 +628031,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -711976,6 +712088,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -789745,6 +789865,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -792171,6 +792298,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -908047,6 +908181,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -910686,6 +910828,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -913232,6 +913382,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -915778,6 +915936,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -918456,6 +918622,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -921141,6 +921315,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -925488,6 +925670,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1355992,7 +1356182,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1356001,7 +1356191,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1358956,7 +1359147,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1358965,7 +1359156,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1361920,7 +1362112,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1361929,7 +1362121,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml index bedbf644e1..e16458fcff 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml @@ -4825,6 +4825,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -29337,11 +29344,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -29349,10 +29358,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -50177,8 +50188,8 @@ paths: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, + Required for `Integration`, `RepositoryRole`, `Team`, + and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -50190,6 +50201,7 @@ paths: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -70612,7 +70624,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -70740,7 +70752,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -122175,6 +122187,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -122862,6 +122879,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json index bb6ccd915a..5e8415c469 100644 --- a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json +++ b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json @@ -7939,6 +7939,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -8321,6 +8329,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -8948,6 +8964,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9330,6 +9354,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -9811,6 +9843,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10193,6 +10233,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -10305,6 +10353,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10687,6 +10743,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -12369,6 +12433,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -12751,6 +12823,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -13429,6 +13509,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13811,6 +13899,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -14406,6 +14502,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14788,6 +14892,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -15094,6 +15206,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15476,6 +15596,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -31654,6 +31782,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -32036,6 +32172,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -32458,6 +32602,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -32840,6 +32992,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -33418,6 +33578,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -33800,6 +33968,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -34769,6 +34945,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -35151,6 +35335,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -54655,6 +54847,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -55037,6 +55237,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -60184,7 +60392,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -60195,7 +60403,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -61937,7 +62146,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -61948,7 +62157,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -63395,7 +63605,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -63406,7 +63616,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -64826,7 +65037,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -64837,7 +65048,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -66575,7 +66787,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -66586,7 +66798,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -146900,13 +147113,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -146914,12 +147129,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -200178,6 +200395,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -200560,6 +200785,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -201202,6 +201435,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -201584,6 +201825,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -264802,7 +265051,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -264813,7 +265062,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -266228,7 +266478,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -266239,7 +266489,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -267451,7 +267702,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -267462,7 +267713,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -269528,7 +269780,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -269539,7 +269791,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -270979,7 +271232,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -270990,7 +271243,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -272198,7 +272452,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -272209,7 +272463,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -365803,7 +366058,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -366267,7 +366522,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -443272,6 +443527,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -443654,6 +443917,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -596157,7 +596428,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -596168,7 +596439,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -597591,7 +597863,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -597602,7 +597874,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -598663,7 +598936,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -598674,7 +598947,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -600759,7 +601033,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -600770,7 +601044,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -602208,7 +602483,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -602219,7 +602494,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -603276,7 +603552,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -603287,7 +603563,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -685158,6 +685435,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -685540,6 +685825,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -764573,6 +764866,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -764955,6 +765256,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -850171,6 +850480,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -852572,6 +852888,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -997936,6 +998259,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -998318,6 +998649,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1000566,6 +1000905,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1000948,6 +1001295,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1003103,6 +1003458,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1003485,6 +1003848,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1005640,6 +1006011,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1006022,6 +1006401,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1008309,6 +1008696,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1008691,6 +1009086,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1010985,6 +1011388,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1011367,6 +1011778,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1015298,6 +1015717,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1015680,6 +1016107,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1439839,7 +1440274,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1439850,7 +1440285,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -1442780,7 +1443216,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1442791,7 +1443227,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -1445721,7 +1446158,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1445732,7 +1446169,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, diff --git a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml index 031c89e8c2..546f37e339 100644 --- a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml +++ b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml @@ -4777,6 +4777,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -5127,6 +5134,13 @@ paths: enum: - read - write + enterprise_administration: + type: string + description: The level of permission to grant the access + token to administer an enterprise account. + enum: + - read + - write enterprise_custom_properties_for_organizations: type: string description: The level of permission to grant the access @@ -23962,10 +23976,10 @@ paths: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` - is ignored. If `actor_type` is `DeployKey`, this should - be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + Required for `Integration`, `RepositoryRole`, `Team`, and + `User` actor types. If `actor_type` is `OrganizationAdmin`, + `actor_id` is ignored. If `actor_type` is `DeployKey`, this + should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories. actor_type: @@ -23978,6 +23992,7 @@ paths: - DeployKey - EnterpriseOwner - EnterpriseRole + - User description: The type of actor that can bypass a ruleset bypass_mode: type: string @@ -43250,11 +43265,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -43262,10 +43279,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -83288,7 +83307,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -83416,7 +83435,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -137790,6 +137809,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -138477,6 +138501,11 @@ x-webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.json b/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.json index 5d4d31e64f..56566956c5 100644 --- a/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.json +++ b/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.json @@ -7875,6 +7875,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -8257,6 +8265,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -8884,6 +8900,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9266,6 +9290,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -9747,6 +9779,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10129,6 +10169,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -10241,6 +10289,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10623,6 +10679,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -12288,6 +12352,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -12670,6 +12742,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -13348,6 +13428,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13730,6 +13818,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -14325,6 +14421,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14707,6 +14811,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -15013,6 +15125,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15395,6 +15515,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -31539,6 +31667,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -31921,6 +32057,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -32343,6 +32487,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -32725,6 +32877,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -33303,6 +33463,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -33685,6 +33853,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -34654,6 +34830,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -35036,6 +35220,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -54514,6 +54706,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -54896,6 +55096,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -60043,7 +60251,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -60054,7 +60262,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -61796,7 +62005,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -61807,7 +62016,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -63254,7 +63464,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -63265,7 +63475,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -64685,7 +64896,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -64696,7 +64907,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -66434,7 +66646,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -66445,7 +66657,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -143273,13 +143486,15 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", - "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3" + "example": "https://reg.example.com/artifactory/bar/libfoo-1.2.3", + "maxLength": 152 }, "path": { "type": "string", "format": "uri", "description": "The path of the artifact.", - "example": "com/github/bar/libfoo-1.2.3" + "example": "com/github/bar/libfoo-1.2.3", + "maxLength": 512 }, "registry_url": { "type": "string", @@ -143287,12 +143502,14 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "example": "https://reg.example.com/artifactory/", - "minLength": 1 + "minLength": 1, + "maxLength": 256 }, "repository": { "type": "string", "description": "The repository name within the registry.", - "example": "bar" + "example": "bar", + "maxLength": 128 }, "status": { "type": "string", @@ -196178,6 +196395,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -196560,6 +196785,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -197202,6 +197435,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -197584,6 +197825,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -258717,7 +258966,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -258728,7 +258977,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -260143,7 +260393,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -260154,7 +260404,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -261366,7 +261617,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -261377,7 +261628,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -263443,7 +263695,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -263454,7 +263706,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -264894,7 +265147,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -264905,7 +265158,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -266113,7 +266367,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -266124,7 +266378,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -359424,7 +359679,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -359888,7 +360143,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -436280,6 +436535,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -436662,6 +436925,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -585246,7 +585517,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -585257,7 +585528,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -586680,7 +586952,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -586691,7 +586963,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -587752,7 +588025,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -587763,7 +588036,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -589848,7 +590122,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -589859,7 +590133,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -591297,7 +591572,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -591308,7 +591583,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -592365,7 +592641,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -592376,7 +592652,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -673736,6 +674013,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -674118,6 +674403,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -750214,6 +750507,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -750596,6 +750897,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -834693,6 +835002,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -837082,6 +837398,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -981304,6 +981627,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -981686,6 +982017,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -983922,6 +984261,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -984304,6 +984651,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -986447,6 +986802,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -986829,6 +987192,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -988972,6 +989343,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -989354,6 +989733,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -991629,6 +992016,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -992011,6 +992406,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -994293,6 +994696,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -994675,6 +995086,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -998582,6 +999001,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -998964,6 +999391,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1419014,7 +1419449,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1419025,7 +1419460,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -1421943,7 +1422379,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1421954,7 +1422390,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -1424872,7 +1425309,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1424883,7 +1425320,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, diff --git a/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.yaml b/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.yaml index 988817e0c2..0269f15fe4 100644 --- a/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.yaml +++ b/descriptions/ghec/dereferenced/ghec.2026-03-10.deref.yaml @@ -4745,6 +4745,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -5095,6 +5102,13 @@ paths: enum: - read - write + enterprise_administration: + type: string + description: The level of permission to grant the access + token to administer an enterprise account. + enum: + - read + - write enterprise_custom_properties_for_organizations: type: string description: The level of permission to grant the access @@ -23892,10 +23906,10 @@ paths: type: integer nullable: true description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` - is ignored. If `actor_type` is `DeployKey`, this should - be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + Required for `Integration`, `RepositoryRole`, `Team`, and + `User` actor types. If `actor_type` is `OrganizationAdmin`, + `actor_id` is ignored. If `actor_type` is `DeployKey`, this + should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories. actor_type: @@ -23908,6 +23922,7 @@ paths: - DeployKey - EnterpriseOwner - EnterpriseRole + - User description: The type of actor that can bypass a ruleset bypass_mode: type: string @@ -42855,11 +42870,13 @@ paths: pattern: "^https://" description: The URL where the artifact is stored. example: https://reg.example.com/artifactory/bar/libfoo-1.2.3 + maxLength: 152 path: type: string format: uri description: The path of the artifact. example: com/github/bar/libfoo-1.2.3 + maxLength: 512 registry_url: type: string format: uri @@ -42867,10 +42884,12 @@ paths: description: The base URL of the artifact registry. example: https://reg.example.com/artifactory/ minLength: 1 + maxLength: 256 repository: type: string description: The repository name within the registry. example: bar + maxLength: 128 status: type: string description: The status of the artifact (e.g., active, inactive). @@ -82845,7 +82864,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -82973,7 +82992,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -137345,6 +137364,11 @@ x-webhooks: enum: {"code":"deadline_exceeded","msg":"operation timed out"}