diff --git a/descriptions-next/api.github.com/api.github.com.2022-11-28.json b/descriptions-next/api.github.com/api.github.com.2022-11-28.json index 2dedcafb5f..6cd2da3592 100644 --- a/descriptions-next/api.github.com/api.github.com.2022-11-28.json +++ b/descriptions-next/api.github.com/api.github.com.2022-11-28.json @@ -19258,6 +19258,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -19266,6 +19267,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -19276,6 +19278,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -19283,6 +19286,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -49551,7 +49555,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -49687,7 +49691,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -113969,6 +113973,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -131372,7 +131384,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -131381,7 +131393,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -168837,6 +168850,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -169676,6 +169696,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ diff --git a/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml b/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml index c8047b7a39..1effa3ad0b 100644 --- a/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml +++ b/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml @@ -14245,12 +14245,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -14259,11 +14261,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -36336,7 +36340,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -36430,7 +36434,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -82670,6 +82674,13 @@ components: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access token to view and + manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access token to create, @@ -95781,7 +95792,7 @@ components: - integer - 'null' description: The ID of the actor that can bypass a ruleset. Required for - `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` + `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -95793,6 +95804,7 @@ components: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -123049,6 +123061,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -123681,6 +123698,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions-next/api.github.com/api.github.com.2026-03-10.json b/descriptions-next/api.github.com/api.github.com.2026-03-10.json index 5cf3460f98..d3254db395 100644 --- a/descriptions-next/api.github.com/api.github.com.2026-03-10.json +++ b/descriptions-next/api.github.com/api.github.com.2026-03-10.json @@ -19257,6 +19257,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -19265,6 +19266,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -19275,6 +19277,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -19282,6 +19285,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -49476,7 +49480,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -49612,7 +49616,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -113808,6 +113812,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -130775,7 +130787,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -130784,7 +130796,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -168364,6 +168377,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -169203,6 +169223,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ diff --git a/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml b/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml index 09827b6a30..bf5b4320ac 100644 --- a/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml +++ b/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml @@ -14243,12 +14243,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -14257,11 +14259,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -36275,7 +36279,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -36369,7 +36373,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -82539,6 +82543,13 @@ components: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access token to view and + manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access token to create, @@ -95342,7 +95353,7 @@ components: - integer - 'null' description: The ID of the actor that can bypass a ruleset. Required for - `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` + `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -95354,6 +95365,7 @@ components: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -122705,6 +122717,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -123337,6 +123354,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions-next/api.github.com/api.github.com.json b/descriptions-next/api.github.com/api.github.com.json index f394239608..2c7d95c13a 100644 --- a/descriptions-next/api.github.com/api.github.com.json +++ b/descriptions-next/api.github.com/api.github.com.json @@ -19304,6 +19304,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -19312,6 +19313,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -19322,6 +19324,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -19329,6 +19332,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -49811,7 +49815,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -49947,7 +49951,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -114452,6 +114456,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -132246,7 +132258,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -132255,7 +132267,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -170109,6 +170122,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -170948,6 +170968,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ diff --git a/descriptions-next/api.github.com/api.github.com.yaml b/descriptions-next/api.github.com/api.github.com.yaml index e0bd433ded..1c412d72b3 100644 --- a/descriptions-next/api.github.com/api.github.com.yaml +++ b/descriptions-next/api.github.com/api.github.com.yaml @@ -14270,12 +14270,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -14284,11 +14286,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -36474,7 +36478,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -36568,7 +36572,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -82960,6 +82964,13 @@ components: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access token to view and + manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access token to create, @@ -96366,7 +96377,7 @@ components: - integer - 'null' description: The ID of the actor that can bypass a ruleset. Required for - `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` + `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -96378,6 +96389,7 @@ components: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -123966,6 +123978,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -124598,6 +124615,11 @@ components: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json index 36b904a699..a2c65d701e 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json @@ -8658,6 +8658,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9798,6 +9806,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10711,6 +10727,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -11189,6 +11213,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13544,6 +13576,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14716,6 +14756,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15752,6 +15800,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -16491,6 +16547,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -114664,6 +114728,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -114672,6 +114737,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -114682,6 +114748,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -114689,6 +114756,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -168638,6 +168706,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -169793,6 +169869,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -242968,7 +243052,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -242977,7 +243061,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -244399,7 +244484,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -244408,7 +244493,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -245622,7 +245708,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -245631,7 +245717,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -247727,7 +247814,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -247736,7 +247823,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -249183,7 +249271,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -249192,7 +249280,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -250402,7 +250491,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -250411,7 +250500,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -356183,7 +356273,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -356653,7 +356743,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -442178,6 +442268,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -631527,7 +631625,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -631536,7 +631634,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -632966,7 +633065,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -632975,7 +633074,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -634038,7 +634138,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -634047,7 +634147,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -636162,7 +636263,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -636171,7 +636272,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -637616,7 +637718,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -637625,7 +637727,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -638684,7 +638787,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -638693,7 +638796,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -723280,6 +723384,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -819918,6 +820030,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -911510,6 +911630,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -914311,6 +914438,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -1050841,6 +1050975,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1053972,6 +1054114,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1057008,6 +1057158,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1060044,6 +1060202,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1063214,6 +1063380,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1066391,6 +1066565,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1071579,6 +1071761,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1572886,7 +1573076,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1572895,7 +1573085,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1576202,7 +1576393,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1576211,7 +1576402,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1579518,7 +1579710,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1579527,7 +1579719,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml index 96e4ca9f7a..4310ce6588 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml @@ -4908,6 +4908,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -29843,12 +29850,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -29857,11 +29866,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -50928,8 +50939,8 @@ paths: - integer - 'null' description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, + Required for `Integration`, `RepositoryRole`, `Team`, + and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -50941,6 +50952,7 @@ paths: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -71728,7 +71740,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -71857,7 +71869,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -123746,6 +123758,11 @@ webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -124448,6 +124465,11 @@ webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json index 6135bd7c7b..88600bd916 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json @@ -8582,6 +8582,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9722,6 +9730,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10635,6 +10651,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -11113,6 +11137,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13449,6 +13481,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14621,6 +14661,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15657,6 +15705,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -16396,6 +16452,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -110393,6 +110457,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -110401,6 +110466,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -110411,6 +110477,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -110418,6 +110485,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -163896,6 +163964,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -165051,6 +165127,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -235584,7 +235668,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -235593,7 +235677,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -237015,7 +237100,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -237024,7 +237109,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -238238,7 +238324,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -238247,7 +238333,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -240343,7 +240430,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -240352,7 +240439,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -241799,7 +241887,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -241808,7 +241896,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -243018,7 +243107,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -243027,7 +243116,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -348473,7 +348563,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -348943,7 +349033,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -433687,6 +433777,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -617919,7 +618017,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -617928,7 +618026,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -619358,7 +619457,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -619367,7 +619466,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -620430,7 +620530,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -620439,7 +620539,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -622554,7 +622655,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -622563,7 +622664,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -624008,7 +624110,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -624017,7 +624119,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -625076,7 +625179,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -625085,7 +625188,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -709047,6 +709151,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -801950,6 +802062,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -892186,6 +892306,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -894975,6 +895102,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -1030469,6 +1030603,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1033588,6 +1033730,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1036612,6 +1036762,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1039636,6 +1039794,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1042794,6 +1042960,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1045959,6 +1046133,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1051123,6 +1051305,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1547527,7 +1547717,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1547536,7 +1547726,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1550831,7 +1551022,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1550840,7 +1551031,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1554135,7 +1554327,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1554144,7 +1554336,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml index af8e523325..b99eb1927f 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml @@ -4873,6 +4873,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -29519,12 +29526,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -29533,11 +29542,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -50550,8 +50561,8 @@ paths: - integer - 'null' description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, + Required for `Integration`, `RepositoryRole`, `Team`, + and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -50563,6 +50574,7 @@ paths: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -71281,7 +71293,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -71410,7 +71422,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -123314,6 +123326,11 @@ webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -124016,6 +124033,11 @@ webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json index b4dd169a89..65b7db246b 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json @@ -8782,6 +8782,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9922,6 +9930,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10849,6 +10865,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -11327,6 +11351,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -13785,6 +13817,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14957,6 +14997,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15993,6 +16041,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -16732,6 +16788,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -116748,6 +116812,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -116756,6 +116821,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -116766,6 +116832,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -116773,6 +116840,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -171199,6 +171267,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -172354,6 +172430,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -249874,7 +249958,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -249883,7 +249967,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -251305,7 +251390,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -251314,7 +251399,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -252528,7 +252614,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -252537,7 +252623,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -254633,7 +254720,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -254642,7 +254729,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -256089,7 +256177,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -256098,7 +256186,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -257308,7 +257397,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -257317,7 +257406,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -364360,7 +364450,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -364830,7 +364920,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -451497,6 +451587,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -645905,7 +646003,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -645914,7 +646012,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -647344,7 +647443,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -647353,7 +647452,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -648416,7 +648516,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -648425,7 +648525,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -650540,7 +650641,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -650549,7 +650650,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -651994,7 +652096,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -652003,7 +652105,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -653062,7 +653165,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -653071,7 +653174,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -739331,6 +739435,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -841243,6 +841355,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -934483,6 +934603,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -937309,6 +937436,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -1075575,6 +1075709,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1078731,6 +1078873,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1081792,6 +1081942,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1084853,6 +1085011,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1088048,6 +1088214,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1091250,6 +1091424,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1096488,6 +1096670,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1605366,7 +1605556,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1605375,7 +1605565,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1608707,7 +1608898,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1608716,7 +1608907,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, @@ -1612048,7 +1612240,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1612057,7 +1612249,8 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "User" ], "description": "The type of actor that can bypass a ruleset." }, diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml index c6df21c21c..94a2002a3e 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml @@ -4965,6 +4965,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -30136,12 +30143,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -30150,11 +30159,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -51394,8 +51405,8 @@ paths: - integer - 'null' description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, + Required for `Integration`, `RepositoryRole`, `Team`, + and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories. @@ -51407,6 +51418,7 @@ paths: - RepositoryRole - Team - DeployKey + - User description: The type of actor that can bypass a ruleset. bypass_mode: type: string @@ -72367,7 +72379,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -72496,7 +72508,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response. @@ -124711,6 +124723,11 @@ webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: @@ -125413,6 +125430,11 @@ webhooks: enum: - read - write + code_quality: + type: string + enum: + - read + - write content_references: type: string enum: diff --git a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json index c76658e14d..09c5f0904d 100644 --- a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json +++ b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json @@ -8674,6 +8674,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -9056,6 +9064,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -9830,6 +9846,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -10212,6 +10236,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -10759,6 +10791,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -11141,6 +11181,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -11253,6 +11301,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -11635,6 +11691,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -13624,6 +13688,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -14006,6 +14078,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -14812,6 +14892,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -15194,6 +15282,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -15864,6 +15960,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -16246,6 +16350,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -16619,6 +16731,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -17001,6 +17121,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -34580,6 +34708,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -34962,6 +35098,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -35467,6 +35611,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -35849,6 +36001,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -36574,6 +36734,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -36956,6 +37124,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -38078,6 +38254,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -38460,6 +38644,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -59540,6 +59732,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -59922,6 +60122,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -65591,7 +65799,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -65602,7 +65810,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -67346,7 +67555,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -67357,7 +67566,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -68811,7 +69021,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -68822,7 +69032,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -70249,7 +70460,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -70260,7 +70471,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -72000,7 +72212,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -72011,7 +72223,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -165524,6 +165737,7 @@ "format": "uri", "pattern": "^https://", "description": "The URL where the artifact is stored.", + "maxLength": 152, "examples": [ "https://reg.example.com/artifactory/bar/libfoo-1.2.3" ] @@ -165532,6 +165746,7 @@ "type": "string", "format": "uri", "description": "The path of the artifact.", + "maxLength": 512, "examples": [ "com/github/bar/libfoo-1.2.3" ] @@ -165542,6 +165757,7 @@ "pattern": "^https://", "description": "The base URL of the artifact registry.", "minLength": 1, + "maxLength": 256, "examples": [ "https://reg.example.com/artifactory/" ] @@ -165549,6 +165765,7 @@ "repository": { "type": "string", "description": "The repository name within the registry.", + "maxLength": 128, "examples": [ "bar" ] @@ -225995,6 +226212,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -226377,6 +226602,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -227166,6 +227399,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -227548,6 +227789,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -301766,7 +302015,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -301777,7 +302026,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -303199,7 +303449,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -303210,7 +303460,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -304424,7 +304675,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -304435,7 +304686,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -306531,7 +306783,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -306542,7 +306794,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -307989,7 +308242,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -308000,7 +308253,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -309210,7 +309464,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -309221,7 +309475,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -418487,7 +418742,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix": { "get": { "summary": "Get the status of an autofix for a code scanning alert", - "description": "Gets the status and description of an autofix for a code scanning alert.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Gets the status and description of an autofix for a code scanning alert on the repository's default branch.\n\nOAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -418957,7 +419212,7 @@ "/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits": { "post": { "summary": "Commit an autofix for a code scanning alert", - "description": "Commits an autofix for a code scanning alert.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", + "description": "Commits an autofix for a code scanning alert from the repository's default branch.\n\nIf an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.\n\nOAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.", "tags": [ "code-scanning" ], @@ -508536,6 +508791,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -508918,6 +509181,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -698068,7 +698339,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -698079,7 +698350,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -699509,7 +699781,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -699520,7 +699792,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -700583,7 +700856,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -700594,7 +700867,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -702709,7 +702983,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -702720,7 +702994,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -704165,7 +704440,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -704176,7 +704451,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -705235,7 +705511,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -705246,7 +705522,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -801971,6 +802248,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -802353,6 +802638,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -898709,6 +899002,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -899091,6 +899392,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1001678,6 +1001987,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -1004479,6 +1004795,13 @@ "write" ] }, + "code_quality": { + "type": "string", + "enum": [ + "read", + "write" + ] + }, "content_references": { "type": "string", "enum": [ @@ -1178005,6 +1178328,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1178387,6 +1178718,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1181152,6 +1181491,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1181534,6 +1181881,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1184204,6 +1184559,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1184586,6 +1184949,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1187256,6 +1187627,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1187638,6 +1188017,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1190442,6 +1190829,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1190824,6 +1191219,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1193635,6 +1194038,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1194017,6 +1194428,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1198839,6 +1199258,14 @@ "write" ] }, + "code_quality": { + "type": "string", + "description": "The level of permission to grant the access token to view and manage code quality data.", + "enum": [ + "read", + "write" + ] + }, "codespaces": { "type": "string", "description": "The level of permission to grant the access token to create, edit, delete, and list Codespaces.", @@ -1199221,6 +1199648,14 @@ "write" ] }, + "enterprise_administration": { + "type": "string", + "description": "The level of permission to grant the access token to administer an enterprise account.", + "enum": [ + "read", + "write" + ] + }, "enterprise_custom_properties_for_organizations": { "type": "string", "description": "The level of permission to grant the access token for organization custom properties management at the enterprise level.", @@ -1702098,7 +1702533,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1702109,7 +1702544,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -1705416,7 +1705852,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1705427,7 +1705863,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, @@ -1708734,7 +1709171,7 @@ "integer", "null" ], - "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, and `Team` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. Required for `Integration`, `RepositoryRole`, `Team`, and `User` actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` is ignored. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1708745,7 +1709182,8 @@ "Team", "DeployKey", "EnterpriseOwner", - "EnterpriseRole" + "EnterpriseRole", + "User" ], "description": "The type of actor that can bypass a ruleset" }, diff --git a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml index 459d17082f..bdf31e0c18 100644 --- a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml +++ b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml @@ -4917,6 +4917,13 @@ paths: enum: - read - write + code_quality: + type: string + description: The level of permission to grant the access + token to view and manage code quality data. + enum: + - read + - write codespaces: type: string description: The level of permission to grant the access @@ -5267,6 +5274,13 @@ paths: enum: - read - write + enterprise_administration: + type: string + description: The level of permission to grant the access + token to administer an enterprise account. + enum: + - read + - write enterprise_custom_properties_for_organizations: type: string description: The level of permission to grant the access @@ -24597,10 +24611,10 @@ paths: - integer - 'null' description: The ID of the actor that can bypass a ruleset. - Required for `Integration`, `RepositoryRole`, and `Team` - actor types. If `actor_type` is `OrganizationAdmin`, `actor_id` - is ignored. If `actor_type` is `DeployKey`, this should - be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + Required for `Integration`, `RepositoryRole`, `Team`, and + `User` actor types. If `actor_type` is `OrganizationAdmin`, + `actor_id` is ignored. If `actor_type` is `DeployKey`, this + should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin`, `EnterpriseOwner` and `EnterpriseRole` are not applicable for personal repositories. actor_type: @@ -24613,6 +24627,7 @@ paths: - DeployKey - EnterpriseOwner - EnterpriseRole + - User description: The type of actor that can bypass a ruleset bypass_mode: type: string @@ -44294,12 +44309,14 @@ paths: format: uri pattern: "^https://" description: The URL where the artifact is stored. + maxLength: 152 examples: - https://reg.example.com/artifactory/bar/libfoo-1.2.3 path: type: string format: uri description: The path of the artifact. + maxLength: 512 examples: - com/github/bar/libfoo-1.2.3 registry_url: @@ -44308,11 +44325,13 @@ paths: pattern: "^https://" description: The base URL of the artifact registry. minLength: 1 + maxLength: 256 examples: - https://reg.example.com/artifactory/ repository: type: string description: The repository name within the registry. + maxLength: 128 examples: - bar status: @@ -85225,7 +85244,7 @@ paths: get: summary: Get the status of an autofix for a code scanning alert description: |- - Gets the status and description of an autofix for a code scanning alert. + Gets the status and description of an autofix for a code scanning alert on the repository's default branch. OAuth app tokens and personal access tokens (classic) need the `security_events` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories. tags: @@ -85354,7 +85373,7 @@ paths: post: summary: Commit an autofix for a code scanning alert description: |- - Commits an autofix for a code scanning alert. + Commits an autofix for a code scanning alert from the repository's default branch. {"code":"deadline_exceeded","msg":"operation timed out"}