diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 15ebb0ccce..8e60ee4377 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "0cbc71f6c0f48a2bc81be56158ea04b535402355" + "sha": "07ad382ef20044d677be30043639d31123370a49" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 5de2d8fd0e..8b77ae6e19 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -199279,7 +199279,7 @@ }, { "name": "since", - "description": "
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Note: This endpoint is in beta and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand code matching policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization\".
\nOnly organization owners can configure and view details about the organization's Copilot Business subscription.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand feature policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization\".
\nOnly organization owners can view details about the organization's Copilot Business or Copilot Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nLists all Copilot seat assignments for an organization that are currently being billed (either active or pending cancellation at the start of the next billing cycle).
\nOnly organization owners can configure and view details about the organization's Copilot Business or Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nLists all active Copilot seats for an organization with a Copilot Business or Copilot Enterprise subscription.\nOnly organization owners can view assigned seats.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for all members of each team specified.\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for all members of each team specified.\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for each user specified.\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for each user specified.\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nGets the GitHub Copilot seat assignment details for a member of an organization who currently has access to GitHub Copilot.
\nOrganization owners can view GitHub Copilot seat assignment details for members in their organization.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nGets the GitHub Copilot seat assignment details for a member of an organization who currently has access to GitHub Copilot.
\nOnly organization owners can view Copilot seat assignment details for members of their organization.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:org scopes to use this endpoint.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index 2fc01ca25c..bea9bf0fca 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -210800,7 +210800,7 @@ }, { "name": "since", - "description": "Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Note: This endpoint is in beta and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand code matching policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization\".
\nOnly organization owners can configure and view details about the organization's Copilot Business subscription.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nGets information about an organization's Copilot subscription, including seat breakdown\nand feature policies. To configure these settings, go to your organization's settings on GitHub.com.\nFor more information, see \"Managing policies for Copilot in your organization\".
\nOnly organization owners can view details about the organization's Copilot Business or Copilot Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nLists all Copilot seat assignments for an organization that are currently being billed (either active or pending cancellation at the start of the next billing cycle).
\nOnly organization owners can configure and view details about the organization's Copilot Business or Enterprise subscription.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nLists all active Copilot seats for an organization with a Copilot Business or Copilot Enterprise subscription.\nOnly organization owners can view assigned seats.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for all users within each specified team.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for all members of each team specified.\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for all members of each team specified.\nThis will cause the members of the specified team(s) to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nPurchases a GitHub Copilot seat for each user specified.\nThe organization will be billed accordingly. For more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nOnly organization owners can add Copilot seats for their organization members.
\nIn order for an admin to use this endpoint, the organization must have a Copilot Business or Enterprise subscription and a configured suggestion matching policy.\nFor more information about setting up a Copilot subscription, see \"Setting up a Copilot subscription for your organization\".\nFor more information about setting a suggestion matching policy, see \"Configuring suggestion matching policies for GitHub Copilot in your organization\".
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for each user specified.\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can configure GitHub Copilot in their organization.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nCancels the Copilot seat assignment for each user specified.\nThis will cause the specified users to lose access to GitHub Copilot at the end of the current billing cycle, and the organization will not be billed further for those users.
\nFor more information about Copilot pricing, see \"Pricing for GitHub Copilot\".
\nFor more information about disabling access to Copilot Business or Enterprise, see \"Revoking access to GitHub Copilot for specific users in your organization\".
\nOnly organization owners can cancel Copilot seats for their organization members.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or admin:org scopes to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nGets the GitHub Copilot seat assignment details for a member of an organization who currently has access to GitHub Copilot.
\nOrganization owners can view GitHub Copilot seat assignment details for members in their organization.
\nOAuth app tokens and personal access tokens (classic) need the manage_billing:copilot scope to use this endpoint.
Note: This endpoint is in beta and is subject to change.
\nGets the GitHub Copilot seat assignment details for a member of an organization who currently has access to GitHub Copilot.
\nOnly organization owners can view Copilot seat assignment details for members of their organization.
\nOAuth app tokens and personal access tokens (classic) need either the manage_billing:copilot or read:org scopes to use this endpoint.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.10-2022-11-28/schema.json b/src/rest/data/ghes-3.10-2022-11-28/schema.json index 2ff9f985c6..be6c1c72a0 100644 --- a/src/rest/data/ghes-3.10-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.10-2022-11-28/schema.json @@ -157163,7 +157163,7 @@ }, { "name": "since", - "description": "Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.11-2022-11-28/schema.json b/src/rest/data/ghes-3.11-2022-11-28/schema.json index 936a8dc93d..e713521367 100644 --- a/src/rest/data/ghes-3.11-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.11-2022-11-28/schema.json @@ -157199,7 +157199,7 @@ }, { "name": "since", - "description": "Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.12-2022-11-28/schema.json b/src/rest/data/ghes-3.12-2022-11-28/schema.json index b520271f18..20db0e6e88 100644 --- a/src/rest/data/ghes-3.12-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.12-2022-11-28/schema.json @@ -157519,7 +157519,7 @@ }, { "name": "since", - "description": "Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.13-2022-11-28/schema.json b/src/rest/data/ghes-3.13-2022-11-28/schema.json index cfe95a0c91..a38566bcb1 100644 --- a/src/rest/data/ghes-3.13-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.13-2022-11-28/schema.json @@ -157663,7 +157663,7 @@ }, { "name": "since", - "description": "Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.9-2022-11-28/schema.json b/src/rest/data/ghes-3.9-2022-11-28/schema.json index bd6779ec90..fec44b9f77 100644 --- a/src/rest/data/ghes-3.9-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.9-2022-11-28/schema.json @@ -155820,7 +155820,7 @@ }, { "name": "since", - "description": "Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only show results that were last updated after the given time. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ. Due to limitations of Git, timestamps must be between 1970-01-01 and 2099-12-31 (inclusive) or unexpected results may be returned.
Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", + "descriptionHTML": "Only authenticated organization owners can add a member to the organization or update the member's role.
\nIf the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be pending until they accept the invitation.
Authenticated users can update a user's membership by passing the role parameter. If the authenticated user changes a member's role to admin, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role to member, no email will be sent.
Rate limits
\nTo prevent abuse, organization owners are limited to creating 50 organization invitations for an organization within a 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 1795cf10ed..318f89479c 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -47,5 +47,5 @@ ] } }, - "sha": "0cbc71f6c0f48a2bc81be56158ea04b535402355" + "sha": "07ad382ef20044d677be30043639d31123370a49" } \ No newline at end of file diff --git a/src/webhooks/data/fpt/schema.json b/src/webhooks/data/fpt/schema.json index 91d8f8eef9..d49ddba63e 100644 --- a/src/webhooks/data/fpt/schema.json +++ b/src/webhooks/data/fpt/schema.json @@ -12912,7 +12912,9 @@ "isRequired": true, "enum": [ "string", - "single_select" + "single_select", + "multi_select", + "true_false" ] }, { @@ -13086,7 +13088,9 @@ "isRequired": true, "enum": [ "string", - "single_select" + "single_select", + "multi_select", + "true_false" ] }, { diff --git a/src/webhooks/data/ghec/schema.json b/src/webhooks/data/ghec/schema.json index f025c380aa..39b766a63f 100644 --- a/src/webhooks/data/ghec/schema.json +++ b/src/webhooks/data/ghec/schema.json @@ -1041,6 +1041,1141 @@ "category": "branch_protection_rule" } }, + "bypass_request_push_ruleset": { + "cancelled": { + "descriptionHtml": "A push ruleset bypass request was cancelled.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in beta and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "cancelled" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "The GitHub user that triggered the event. This property is included in every webhook payload.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "cancelled", + "category": "bypass_request_push_ruleset" + }, + "completed": { + "descriptionHtml": "A push ruleset bypass request was completed.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in beta and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "completed" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "The GitHub user that triggered the event. This property is included in every webhook payload.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "completed", + "category": "bypass_request_push_ruleset" + }, + "created": { + "descriptionHtml": "A push ruleset bypass request was created.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in beta and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "created" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "The GitHub user that triggered the event. This property is included in every webhook payload.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "created", + "category": "bypass_request_push_ruleset" + }, + "response_dismissed": { + "descriptionHtml": "A push ruleset bypass response was dismissed.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in beta and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "response_dismissed" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "exemption_response", + "in": "body", + "description": "A response to an exemption request by a delegated bypasser.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "The GitHub user that triggered the event. This property is included in every webhook payload.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "response_dismissed", + "category": "bypass_request_push_ruleset" + }, + "response_submitted": { + "descriptionHtml": "A response either approving or rejecting the push ruleset bypass request was submitted.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in beta and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "response_submitted" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "exemption_response", + "in": "body", + "description": "A response to an exemption request by a delegated bypasser.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "The GitHub user that triggered the event. This property is included in every webhook payload.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "response_submitted", + "category": "bypass_request_push_ruleset" + } + }, "bypass_request_secret_scanning": { "cancelled": { "descriptionHtml": "A secret scanning push protection bypass request was cancelled.
", @@ -14111,7 +15246,9 @@ "isRequired": true, "enum": [ "string", - "single_select" + "single_select", + "multi_select", + "true_false" ] }, { @@ -14285,7 +15422,9 @@ "isRequired": true, "enum": [ "string", - "single_select" + "single_select", + "multi_select", + "true_false" ] }, { diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index 1f7a55171e..5b898f5a8e 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "0cbc71f6c0f48a2bc81be56158ea04b535402355" + "sha": "07ad382ef20044d677be30043639d31123370a49" } \ No newline at end of file