From 705ae14e9fcd1c1b92da3802f557cbd6f79d0635 Mon Sep 17 00:00:00 2001 From: github-openapi-bot <69533958+github-openapi-bot@users.noreply.github.com> Date: Mon, 26 Apr 2021 13:40:55 -0400 Subject: [PATCH] Update OpenAPI Descriptions (#18984) --- lib/rest/static/decorated/api.github.com.json | 9 ++----- lib/rest/static/decorated/ghes-2.22.json | 7 +----- lib/rest/static/decorated/ghes-3.0.json | 7 +----- lib/rest/static/decorated/github.ae.json | 9 ++----- .../dereferenced/api.github.com.deref.json | 24 ++++++++++++------- .../static/dereferenced/ghes-2.18.deref.json | 4 ++++ .../static/dereferenced/ghes-2.19.deref.json | 4 ++++ .../static/dereferenced/ghes-2.20.deref.json | 4 ++++ .../static/dereferenced/ghes-2.21.deref.json | 4 ++++ .../static/dereferenced/ghes-2.22.deref.json | 19 ++++++++------- .../static/dereferenced/ghes-3.0.deref.json | 19 ++++++++------- .../static/dereferenced/github.ae.deref.json | 24 ++++++++++++------- 12 files changed, 72 insertions(+), 62 deletions(-) diff --git a/lib/rest/static/decorated/api.github.com.json b/lib/rest/static/decorated/api.github.com.json index 1259f8093a..3fd6794fdc 100644 --- a/lib/rest/static/decorated/api.github.com.json +++ b/lib/rest/static/decorated/api.github.com.json @@ -46895,7 +46895,7 @@ "httpStatusCode": "200", "httpStatusMessage": "OK", "description": "Response", - "payload": "
[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
+ "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"category\": \".github/workflows/codeql-analysis.yml:analyze/language:python\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"category\": \".github/workflows/shiftleft.yml:build/\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
},
{
"httpStatusCode": "403",
@@ -46987,7 +46987,7 @@
"httpStatusCode": "200",
"httpStatusMessage": "OK",
"description": "Default response",
- "payload": "{\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"c18c69115654ff0166991962832dc2bd7756e655\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"javascript\\\"}\",\n \"error\": \"\",\n \"created_at\": \"2021-01-13T11:55:49Z\",\n \"results_count\": 3,\n \"rules_count\": 67,\n \"id\": 3602840,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"47177e22-5596-11eb-80a1-c1e54ef945c6\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n}\n"
+ "payload": "{\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"c18c69115654ff0166991962832dc2bd7756e655\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"javascript\\\"}\",\n \"error\": \"\",\n \"category\": \".github/workflows/codeql-analysis.yml:analyze/language:javascript\",\n \"created_at\": \"2021-01-13T11:55:49Z\",\n \"results_count\": 3,\n \"rules_count\": 67,\n \"id\": 3602840,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"47177e22-5596-11eb-80a1-c1e54ef945c6\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n}\n"
},
{
"httpStatusCode": "403",
@@ -47310,11 +47310,6 @@
}
],
"responses": [
- {
- "httpStatusCode": "200",
- "httpStatusMessage": "OK",
- "description": "Response"
- },
{
"httpStatusCode": "202",
"httpStatusMessage": "Accepted",
diff --git a/lib/rest/static/decorated/ghes-2.22.json b/lib/rest/static/decorated/ghes-2.22.json
index 65ad3f00f8..145e129012 100644
--- a/lib/rest/static/decorated/ghes-2.22.json
+++ b/lib/rest/static/decorated/ghes-2.22.json
@@ -41292,7 +41292,7 @@
"httpStatusCode": "200",
"httpStatusMessage": "OK",
"description": "Response",
- "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
+ "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"category\": \".github/workflows/codeql-analysis.yml:analyze/language:python\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"category\": \".github/workflows/shiftleft.yml:build/\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
},
{
"httpStatusCode": "403",
@@ -41507,11 +41507,6 @@
}
],
"responses": [
- {
- "httpStatusCode": "200",
- "httpStatusMessage": "OK",
- "description": "Response"
- },
{
"httpStatusCode": "202",
"httpStatusMessage": "Accepted",
diff --git a/lib/rest/static/decorated/ghes-3.0.json b/lib/rest/static/decorated/ghes-3.0.json
index b4b8627b92..d65a4d6669 100644
--- a/lib/rest/static/decorated/ghes-3.0.json
+++ b/lib/rest/static/decorated/ghes-3.0.json
@@ -45773,7 +45773,7 @@
"httpStatusCode": "200",
"httpStatusMessage": "OK",
"description": "Response",
- "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
+ "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"category\": \".github/workflows/codeql-analysis.yml:analyze/language:python\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"category\": \".github/workflows/shiftleft.yml:build/\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
},
{
"httpStatusCode": "403",
@@ -45988,11 +45988,6 @@
}
],
"responses": [
- {
- "httpStatusCode": "200",
- "httpStatusMessage": "OK",
- "description": "Response"
- },
{
"httpStatusCode": "202",
"httpStatusMessage": "Accepted",
diff --git a/lib/rest/static/decorated/github.ae.json b/lib/rest/static/decorated/github.ae.json
index 7ebd0bb8be..09b7c4acee 100644
--- a/lib/rest/static/decorated/github.ae.json
+++ b/lib/rest/static/decorated/github.ae.json
@@ -39584,7 +39584,7 @@
"httpStatusCode": "200",
"httpStatusMessage": "OK",
"description": "Response",
- "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
+ "payload": "[\n {\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"d99612c3e1f2970085cfbaeadf8f010ef69bad83\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"python\\\"}\",\n \"error\": \"\",\n \"category\": \".github/workflows/codeql-analysis.yml:analyze/language:python\",\n \"created_at\": \"2020-08-27T15:05:21Z\",\n \"results_count\": 17,\n \"rules_count\": 49,\n \"id\": 201,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"6c81cd8e-b078-4ac3-a3be-1dad7dbd0b53\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n },\n {\n \"ref\": \"refs/heads/my-branch\",\n \"commit_sha\": \"c8cff6510d4d084fb1b4aa13b64b97ca12b07321\",\n \"analysis_key\": \".github/workflows/shiftleft.yml:build\",\n \"environment\": \"{}\",\n \"error\": \"\",\n \"category\": \".github/workflows/shiftleft.yml:build/\",\n \"created_at\": \"2020-08-31T22:46:44Z\",\n \"results_count\": 17,\n \"rules_count\": 32,\n \"id\": 200,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/200\",\n \"sarif_id\": \"8981cd8e-b078-4ac3-a3be-1dad7dbd0b582\",\n \"tool\": {\n \"name\": \"Python Security Analysis\",\n \"guid\": null,\n \"version\": \"1.2.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n }\n]\n"
},
{
"httpStatusCode": "403",
@@ -39676,7 +39676,7 @@
"httpStatusCode": "200",
"httpStatusMessage": "OK",
"description": "Default response",
- "payload": "{\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"c18c69115654ff0166991962832dc2bd7756e655\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"javascript\\\"}\",\n \"error\": \"\",\n \"created_at\": \"2021-01-13T11:55:49Z\",\n \"results_count\": 3,\n \"rules_count\": 67,\n \"id\": 3602840,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"47177e22-5596-11eb-80a1-c1e54ef945c6\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n}\n"
+ "payload": "{\n \"ref\": \"refs/heads/main\",\n \"commit_sha\": \"c18c69115654ff0166991962832dc2bd7756e655\",\n \"analysis_key\": \".github/workflows/codeql-analysis.yml:analyze\",\n \"environment\": \"{\\\"language\\\":\\\"javascript\\\"}\",\n \"error\": \"\",\n \"category\": \".github/workflows/codeql-analysis.yml:analyze/language:javascript\",\n \"created_at\": \"2021-01-13T11:55:49Z\",\n \"results_count\": 3,\n \"rules_count\": 67,\n \"id\": 3602840,\n \"url\": \"https://api.github.com/repos/octocat/hello-world/code-scanning/analyses/201\",\n \"sarif_id\": \"47177e22-5596-11eb-80a1-c1e54ef945c6\",\n \"tool\": {\n \"name\": \"CodeQL\",\n \"guid\": null,\n \"version\": \"2.4.0\"\n },\n \"deletable\": true,\n \"warning\": \"\"\n}\n"
},
{
"httpStatusCode": "403",
@@ -39891,11 +39891,6 @@
}
],
"responses": [
- {
- "httpStatusCode": "200",
- "httpStatusMessage": "OK",
- "description": "Response"
- },
{
"httpStatusCode": "202",
"httpStatusMessage": "Accepted",
diff --git a/lib/rest/static/dereferenced/api.github.com.deref.json b/lib/rest/static/dereferenced/api.github.com.deref.json
index 1bc109dea1..83eaa47098 100644
--- a/lib/rest/static/dereferenced/api.github.com.deref.json
+++ b/lib/rest/static/dereferenced/api.github.com.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
@@ -164291,6 +164295,10 @@
"type": "string",
"description": "Identifies the variable values associated with the environment in which this analysis was performed."
},
+ "category": {
+ "type": "string",
+ "description": "Identifies the configuration and environment under which the analysis was executed."
+ },
"error": {
"type": "string",
"example": "error reading field xyz"
@@ -164382,6 +164390,7 @@
"analysis_key": ".github/workflows/codeql-analysis.yml:analyze",
"environment": "{\"language\":\"python\"}",
"error": "",
+ "category": ".github/workflows/codeql-analysis.yml:analyze/language:python",
"created_at": "2020-08-27T15:05:21Z",
"results_count": 17,
"rules_count": 49,
@@ -164402,6 +164411,7 @@
"analysis_key": ".github/workflows/shiftleft.yml:build",
"environment": "{}",
"error": "",
+ "category": ".github/workflows/shiftleft.yml:build/",
"created_at": "2020-08-31T22:46:44Z",
"results_count": 17,
"rules_count": 32,
@@ -164577,6 +164587,10 @@
"type": "string",
"description": "Identifies the variable values associated with the environment in which this analysis was performed."
},
+ "category": {
+ "type": "string",
+ "description": "Identifies the configuration and environment under which the analysis was executed."
+ },
"error": {
"type": "string",
"example": "error reading field xyz"
@@ -164667,6 +164681,7 @@
"analysis_key": ".github/workflows/codeql-analysis.yml:analyze",
"environment": "{\"language\":\"javascript\"}",
"error": "",
+ "category": ".github/workflows/codeql-analysis.yml:analyze/language:javascript",
"created_at": "2021-01-13T11:55:49Z",
"results_count": 3,
"rules_count": 67,
@@ -165080,15 +165095,6 @@
}
},
"responses": {
- "200": {
- "description": "Response",
- "content": {
- "application/json": {
- "schema": {
- }
- }
- }
- },
"202": {
"description": "Response",
"content": {
diff --git a/lib/rest/static/dereferenced/ghes-2.18.deref.json b/lib/rest/static/dereferenced/ghes-2.18.deref.json
index 8d755f6c3a..4d24b6f8b9 100644
--- a/lib/rest/static/dereferenced/ghes-2.18.deref.json
+++ b/lib/rest/static/dereferenced/ghes-2.18.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
diff --git a/lib/rest/static/dereferenced/ghes-2.19.deref.json b/lib/rest/static/dereferenced/ghes-2.19.deref.json
index 153ae67761..1bd752c2ff 100644
--- a/lib/rest/static/dereferenced/ghes-2.19.deref.json
+++ b/lib/rest/static/dereferenced/ghes-2.19.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
diff --git a/lib/rest/static/dereferenced/ghes-2.20.deref.json b/lib/rest/static/dereferenced/ghes-2.20.deref.json
index ad60611bb7..72f0e2ca16 100644
--- a/lib/rest/static/dereferenced/ghes-2.20.deref.json
+++ b/lib/rest/static/dereferenced/ghes-2.20.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
diff --git a/lib/rest/static/dereferenced/ghes-2.21.deref.json b/lib/rest/static/dereferenced/ghes-2.21.deref.json
index 5c61fafda1..5b10162d5b 100644
--- a/lib/rest/static/dereferenced/ghes-2.21.deref.json
+++ b/lib/rest/static/dereferenced/ghes-2.21.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
diff --git a/lib/rest/static/dereferenced/ghes-2.22.deref.json b/lib/rest/static/dereferenced/ghes-2.22.deref.json
index f73b948562..88f249fc96 100644
--- a/lib/rest/static/dereferenced/ghes-2.22.deref.json
+++ b/lib/rest/static/dereferenced/ghes-2.22.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
@@ -145516,6 +145520,10 @@
"type": "string",
"description": "Identifies the variable values associated with the environment in which this analysis was performed."
},
+ "category": {
+ "type": "string",
+ "description": "Identifies the configuration and environment under which the analysis was executed."
+ },
"error": {
"type": "string",
"example": "error reading field xyz"
@@ -145607,6 +145615,7 @@
"analysis_key": ".github/workflows/codeql-analysis.yml:analyze",
"environment": "{\"language\":\"python\"}",
"error": "",
+ "category": ".github/workflows/codeql-analysis.yml:analyze/language:python",
"created_at": "2020-08-27T15:05:21Z",
"results_count": 17,
"rules_count": 49,
@@ -145627,6 +145636,7 @@
"analysis_key": ".github/workflows/shiftleft.yml:build",
"environment": "{}",
"error": "",
+ "category": ".github/workflows/shiftleft.yml:build/",
"created_at": "2020-08-31T22:46:44Z",
"results_count": 17,
"rules_count": 32,
@@ -145808,15 +145818,6 @@
}
},
"responses": {
- "200": {
- "description": "Response",
- "content": {
- "application/json": {
- "schema": {
- }
- }
- }
- },
"202": {
"description": "Response",
"content": {
diff --git a/lib/rest/static/dereferenced/ghes-3.0.deref.json b/lib/rest/static/dereferenced/ghes-3.0.deref.json
index 532bac8266..1e18f42253 100644
--- a/lib/rest/static/dereferenced/ghes-3.0.deref.json
+++ b/lib/rest/static/dereferenced/ghes-3.0.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
@@ -150799,6 +150803,10 @@
"type": "string",
"description": "Identifies the variable values associated with the environment in which this analysis was performed."
},
+ "category": {
+ "type": "string",
+ "description": "Identifies the configuration and environment under which the analysis was executed."
+ },
"error": {
"type": "string",
"example": "error reading field xyz"
@@ -150890,6 +150898,7 @@
"analysis_key": ".github/workflows/codeql-analysis.yml:analyze",
"environment": "{\"language\":\"python\"}",
"error": "",
+ "category": ".github/workflows/codeql-analysis.yml:analyze/language:python",
"created_at": "2020-08-27T15:05:21Z",
"results_count": 17,
"rules_count": 49,
@@ -150910,6 +150919,7 @@
"analysis_key": ".github/workflows/shiftleft.yml:build",
"environment": "{}",
"error": "",
+ "category": ".github/workflows/shiftleft.yml:build/",
"created_at": "2020-08-31T22:46:44Z",
"results_count": 17,
"rules_count": 32,
@@ -151091,15 +151101,6 @@
}
},
"responses": {
- "200": {
- "description": "Response",
- "content": {
- "application/json": {
- "schema": {
- }
- }
- }
- },
"202": {
"description": "Response",
"content": {
diff --git a/lib/rest/static/dereferenced/github.ae.deref.json b/lib/rest/static/dereferenced/github.ae.deref.json
index 2e50c3ce44..435f61eab2 100644
--- a/lib/rest/static/dereferenced/github.ae.deref.json
+++ b/lib/rest/static/dereferenced/github.ae.deref.json
@@ -35,6 +35,10 @@
"name": "checks",
"description": "Rich interactions with checks run by your integrations."
},
+ {
+ "name": "classroom",
+ "description": "Endpoints that give information about Classroom-related data."
+ },
{
"name": "code-scanning",
"description": "Retrieve code scanning alerts from a repository."
@@ -130943,6 +130947,10 @@
"type": "string",
"description": "Identifies the variable values associated with the environment in which this analysis was performed."
},
+ "category": {
+ "type": "string",
+ "description": "Identifies the configuration and environment under which the analysis was executed."
+ },
"error": {
"type": "string",
"example": "error reading field xyz"
@@ -131034,6 +131042,7 @@
"analysis_key": ".github/workflows/codeql-analysis.yml:analyze",
"environment": "{\"language\":\"python\"}",
"error": "",
+ "category": ".github/workflows/codeql-analysis.yml:analyze/language:python",
"created_at": "2020-08-27T15:05:21Z",
"results_count": 17,
"rules_count": 49,
@@ -131054,6 +131063,7 @@
"analysis_key": ".github/workflows/shiftleft.yml:build",
"environment": "{}",
"error": "",
+ "category": ".github/workflows/shiftleft.yml:build/",
"created_at": "2020-08-31T22:46:44Z",
"results_count": 17,
"rules_count": 32,
@@ -131229,6 +131239,10 @@
"type": "string",
"description": "Identifies the variable values associated with the environment in which this analysis was performed."
},
+ "category": {
+ "type": "string",
+ "description": "Identifies the configuration and environment under which the analysis was executed."
+ },
"error": {
"type": "string",
"example": "error reading field xyz"
@@ -131319,6 +131333,7 @@
"analysis_key": ".github/workflows/codeql-analysis.yml:analyze",
"environment": "{\"language\":\"javascript\"}",
"error": "",
+ "category": ".github/workflows/codeql-analysis.yml:analyze/language:javascript",
"created_at": "2021-01-13T11:55:49Z",
"results_count": 3,
"rules_count": 67,
@@ -131499,15 +131514,6 @@
}
},
"responses": {
- "200": {
- "description": "Response",
- "content": {
- "application/json": {
- "schema": {
- }
- }
- }
- },
"202": {
"description": "Response",
"content": {