From 80cd66b787929f37dd078389b7415ce0b752de21 Mon Sep 17 00:00:00 2001 From: docubot <67483024+docubot@users.noreply.github.com> Date: Thu, 15 Jun 2023 10:39:01 -0400 Subject: [PATCH] Update OpenAPI Description (#37892) Co-authored-by: Matt Pollard --- src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/schema.json | 22 ++++++++++++------- src/rest/data/ghae/schema.json | 12 +++++----- src/rest/data/ghec-2022-11-28/schema.json | 22 ++++++++++++------- src/rest/data/ghes-3.4/schema.json | 12 +++++----- src/rest/data/ghes-3.5/schema.json | 4 ++-- src/rest/data/ghes-3.6/schema.json | 4 ++-- src/rest/data/ghes-3.7/schema.json | 4 ++-- src/rest/data/ghes-3.8/schema.json | 4 ++-- src/rest/data/ghes-3.9-2022-11-28/schema.json | 4 ++-- src/rest/lib/config.json | 2 +- src/webhooks/data/fpt/schema.json | 2 +- src/webhooks/data/ghae/schema.json | 2 +- src/webhooks/data/ghec/schema.json | 2 +- src/webhooks/data/ghes-3.7/schema.json | 2 +- src/webhooks/data/ghes-3.8/schema.json | 2 +- src/webhooks/data/ghes-3.9/schema.json | 2 +- src/webhooks/lib/config.json | 2 +- 18 files changed, 59 insertions(+), 47 deletions(-) diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index c48eaa1b8b..bfc2ffb0a2 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -7,5 +7,5 @@ "2022-11-28" ] }, - "sha": "a690f58e01c4ad78d5541f2cf795b53712b25d84" + "sha": "bff312ae07f0fca06be8c742d9f3f836a7b8bfab" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index bda8631623..ccd5ba184c 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -163385,6 +163385,12 @@ "default", "extended" ] + }, + { + "type": "array of strings", + "name": "languages", + "in": "body", + "description": "

CodeQL languages to be analyzed. Supported values are: c-cpp, csharp, go, java-kotlin, javascript-typescript, python, and ruby.

" } ], "enabledForGitHubApps": true, @@ -163813,8 +163819,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -163915,8 +163921,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -359406,8 +359412,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns a 204 if the given user is blocked by the given organization. Returns a 404 if the organization is not blocking the user, or if the user account has been identified as spam by GitHub.

", "statusCodes": [ { "httpStatusCode": "204", @@ -359465,8 +359471,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Blocks the given user on behalf of the specified organization and returns a 204. If the organization cannot block the given user a 422 is returned.

", "statusCodes": [ { "httpStatusCode": "204", @@ -359524,8 +359530,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Unblocks the given user on behalf of the specified organization.

", "statusCodes": [ { "httpStatusCode": "204", @@ -542338,8 +542344,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns a 204 if the given user is blocked by the authenticated user. Returns a 404 if the given user is not blocked by the authenticated user, or if the given user account has been identified as spam by GitHub.

", "statusCodes": [ { "httpStatusCode": "204", @@ -542399,8 +542405,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Blocks the given user and returns a 204. If the authenticated user cannot block the given user a 422 is returned.

", "statusCodes": [ { "httpStatusCode": "204", @@ -542464,8 +542470,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Unblocks the given user and returns a 204.

", "statusCodes": [ { "httpStatusCode": "204", diff --git a/src/rest/data/ghae/schema.json b/src/rest/data/ghae/schema.json index 89a8b9a375..1a54cc7533 100644 --- a/src/rest/data/ghae/schema.json +++ b/src/rest/data/ghae/schema.json @@ -116496,8 +116496,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -116598,8 +116598,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -369582,7 +369582,7 @@ } ], "previews": [], - "descriptionHTML": "

Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", + "descriptionHTML": "

Lists secret scanning alerts for an eligible repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -369927,7 +369927,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets a single secret scanning alert detected in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", + "descriptionHTML": "

Gets a single secret scanning alert detected in an eligible repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -370335,7 +370335,7 @@ } ], "previews": [], - "descriptionHTML": "

Updates the status of a secret scanning alert in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts write permission to use this endpoint.

", + "descriptionHTML": "

Updates the status of a secret scanning alert in an eligible repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts write permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -370614,7 +370614,7 @@ } ], "previews": [], - "descriptionHTML": "

Lists all locations for a given secret scanning alert for a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", + "descriptionHTML": "

Lists all locations for a given secret scanning alert for an eligible repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index 997afb9f94..782cab93ce 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -175072,6 +175072,12 @@ "default", "extended" ] + }, + { + "type": "array of strings", + "name": "languages", + "in": "body", + "description": "

CodeQL languages to be analyzed. Supported values are: c-cpp, csharp, go, java-kotlin, javascript-typescript, python, and ruby.

" } ], "enabledForGitHubApps": true, @@ -175500,8 +175506,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -175602,8 +175608,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -373533,8 +373539,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns a 204 if the given user is blocked by the given organization. Returns a 404 if the organization is not blocking the user, or if the user account has been identified as spam by GitHub.

", "statusCodes": [ { "httpStatusCode": "204", @@ -373592,8 +373598,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Blocks the given user on behalf of the specified organization and returns a 204. If the organization cannot block the given user a 422 is returned.

", "statusCodes": [ { "httpStatusCode": "204", @@ -373651,8 +373657,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Unblocks the given user on behalf of the specified organization.

", "statusCodes": [ { "httpStatusCode": "204", @@ -563427,8 +563433,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns a 204 if the given user is blocked by the authenticated user. Returns a 404 if the given user is not blocked by the authenticated user, or if the given user account has been identified as spam by GitHub.

", "statusCodes": [ { "httpStatusCode": "204", @@ -563488,8 +563494,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Blocks the given user and returns a 204. If the authenticated user cannot block the given user a 422 is returned.

", "statusCodes": [ { "httpStatusCode": "204", @@ -563553,8 +563559,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Unblocks the given user and returns a 204.

", "statusCodes": [ { "httpStatusCode": "204", diff --git a/src/rest/data/ghes-3.4/schema.json b/src/rest/data/ghes-3.4/schema.json index 042dc11752..68b6e99cdc 100644 --- a/src/rest/data/ghes-3.4/schema.json +++ b/src/rest/data/ghes-3.4/schema.json @@ -142565,8 +142565,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -142667,8 +142667,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -412510,7 +412510,7 @@ } ], "previews": [], - "descriptionHTML": "

Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", + "descriptionHTML": "

Lists secret scanning alerts for an eligible repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -412848,7 +412848,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets a single secret scanning alert detected in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", + "descriptionHTML": "

Gets a single secret scanning alert detected in an eligible repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -413242,7 +413242,7 @@ } ], "previews": [], - "descriptionHTML": "

Updates the status of a secret scanning alert in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts write permission to use this endpoint.

", + "descriptionHTML": "

Updates the status of a secret scanning alert in an eligible repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts write permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -413473,7 +413473,7 @@ } ], "previews": [], - "descriptionHTML": "

Lists all locations for a given secret scanning alert for a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", + "descriptionHTML": "

Lists all locations for a given secret scanning alert for an eligible repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo scope or security_events scope.

\n

GitHub Apps must have the secret_scanning_alerts read permission to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.5/schema.json b/src/rest/data/ghes-3.5/schema.json index 55db318346..2c354f260d 100644 --- a/src/rest/data/ghes-3.5/schema.json +++ b/src/rest/data/ghes-3.5/schema.json @@ -149787,8 +149787,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -149889,8 +149889,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.6/schema.json b/src/rest/data/ghes-3.6/schema.json index 9e10e84535..4d1f9ad348 100644 --- a/src/rest/data/ghes-3.6/schema.json +++ b/src/rest/data/ghes-3.6/schema.json @@ -152380,8 +152380,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -152482,8 +152482,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.7/schema.json b/src/rest/data/ghes-3.7/schema.json index aecbac8fd5..5fed5a2961 100644 --- a/src/rest/data/ghes-3.7/schema.json +++ b/src/rest/data/ghes-3.7/schema.json @@ -154800,8 +154800,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -154902,8 +154902,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.8/schema.json b/src/rest/data/ghes-3.8/schema.json index cafb357c3d..6e18cd9c43 100644 --- a/src/rest/data/ghes-3.8/schema.json +++ b/src/rest/data/ghes-3.8/schema.json @@ -169182,8 +169182,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -169284,8 +169284,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.9-2022-11-28/schema.json b/src/rest/data/ghes-3.9-2022-11-28/schema.json index d0040a3c00..1f441fd752 100644 --- a/src/rest/data/ghes-3.9-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.9-2022-11-28/schema.json @@ -169859,8 +169859,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns array of all GitHub's codes of conduct.

", "statusCodes": [ { "httpStatusCode": "200", @@ -169961,8 +169961,8 @@ } } ], - "descriptionHTML": "", "previews": [], + "descriptionHTML": "

Returns information about the specified GitHub code of conduct.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 34d67b685e..1720ff4d79 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -33,5 +33,5 @@ ] } }, - "sha": "a690f58e01c4ad78d5541f2cf795b53712b25d84" + "sha": "bff312ae07f0fca06be8c742d9f3f836a7b8bfab" } \ No newline at end of file diff --git a/src/webhooks/data/fpt/schema.json b/src/webhooks/data/fpt/schema.json index 2275142f96..3d9230204e 100644 --- a/src/webhooks/data/fpt/schema.json +++ b/src/webhooks/data/fpt/schema.json @@ -18988,7 +18988,7 @@ }, "deleted": { "descriptionHtml": "

A deploy key was deleted.

", - "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", + "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL API documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", "bodyParameters": [ { "type": "string", diff --git a/src/webhooks/data/ghae/schema.json b/src/webhooks/data/ghae/schema.json index ee806ae3a8..0de3fdc5ea 100644 --- a/src/webhooks/data/ghae/schema.json +++ b/src/webhooks/data/ghae/schema.json @@ -18988,7 +18988,7 @@ }, "deleted": { "descriptionHtml": "

A deploy key was deleted.

", - "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", + "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL API documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", "bodyParameters": [ { "type": "string", diff --git a/src/webhooks/data/ghec/schema.json b/src/webhooks/data/ghec/schema.json index ca635b623d..8d62afb331 100644 --- a/src/webhooks/data/ghec/schema.json +++ b/src/webhooks/data/ghec/schema.json @@ -18988,7 +18988,7 @@ }, "deleted": { "descriptionHtml": "

A deploy key was deleted.

", - "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", + "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL API documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", "bodyParameters": [ { "type": "string", diff --git a/src/webhooks/data/ghes-3.7/schema.json b/src/webhooks/data/ghes-3.7/schema.json index c1635d9bba..b819754bba 100644 --- a/src/webhooks/data/ghes-3.7/schema.json +++ b/src/webhooks/data/ghes-3.7/schema.json @@ -17902,7 +17902,7 @@ }, "deleted": { "descriptionHtml": "

A deploy key was deleted.

", - "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", + "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL API documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", "bodyParameters": [ { "type": "string", diff --git a/src/webhooks/data/ghes-3.8/schema.json b/src/webhooks/data/ghes-3.8/schema.json index 1e77bed82a..4564f87e4e 100644 --- a/src/webhooks/data/ghes-3.8/schema.json +++ b/src/webhooks/data/ghes-3.8/schema.json @@ -17902,7 +17902,7 @@ }, "deleted": { "descriptionHtml": "

A deploy key was deleted.

", - "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", + "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL API documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", "bodyParameters": [ { "type": "string", diff --git a/src/webhooks/data/ghes-3.9/schema.json b/src/webhooks/data/ghes-3.9/schema.json index 8e773d362d..b660165dec 100644 --- a/src/webhooks/data/ghes-3.9/schema.json +++ b/src/webhooks/data/ghes-3.9/schema.json @@ -17902,7 +17902,7 @@ }, "deleted": { "descriptionHtml": "

A deploy key was deleted.

", - "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", + "summaryHtml": "

This event occurs when there is activity relating to deploy keys. For more information, see \"Managing deploy keys.\" For information about the APIs to manage deploy keys, see the GraphQL API documentation or \"Deploy keys\" in the REST API documentation.

\n

To subscribe to this event, a GitHub App must have at least read-level access for the \"Deployments\" repository permission.

", "bodyParameters": [ { "type": "string", diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index 92e434c91e..134d3d6ccb 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "a690f58e01c4ad78d5541f2cf795b53712b25d84" + "sha": "bff312ae07f0fca06be8c742d9f3f836a7b8bfab" } \ No newline at end of file