diff --git a/assets/images/enterprise/security/enterprise-security-and-analysis-disable-or-enable-all-with-validity-checks.png b/assets/images/enterprise/security/enterprise-security-and-analysis-disable-or-enable-all-with-validity-checks.png deleted file mode 100644 index 9f4a5a2092..0000000000 Binary files a/assets/images/enterprise/security/enterprise-security-and-analysis-disable-or-enable-all-with-validity-checks.png and /dev/null differ diff --git a/assets/images/enterprise/security/enterprise-security-and-analysis-disable-or-enable-all-without-validity-check.png b/assets/images/enterprise/security/enterprise-security-and-analysis-disable-or-enable-all-without-validity-check.png deleted file mode 100644 index 98d84f06f4..0000000000 Binary files a/assets/images/enterprise/security/enterprise-security-and-analysis-disable-or-enable-all-without-validity-check.png and /dev/null differ diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 194414653c..cc5fed1bcf 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "2a29b70c717f70a4afa122ed166a6a885a1d7d77" + "sha": "38baa7aebf29fe927aac6aa0ae769b7a8d3204ca" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 90c1c75a6a..c29488e5a5 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -362004,8 +362004,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -363247,8 +363246,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ] }, { @@ -364533,8 +364531,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -365888,8 +365885,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -367136,8 +367132,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ] }, { @@ -368423,8 +368418,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -490413,8 +490407,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -491665,8 +491658,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ] }, { @@ -492767,8 +492759,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -494133,8 +494124,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, @@ -495390,8 +495380,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ] }, { @@ -496493,8 +496482,7 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey", - "EnterpriseTeam" + "DeployKey" ], "description": "The type of actor that can bypass a ruleset.\n" }, diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index b0274d5fd3..2913ef4285 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -379877,7 +379877,7 @@ } ], "previews": [], - "descriptionHTML": "
Creates a custom organization role that can be assigned to users and teams, granting them specific permissions over the organization. For more information on custom organization roles, see \"Managing people's access to your organization with roles.\"
\nTo use this endpoint, the authenticated user must be one of:
\nwrite_organization_custom_org_role in the organization.OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Creates a custom organization role that can be assigned to users and teams, granting them specific\npermissions over the organization and optionally across all repositories in the organization. For\nmore information on custom organization roles, see \"Managing people's access to your organization with roles.\"
\nTo include repository permissions in an organization role, you must also include the base_role\nfield, which is one of read, write, triage, maintain, or admin (or none if no base role is set). This base role provides a set of\nfine-grained permissions as well as implicit permissions - those that aren't exposed as fine-grained permissions\nand can only be granted through the base role (like \"reading a repo\"). If you include repository permissions, those\npermissions apply across all of the repositories in the organization. You do not have to include organization permissions\nin order to add repository permissions.
See \"List repository permissions\" for valid repository permissions.
\nTo use this endpoint, the authenticated user must be one of:
\nwrite_organization_custom_org_role in the organization.OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Updates an existing custom organization role. Permission changes will apply to all assignees. For more information on custom organization roles, see \"Managing people's access to your organization with roles.\"
\nTo use this endpoint, the authenticated user must be one of:
\nwrite_organization_custom_org_role in the organization.OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Updates an existing custom organization role. Permission changes will apply to all assignees. For more information on custom organization roles, see \"Managing people's access to your organization with roles.\"
\nIf the update would add repository permissions, the base_role must also be set to a value besides none, either\npreviously or as part of the update.\nIf the update sets the base_role field to none, you must also remove all of the repository\npermissions as well, otherwise the update will fail.
To use this endpoint, the authenticated user must be one of:
\nwrite_organization_custom_org_role in the organization.OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Creates a custom organization role that can be assigned to users and teams, granting them specific permissions over the organization. For more information on custom organization roles, see \"Managing people's access to your organization with roles.\"
\nTo use this endpoint, the authenticated user must be one of:
\nwrite_organization_custom_org_role in the organization.OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Creates a custom organization role that can be assigned to users and teams, granting them specific\npermissions over the organization and optionally across all repositories in the organization. For\nmore information on custom organization roles, see \"Managing people's access to your organization with roles.\"
\nTo use this endpoint, the authenticated user must be one of:
\nwrite_organization_custom_org_role in the organization.OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.