From 606458c3c35586e5f7be55bcc0953f12639cdcd4 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Fri, 25 Jul 2025 12:47:48 -0700 Subject: [PATCH 1/4] Update OpenAPI Description (#56851) Co-authored-by: John Clement <70238417+jclement136@users.noreply.github.com> --- .../fine-grained-pat-permissions.json | 88 ++++---- .../server-to-server-permissions.json | 200 ++++++++--------- .../fine-grained-pat-permissions.json | 88 ++++---- .../server-to-server-permissions.json | 200 ++++++++--------- .../fine-grained-pat-permissions.json | 168 +++++++------- .../server-to-server-permissions.json | 200 ++++++++--------- .../fine-grained-pat-permissions.json | 168 +++++++------- .../server-to-server-permissions.json | 200 ++++++++--------- src/github-apps/lib/config.json | 2 +- .../data/ghes-3.14-2022-11-28/schema.json | 208 +++++++++--------- .../data/ghes-3.15-2022-11-28/schema.json | 16 +- .../data/ghes-3.16-2022-11-28/schema.json | 180 +++++++-------- .../data/ghes-3.17-2022-11-28/schema.json | 16 +- src/rest/lib/config.json | 2 +- src/webhooks/lib/config.json | 2 +- 15 files changed, 869 insertions(+), 869 deletions(-) diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json index dd3abb0e2898..fe2b64849961 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json @@ -1314,8 +1314,8 @@ ] }, "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", "permissions": [ { "category": "enterprise-admin", @@ -5492,48 +5492,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - } - ] - }, "pull_requests": { "title": "Pull requests", "displayTitle": "Repository permissions for \"Pull requests\"", @@ -6107,6 +6065,48 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json index 5d4fa3f85ad4..34c465209cf7 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json @@ -1593,6 +1593,56 @@ } ] }, + "organization_pre_receive_hooks": { + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "patch", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "delete", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "organization_personal_access_token_requests": { "title": "Personal access token requests", "displayTitle": "Organization permissions for \"Personal access token requests\"", @@ -1693,56 +1743,6 @@ } ] }, - "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "patch", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "delete", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "organization_projects": { "title": "Projects", "displayTitle": "Organization permissions for \"Projects\"", @@ -6923,56 +6923,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "repository_projects": { "title": "Projects", "displayTitle": "Repository permissions for \"Projects\"", @@ -7909,6 +7859,56 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json index 5c759e8b976d..f428927179a2 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json @@ -1404,8 +1404,8 @@ ] }, "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", "permissions": [ { "category": "enterprise-admin", @@ -5600,48 +5600,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - } - ] - }, "pull_requests": { "title": "Pull requests", "displayTitle": "Repository permissions for \"Pull requests\"", @@ -6215,6 +6173,48 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json index bb4ebc536f78..20881a9ea10a 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json @@ -1703,6 +1703,56 @@ } ] }, + "organization_pre_receive_hooks": { + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "patch", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "delete", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "organization_personal_access_token_requests": { "title": "Personal access token requests", "displayTitle": "Organization permissions for \"Personal access token requests\"", @@ -1803,56 +1853,6 @@ } ] }, - "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "patch", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "delete", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "organization_projects": { "title": "Projects", "displayTitle": "Organization permissions for \"Projects\"", @@ -7055,56 +7055,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "repository_projects": { "title": "Projects", "displayTitle": "Repository permissions for \"Projects\"", @@ -8041,6 +7991,56 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json index f85e3c79b49f..aa93f29c5ffd 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json @@ -1403,6 +1403,48 @@ } ] }, + "organization_pre_receive_hooks": { + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "patch", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "delete", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + } + ] + }, "organization_private_registries": { "title": "Organization private registries", "displayTitle": "Organization permissions for \"Organization private registries\"", @@ -1454,48 +1496,6 @@ } ] }, - "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "patch", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "delete", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - } - ] - }, "organization_projects": { "title": "Projects", "displayTitle": "Organization permissions for \"Projects\"", @@ -5651,48 +5651,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - } - ] - }, "pull_requests": { "title": "Pull requests", "displayTitle": "Repository permissions for \"Pull requests\"", @@ -6266,6 +6224,48 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json index 1bbc62e01ceb..27873c343c17 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json @@ -1703,6 +1703,56 @@ } ] }, + "organization_pre_receive_hooks": { + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "patch", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "delete", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "organization_private_registries": { "title": "Organization private registries", "displayTitle": "Organization permissions for \"Organization private registries\"", @@ -1864,56 +1914,6 @@ } ] }, - "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "patch", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "delete", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "organization_projects": { "title": "Projects", "displayTitle": "Organization permissions for \"Projects\"", @@ -7116,56 +7116,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "repository_projects": { "title": "Projects", "displayTitle": "Repository permissions for \"Projects\"", @@ -8102,6 +8052,56 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json index bc0af8eafa2f..81736f19e0d1 100644 --- a/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.17-2022-11-28/fine-grained-pat-permissions.json @@ -1454,6 +1454,48 @@ } ] }, + "organization_pre_receive_hooks": { + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "patch", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "delete", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + } + ] + }, "organization_private_registries": { "title": "Organization private registries", "displayTitle": "Organization permissions for \"Organization private registries\"", @@ -1505,48 +1547,6 @@ } ] }, - "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "patch", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "delete", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - } - ] - }, "organization_projects": { "title": "Projects", "displayTitle": "Organization permissions for \"Projects\"", @@ -5720,48 +5720,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "read" - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "additional-permissions": false, - "access": "write" - } - ] - }, "pull_requests": { "title": "Pull requests", "displayTitle": "Repository permissions for \"Pull requests\"", @@ -6335,6 +6293,48 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "read" + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "additional-permissions": false, + "access": "write" + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json index 796545861df6..049982444a9f 100644 --- a/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.17-2022-11-28/server-to-server-permissions.json @@ -1764,6 +1764,56 @@ } ] }, + "organization_pre_receive_hooks": { + "title": "Organization pre-receive hooks", + "displayTitle": "Organization permissions for \"Organization pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "get", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "patch", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-an-organization", + "subcategory": "org-pre-receive-hooks", + "verb": "delete", + "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "organization_private_registries": { "title": "Organization private registries", "displayTitle": "Organization permissions for \"Organization private registries\"", @@ -1925,56 +1975,6 @@ } ] }, - "organization_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Organization permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "get", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "patch", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-an-organization", - "subcategory": "org-pre-receive-hooks", - "verb": "delete", - "requestPath": "/orgs/{org}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "organization_projects": { "title": "Projects", "displayTitle": "Organization permissions for \"Projects\"", @@ -7199,56 +7199,6 @@ } ] }, - "repository_pre_receive_hooks": { - "title": "Pre-receive hooks", - "displayTitle": "Repository permissions for \"Pre-receive hooks\"", - "permissions": [ - { - "category": "enterprise-admin", - "slug": "list-pre-receive-hooks-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "get-a-pre-receive-hook-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "get", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "read", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "update-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "patch", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - }, - { - "category": "enterprise-admin", - "slug": "remove-pre-receive-hook-enforcement-for-a-repository", - "subcategory": "repo-pre-receive-hooks", - "verb": "delete", - "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", - "access": "write", - "user-to-server": true, - "server-to-server": true, - "additional-permissions": false - } - ] - }, "repository_projects": { "title": "Projects", "displayTitle": "Repository permissions for \"Projects\"", @@ -8185,6 +8135,56 @@ } ] }, + "repository_pre_receive_hooks": { + "title": "Repository pre-receive hooks", + "displayTitle": "Repository permissions for \"Repository pre-receive hooks\"", + "permissions": [ + { + "category": "enterprise-admin", + "slug": "list-pre-receive-hooks-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "get-a-pre-receive-hook-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "read", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "update-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "patch", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + }, + { + "category": "enterprise-admin", + "slug": "remove-pre-receive-hook-enforcement-for-a-repository", + "subcategory": "repo-pre-receive-hooks", + "verb": "delete", + "requestPath": "/repos/{owner}/{repo}/pre-receive-hooks/{pre_receive_hook_id}", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": false + } + ] + }, "secret_scanning_alerts": { "title": "Secret scanning alerts", "displayTitle": "Repository permissions for \"Secret scanning alerts\"", diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 0e46bf1330af..b0cecd8da929 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "1a8e746d3e6e8faaef13ee92434686571cccb992" + "sha": "ecbe0df804f3f85f8a68f48d6e9711d05da6f201" } \ No newline at end of file diff --git a/src/rest/data/ghes-3.14-2022-11-28/schema.json b/src/rest/data/ghes-3.14-2022-11-28/schema.json index c602d99dcdc9..700418c037f0 100644 --- a/src/rest/data/ghes-3.14-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.14-2022-11-28/schema.json @@ -264,13 +264,13 @@ } ], "previews": [], + "descriptionHTML": "
Lists all artifacts for a repository.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
OK
" } - ], - "descriptionHTML": "Lists all artifacts for a repository.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
Gets the total GitHub Actions cache usage for an organization.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nOAuth tokens and personal access tokens (classic) need the read:org
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Gets the total GitHub Actions cache usage for an organization.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nOAuth tokens and personal access tokens (classic) need the read:org
scope to use this endpoint.
Gets GitHub Actions cache usage for a repository.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nAnyone with read access to the repository can use this endpoint.
\nIf the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Gets GitHub Actions cache usage for a repository.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nAnyone with read access to the repository can use this endpoint.
\nIf the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Deletes one or more GitHub Actions caches for a repository, using a complete cache key. By default, all caches that match the provided key are deleted, but you can optionally provide a Git ref to restrict deletions to caches that match both the provided key and the Git ref.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Deletes one or more GitHub Actions caches for a repository, using a complete cache key. By default, all caches that match the provided key are deleted, but you can optionally provide a Git ref to restrict deletions to caches that match both the provided key and the Git ref.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Sets the actions that are allowed in an enterprise. To use this endpoint, the enterprise permission policy for allowed_actions
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for an enterprise.\"
OAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Sets the actions that are allowed in an enterprise. To use this endpoint, the enterprise permission policy for allowed_actions
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for an enterprise.\"
OAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
Sets the actions that are allowed in a repository. To use this endpoint, the repository permission policy for allowed_actions
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for a repository.\"
If the repository belongs to an organization or enterprise that has selected
actions set at the organization or enterprise levels, then you cannot override any of the allowed actions settings.
To use the patterns_allowed
setting for private repositories, the repository must belong to an enterprise. If the repository does not belong to an enterprise, then the patterns_allowed
setting only applies to public repositories.
OAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Sets the actions that are allowed in a repository. To use this endpoint, the repository permission policy for allowed_actions
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for a repository.\"
If the repository belongs to an organization or enterprise that has selected
actions set at the organization or enterprise levels, then you cannot override any of the allowed actions settings.
To use the patterns_allowed
setting for private repositories, the repository must belong to an enterprise. If the repository does not belong to an enterprise, then the patterns_allowed
setting only applies to public repositories.
OAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Gets your public key, which you need to encrypt secrets. You need to\nencrypt a secret before you can create or update secrets.
\nThe authenticated user must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Gets your public key, which you need to encrypt secrets. You need to\nencrypt a secret before you can create or update secrets.
\nThe authenticated user must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Deletes a secret in an organization using the secret name.
\nAuthenticated users must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Deletes a secret in an organization using the secret name.
\nAuthenticated users must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Deletes a secret in a repository using the secret name.
\nAuthenticated users must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Deletes a secret in a repository using the secret name.
\nAuthenticated users must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Deletes a self-hosted runner group for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Deletes a self-hosted runner group for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Removes a self-hosted runner from a group configured in an enterprise. The runner is then returned to the default group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Removes a self-hosted runner from a group configured in an enterprise. The runner is then returned to the default group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Creates a new self-hosted runner group for an organization.
\nOAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Created
" } - ], - "descriptionHTML": "Creates a new self-hosted runner group for an organization.
\nOAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Deletes a self-hosted runner group for an organization.
\nOAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Deletes a self-hosted runner group for an organization.
\nOAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Lists binaries for the runner application that you can download and run.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
OK
" } - ], - "descriptionHTML": "Lists binaries for the runner application that you can download and run.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Lists binaries for the runner application that you can download and run.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Lists binaries for the runner application that you can download and run.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Gets a specific self-hosted runner configured in a repository.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Gets a specific self-hosted runner configured in a repository.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Creates a repository variable that you can reference in a GitHub Actions workflow.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Created
" } - ], - "descriptionHTML": "Creates a repository variable that you can reference in a GitHub Actions workflow.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Gets a specific workflow run attempt.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
OK
" } - ], - "descriptionHTML": "Gets a specific workflow run attempt.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
You can use this endpoint to manually trigger a GitHub Actions workflow run. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
.
You must configure your GitHub Actions workflow to run when the workflow_dispatch
webhook event occurs. The inputs
are configured in the workflow file. For more information about how to configure the workflow_dispatch
event in the workflow file, see \"Events that trigger workflows.\"
OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "You can use this endpoint to manually trigger a GitHub Actions workflow run. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
.
You must configure your GitHub Actions workflow to run when the workflow_dispatch
webhook event occurs. The inputs
are configured in the workflow file. For more information about how to configure the workflow_dispatch
event in the workflow file, see \"Events that trigger workflows.\"
OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Note
\n\nThis API is not built to serve real-time use cases. Depending on the time of day, event latency can be anywhere from 30s to 6h.
\nOK
" } - ], - "descriptionHTML": "Note
\n\nThis API is not built to serve real-time use cases. Depending on the time of day, event latency can be anywhere from 30s to 6h.
\nGets the announcement banner currently set for the organization. Only returns the announcement banner set at the\norganization level. Organization members may also see an enterprise-level announcement banner. To get an\nannouncement banner displayed at the enterprise level, use the enterprise-level endpoint.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "Gets the announcement banner currently set for the organization. Only returns the announcement banner set at the\norganization level. Organization members may also see an enterprise-level announcement banner. To get an\nannouncement banner displayed at the enterprise level, use the enterprise-level endpoint.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -90729,13 +90729,13 @@ } ], "previews": [], + "descriptionHTML": "Removes the announcement banner currently set for the organization.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ], - "descriptionHTML": "Removes the announcement banner currently set for the organization.
" + ] } ] }, @@ -99867,13 +99867,13 @@ } ], "previews": [], + "descriptionHTML": "Enables an authenticated GitHub App to find the organization's installation information.
\nYou must use a JWT to access this endpoint.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "Enables an authenticated GitHub App to find the organization's installation information.
\nYou must use a JWT to access this endpoint.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -132089,6 +132089,7 @@ } ], "previews": [], + "descriptionHTML": "Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
\nGrants the specified teams push access for this branch. You can also give push access to child teams.
", "statusCodes": [ { "httpStatusCode": "200", @@ -132098,8 +132099,7 @@ "httpStatusCode": "422", "description": "Validation failed, or the endpoint has been spammed.
" } - ], - "descriptionHTML": "Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
\nGrants the specified teams push access for this branch. You can also give push access to child teams.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -139790,13 +139790,13 @@ } ], "previews": [], + "descriptionHTML": "Updates a check run for a specific commit in a repository.
\nNote
\n\nThe endpoints to manage checks only look for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
OAuth apps and personal access tokens (classic) cannot use this endpoint.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "Updates a check run for a specific commit in a repository.
\nNote
\n\nThe endpoints to manage checks only look for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
OAuth apps and personal access tokens (classic) cannot use this endpoint.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -163289,13 +163289,13 @@ } ], "previews": [], + "descriptionHTML": "", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -187025,13 +187025,13 @@ } ], "previews": [], + "descriptionHTML": "Replaces all repositories for an organization secret when the visibility
\nfor repository access is set to selected
. The visibility is set when you Create\nor update an organization secret.
OAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Replaces all repositories for an organization secret when the visibility
\nfor repository access is set to selected
. The visibility is set when you Create\nor update an organization secret.
OAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -189175,13 +189175,13 @@ } ], "previews": [], + "descriptionHTML": "Deploy keys are immutable. If you need to update a key, remove the key and create a new one instead.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ], - "descriptionHTML": "Deploy keys are immutable. If you need to update a key, remove the key and create a new one instead.
" + ] } ] }, @@ -200984,13 +200984,13 @@ } ], "previews": [], + "descriptionHTML": "", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -201483,13 +201483,13 @@ } ], "previews": [], + "descriptionHTML": "", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "" + ] } ], "announcement": [ @@ -205298,6 +205298,7 @@ } ], "previews": [], + "descriptionHTML": "Uploads a new enterprise license. In order to apply it right away, use the apply
query parameter.
Note
\n\nThe request body for this operation must be submitted as multipart/form-data
data. You can can reference the license file by prefixing the filename with the @
symbol using curl
. For more information, see the curl
documentation.
Internal error
" } - ], - "descriptionHTML": "Uploads a new enterprise license. In order to apply it right away, use the apply
query parameter.
Note
\n\nThe request body for this operation must be submitted as multipart/form-data
data. You can can reference the license file by prefixing the filename with the @
symbol using curl
. For more information, see the curl
documentation.
For pre-receive hooks which are allowed to be configured at the org level, you can set enforcement
and allow_downstream_configuration
OK
" } - ], - "descriptionHTML": "For pre-receive hooks which are allowed to be configured at the org level, you can set enforcement
and allow_downstream_configuration
You can demote any user account except your own.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ], - "descriptionHTML": "You can demote any user account except your own.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -269877,6 +269877,7 @@ } ], "previews": [], + "descriptionHTML": "You can use the REST API to list comments on issues and pull requests. Every pull request is an issue, but not every issue is a pull request.
\nIssue comments are ordered by ascending ID.
\nThis endpoint supports the following custom media types. For more information, see \"Media types.\"
\napplication/vnd.github.raw+json
: Returns the raw markdown body. Response will include body
. This is the default if you do not pass any specific media type.application/vnd.github.text+json
: Returns a text only representation of the markdown body. Response will include body_text
.application/vnd.github.html+json
: Returns HTML rendered from the body's markdown. Response will include body_html
.application/vnd.github.full+json
: Returns raw, text, and HTML representations. Response will include body
, body_text
, and body_html
.Gone
" } - ], - "descriptionHTML": "You can use the REST API to list comments on issues and pull requests. Every pull request is an issue, but not every issue is a pull request.
\nIssue comments are ordered by ascending ID.
\nThis endpoint supports the following custom media types. For more information, see \"Media types.\"
\napplication/vnd.github.raw+json
: Returns the raw markdown body. Response will include body
. This is the default if you do not pass any specific media type.application/vnd.github.text+json
: Returns a text only representation of the markdown body. Response will include body_text
.application/vnd.github.html+json
: Returns HTML rendered from the body's markdown. Response will include body_html
.application/vnd.github.full+json
: Returns raw, text, and HTML representations. Response will include body
, body_text
, and body_html
.Lists labels for issues in a milestone.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "Lists labels for issues in a milestone.
" + ] } ], "milestones": [ @@ -316078,13 +316078,13 @@ } ], "previews": [], + "descriptionHTML": "Lists the most recent migrations, including both exports (which can be started through the REST API) and imports (which cannot be started using the REST API).
\nA list of repositories
is only returned for export migrations.
OK
" } - ], - "descriptionHTML": "Lists the most recent migrations, including both exports (which can be started through the REST API) and imports (which cannot be started using the REST API).
\nA list of repositories
is only returned for export migrations.
Warning
\n\nClosing down notice: This operation is closing down and will be removed in the future. Use the \"List custom repository roles\" endpoint instead.
\nList the custom repository roles available in this organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Response - list of custom role names
" } - ], - "descriptionHTML": "Warning
\n\nClosing down notice: This operation is closing down and will be removed in the future. Use the \"List custom repository roles\" endpoint instead.
\nList the custom repository roles available in this organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Lists the fine-grained permissions that can be used in custom repository roles for an organization. For more information, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Lists the fine-grained permissions that can be used in custom repository roles for an organization. For more information, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Remove an organization role from a user. For more information on organization roles, see \"Using organization roles.\"
\nThe authenticated user must be an administrator for the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Remove an organization role from a user. For more information on organization roles, see \"Using organization roles.\"
\nThe authenticated user must be an administrator for the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Delete a ruleset for an organization.
", "statusCodes": [ { "httpStatusCode": "204", @@ -357467,8 +357468,7 @@ "httpStatusCode": "500", "description": "Internal Error
" } - ], - "descriptionHTML": "Delete a ruleset for an organization.
" + ] } ], "security-managers": [ @@ -358916,13 +358916,13 @@ } ], "previews": [], + "descriptionHTML": "Returns the webhook configuration for an organization. To get more information about the webhook, including the active
state and events
, use \"Get an organization webhook .\"
You must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need admin:org_hook
scope. OAuth apps cannot list, view, or edit\nwebhooks that they did not create and users cannot list, view, or edit webhooks that were created by OAuth apps.
OK
" } - ], - "descriptionHTML": "Returns the webhook configuration for an organization. To get more information about the webhook, including the active
state and events
, use \"Get an organization webhook .\"
You must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need admin:org_hook
scope. OAuth apps cannot list, view, or edit\nwebhooks that they did not create and users cannot list, view, or edit webhooks that were created by OAuth apps.
Gets a specific package metadata for a public package owned by a user.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
OK
" } - ], - "descriptionHTML": "Gets a specific package metadata for a public package owned by a user.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
Gets the users or teams whose review is requested for a pull request. Once a requested reviewer submits a review, they are no longer considered a requested reviewer. Their review will instead be returned by the List reviews for a pull request operation.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "Gets the users or teams whose review is requested for a pull request. Once a requested reviewer submits a review, they are no longer considered a requested reviewer. Their review will instead be returned by the List reviews for a pull request operation.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -424333,13 +424333,13 @@ } ], "previews": [], + "descriptionHTML": "Note
\n\nYou can also specify a team or organization with team_id
and org_id
using the route DELETE /organizations/:org_id/team/:team_id/discussions/:discussion_number/reactions/:reaction_id
.
Delete a reaction to a team discussion.
\nOAuth app tokens and personal access tokens (classic) need the write:discussion
scope to use this endpoint.
No Content
" } - ], - "descriptionHTML": "Note
\n\nYou can also specify a team or organization with team_id
and org_id
using the route DELETE /organizations/:org_id/team/:team_id/discussions/:discussion_number/reactions/:reaction_id
.
Delete a reaction to a team discussion.
\nOAuth app tokens and personal access tokens (classic) need the write:discussion
scope to use this endpoint.
List any syntax errors that are detected in the CODEOWNERS\nfile.
\nFor more information about the correct CODEOWNERS syntax,\nsee \"About code owners.\"
", "statusCodes": [ { "httpStatusCode": "200", @@ -453917,8 +453918,7 @@ "httpStatusCode": "404", "description": "Resource not found
" } - ], - "descriptionHTML": "List any syntax errors that are detected in the CODEOWNERS\nfile.
\nFor more information about the correct CODEOWNERS syntax,\nsee \"About code owners.\"
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -524991,13 +524991,13 @@ } ], "previews": [], + "descriptionHTML": "Warning
\n\nEndpoint closing down notice: This endpoint route is closing down and will be removed from the Teams API. We recommend migrating your existing code to use the new List discussions
endpoint.
List all discussions on a team's page.
\nOAuth app tokens and personal access tokens (classic) need the read:discussion
scope to use this endpoint.
OK
" } - ], - "descriptionHTML": "Warning
\n\nEndpoint closing down notice: This endpoint route is closing down and will be removed from the Teams API. We recommend migrating your existing code to use the new List discussions
endpoint.
List all discussions on a team's page.
\nOAuth app tokens and personal access tokens (classic) need the read:discussion
scope to use this endpoint.
Lists a connection between a team and an external group.
\nYou can manage team membership with your identity provider using Enterprise Managed Users for GitHub Enterprise Cloud. For more information, see \"GitHub's products\" in the GitHub Help documentation.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ], - "descriptionHTML": "Lists a connection between a team and an external group.
\nYou can manage team membership with your identity provider using Enterprise Managed Users for GitHub Enterprise Cloud. For more information, see \"GitHub's products\" in the GitHub Help documentation.
" + ] }, { "serverUrl": "http(s)://HOSTNAME/api/v3", diff --git a/src/rest/data/ghes-3.15-2022-11-28/schema.json b/src/rest/data/ghes-3.15-2022-11-28/schema.json index 4401ffb50d41..6310a305d22f 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.15-2022-11-28/schema.json @@ -211074,7 +211074,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "read" + "\"Organization pre-receive hooks\" organization permissions": "read" } ] }, @@ -211170,7 +211170,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "read" + "\"Organization pre-receive hooks\" organization permissions": "read" } ] }, @@ -211275,7 +211275,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "write" + "\"Organization pre-receive hooks\" organization permissions": "write" } ] }, @@ -211372,7 +211372,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "write" + "\"Organization pre-receive hooks\" organization permissions": "write" } ] }, @@ -213414,7 +213414,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "read" + "\"Repository pre-receive hooks\" repository permissions": "read" } ] }, @@ -213516,7 +213516,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "read" + "\"Repository pre-receive hooks\" repository permissions": "read" } ] }, @@ -213626,7 +213626,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "write" + "\"Repository pre-receive hooks\" repository permissions": "write" } ] }, @@ -213728,7 +213728,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "write" + "\"Repository pre-receive hooks\" repository permissions": "write" } ] }, diff --git a/src/rest/data/ghes-3.16-2022-11-28/schema.json b/src/rest/data/ghes-3.16-2022-11-28/schema.json index a9de65514eb8..bb4da0c18b24 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.16-2022-11-28/schema.json @@ -1364,13 +1364,13 @@ } ], "previews": [], - "descriptionHTML": "Lists repositories and their GitHub Actions cache usage for an organization.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nOAuth tokens and personal access tokens (classic) need the read:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists repositories and their GitHub Actions cache usage for an organization.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nOAuth tokens and personal access tokens (classic) need the read:org
scope to use this endpoint.
Sets the GitHub Actions permissions policy for organizations and allowed actions in an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Sets the GitHub Actions permissions policy for organizations and allowed actions in an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
Adds an organization to the list of selected organizations that are enabled for GitHub Actions in an enterprise. To use this endpoint, the enterprise permission policy for enabled_organizations
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for an enterprise.\"
OAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Adds an organization to the list of selected organizations that are enabled for GitHub Actions in an enterprise. To use this endpoint, the enterprise permission policy for enabled_organizations
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for an enterprise.\"
OAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
Sets the actions that are allowed in an enterprise. To use this endpoint, the enterprise permission policy for allowed_actions
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for an enterprise.\"
OAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Sets the actions that are allowed in an enterprise. To use this endpoint, the enterprise permission policy for allowed_actions
must be configured to selected
. For more information, see \"Set GitHub Actions permissions for an enterprise.\"
OAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
Gets the level of access that workflows outside of the repository have to actions and reusable workflows in the repository.\nThis endpoint only applies to internal and private repositories.\nFor more information, see \"Allowing access to components in a private repository\" and\n\"Allowing access to components in an internal repository.\"
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets the level of access that workflows outside of the repository have to actions and reusable workflows in the repository.\nThis endpoint only applies to internal and private repositories.\nFor more information, see \"Allowing access to components in a private repository\" and\n\"Allowing access to components in an internal repository.\"
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Lists all secrets available in an organization without revealing their\nencrypted values.
\nAuthenticated users must have collaborator access to a repository to create, update, or read secrets.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
OK
" } - ] + ], + "descriptionHTML": "Lists all secrets available in an organization without revealing their\nencrypted values.
\nAuthenticated users must have collaborator access to a repository to create, update, or read secrets.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Gets your public key, which you need to encrypt secrets. You need to\nencrypt a secret before you can create or update secrets.
\nThe authenticated user must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets your public key, which you need to encrypt secrets. You need to\nencrypt a secret before you can create or update secrets.
\nThe authenticated user must have collaborator access to a repository to create, update, or read secrets.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Creates a new self-hosted runner group for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Created
" } - ] + ], + "descriptionHTML": "Creates a new self-hosted runner group for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Deletes a self-hosted runner group for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Deletes a self-hosted runner group for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Removes a self-hosted runner from a group configured in an enterprise. The runner is then returned to the default group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Removes a self-hosted runner from a group configured in an enterprise. The runner is then returned to the default group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Lists all self-hosted runner groups configured in an organization and inherited from an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists all self-hosted runner groups configured in an organization and inherited from an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Gets a specific self-hosted runner group for an organization.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets a specific self-hosted runner group for an organization.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Lists the repositories with access to a self-hosted runner group configured in an organization.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists the repositories with access to a self-hosted runner group configured in an organization.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Replaces the list of repositories that have access to a self-hosted runner group configured in an organization.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Replaces the list of repositories that have access to a self-hosted runner group configured in an organization.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Adds a self-hosted runner to a runner group configured in an organization.
\nOAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Adds a self-hosted runner to a runner group configured in an organization.
\nOAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Lists binaries for the runner application that you can download and run.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
OK
" } - ] + ], + "descriptionHTML": "Lists binaries for the runner application that you can download and run.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Returns a token that you can pass to the config
script. The token expires after one hour.
For example, you can replace TOKEN
in the following example with the registration token provided by this endpoint to configure your self-hosted runner:
./config.sh --url https://github.com/octo-org --token TOKEN\n
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Created
" } - ] + ], + "descriptionHTML": "Returns a token that you can pass to the config
script. The token expires after one hour.
For example, you can replace TOKEN
in the following example with the registration token provided by this endpoint to configure your self-hosted runner:
./config.sh --url https://github.com/octo-org --token TOKEN\n
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Returns a token that you can pass to the config
script to remove a self-hosted runner from an organization. The token expires after one hour.
For example, you can replace TOKEN
in the following example with the registration token provided by this endpoint to remove your self-hosted runner from an organization:
./config.sh remove --token TOKEN\n
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Created
" } - ] + ], + "descriptionHTML": "Returns a token that you can pass to the config
script to remove a self-hosted runner from an organization. The token expires after one hour.
For example, you can replace TOKEN
in the following example with the registration token provided by this endpoint to remove your self-hosted runner from an organization:
./config.sh remove --token TOKEN\n
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Forces the removal of a self-hosted runner from an organization. You can use this endpoint to completely remove the runner when the machine you were using no longer exists.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Validation failed, or the endpoint has been spammed.
" } - ] + ], + "descriptionHTML": "Forces the removal of a self-hosted runner from an organization. You can use this endpoint to completely remove the runner when the machine you were using no longer exists.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Creates an organization variable that you can reference in a GitHub Actions workflow.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Response when creating a variable
" } - ] + ], + "descriptionHTML": "Creates an organization variable that you can reference in a GitHub Actions workflow.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth tokens and personal access tokens (classic) need theadmin:org
scope to use this endpoint. If the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Creates a repository variable that you can reference in a GitHub Actions workflow.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Created
" } - ] + ], + "descriptionHTML": "Creates a repository variable that you can reference in a GitHub Actions workflow.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Re-run all of the failed jobs and their dependent jobs in a workflow run using the id
of the workflow run.
OAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Created
" } - ] + ], + "descriptionHTML": "Re-run all of the failed jobs and their dependent jobs in a workflow run using the id
of the workflow run.
OAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Lists the workflows in a repository.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
OK
" } - ] + ], + "descriptionHTML": "Lists the workflows in a repository.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
List all notifications for the current user, sorted by most recently updated.
", "statusCodes": [ { "httpStatusCode": "200", @@ -79775,7 +79774,8 @@ "httpStatusCode": "422", "description": "Validation failed, or the endpoint has been spammed.
" } - ] + ], + "descriptionHTML": "List all notifications for the current user, sorted by most recently updated.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -100313,13 +100313,13 @@ } ], "previews": [], - "descriptionHTML": "Enables an authenticated GitHub App to find the organization's installation information.
\nYou must use a JWT to access this endpoint.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Enables an authenticated GitHub App to find the organization's installation information.
\nYou must use a JWT to access this endpoint.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -200130,13 +200130,13 @@ } ], "previews": [], - "descriptionHTML": "Lists the deployment branch policies for an environment.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
OK
" } - ] + ], + "descriptionHTML": "Lists the deployment branch policies for an environment.
\nAnyone with read access to the repository can use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint with a private repository.
OK
" } - ] + ], + "descriptionHTML": "" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -209337,13 +209337,13 @@ } ], "previews": [], - "descriptionHTML": "", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -209584,13 +209584,13 @@ } ], "previews": [], - "descriptionHTML": "", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "" } ], "announcement": [ @@ -209671,13 +209671,13 @@ } ], "previews": [], - "descriptionHTML": "Gets the current message and expiration date of the global announcement banner in your enterprise.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Gets the current message and expiration date of the global announcement banner in your enterprise.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -209819,13 +209819,13 @@ } ], "previews": [], - "descriptionHTML": "Removes the global announcement banner in your enterprise.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ] + ], + "descriptionHTML": "Removes the global announcement banner in your enterprise.
" } ], "audit-log": [ @@ -216258,7 +216258,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "read" + "\"Organization pre-receive hooks\" organization permissions": "read" } ] }, @@ -216354,7 +216354,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "read" + "\"Organization pre-receive hooks\" organization permissions": "read" } ] }, @@ -216459,7 +216459,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "write" + "\"Organization pre-receive hooks\" organization permissions": "write" } ] }, @@ -216556,7 +216556,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "write" + "\"Organization pre-receive hooks\" organization permissions": "write" } ] }, @@ -218598,7 +218598,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "read" + "\"Repository pre-receive hooks\" repository permissions": "read" } ] }, @@ -218700,7 +218700,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "read" + "\"Repository pre-receive hooks\" repository permissions": "read" } ] }, @@ -218810,7 +218810,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "write" + "\"Repository pre-receive hooks\" repository permissions": "write" } ] }, @@ -218912,7 +218912,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "write" + "\"Repository pre-receive hooks\" repository permissions": "write" } ] }, @@ -277242,13 +277242,13 @@ } ], "previews": [], - "descriptionHTML": "You can use the REST API to delete comments on issues and pull requests. Every pull request is an issue, but not every issue is a pull request.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ] + ], + "descriptionHTML": "You can use the REST API to delete comments on issues and pull requests. Every pull request is an issue, but not every issue is a pull request.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -301805,13 +301805,13 @@ } ], "previews": [], - "descriptionHTML": "Lists labels for issues in a milestone.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Lists labels for issues in a milestone.
" } ], "milestones": [ @@ -321905,13 +321905,13 @@ } ], "previews": [], - "descriptionHTML": "Get Hypermedia links to resources accessible in GitHub's REST API
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Get Hypermedia links to resources accessible in GitHub's REST API
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -322192,13 +322192,13 @@ } ], "previews": [], - "descriptionHTML": "Get a random sentence from the Zen of GitHub
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Get a random sentence from the Zen of GitHub
" } ] }, @@ -345107,13 +345107,13 @@ } ], "previews": [], - "descriptionHTML": "Lists all GitHub Apps in an organization. The installation count includes\nall GitHub Apps installed on repositories in the organization.
\nThe authenticated user must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:read
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists all GitHub Apps in an organization. The installation count includes\nall GitHub Apps installed on repositories in the organization.
\nThe authenticated user must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:read
scope to use this endpoint.
List the custom repository roles available in this organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Response - list of custom role names
" } - ] + ], + "descriptionHTML": "List the custom repository roles available in this organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Gets a custom repository role that is available to all repositories owned by the organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Resource not found
" } - ] + ], + "descriptionHTML": "Gets a custom repository role that is available to all repositories owned by the organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Removing a user from this list will remove them from all teams and they will no longer have any access to the organization's repositories.
\nNote
\n\nIf a user has both direct membership in the organization as well as indirect membership via an enterprise team, only their direct membership will be removed. Their indirect membership via an enterprise team remains until the user is removed from the enterprise team.
\nForbidden
" } - ] + ], + "descriptionHTML": "Removing a user from this list will remove them from all teams and they will no longer have any access to the organization's repositories.
\nNote
\n\nIf a user has both direct membership in the organization as well as indirect membership via an enterprise team, only their direct membership will be removed. Their indirect membership via an enterprise team remains until the user is removed from the enterprise team.
\nReturns the webhook configuration for an organization. To get more information about the webhook, including the active
state and events
, use \"Get an organization webhook .\"
You must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need admin:org_hook
scope. OAuth apps cannot list, view, or edit\nwebhooks that they did not create and users cannot list, view, or edit webhooks that were created by OAuth apps.
OK
" } - ] + ], + "descriptionHTML": "Returns the webhook configuration for an organization. To get more information about the webhook, including the active
state and events
, use \"Get an organization webhook .\"
You must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need admin:org_hook
scope. OAuth apps cannot list, view, or edit\nwebhooks that they did not create and users cannot list, view, or edit webhooks that were created by OAuth apps.
Lists external groups available in an organization. You can query the groups using the display_name
parameter, only groups with a group_name
containing the text provided in the display_name
parameter will be returned. You can also limit your page results using the per_page
parameter. GitHub Enterprise Server generates a url-encoded page
token using a cursor value for where the next page begins. For more information on cursor pagination, see \"Offset and Cursor Pagination explained.\"
You can manage team membership with your identity provider using Enterprise Managed Users for GitHub Enterprise Cloud. For more information, see \"GitHub's products\" in the GitHub Help documentation.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Lists external groups available in an organization. You can query the groups using the display_name
parameter, only groups with a group_name
containing the text provided in the display_name
parameter will be returned. You can also limit your page results using the per_page
parameter. GitHub Enterprise Server generates a url-encoded page
token using a cursor value for where the next page begins. For more information on cursor pagination, see \"Offset and Cursor Pagination explained.\"
You can manage team membership with your identity provider using Enterprise Managed Users for GitHub Enterprise Cloud. For more information, see \"GitHub's products\" in the GitHub Help documentation.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", diff --git a/src/rest/data/ghes-3.17-2022-11-28/schema.json b/src/rest/data/ghes-3.17-2022-11-28/schema.json index 11a47f4e5d62..f3c35733c5a2 100644 --- a/src/rest/data/ghes-3.17-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.17-2022-11-28/schema.json @@ -217060,7 +217060,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "read" + "\"Organization pre-receive hooks\" organization permissions": "read" } ] }, @@ -217156,7 +217156,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "read" + "\"Organization pre-receive hooks\" organization permissions": "read" } ] }, @@ -217261,7 +217261,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "write" + "\"Organization pre-receive hooks\" organization permissions": "write" } ] }, @@ -217358,7 +217358,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" organization permissions": "write" + "\"Organization pre-receive hooks\" organization permissions": "write" } ] }, @@ -219400,7 +219400,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "read" + "\"Repository pre-receive hooks\" repository permissions": "read" } ] }, @@ -219502,7 +219502,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "read" + "\"Repository pre-receive hooks\" repository permissions": "read" } ] }, @@ -219612,7 +219612,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "write" + "\"Repository pre-receive hooks\" repository permissions": "write" } ] }, @@ -219714,7 +219714,7 @@ "fineGrainedPat": true, "permissions": [ { - "\"Pre-receive hooks\" repository permissions": "write" + "\"Repository pre-receive hooks\" repository permissions": "write" } ] }, diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index f337a05ee2ef..566793242c79 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -44,5 +44,5 @@ ] } }, - "sha": "1a8e746d3e6e8faaef13ee92434686571cccb992" + "sha": "ecbe0df804f3f85f8a68f48d6e9711d05da6f201" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index 1b14ce565696..4a1c572945bc 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "1a8e746d3e6e8faaef13ee92434686571cccb992" + "sha": "ecbe0df804f3f85f8a68f48d6e9711d05da6f201" } \ No newline at end of file From 013a73566c284432dbc17aa4affbfd9d399fe7e8 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Fri, 25 Jul 2025 12:48:09 -0700 Subject: [PATCH 2/4] Update OpenAPI Description (#56831) Co-authored-by: John Clement <70238417+jclement136@users.noreply.github.com> --- .../data/ghes-3.15-2022-11-28/schema.json | 210 +++++++++--------- 1 file changed, 105 insertions(+), 105 deletions(-) diff --git a/src/rest/data/ghes-3.15-2022-11-28/schema.json b/src/rest/data/ghes-3.15-2022-11-28/schema.json index 6310a305d22f..132e2ad4fa27 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.15-2022-11-28/schema.json @@ -479,13 +479,13 @@ } ], "previews": [], - "descriptionHTML": "Gets a specific artifact for a workflow run.
\nAnyone with read access to the repository can use this endpoint.
\nIf the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets a specific artifact for a workflow run.
\nAnyone with read access to the repository can use this endpoint.
\nIf the repository is private, OAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Sets the GitHub Actions cache usage policy for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Sets the GitHub Actions cache usage policy for an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
Gets the total GitHub Actions cache usage for an organization.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nOAuth tokens and personal access tokens (classic) need the read:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets the total GitHub Actions cache usage for an organization.\nThe data fetched using this API is refreshed approximately every 5 minutes, so values returned from this endpoint may take at least 5 minutes to get updated.
\nOAuth tokens and personal access tokens (classic) need the read:org
scope to use this endpoint.
Gets the GitHub Actions permissions policy for repositories and allowed actions in an organization.
\nYou must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
OK
" } - ] + ], + "descriptionHTML": "Gets the GitHub Actions permissions policy for repositories and allowed actions in an organization.
\nYou must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
Gets the default workflow permissions granted to the GITHUB_TOKEN
when running workflows in an organization,\nas well as whether GitHub Actions can submit approving pull request reviews. For more information, see\n\"Setting the permissions of the GITHUB_TOKEN for your organization.\"
OAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets the default workflow permissions granted to the GITHUB_TOKEN
when running workflows in an organization,\nas well as whether GitHub Actions can submit approving pull request reviews. For more information, see\n\"Setting the permissions of the GITHUB_TOKEN for your organization.\"
OAuth tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Gets the level of access that workflows outside of the repository have to actions and reusable workflows in the repository.\nThis endpoint only applies to internal and private repositories.\nFor more information, see \"Allowing access to components in a private repository\" and\n\"Allowing access to components in an internal repository.\"
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets the level of access that workflows outside of the repository have to actions and reusable workflows in the repository.\nThis endpoint only applies to internal and private repositories.\nFor more information, see \"Allowing access to components in a private repository\" and\n\"Allowing access to components in an internal repository.\"
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Updates the name
and visibility
of a self-hosted runner group in an enterprise.
OAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Updates the name
and visibility
of a self-hosted runner group in an enterprise.
OAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Lists the self-hosted runners that are in a specific enterprise group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists the self-hosted runners that are in a specific enterprise group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Replaces the list of self-hosted runners that are part of an enterprise runner group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Replaces the list of self-hosted runners that are part of an enterprise runner group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Removes a self-hosted runner from a group configured in an enterprise. The runner is then returned to the default group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Removes a self-hosted runner from a group configured in an enterprise. The runner is then returned to the default group.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Lists all self-hosted runner groups configured in an organization and inherited from an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists all self-hosted runner groups configured in an organization and inherited from an enterprise.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Lists binaries for the runner application that you can download and run.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists binaries for the runner application that you can download and run.
\nOAuth app tokens and personal access tokens (classic) need the manage_runners:enterprise
scope to use this endpoint.
Remove all previous custom labels and set the new custom labels for a specific\nself-hosted runner configured in an organization.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Validation failed, or the endpoint has been spammed.
" } - ] + ], + "descriptionHTML": "Remove all previous custom labels and set the new custom labels for a specific\nself-hosted runner configured in an organization.
\nAuthenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Remove a custom label from a self-hosted runner configured\nin an organization. Returns the remaining labels from the runner.
\nThis endpoint returns a 404 Not Found
status if the custom label is not\npresent on the runner.
Authenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Validation failed, or the endpoint has been spammed.
" } - ] + ], + "descriptionHTML": "Remove a custom label from a self-hosted runner configured\nin an organization. Returns the remaining labels from the runner.
\nThis endpoint returns a 404 Not Found
status if the custom label is not\npresent on the runner.
Authenticated users must have admin access to the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Lists all self-hosted runners configured in a repository.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Lists all self-hosted runners configured in a repository.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Forces the removal of a self-hosted runner from a repository. You can use this endpoint to completely remove the runner when the machine you were using no longer exists.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Validation failed, or the endpoint has been spammed.
" } - ] + ], + "descriptionHTML": "Forces the removal of a self-hosted runner from a repository. You can use this endpoint to completely remove the runner when the machine you were using no longer exists.
\nAuthenticated users must have admin access to the repository to use this endpoint.
\nOAuth tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Lists all organization variables.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
OK
" } - ] + ], + "descriptionHTML": "Lists all organization variables.
\nAuthenticated users must have collaborator access to a repository to create, update, or read variables.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint. If the repository is private, the repo
scope is also required.
Gets a specific variable in a repository.
\nThe authenticated user must have collaborator access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "Gets a specific variable in a repository.
\nThe authenticated user must have collaborator access to the repository to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the repo
scope to use this endpoint.
Note
\n\nThis API is not built to serve real-time use cases. Depending on the time of day, event latency can be anywhere from 30s to 6h.
\nOK
" } - ] + ], + "descriptionHTML": "Note
\n\nThis API is not built to serve real-time use cases. Depending on the time of day, event latency can be anywhere from 30s to 6h.
\nIf you would like to watch a repository, set subscribed
to true
. If you would like to ignore notifications made within a repository, set ignored
to true
. If you would like to stop watching a repository, delete the repository's subscription completely.
OK
" } - ] + ], + "descriptionHTML": "If you would like to watch a repository, set subscribed
to true
. If you would like to ignore notifications made within a repository, set ignored
to true
. If you would like to stop watching a repository, delete the repository's subscription completely.
Removes the announcement banner currently set for the organization.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ] + ], + "descriptionHTML": "Removes the announcement banner currently set for the organization.
" } ] }, @@ -100255,13 +100255,13 @@ } ], "previews": [], - "descriptionHTML": "Enables an authenticated GitHub App to find the organization's installation information.
\nYou must use a JWT to access this endpoint.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Enables an authenticated GitHub App to find the organization's installation information.
\nYou must use a JWT to access this endpoint.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -140374,13 +140374,13 @@ } ], "previews": [], - "descriptionHTML": "Updates a check run for a specific commit in a repository.
\nNote
\n\nThe endpoints to manage checks only look for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
OAuth apps and personal access tokens (classic) cannot use this endpoint.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Updates a check run for a specific commit in a repository.
\nNote
\n\nThe endpoints to manage checks only look for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
OAuth apps and personal access tokens (classic) cannot use this endpoint.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -163495,7 +163495,6 @@ } ], "previews": [], - "descriptionHTML": "Returns array of all GitHub's codes of conduct.
", "statusCodes": [ { "httpStatusCode": "200", @@ -163505,7 +163504,8 @@ "httpStatusCode": "304", "description": "Not modified
" } - ] + ], + "descriptionHTML": "Returns array of all GitHub's codes of conduct.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -190137,13 +190137,13 @@ } ], "previews": [], - "descriptionHTML": "Deletes a secret in an organization using the secret name.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Deletes a secret in an organization using the secret name.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -205391,13 +205391,13 @@ } ], "previews": [], - "descriptionHTML": "", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -211422,13 +211422,13 @@ } ], "previews": [], - "descriptionHTML": "Removes any overrides for this hook at the org level for this org.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Removes any overrides for this hook at the org level for this org.
" } ], "orgs": [ @@ -213677,13 +213677,13 @@ } ], "previews": [], - "descriptionHTML": "For pre-receive hooks which are allowed to be configured at the repo level, you can set enforcement
OK
" } - ] + ], + "descriptionHTML": "For pre-receive hooks which are allowed to be configured at the repo level, you can set enforcement
Creates a comment on a gist.
\nThis endpoint supports the following custom media types. For more information, see \"Media types.\"
\napplication/vnd.github.raw+json
: Returns the raw markdown. This is the default if you do not pass any specific media type.application/vnd.github.base64+json
: Returns the base64-encoded contents. This can be useful if your gist contains any invalid UTF-8 sequences.Resource not found
" } - ] + ], + "descriptionHTML": "Creates a comment on a gist.
\nThis endpoint supports the following custom media types. For more information, see \"Media types.\"
\napplication/vnd.github.raw+json
: Returns the raw markdown. This is the default if you do not pass any specific media type.application/vnd.github.base64+json
: Returns the base64-encoded contents. This can be useful if your gist contains any invalid UTF-8 sequences.Adds up to 10 assignees to an issue. Users already assigned to an issue are not replaced.
", "statusCodes": [ { "httpStatusCode": "201", "description": "Created
" } - ] + ], + "descriptionHTML": "Adds up to 10 assignees to an issue. Users already assigned to an issue are not replaced.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -296574,13 +296574,13 @@ } ], "previews": [], - "descriptionHTML": "Lists labels for issues in a milestone.
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Lists labels for issues in a milestone.
" } ], "milestones": [ @@ -316674,13 +316674,13 @@ } ], "previews": [], - "descriptionHTML": "Get Hypermedia links to resources accessible in GitHub's REST API
", "statusCodes": [ { "httpStatusCode": "200", "description": "OK
" } - ] + ], + "descriptionHTML": "Get Hypermedia links to resources accessible in GitHub's REST API
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -319305,13 +319305,13 @@ } ], "previews": [], - "descriptionHTML": "Lists the most recent migrations, including both exports (which can be started through the REST API) and imports (which cannot be started using the REST API).
\nA list of repositories
is only returned for export migrations.
OK
" } - ] + ], + "descriptionHTML": "Lists the most recent migrations, including both exports (which can be started through the REST API) and imports (which cannot be started using the REST API).
\nA list of repositories
is only returned for export migrations.
Warning
\n\nClosing down notice: This operation is closing down and will be removed in the future. Use the \"List custom repository roles\" endpoint instead.
\nList the custom repository roles available in this organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Response - list of custom role names
" } - ] + ], + "descriptionHTML": "Warning
\n\nClosing down notice: This operation is closing down and will be removed in the future. Use the \"List custom repository roles\" endpoint instead.
\nList the custom repository roles available in this organization. For more information on custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be administrator of the organization or of a repository of the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
or repo
scope to use this endpoint.
Deletes a custom role from an organization. Once the custom role has been deleted, any\nuser, team, or invitation with the deleted custom role will be reassigned the inherited role. For more information about custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator for the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Deletes a custom role from an organization. Once the custom role has been deleted, any\nuser, team, or invitation with the deleted custom role will be reassigned the inherited role. For more information about custom repository roles, see \"About custom repository roles.\"
\nThe authenticated user must be an administrator for the organization to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need the admin:org
scope to use this endpoint.
Removes the public membership for the authenticated user from the specified organization, unless public visibility is enforced by default.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ] + ], + "descriptionHTML": "Removes the public membership for the authenticated user from the specified organization, unless public visibility is enforced by default.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -357619,7 +357619,6 @@ } ], "previews": [], - "descriptionHTML": "Create a repository ruleset for an organization.
", "statusCodes": [ { "httpStatusCode": "201", @@ -357633,7 +357632,8 @@ "httpStatusCode": "500", "description": "Internal Error
" } - ] + ], + "descriptionHTML": "Create a repository ruleset for an organization.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -362492,7 +362492,6 @@ } ], "previews": [], - "descriptionHTML": "Delete a webhook for an organization.
\nThe authenticated user must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need admin:org_hook
scope. OAuth apps cannot list, view, or edit\nwebhooks that they did not create and users cannot list, view, or edit webhooks that were created by OAuth apps.
Resource not found
" } - ] + ], + "descriptionHTML": "Delete a webhook for an organization.
\nThe authenticated user must be an organization owner to use this endpoint.
\nOAuth app tokens and personal access tokens (classic) need admin:org_hook
scope. OAuth apps cannot list, view, or edit\nwebhooks that they did not create and users cannot list, view, or edit webhooks that were created by OAuth apps.
Lists packages owned by the authenticated user within the user's namespace.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
The value of per_page
multiplied by page
cannot be greater than 10000.
Lists packages owned by the authenticated user within the user's namespace.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
Gets a specific package version for a package owned by the authenticated user.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
OK
" } - ] + ], + "descriptionHTML": "Gets a specific package version for a package owned by the authenticated user.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
Gets a specific package version for a public package owned by a specified user.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
OK
" } - ] + ], + "descriptionHTML": "Gets a specific package version for a public package owned by a specified user.
\nOAuth app tokens and personal access tokens (classic) need the read:packages
scope to use this endpoint. For more information, see \"About permissions for GitHub Packages.\"
You can request that your site be built from the latest revision on the default branch. This has the same effect as pushing a commit to your default branch, but does not require an additional commit. Manually triggering page builds can be helpful when diagnosing build warnings and failures.
\nBuild requests are limited to one concurrent build per repository and one concurrent build per requester. If you request a build while another is still in progress, the second request will be queued until the first completes.
", "statusCodes": [ { "httpStatusCode": "201", "description": "Created
" } - ] + ], + "descriptionHTML": "You can request that your site be built from the latest revision on the default branch. This has the same effect as pushing a commit to your default branch, but does not require an additional commit. Manually triggering page builds can be helpful when diagnosing build warnings and failures.
\nBuild requests are limited to one concurrent build per repository and one concurrent build per requester. If you request a build while another is still in progress, the second request will be queued until the first completes.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -410226,13 +410226,13 @@ } ], "previews": [], - "descriptionHTML": "Lists all review comments for a specified pull request. By default, review comments\nare in ascending order by ID.
\nThis endpoint supports the following custom media types. For more information, see \"Media types.\"
\napplication/vnd.github-commitcomment.raw+json
: Returns the raw markdown body. Response will include body
. This is the default if you do not pass any specific media type.application/vnd.github-commitcomment.text+json
: Returns a text only representation of the markdown body. Response will include body_text
.application/vnd.github-commitcomment.html+json
: Returns HTML rendered from the body's markdown. Response will include body_html
.application/vnd.github-commitcomment.full+json
: Returns raw, text, and HTML representations. Response will include body
, body_text
, and body_html
.OK
" } - ] + ], + "descriptionHTML": "Lists all review comments for a specified pull request. By default, review comments\nare in ascending order by ID.
\nThis endpoint supports the following custom media types. For more information, see \"Media types.\"
\napplication/vnd.github-commitcomment.raw+json
: Returns the raw markdown body. Response will include body
. This is the default if you do not pass any specific media type.application/vnd.github-commitcomment.text+json
: Returns a text only representation of the markdown body. Response will include body_text
.application/vnd.github-commitcomment.html+json
: Returns HTML rendered from the body's markdown. Response will include body_html
.application/vnd.github-commitcomment.full+json
: Returns raw, text, and HTML representations. Response will include body
, body_text
, and body_html
.List the reactions to a team discussion comment.
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route GET /organizations/:org_id/team/:team_id/discussions/:discussion_number/comments/:comment_number/reactions
.
OAuth app tokens and personal access tokens (classic) need the read:discussion
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "List the reactions to a team discussion comment.
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route GET /organizations/:org_id/team/:team_id/discussions/:discussion_number/comments/:comment_number/reactions
.
OAuth app tokens and personal access tokens (classic) need the read:discussion
scope to use this endpoint.
Note
\n\nYou can also specify a repository by repository_id
using the route DELETE delete /repositories/:repository_id/issues/comments/:comment_id/reactions/:reaction_id
.
Delete a reaction to an issue comment.
", "statusCodes": [ { "httpStatusCode": "204", "description": "No Content
" } - ] + ], + "descriptionHTML": "Note
\n\nYou can also specify a repository by repository_id
using the route DELETE delete /repositories/:repository_id/issues/comments/:comment_id/reactions/:reaction_id
.
Delete a reaction to an issue comment.
" }, { "serverUrl": "http(s)://HOSTNAME/api/v3", @@ -465061,13 +465061,13 @@ } } ], - "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner
and template_repo
route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template
key is true
.
OAuth app tokens and personal access tokens (classic) need the public_repo
or repo
scope to create a public repository, and repo
scope to create a private repository.
Created
" } ], + "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner
and template_repo
route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template
key is true
.
OAuth app tokens and personal access tokens (classic) need the public_repo
or repo
scope to create a public repository, and repo
scope to create a private repository.
Creating and using repository templates is currently available for developers to preview. To access this new endpoint during the preview period, you must provide a custom media type in the Accept
header:
application/vnd.github.baptiste-preview+json\n
"
]
@@ -483588,7 +483588,6 @@
}
],
"previews": [],
- "descriptionHTML": "Enables Git LFS for a repository.
\nOAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
We will return a 403 with one of the following messages:
\nEnables Git LFS for a repository.
\nOAuth app tokens and personal access tokens (classic) need the admin:enterprise
scope to use this endpoint.
To delete a team, the authenticated user must be an organization owner or team maintainer.
\nIf you are an organization owner, deleting a parent team will delete all of its child teams as well.
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}
.
No Content
" } - ] + ], + "descriptionHTML": "To delete a team, the authenticated user must be an organization owner or team maintainer.
\nIf you are an organization owner, deleting a parent team will delete all of its child teams as well.
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}
.
Warning
\n\nClosing down notice: Projects (classic) is being deprecated in favor of the new Projects experience.\nSee the changelog for more information.
\nNot Found if project is not managed by this team
" } - ] + ], + "descriptionHTML": "Warning
\n\nClosing down notice: Projects (classic) is being deprecated in favor of the new Projects experience.\nSee the changelog for more information.
\nWarning
\n\nEndpoint closing down notice: This endpoint route is closing down and will be removed from the Teams API. We recommend migrating your existing code to use the new Delete a discussion comment endpoint.
\nDeletes a comment on a team discussion.
\nOAuth app tokens and personal access tokens (classic) need the write:discussion
scope to use this endpoint.
No Content
" } - ] + ], + "descriptionHTML": "Warning
\n\nEndpoint closing down notice: This endpoint route is closing down and will be removed from the Teams API. We recommend migrating your existing code to use the new Delete a discussion comment endpoint.
\nDeletes a comment on a team discussion.
\nOAuth app tokens and personal access tokens (classic) need the write:discussion
scope to use this endpoint.
List all discussions on a team's page.
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/discussions
.
OAuth app tokens and personal access tokens (classic) need the read:discussion
scope to use this endpoint.
OK
" } - ] + ], + "descriptionHTML": "List all discussions on a team's page.
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/discussions
.
OAuth app tokens and personal access tokens (classic) need the read:discussion
scope to use this endpoint.
Creates a new discussion post on a team's page.
\nThis endpoint triggers notifications. Creating content too quickly using this endpoint may result in secondary rate limiting. For more information, see \"Rate limits for the API\" and \"Best practices for using the REST API.\"
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route POST /organizations/{org_id}/team/{team_id}/discussions
.
OAuth app tokens and personal access tokens (classic) need the write:discussion
scope to use this endpoint.
Created
" } - ] + ], + "descriptionHTML": "Creates a new discussion post on a team's page.
\nThis endpoint triggers notifications. Creating content too quickly using this endpoint may result in secondary rate limiting. For more information, see \"Rate limits for the API\" and \"Best practices for using the REST API.\"
\nNote
\n\nYou can also specify a team by org_id
and team_id
using the route POST /organizations/{org_id}/team/{team_id}/discussions
.
OAuth app tokens and personal access tokens (classic) need the write:discussion
scope to use this endpoint.
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: