diff --git a/data/release-notes/enterprise-server/3-12/16.yml b/data/release-notes/enterprise-server/3-12/16.yml new file mode 100644 index 000000000000..79dd87f13e8b --- /dev/null +++ b/data/release-notes/enterprise-server/3-12/16.yml @@ -0,0 +1,46 @@ +date: '2025-03-04' +sections: + security_fixes: + - | + Permissions and ownership of `/etc/ssh/sshd_config` are now enforced so that the `root` identity is the only one able to read or write to the file. + - | + Packages have been updated to the latest security versions. + bugs: + - | + Some instances with self-signed certificates encountered duplicated IP and DNS entries in their certificate. + - | + Domain entries could fail to load in the "Verified & Approves Domains" section of the site admin dashboard if one or more authoritative nameservers for the affected domain was unreachable or unresponsive. + - | + An issue with the webhook delivery system could cause missing commits on pull requests and stop GitHub Actions workflows from running reliably on certain triggers. A database replication delay in the webhook delivery system has been removed. + - | + Some packages failed to install when a hotpatch was applied to instances hosted on Google Cloud Platform. + changes: + - | + The `ghe-check-disk-usage` command has been updated to provide more valuable insights into troubleshooting disk space issues on the root and data disks. + - | + A graph for visualizing the status of repository maintenance has been added to the management console. + known_issues: + - | + Custom firewall rules are removed during the upgrade process. + - | + During the validation phase of a configuration run, a `No such object` error may occur for the Notebook and Viewscreen services. This error can be ignored as the services should still correctly start. + - | + If the root site administrator is locked out of the Management Console after failed login attempts, the account does not unlock automatically after the defined lockout time. Someone with administrative SSH access to the instance must unlock the account using the administrative shell. For more information, see "[AUTOTITLE](/admin/configuration/administering-your-instance-from-the-management-console/troubleshooting-access-to-the-management-console#unlocking-the-root-site-administrator-account)." + - | + The `mbind: Operation not permitted` error in the `/var/log/mysql/mysql.err` file can be ignored. MySQL 8 does not gracefully handle when the `CAP_SYS_NICE` capability isn't required, and outputs an error instead of a warning. + - | + On an instance with the HTTP `X-Forwarded-For` header configured for use behind a load balancer, all client IP addresses in the instance's audit log erroneously appear as 127.0.0.1. + - | + {% data reusables.release-notes.large-adoc-files-issue %} + - | + The `reply.[hostname]` subdomain is falsely always displaying as having no ssl and dns record, when testing the domain settings via management console **without subdomain isolation**. When regenerating the certificates with management console, the `subdomain reply.[hostname]` is missing from the ssl certification. + - | + Admin stats REST API endpoints may timeout on appliances with many users or repositories. Retrying the request until data is returned is advised. + - | + {% data reusables.release-notes.2024-06-possible-frontend-5-minute-outage-during-hotpatch-upgrade %} + - | + When restoring from a backup snapshot, a large number of `mapper_parsing_exception` errors may be displayed. + - | + Some customers upgrading from 3.11.x or 3.12.x may experience a bug with the feature "Automatic update checks", filling the root disk with logs causing a system degradation. To prevent this, you can turn off the feature "[Enable automatic update check](/admin/upgrading-your-instance/preparing-to-upgrade/enabling-automatic-update-checks#enabling-automatic-update-checks)" in the management console. + - | + After a geo-replica is promoted to be a primary by running `ghe-repl-promote`, the actions workflow of a repository does not have any suggested workflows. diff --git a/data/release-notes/enterprise-server/3-13/12.yml b/data/release-notes/enterprise-server/3-13/12.yml new file mode 100644 index 000000000000..a58fb150139f --- /dev/null +++ b/data/release-notes/enterprise-server/3-13/12.yml @@ -0,0 +1,50 @@ +date: '2025-03-04' +sections: + security_fixes: + - | + Permissions and ownership of `/etc/ssh/sshd_config` are enforced so that the `root` identity is the only one able to read or write to the file. + - | + Packages have been updated to the latest security versions. + bugs: + - | + Some instances with self-signed certificates encountered duplicated IP and DNS entries in their certificate. + - | + During an upgrade, encrypted record diagnostics would incorrectly flag 2FA records without associated users as undecryptable, causing misleading or unactionable error messages. In addition, in a high-availability or cluster configuration, encrypted record diagnostics were run unnecessarily on nodes other than the MySQL primary, and the resulting prompt from these diagnostics did not honor the `-y` flag. + - | + An issue with the webhook delivery system could cause missing commits on pull requests and stop GitHub Actions workflows from running reliably on certain triggers. A database replication delay in the webhook delivery system has been removed. + - | + When a pre-receive hook blocked users from making a commit in the UI, the error message did not display any `echo` messages specified in the pre-receive hook script. + - | + When users requested large amounts of data from certain API endpoints, such as [List organization repositories](/rest/repos/repos#list-organization-repositories), they sometimes received a `500` error. + - | + Domain entries could fail to load in the "Verified & Approves Domains" section of the site admin dashboard if one or more authoritative nameservers for the affected domain was unreachable or unresponsive. + - | + Some packages failed to install when a hotpatch was applied to instances hosted on Google Cloud Platform. + changes: + - | + The `ghe-check-disk-usage` command has been updated to provide more valuable insights into troubleshooting disk space issues on the root and data disks. + - | + A graph for visualizing the status of repository maintenance has been added to the management console. + known_issues: + - | + During the validation phase of a configuration run, a `No such object` error may occur for the Notebook and Viewscreen services. This error can be ignored as the services should still correctly start. + - | + If the root site administrator is locked out of the Management Console after failed login attempts, the account does not unlock automatically after the defined lockout time. Someone with administrative SSH access to the instance must unlock the account using the administrative shell. For more information, see "[AUTOTITLE](/admin/configuration/administering-your-instance-from-the-management-console/troubleshooting-access-to-the-management-console#unlocking-the-root-site-administrator-account)." + - | + On an instance with the HTTP `X-Forwarded-For` header configured for use behind a load balancer, all client IP addresses in the instance's audit log erroneously appear as 127.0.0.1. + - | + For an instance in a cluster configuration and with GitHub Actions enabled, restoring a cluster from backup requires targeting the primary DB node. + - | + When following the steps for [Replacing the primary MySQL node](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-the-primary-mysql-node), step 14 (running `ghe-cluster-config-apply`) might fail with errors. If this occurs, re-running `ghe-cluster-config-apply` is expected to succeed. + - | + Running a config apply as part of the steps for [Replacing a node in an emergency](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-a-node-in-an-emergency) may fail with errors if the node being replaced is still reachable. If this occurs, shutdown the node and repeat the steps. + - | + {% data reusables.release-notes.2024-06-possible-frontend-5-minute-outage-during-hotpatch-upgrade %} + - | + When restoring data originally backed up from a 3.13 or greater appliance version, the elasticsearch indices need to be reindexed before some of the data will show up. This happens via a nightly scheduled job. It can also be forced by running `/usr/local/share/enterprise/ghe-es-search-repair`. + - | + When restoring from a backup snapshot, a large number of `mapper_parsing_exception` errors may be displayed. + - | + After a restore, existing outside collaborators are unable to be added to repositories in a new organization. This issue can be resolved by running `/usr/local/share/enterprise/ghe-es-search-repair` on the appliance. + - | + After a geo-replica is promoted to be a primary by running `ghe-repl-promote`, the actions workflow of a repository does not have any suggested workflows. diff --git a/data/release-notes/enterprise-server/3-14/9.yml b/data/release-notes/enterprise-server/3-14/9.yml new file mode 100644 index 000000000000..d6fab06b5fba --- /dev/null +++ b/data/release-notes/enterprise-server/3-14/9.yml @@ -0,0 +1,62 @@ +date: '2025-03-04' +sections: + security_fixes: + - | + Permissions and ownership of `/etc/ssh/sshd_config` are now enforced so that the `root` identity is the only one able to read or write to the file. + - | + Packages have been updated to the latest security versions. + bugs: + - | + Some instances with self-signed certificates encountered duplicated IP and DNS entries in their certificate. + - | + During an upgrade, encrypted record diagnostics would incorrectly flag 2FA records without associated users as undecryptable, causing misleading or unactionable error messages. In addition, in a high-availability or cluster configuration, encrypted record diagnostics were run unnecessarily on nodes other than the MySQL primary, and the resulting prompt from these diagnostics did not honor the `-y` flag. + - | + An issue with the webhook delivery system could cause missing commits on pull requests and stop GitHub Actions workflows from running reliably on certain triggers. A database replication delay in the webhook delivery system has been removed. + - | + When a pre-receive hook blocked users from making a commit in the UI, the error message did not display any `echo` messages specified in the pre-receive hook script. + - | + When users requested large amounts of data from certain API endpoints, such as [List organization repositories](/rest/repos/repos#list-organization-repositories), they sometimes received a `500` error. + - | + Domain entries could fail to load in the "Verified & Approves Domains" section of the site admin dashboard if one or more authoritative nameservers for the affected domain was unreachable or unresponsive. + - | + Team avatars and descriptions did not always appear on the team's page. + - | + Some packages failed to install when a hotpatch was applied to instances hosted on Google Cloud Platform. + changes: + - | + The `ghe-check-disk-usage` command has been updated to provide more valuable insights into troubleshooting disk space issues on the root and data disks. + - | + A graph for visualizing the status of repository maintenance has been added to the management console. + known_issues: + - | + During the validation phase of a configuration run, a `No such object` error may occur for the Notebook and Viewscreen services. This error can be ignored as the services should still correctly start. + - | + If the root site administrator is locked out of the Management Console after failed login attempts, the account does not unlock automatically after the defined lockout time. Someone with administrative SSH access to the instance must unlock the account using the administrative shell. For more information, see "[AUTOTITLE](/admin/configuration/administering-your-instance-from-the-management-console/troubleshooting-access-to-the-management-console#unlocking-the-root-site-administrator-account)." + - | + On an instance with the HTTP `X-Forwarded-For` header configured for use behind a load balancer, all client IP addresses in the instance's audit log erroneously appear as 127.0.0.1. + - | + {% data reusables.release-notes.large-adoc-files-issue %} + - | + Admin stats REST API endpoints may timeout on appliances with many users or repositories. Retrying the request until data is returned is advised. + - | + When following the steps for [Replacing the primary MySQL node](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-the-primary-mysql-node), step 14 (running `ghe-cluster-config-apply`) might fail with errors. If this occurs, re-running `ghe-cluster-config-apply` is expected to succeed. + - | + Running a config apply as part of the steps for [Replacing a node in an emergency](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-a-node-in-an-emergency) may fail with errors if the node being replaced is still reachable. If this occurs, shutdown the node and repeat the steps. + - | + {% data reusables.release-notes.2024-06-possible-frontend-5-minute-outage-during-hotpatch-upgrade %} + - | + When restoring data originally backed up from a 3.13 or greater appliance version, the elasticsearch indices need to be reindexed before some of the data will show up. This happens via a nightly scheduled job. It can also be forced by running `/usr/local/share/enterprise/ghe-es-search-repair`. + - | + An organization-level code scanning configuration page is displayed on instances that do not use GitHub Advanced Security or code scanning. + - | + When following the steps for [Replacing the primary MySQL node](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-the-primary-mysql-node), step 14 (running `ghe-cluster-config-apply`) might fail with errors. If this occurs, re-running `ghe-cluster-config-apply` is expected to succeed. + - | + In the header bar displayed to site administrators, some icons are not available. + - | + When enabling automatic update checks for the first time in the Management Console, the status is not dynamically reflected until the "Updates" page is reloaded. + - | + When restoring from a backup snapshot, a large number of `mapper_parsing_exception` errors may be displayed. + - | + After a restore, existing outside collaborators are unable to be added to repositories in a new organization. This issue can be resolved by running `/usr/local/share/enterprise/ghe-es-search-repair` on the appliance. + - | + After a geo-replica is promoted to be a primary by running `ghe-repl-promote`, the actions workflow of a repository does not have any suggested workflows. diff --git a/data/release-notes/enterprise-server/3-15/4.yml b/data/release-notes/enterprise-server/3-15/4.yml new file mode 100644 index 000000000000..f3ac9afcaabf --- /dev/null +++ b/data/release-notes/enterprise-server/3-15/4.yml @@ -0,0 +1,64 @@ +date: '2025-03-04' +sections: + security_fixes: + - | + Permissions and ownership of `/etc/ssh/sshd_config` are now enforced so that the `root` identity is the only one able to read or write to the file. + - | + Packages have been updated to the latest security versions. + bugs: + - | + Some instances with self-signed certificates encountered duplicated IP and DNS entries in their certificate. + - | + During an upgrade, encrypted record diagnostics would incorrectly flag 2FA records without associated users as undecryptable, causing misleading or unactionable error messages. In addition, in a high-availability or cluster configuration, encrypted record diagnostics were run unnecessarily on nodes other than the MySQL primary, and the resulting prompt from these diagnostics did not honor the `-y` flag. + - | + An issue with the webhook delivery system could cause missing commits on pull requests and stop GitHub Actions workflows from running reliably on certain triggers. A database replication delay in the webhook delivery system has been removed. + - | + When a pre-receive hook blocked users from making a commit in the UI, the error message did not display any `echo` messages specified in the pre-receive hook script. + - | + When users requested large amounts of data from certain API endpoints, such as [List organization repositories](/rest/repos/repos#list-organization-repositories), they sometimes received a `500` error. + - | + Domain entries could fail to load in the "Verified & Approves Domains" section of the site admin dashboard if one or more authoritative nameservers for the affected domain was unreachable or unresponsive. + - | + Team avatars and descriptions did not always appear on the team's page. + - | + Some packages failed to install when a hotpatch was applied to instances hosted on Google Cloud Platform. + changes: + - | + The `ghe-check-disk-usage` command has been updated to provide more valuable insights into troubleshooting disk space issues on the root and data disks. + - | + A graph for visualizing the status of repository maintenance has been added to the management console. + known_issues: + - | + During the validation phase of a configuration run, a `No such object` error may occur for the Notebook and Viewscreen services. This error can be ignored as the services should still correctly start. + - | + If the root site administrator is locked out of the Management Console after failed login attempts, the account does not unlock automatically after the defined lockout time. Someone with administrative SSH access to the instance must unlock the account using the administrative shell. For more information, see "[AUTOTITLE](/admin/configuration/administering-your-instance-from-the-management-console/troubleshooting-access-to-the-management-console#unlocking-the-root-site-administrator-account)." + - | + On an instance with the HTTP `X-Forwarded-For` header configured for use behind a load balancer, all client IP addresses in the instance's audit log erroneously appear as 127.0.0.1. + - | + {% data reusables.release-notes.large-adoc-files-issue %} + - | + Admin stats REST API endpoints may timeout on appliances with many users or repositories. Retrying the request until data is returned is advised. + - | + When following the steps for [Replacing the primary MySQL node]/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-the-primary-mysql-node), step 14 (running `ghe-cluster-config-apply`) might fail with errors. If this occurs, re-running `ghe-cluster-config-apply` is expected to succeed. + - | + Running a config apply as part of the steps for [Replacing a node in an emergency](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-a-node-in-an-emergency) may fail with errors if the node being replaced is still reachable. If this occurs, shutdown the node and repeat the steps. + - | + {% data reusables.release-notes.2024-06-possible-frontend-5-minute-outage-during-hotpatch-upgrade %} + - | + When restoring data originally backed up from a 3.13 or greater appliance version, the elasticsearch indices need to be reindexed before some of the data will show up. This happens via a nightly scheduled job. It can also be forced by running `/usr/local/share/enterprise/ghe-es-search-repair`. + - | + An organization-level code scanning configuration page is displayed on instances that do not use GitHub Advanced Security or code scanning. + - | + When following the steps for [Replacing the primary MySQL node](/admin/monitoring-managing-and-updating-your-instance/configuring-clustering/replacing-a-cluster-node#replacing-the-primary-mysql-node), step 14 (running `ghe-cluster-config-apply`) might fail with errors. If this occurs, re-running `ghe-cluster-config-apply` is expected to succeed. + - | + In the header bar displayed to site administrators, some icons are not available. + - | + When enabling automatic update checks for the first time in the Management Console, the status is not dynamically reflected until the "Updates" page is reloaded. + - | + When restoring from a backup snapshot, a large number of `mapper_parsing_exception` errors may be displayed. + - | + When initializing a new GHES cluster, nodes with the `consul-server` role should be added to the cluster before adding additional nodes. Adding all nodes simultaneously creates a race condition between nomad server registration and nomad client registration. + - | + Admins setting up cluster high availability (HA) may encounter a spokes error when running ghe-cluster-repl-status if a new organization and repositories are created before using the ghe-cluster-repl-bootstrap command. To avoid this issue, complete the cluster HA setup with ghe-cluster-repl-bootstrap before creating new organizations and repositories. + - | + After a restore, existing outside collaborators are unable to be added to repositories in a new organization. This issue can be resolved by running `/usr/local/share/enterprise/ghe-es-search-repair` on the appliance. diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json index 8fba72c33899..66fbef381fda 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json @@ -5952,15 +5952,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -8252,21 +8243,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "plan": { "title": "Plan", "displayTitle": "User permissions for \"Plan\"", diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json index c9dad538b94a..08f5837e5b53 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json @@ -914,12 +914,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json index 6d6010f8b4fc..1c36f6ac19b8 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json @@ -7233,17 +7233,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -10021,23 +10010,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "plan": { "title": "Plan", "displayTitle": "User permissions for \"Plan\"", diff --git a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json index c9dad538b94a..08f5837e5b53 100644 --- a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json @@ -914,12 +914,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index 0da5cb15d580..18ab18070b46 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -6429,15 +6429,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -8774,21 +8765,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "plan": { "title": "Plan", "displayTitle": "User permissions for \"Plan\"", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json index 473de6ac881e..ae781b13f007 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json @@ -926,12 +926,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index 0220e906ae29..bdada72312dc 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -7812,17 +7812,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -10655,23 +10644,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "plan": { "title": "Plan", "displayTitle": "User permissions for \"Plan\"", diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index 473de6ac881e..ae781b13f007 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -926,12 +926,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json index 4527ab4d338e..a7690f183cfd 100644 --- a/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat-permissions.json @@ -4443,15 +4443,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -6446,21 +6437,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat.json index 0d1d97df06dc..ef3b142c68a9 100644 --- a/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.12-2022-11-28/fine-grained-pat.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json index c0a689f8d463..17cb6474b730 100644 --- a/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.12-2022-11-28/server-to-server-permissions.json @@ -5406,17 +5406,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -7835,23 +7824,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.12-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.12-2022-11-28/user-to-server-rest.json index 0d1d97df06dc..ef3b142c68a9 100644 --- a/src/github-apps/data/ghes-3.12-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.12-2022-11-28/user-to-server-rest.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json index dd42c76e0da7..4e571cd9a039 100644 --- a/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat-permissions.json @@ -4527,15 +4527,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -6557,21 +6548,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat.json index 94e76322c10b..8338ffc03f54 100644 --- a/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.13-2022-11-28/fine-grained-pat.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json index 0bae129f63e6..0a1eb0472abb 100644 --- a/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.13-2022-11-28/server-to-server-permissions.json @@ -5506,17 +5506,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -7968,23 +7957,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.13-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.13-2022-11-28/user-to-server-rest.json index 94e76322c10b..8338ffc03f54 100644 --- a/src/github-apps/data/ghes-3.13-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.13-2022-11-28/user-to-server-rest.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json index cc5a7a7c47f2..ca6a0d24e922 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat-permissions.json @@ -4659,15 +4659,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -6689,21 +6680,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat.json index c57f54e67729..62c4ac51cecb 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/fine-grained-pat.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json index 77736651c7a1..af915e927809 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/server-to-server-permissions.json @@ -5666,17 +5666,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -8128,23 +8117,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.14-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.14-2022-11-28/user-to-server-rest.json index c57f54e67729..62c4ac51cecb 100644 --- a/src/github-apps/data/ghes-3.14-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.14-2022-11-28/user-to-server-rest.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json index 54c7a7bf40ae..3727336235a8 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat-permissions.json @@ -4767,15 +4767,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -6797,21 +6788,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat.json index 11ea159d8aeb..82e1710fbb27 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/fine-grained-pat.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json index 46c8793dca64..42aa951d0012 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/server-to-server-permissions.json @@ -5798,17 +5798,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -8260,23 +8249,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.15-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.15-2022-11-28/user-to-server-rest.json index 11ea159d8aeb..82e1710fbb27 100644 --- a/src/github-apps/data/ghes-3.15-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.15-2022-11-28/user-to-server-rest.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json index 3e34ae615a49..0232ee36ced2 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat-permissions.json @@ -4827,15 +4827,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -6866,21 +6857,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "additional-permissions": true, - "access": "read" - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat.json index 56c10583ebf1..3ff5f9c1dd97 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/fine-grained-pat.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json index 00c7133e261f..6ae101575232 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/server-to-server-permissions.json @@ -5870,17 +5870,6 @@ "title": "Metadata", "displayTitle": "Repository permissions for \"Metadata\"", "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - }, { "category": "actions", "slug": "enable-a-selected-repository-for-github-actions-in-an-organization", @@ -8343,23 +8332,6 @@ } ] }, - "notifications": { - "title": "Notifications", - "displayTitle": "User permissions for \"Notifications\"", - "permissions": [ - { - "category": "activity", - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications", - "access": "read", - "user-to-server": true, - "server-to-server": false, - "additional-permissions": true - } - ] - }, "profile": { "title": "Profile", "displayTitle": "User permissions for \"Profile\"", diff --git a/src/github-apps/data/ghes-3.16-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghes-3.16-2022-11-28/user-to-server-rest.json index 56c10583ebf1..3ff5f9c1dd97 100644 --- a/src/github-apps/data/ghes-3.16-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghes-3.16-2022-11-28/user-to-server-rest.json @@ -860,12 +860,6 @@ "verb": "get", "requestPath": "/networks/{owner}/{repo}/events" }, - { - "slug": "list-notifications-for-the-authenticated-user", - "subcategory": "notifications", - "verb": "get", - "requestPath": "/notifications" - }, { "slug": "list-public-organization-events", "subcategory": "events", diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 41599e3d4a43..26b930415f23 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "fe14ea7d381f04c8bb5bd7b13a97114eab1b173e" + "sha": "bd20ee69c1c322d490ad715db8d0c68e8f92f432" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index fbd462a2f90c..777736583571 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -75099,15 +75099,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { @@ -168257,6 +168252,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -168513,6 +168517,18 @@ ], "default": "disabled" }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "
The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "default": "disabled" + }, { "type": "string", "name": "private_vulnerability_reporting", @@ -168585,6 +168601,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325", @@ -168785,6 +168802,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -169177,6 +169203,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -169306,6 +169341,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325", @@ -169506,6 +169542,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -169761,6 +169806,18 @@ "not_set" ] }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "default": "disabled" + }, { "type": "string", "name": "private_vulnerability_reporting", @@ -169829,6 +169886,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325", @@ -170029,6 +170087,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -170364,6 +170431,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -170579,6 +170647,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -171749,6 +171826,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -172048,6 +172134,18 @@ ], "default": "disabled" }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "default": "disabled" + }, { "type": "string", "name": "secret_scanning_delegated_alert_dismissal", @@ -172139,6 +172237,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -172339,6 +172438,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -172723,6 +172831,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -172956,6 +173073,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -173156,6 +173274,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -173453,6 +173580,17 @@ "not_set" ] }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, { "type": "string", "name": "secret_scanning_delegated_alert_dismissal", @@ -173540,6 +173678,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -173740,6 +173879,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -174076,6 +174224,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -174291,6 +174440,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -175194,6 +175352,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "secret_scanning_delegated_alert_dismissal": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", @@ -175414,6 +175573,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index a387da731c2a..9d144ae7c8a8 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -83723,15 +83723,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { @@ -179376,6 +179371,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -179632,6 +179636,18 @@ ], "default": "disabled" }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "default": "disabled" + }, { "type": "string", "name": "private_vulnerability_reporting", @@ -179704,6 +179720,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325", @@ -179904,6 +179921,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -180296,6 +180322,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -180425,6 +180460,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325", @@ -180625,6 +180661,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -180880,6 +180925,18 @@ "not_set" ] }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "default": "disabled" + }, { "type": "string", "name": "private_vulnerability_reporting", @@ -180948,6 +181005,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325", @@ -181148,6 +181206,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -181483,6 +181550,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -181698,6 +181766,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -182868,6 +182945,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -183167,6 +183253,18 @@ ], "default": "disabled" }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "default": "disabled" + }, { "type": "string", "name": "secret_scanning_delegated_alert_dismissal", @@ -183258,6 +183356,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -183458,6 +183557,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -183842,6 +183950,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -184075,6 +184192,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -184275,6 +184393,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -184572,6 +184699,17 @@ "not_set" ] }, + { + "type": "string", + "name": "secret_scanning_generic_secrets", + "in": "body", + "description": "The enablement status of Copilot secret scanning
", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, { "type": "string", "name": "secret_scanning_delegated_alert_dismissal", @@ -184659,6 +184797,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -184859,6 +184998,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -185195,6 +185343,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", "url": "https://api.github.com/orgs/octo-org/code-security/configurations/1325", @@ -185410,6 +185559,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", @@ -186313,6 +186471,7 @@ "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", + "secret_scanning_generic_secrets": "disabled", "secret_scanning_delegated_alert_dismissal": "disabled", "private_vulnerability_reporting": "disabled", "enforcement": "enforced", @@ -186533,6 +186692,15 @@ "not_set" ] }, + "secret_scanning_generic_secrets": { + "type": "string", + "description": "The enablement status of Copilot secret scanning", + "enum": [ + "enabled", + "disabled", + "not_set" + ] + }, "secret_scanning_delegated_alert_dismissal": { "type": "string", "description": "The enablement status of secret scanning delegated alert dismissal", diff --git a/src/rest/data/ghes-3.12-2022-11-28/schema.json b/src/rest/data/ghes-3.12-2022-11-28/schema.json index adfe7eab6c13..b3dd4192cc3f 100644 --- a/src/rest/data/ghes-3.12-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.12-2022-11-28/schema.json @@ -78078,15 +78078,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { diff --git a/src/rest/data/ghes-3.13-2022-11-28/schema.json b/src/rest/data/ghes-3.13-2022-11-28/schema.json index 978f5d60cd7f..17dd989f5895 100644 --- a/src/rest/data/ghes-3.13-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.13-2022-11-28/schema.json @@ -78078,15 +78078,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { diff --git a/src/rest/data/ghes-3.14-2022-11-28/schema.json b/src/rest/data/ghes-3.14-2022-11-28/schema.json index e56a4437273a..a6dd799805b1 100644 --- a/src/rest/data/ghes-3.14-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.14-2022-11-28/schema.json @@ -78078,15 +78078,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { diff --git a/src/rest/data/ghes-3.15-2022-11-28/schema.json b/src/rest/data/ghes-3.15-2022-11-28/schema.json index c9be1fc94a64..80433000bf3f 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.15-2022-11-28/schema.json @@ -78324,15 +78324,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { diff --git a/src/rest/data/ghes-3.16-2022-11-28/schema.json b/src/rest/data/ghes-3.16-2022-11-28/schema.json index 2e4ca71a4bc3..00c1cb61660f 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.16-2022-11-28/schema.json @@ -78324,15 +78324,10 @@ ], "bodyParameters": [], "progAccess": { - "userToServerRest": true, + "userToServerRest": false, "serverToServer": false, "fineGrainedPat": false, - "permissions": [ - { - "\"Metadata\" repository permissions": "read", - "\"Notifications\" user permissions": "read" - } - ] + "permissions": [] }, "codeExamples": [ { diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 38a9accb6a05..50f29e1b6582 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -47,5 +47,5 @@ ] } }, - "sha": "fe14ea7d381f04c8bb5bd7b13a97114eab1b173e" + "sha": "bd20ee69c1c322d490ad715db8d0c68e8f92f432" } \ No newline at end of file diff --git a/src/webhooks/data/fpt/schema.json b/src/webhooks/data/fpt/schema.json index 5d7ab567e8ff..d334b9c3cb3f 100644 --- a/src/webhooks/data/fpt/schema.json +++ b/src/webhooks/data/fpt/schema.json @@ -201885,6 +201885,19 @@ } ] }, + { + "type": "object", + "name": "tag_name", + "description": "", + "childParamsGroups": [ + { + "type": "string", + "name": "from", + "description": "The previous version of the tag_name if the action was edited
.
The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1233,7 +1233,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1288,6 +1289,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1424,7 +1448,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1449,7 +1473,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1504,6 +1529,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1639,8 +1687,248 @@ "name": "id", "description": "The ID of the exemption request.
" }, + { + "type": "integer or null", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, { "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning", + "secret_scanning_closure" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "A GitHub user.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "created", + "category": "bypass_request_push_ruleset" + }, + "response_dismissed": { + "descriptionHtml": "A push ruleset bypass response was dismissed.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in public preview and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "response_dismissed" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1665,223 +1953,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" - ] - }, - { - "type": "object", - "name": "exemption_request_data", - "description": "Push rules that are being requested to be bypassed.
" - }, - { - "type": "string", - "name": "resource_identifier", - "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" - }, - { - "type": "string", - "name": "status", - "description": "The status of the exemption request.
", - "enum": [ - "pending", - "rejected", - "cancelled", - "completed" - ] - }, - { - "type": "string or null", - "name": "requester_comment", - "description": "The comment the requester provided when creating the exemption request.
" - }, - { - "type": "object or null", - "name": "metadata", - "description": "Metadata about the exemption request.
", - "childParamsGroups": [ - { - "type": "object", - "name": "Secret Scanning Push Protection Exemption Request Metadata", - "description": "Metadata for a secret scanning push protection exemption request.
", - "childParamsGroups": [ - { - "type": "string", - "name": "label", - "description": "The label for the secret type
" - }, - { - "type": "string", - "name": "reason", - "description": "The reason for the exemption request
", - "enum": [ - "fixed_later", - "false_positive", - "tests" - ] - } - ] - } - ], - "oneOfObject": true - }, - { - "type": "string", - "name": "expires_at", - "description": "The date and time the exemption request will expire.
" - }, - { - "type": "string", - "name": "created_at", - "description": "The date and time the exemption request was created.
" - }, - { - "type": "array of objects or null", - "name": "responses", - "description": "The responses to the exemption request.
", - "childParamsGroups": [ - { - "type": "integer", - "name": "id", - "description": "The ID of the exemption response.
" - }, - { - "type": "integer", - "name": "reviewer_id", - "description": "The ID of the user who reviewed the exemption request.
" - }, - { - "type": "string", - "name": "reviewer_login", - "description": "The login of the user who reviewed the exemption request.
" - }, - { - "type": "string", - "name": "status", - "description": "The status of the exemption response.
", - "enum": [ - "approved", - "rejected", - "dismissed" - ] - }, - { - "type": "string or null", - "name": "reviewer_comment", - "description": "The comment the reviewer provided when responding to the exemption request.
" - }, - { - "type": "string", - "name": "created_at", - "description": "The date and time the exemption request was created.
" - } - ] - }, - { - "type": "string", - "name": "html_url", - "description": "The URL to view the exemption request in a browser.
" - } - ] - }, - { - "type": "object", - "name": "sender", - "in": "body", - "description": "A GitHub user.
", - "isRequired": true, - "childParamsGroups": [] - } - ], - "availability": [ - "repository", - "organization", - "app" - ], - "action": "created", - "category": "bypass_request_push_ruleset" - }, - "response_dismissed": { - "descriptionHtml": "A push ruleset bypass response was dismissed.
", - "summaryHtml": "This event occurs when there is activity related to a user's request to bypass a set of push rules.
\nFor more information, see \"Managing requests to bypass push rulesets.\"
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Administration\" repository permission.
\nNote: Delegated bypass for push rules is currently in public preview and subject to change.
", - "bodyParameters": [ - { - "type": "string", - "name": "action", - "in": "body", - "description": "", - "isRequired": true, - "enum": [ - "response_dismissed" - ], - "childParamsGroups": [] - }, - { - "type": "object", - "name": "enterprise", - "in": "body", - "description": "An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", - "isRequired": true, - "childParamsGroups": [ - { - "type": "integer", - "name": "id", - "description": "The ID of the exemption request.
" - }, - { - "type": "integer", - "name": "number", - "description": "The number uniquely identifying the exemption request within it's repository.
" - }, - { - "type": "integer", - "name": "repository_id", - "description": "The ID of the repository the exemption request is for.
" - }, - { - "type": "integer", - "name": "requester_id", - "description": "The ID of the user who requested the exemption.
" - }, - { - "type": "string", - "name": "requester_login", - "description": "The login of the user who requested the exemption.
" - }, - { - "type": "string", - "name": "request_type", - "description": "The type of request.
", - "enum": [ - "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1936,6 +2009,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2116,7 +2212,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2141,7 +2237,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2196,6 +2293,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2378,7 +2498,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2403,7 +2523,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2458,6 +2579,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2594,7 +2738,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2619,7 +2763,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2674,6 +2819,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2810,7 +2978,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2835,7 +3003,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2890,6 +3059,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -3026,7 +3218,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -3051,7 +3243,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -3106,6 +3299,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -3286,7 +3502,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -3311,7 +3527,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -3366,6 +3583,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -12424,10 +12664,10 @@ "category": "check_suite" } }, - "code_scanning_alert": { - "appeared_in_branch": { - "descriptionHtml": "A previously created code scanning alert appeared in another branch. This can happen when a branch is merged into or created from a branch with a pre-existing code scanning alert.
", - "summaryHtml": "This event occurs when there is activity relating to code scanning alerts in a repository. For more information, see \"About code scanning\" and \"About code scanning alerts.\" For information about the API to manage code scanning, see \"Code scanning\" in the REST API documentation.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Code scanning alerts\" repository permission.
", + "dismissal_request_secret_scanning": { + "cancelled": { + "descriptionHtml": "A secret scanning alert dismissal request was canceled.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to dismiss a secret scanning alert.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Secret scanning alerts\" repository permission.
\n[!NOTE]\nDelegated alert dismissal for secret scanning is currently in public preview and subject to change.
", "bodyParameters": [ { "type": "string", @@ -12436,362 +12676,1652 @@ "description": "", "isRequired": true, "enum": [ - "appeared_in_branch" + "cancelled" ], "childParamsGroups": [] }, { "type": "object", - "name": "alert", + "name": "enterprise", "in": "body", - "description": "The code scanning alert involved in the event.
", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", "isRequired": true, "childParamsGroups": [ { - "type": "string", - "name": "created_at", - "description": "The time that the alert was created in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
The ID of the exemption request.
" }, { - "type": "string or null", - "name": "dismissed_at", - "description": "The time that the alert was dismissed in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ
.
The number uniquely identifying the exemption request within it's repository.
" }, { - "type": "object or null", - "name": "dismissed_by", - "description": "", - "isRequired": true, - "childParamsGroups": [ - { - "type": "string", - "name": "avatar_url", - "description": "" - }, - { - "type": "boolean", - "name": "deleted", - "description": "" - }, - { - "type": "string or null", - "name": "email", - "description": "" - }, - { - "type": "string", - "name": "events_url", - "description": "" - }, - { - "type": "string", - "name": "followers_url", - "description": "" - }, - { - "type": "string", - "name": "following_url", - "description": "" - }, - { - "type": "string", - "name": "gists_url", - "description": "" - }, - { - "type": "string", - "name": "gravatar_id", - "description": "" - }, - { - "type": "string", - "name": "html_url", - "description": "" - }, - { - "type": "integer", - "name": "id", - "description": "", - "isRequired": true - }, - { - "type": "string", - "name": "login", - "description": "", - "isRequired": true - }, - { - "type": "string", - "name": "name", - "description": "" - }, - { - "type": "string", - "name": "node_id", - "description": "" - }, - { - "type": "string", - "name": "organizations_url", - "description": "" - }, - { - "type": "string", - "name": "received_events_url", - "description": "" - }, - { - "type": "string", - "name": "repos_url", - "description": "" - }, - { - "type": "boolean", - "name": "site_admin", - "description": "" - }, - { - "type": "string", - "name": "starred_url", - "description": "" - }, - { - "type": "string", - "name": "subscriptions_url", - "description": "" - }, - { - "type": "string", - "name": "type", - "description": "", - "enum": [ - "Bot", - "User", - "Organization" - ] - }, - { - "type": "string", - "name": "url", - "description": "" - }, - { - "type": "string", - "name": "user_view_type", - "description": "" - } - ] + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" }, { - "type": "string or null", - "name": "dismissed_comment", - "description": "The dismissal comment associated with the dismissal of the alert.
" + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" }, { - "type": "string or null", - "name": "dismissed_reason", - "description": "The reason for dismissing or closing the alert.
", - "isRequired": true, + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", "enum": [ - "false positive", - "won't fix", - "used in tests", - null + "push_ruleset_bypass", + "secret_scanning", + "secret_scanning_closure" ] }, { - "type": "null", - "name": "fixed_at", - "description": "The time that the alert was fixed in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ
.
Push rules that are being requested to be bypassed.
" }, { "type": "string", - "name": "html_url", - "description": "The GitHub URL of the alert resource.
", - "isRequired": true + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" }, { "type": "object or null", - "name": "most_recent_instance", - "description": "", + "name": "metadata", + "description": "Metadata about the exemption request.
", "childParamsGroups": [ - { - "type": "string", - "name": "analysis_key", - "description": "Identifies the configuration under which the analysis was executed. For example, in GitHub Actions this includes the workflow filename and job name.
", - "isRequired": true - }, - { - "type": "string", - "name": "category", - "description": "Identifies the configuration under which the analysis was executed.
" - }, - { - "type": "array of strings", - "name": "classifications", - "description": "" - }, - { - "type": "string", - "name": "commit_sha", - "description": "" - }, - { - "type": "string", - "name": "environment", - "description": "Identifies the variable values associated with the environment in which the analysis that generated this alert instance was performed, such as the language that was analyzed.
", - "isRequired": true - }, { "type": "object", - "name": "location", - "description": "", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", "childParamsGroups": [ - { - "type": "integer", - "name": "end_column", - "description": "" - }, - { - "type": "integer", - "name": "end_line", - "description": "" - }, { "type": "string", - "name": "path", - "description": "" - }, - { - "type": "integer", - "name": "start_column", - "description": "" + "name": "label", + "description": "The label for the secret type
" }, { - "type": "integer", - "name": "start_line", - "description": "" + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] } ] }, { "type": "object", - "name": "message", - "description": "", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", "childParamsGroups": [ { "type": "string", - "name": "text", - "description": "" + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] } ] - }, - { - "type": "string", - "name": "ref", - "description": "The full Git reference, formatted as refs/heads/<branch name>
.
State of a code scanning alert.
", - "isRequired": true, - "enum": [ - "open", - "dismissed", - "fixed" - ] } - ] + ], + "oneOfObject": true }, { - "type": "integer", - "name": "number", - "description": "The code scanning alert number.
", - "isRequired": true + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" }, { - "type": "object", - "name": "rule", - "description": "", - "isRequired": true, + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", "childParamsGroups": [ { - "type": "string", - "name": "description", - "description": "A short description of the rule used to detect the alert.
", - "isRequired": true + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" }, { "type": "string", - "name": "id", - "description": "A unique identifier for the rule used to detect the alert.
", - "isRequired": true + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" }, { - "type": "string or null", - "name": "severity", - "description": "The severity of the alert.
", - "isRequired": true, + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", "enum": [ - "none", - "note", - "warning", - "error", - null + "approved", + "rejected", + "dismissed" ] - } - ] - }, - { - "type": "string or null", - "name": "state", - "description": "State of a code scanning alert. Events for alerts found outside the default branch will return a null
value until they are dismissed or fixed.
The name of the tool used to generate the code scanning analysis alert.
", - "isRequired": true }, { "type": "string or null", - "name": "version", - "description": "The version of the tool used to detect the alert.
", - "isRequired": true + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" } ] }, { "type": "string", - "name": "url", - "description": "", - "isRequired": true + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" } ] }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "A GitHub user.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "cancelled", + "category": "dismissal_request_secret_scanning" + }, + "completed": { + "descriptionHtml": "A secret scanning alert dismissal request was completed.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to dismiss a secret scanning alert.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Secret scanning alerts\" repository permission.
\n[!NOTE]\nDelegated alert dismissal for secret scanning is currently in public preview and subject to change.
", + "bodyParameters": [ { "type": "string", - "name": "commit_oid", + "name": "action", "in": "body", - "description": "The commit SHA of the code scanning alert. When the action is reopened_by_user
or closed_by_user
, the event was triggered by the sender
and this value will be empty.
An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer or null", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning", + "secret_scanning_closure" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "A GitHub user.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "completed", + "category": "dismissal_request_secret_scanning" + }, + "created": { + "descriptionHtml": "A secret scanning alert dismissal request was created.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to dismiss a secret scanning alert.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Secret scanning alerts\" repository permission.
\n[!NOTE]\nDelegated alert dismissal for secret scanning is currently in public preview and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "created" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer or null", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning", + "secret_scanning_closure" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "A GitHub user.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "created", + "category": "dismissal_request_secret_scanning" + }, + "response_dismissed": { + "descriptionHtml": "A secret scanning alert dismissal response was dismissed.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to dismiss a secret scanning alert.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Secret scanning alerts\" repository permission.
\n[!NOTE]\nDelegated alert dismissal for secret scanning is currently in public preview and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "response_dismissed" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer or null", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning", + "secret_scanning_closure" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "exemption_response", + "in": "body", + "description": "A response to an exemption request by a delegated bypasser.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "A GitHub user.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "response_dismissed", + "category": "dismissal_request_secret_scanning" + }, + "response_submitted": { + "descriptionHtml": "A secret scanning alert dismissal response was submitted.
", + "summaryHtml": "This event occurs when there is activity related to a user's request to dismiss a secret scanning alert.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Secret scanning alerts\" repository permission.
\n[!NOTE]\nDelegated alert dismissal for secret scanning is currently in public preview and subject to change.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "response_submitted" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "enterprise", + "in": "body", + "description": "An enterprise on GitHub. Webhook payloads contain the enterprise
property when the webhook is configured\non an enterprise account or an organization that's part of an enterprise account. For more information,\nsee \"About enterprise accounts.\"
The GitHub App installation. Webhook payloads contain the installation
property when the event is configured\nfor and sent to a GitHub App. For more information,\nsee \"Using webhooks with GitHub Apps.\"
A GitHub organization. Webhook payloads contain the organization
property when the webhook is configured for an\norganization, or when the event occurs from activity in a repository owned by an organization.
The repository on GitHub where the event occurred. Webhook payloads contain the repository
property\nwhen the event occurs from activity in a repository.
A request from a user to be exempted from a set of rules.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption request.
" + }, + { + "type": "integer or null", + "name": "number", + "description": "The number uniquely identifying the exemption request within it's repository.
" + }, + { + "type": "integer", + "name": "repository_id", + "description": "The ID of the repository the exemption request is for.
" + }, + { + "type": "integer", + "name": "requester_id", + "description": "The ID of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "requester_login", + "description": "The login of the user who requested the exemption.
" + }, + { + "type": "string", + "name": "request_type", + "description": "The type of request.
", + "enum": [ + "push_ruleset_bypass", + "secret_scanning", + "secret_scanning_closure" + ] + }, + { + "type": "object", + "name": "exemption_request_data", + "description": "Push rules that are being requested to be bypassed.
" + }, + { + "type": "string", + "name": "resource_identifier", + "description": "The unique identifier for the request type of the exemption request. For example, a commit SHA.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption request.
", + "enum": [ + "pending", + "rejected", + "cancelled", + "completed" + ] + }, + { + "type": "string or null", + "name": "requester_comment", + "description": "The comment the requester provided when creating the exemption request.
" + }, + { + "type": "object or null", + "name": "metadata", + "description": "Metadata about the exemption request.
", + "childParamsGroups": [ + { + "type": "object", + "name": "Secret Scanning Push Protection Exemption Request Metadata", + "description": "Metadata for a secret scanning push protection exemption request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "label", + "description": "The label for the secret type
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the exemption request
", + "enum": [ + "fixed_later", + "false_positive", + "tests" + ] + } + ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] + } + ], + "oneOfObject": true + }, + { + "type": "string", + "name": "expires_at", + "description": "The date and time the exemption request will expire.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + }, + { + "type": "array of objects or null", + "name": "responses", + "description": "The responses to the exemption request.
", + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "string", + "name": "html_url", + "description": "The URL to view the exemption request in a browser.
" + } + ] + }, + { + "type": "object", + "name": "exemption_response", + "in": "body", + "description": "A response to an exemption request by a delegated bypasser.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "integer", + "name": "id", + "description": "The ID of the exemption response.
" + }, + { + "type": "integer", + "name": "reviewer_id", + "description": "The ID of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "reviewer_login", + "description": "The login of the user who reviewed the exemption request.
" + }, + { + "type": "string", + "name": "status", + "description": "The status of the exemption response.
", + "enum": [ + "approved", + "rejected", + "dismissed" + ] + }, + { + "type": "string or null", + "name": "reviewer_comment", + "description": "The comment the reviewer provided when responding to the exemption request.
" + }, + { + "type": "string", + "name": "created_at", + "description": "The date and time the exemption request was created.
" + } + ] + }, + { + "type": "object", + "name": "sender", + "in": "body", + "description": "A GitHub user.
", + "isRequired": true, + "childParamsGroups": [] + } + ], + "availability": [ + "repository", + "organization", + "app" + ], + "action": "response_submitted", + "category": "dismissal_request_secret_scanning" + } + }, + "code_scanning_alert": { + "appeared_in_branch": { + "descriptionHtml": "A previously created code scanning alert appeared in another branch. This can happen when a branch is merged into or created from a branch with a pre-existing code scanning alert.
", + "summaryHtml": "This event occurs when there is activity relating to code scanning alerts in a repository. For more information, see \"About code scanning\" and \"About code scanning alerts.\" For information about the API to manage code scanning, see \"Code scanning\" in the REST API documentation.
\nTo subscribe to this event, a GitHub App must have at least read-level access for the \"Code scanning alerts\" repository permission.
", + "bodyParameters": [ + { + "type": "string", + "name": "action", + "in": "body", + "description": "", + "isRequired": true, + "enum": [ + "appeared_in_branch" + ], + "childParamsGroups": [] + }, + { + "type": "object", + "name": "alert", + "in": "body", + "description": "The code scanning alert involved in the event.
", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "created_at", + "description": "The time that the alert was created in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ.
The time that the alert was dismissed in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ
.
The dismissal comment associated with the dismissal of the alert.
" + }, + { + "type": "string or null", + "name": "dismissed_reason", + "description": "The reason for dismissing or closing the alert.
", + "isRequired": true, + "enum": [ + "false positive", + "won't fix", + "used in tests", + null + ] + }, + { + "type": "null", + "name": "fixed_at", + "description": "The time that the alert was fixed in ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ
.
The GitHub URL of the alert resource.
", + "isRequired": true + }, + { + "type": "object or null", + "name": "most_recent_instance", + "description": "", + "childParamsGroups": [ + { + "type": "string", + "name": "analysis_key", + "description": "Identifies the configuration under which the analysis was executed. For example, in GitHub Actions this includes the workflow filename and job name.
", + "isRequired": true + }, + { + "type": "string", + "name": "category", + "description": "Identifies the configuration under which the analysis was executed.
" + }, + { + "type": "array of strings", + "name": "classifications", + "description": "" + }, + { + "type": "string", + "name": "commit_sha", + "description": "" + }, + { + "type": "string", + "name": "environment", + "description": "Identifies the variable values associated with the environment in which the analysis that generated this alert instance was performed, such as the language that was analyzed.
", + "isRequired": true + }, + { + "type": "object", + "name": "location", + "description": "", + "childParamsGroups": [ + { + "type": "integer", + "name": "end_column", + "description": "" + }, + { + "type": "integer", + "name": "end_line", + "description": "" + }, + { + "type": "string", + "name": "path", + "description": "" + }, + { + "type": "integer", + "name": "start_column", + "description": "" + }, + { + "type": "integer", + "name": "start_line", + "description": "" + } + ] + }, + { + "type": "object", + "name": "message", + "description": "", + "childParamsGroups": [ + { + "type": "string", + "name": "text", + "description": "" + } + ] + }, + { + "type": "string", + "name": "ref", + "description": "The full Git reference, formatted as refs/heads/<branch name>
.
State of a code scanning alert.
", + "isRequired": true, + "enum": [ + "open", + "dismissed", + "fixed" + ] + } + ] + }, + { + "type": "integer", + "name": "number", + "description": "The code scanning alert number.
", + "isRequired": true + }, + { + "type": "object", + "name": "rule", + "description": "", + "isRequired": true, + "childParamsGroups": [ + { + "type": "string", + "name": "description", + "description": "A short description of the rule used to detect the alert.
", + "isRequired": true + }, + { + "type": "string", + "name": "id", + "description": "A unique identifier for the rule used to detect the alert.
", + "isRequired": true + }, + { + "type": "string or null", + "name": "severity", + "description": "The severity of the alert.
", + "isRequired": true, + "enum": [ + "none", + "note", + "warning", + "error", + null + ] + } + ] + }, + { + "type": "string or null", + "name": "state", + "description": "State of a code scanning alert. Events for alerts found outside the default branch will return a null
value until they are dismissed or fixed.
The name of the tool used to generate the code scanning analysis alert.
", + "isRequired": true + }, + { + "type": "string or null", + "name": "version", + "description": "The version of the tool used to detect the alert.
", + "isRequired": true + } + ] + }, + { + "type": "string", + "name": "url", + "description": "", + "isRequired": true + } + ] + }, + { + "type": "string", + "name": "commit_oid", + "in": "body", + "description": "The commit SHA of the code scanning alert. When the action is reopened_by_user
or closed_by_user
, the event was triggered by the sender
and this value will be empty.
The previous version of the tag_name if the action was edited
.
The previous version of the tag_name if the action was edited
.
The previous version of the tag_name if the action was edited
.
The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1154,7 +1154,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1209,6 +1210,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1345,7 +1369,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1370,7 +1394,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1425,6 +1450,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1561,7 +1609,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1586,7 +1634,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1641,6 +1690,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1777,7 +1849,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1802,7 +1874,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1857,6 +1930,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2037,7 +2133,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2062,7 +2158,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2117,6 +2214,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -192584,6 +192704,19 @@ } ] }, + { + "type": "object", + "name": "tag_name", + "description": "", + "childParamsGroups": [ + { + "type": "string", + "name": "from", + "description": "The previous version of the tag_name if the action was edited
.
The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1233,7 +1233,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1288,6 +1289,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1424,7 +1448,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1449,7 +1473,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1504,6 +1529,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1640,7 +1688,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1665,7 +1713,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1720,6 +1769,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1856,7 +1928,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1881,7 +1953,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1936,6 +2009,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2116,7 +2212,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2141,7 +2237,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2196,6 +2293,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -192757,6 +192877,19 @@ } ] }, + { + "type": "object", + "name": "tag_name", + "description": "", + "childParamsGroups": [ + { + "type": "string", + "name": "from", + "description": "The previous version of the tag_name if the action was edited
.
The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1233,7 +1233,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1288,6 +1289,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1424,7 +1448,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1449,7 +1473,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1504,6 +1529,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1640,7 +1688,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1665,7 +1713,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1720,6 +1769,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -1856,7 +1928,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -1881,7 +1953,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -1936,6 +2009,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2116,7 +2212,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2141,7 +2237,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2196,6 +2293,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2378,7 +2498,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2403,7 +2523,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2458,6 +2579,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2594,7 +2738,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2619,7 +2763,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2674,6 +2819,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -2810,7 +2978,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -2835,7 +3003,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -2890,6 +3059,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -3026,7 +3218,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -3051,7 +3243,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -3106,6 +3299,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -3286,7 +3502,7 @@ "description": "The ID of the exemption request.
" }, { - "type": "integer", + "type": "integer or null", "name": "number", "description": "The number uniquely identifying the exemption request within it's repository.
" }, @@ -3311,7 +3527,8 @@ "description": "The type of request.
", "enum": [ "push_ruleset_bypass", - "secret_scanning" + "secret_scanning", + "secret_scanning_closure" ] }, { @@ -3366,6 +3583,29 @@ ] } ] + }, + { + "type": "object", + "name": "Secret scanning alert dismissal request metadata", + "description": "Metadata for a secret scanning alert dismissal request.
", + "childParamsGroups": [ + { + "type": "string", + "name": "alert_title", + "description": "The title of the secret alert
" + }, + { + "type": "string", + "name": "reason", + "description": "The reason for the dismissal request
", + "enum": [ + "fixed_later", + "false_positive", + "tests", + "revoked" + ] + } + ] } ], "oneOfObject": true @@ -194056,6 +194296,19 @@ } ] }, + { + "type": "object", + "name": "tag_name", + "description": "", + "childParamsGroups": [ + { + "type": "string", + "name": "from", + "description": "The previous version of the tag_name if the action was edited
.