diff --git a/descriptions/api.github.com/api.github.com.2022-11-28.json b/descriptions/api.github.com/api.github.com.2022-11-28.json index 792558bc9..2a9abf153 100644 --- a/descriptions/api.github.com/api.github.com.2022-11-28.json +++ b/descriptions/api.github.com/api.github.com.2022-11-28.json @@ -289892,7 +289892,7 @@ }, "custom-property-name": { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/api.github.com/api.github.com.2022-11-28.yaml b/descriptions/api.github.com/api.github.com.2022-11-28.yaml index 29f952283..6a0d16729 100644 --- a/descriptions/api.github.com/api.github.com.2022-11-28.yaml +++ b/descriptions/api.github.com/api.github.com.2022-11-28.yaml @@ -220410,7 +220410,7 @@ components: type: integer custom-property-name: name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/api.github.com/api.github.com.json b/descriptions/api.github.com/api.github.com.json index 792558bc9..2a9abf153 100644 --- a/descriptions/api.github.com/api.github.com.json +++ b/descriptions/api.github.com/api.github.com.json @@ -289892,7 +289892,7 @@ }, "custom-property-name": { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/api.github.com/api.github.com.yaml b/descriptions/api.github.com/api.github.com.yaml index 29f952283..6a0d16729 100644 --- a/descriptions/api.github.com/api.github.com.yaml +++ b/descriptions/api.github.com/api.github.com.yaml @@ -220410,7 +220410,7 @@ components: type: integer custom-property-name: name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json index 85b45d067..7d0f28a99 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json @@ -103090,7 +103090,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -103280,7 +103280,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -103544,7 +103544,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml index 3e0ed3d60..e878996d2 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml @@ -27575,7 +27575,7 @@ paths: - *91 - &196 name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.deref.json index 85b45d067..7d0f28a99 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.json @@ -103090,7 +103090,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -103280,7 +103280,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -103544,7 +103544,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml index 3e0ed3d60..e878996d2 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml @@ -27575,7 +27575,7 @@ paths: - *91 - &196 name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json index 2a073cb2e..47e736406 100644 --- a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json +++ b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json @@ -23831,7 +23831,7 @@ "/enterprises/{enterprise}/code_security_and_analysis": { "get": { "summary": "Get code security and analysis features for an enterprise", - "description": "Gets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nGets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -23956,12 +23956,15 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true }, "patch": { "summary": "Update code security and analysis features for an enterprise", - "description": "Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nUpdates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -24074,8 +24077,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/enterprises/{enterprise}/consumed-licenses": { @@ -30229,7 +30235,7 @@ "/enterprises/{enterprise}/{security_product}/{enablement}": { "post": { "summary": "Enable or disable a security feature", - "description": "Enables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nEnables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -30317,8 +30323,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/events": { @@ -120836,7 +120845,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -121026,7 +121035,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -121290,7 +121299,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -127175,7 +127184,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -127184,9 +127193,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -128505,7 +128515,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -128514,9 +128524,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -129710,7 +129721,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -129719,9 +129730,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -131621,7 +131633,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -131630,9 +131642,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -132976,7 +132989,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -132985,9 +132998,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -134177,7 +134191,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -134186,9 +134200,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -387957,7 +387972,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -387966,9 +387981,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -389296,7 +389312,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -389305,9 +389321,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -390273,7 +390290,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -390282,9 +390299,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -392203,7 +392221,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -392212,9 +392230,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -393557,7 +393576,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -393566,9 +393585,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -394530,7 +394550,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -394539,9 +394559,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -1037521,7 +1037542,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1037530,9 +1037551,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -1040339,7 +1040361,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1040348,9 +1040370,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -1043157,7 +1043180,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1043166,9 +1043189,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", diff --git a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml index ed05d8c1e..1c85fb586 100644 --- a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml +++ b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml @@ -10387,6 +10387,9 @@ paths: get: summary: Get code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Gets code security and analysis settings for the specified enterprise. The authenticated user must be an administrator of the enterprise in order to use this endpoint. @@ -10476,9 +10479,15 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true patch: summary: Update code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -10556,6 +10565,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/enterprises/{enterprise}/consumed-licenses": get: summary: List enterprise consumed licenses @@ -13265,6 +13277,9 @@ paths: post: summary: Enable or disable a security feature description: |- + > [!WARNING] + > **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Enables or disables the specified security feature for all repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -13316,6 +13331,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/events": get: summary: List public events @@ -33314,7 +33332,7 @@ paths: - *121 - &239 name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: @@ -35105,8 +35123,9 @@ paths: description: The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should - be null. `OrganizationAdmin` is not applicable for personal - repositories. + be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + is ignored. `OrganizationAdmin` and `EnterpriseOwner` + are not applicable for personal repositories. actor_type: type: string enum: @@ -35115,7 +35134,8 @@ paths: - RepositoryRole - Team - DeployKey - description: The type of actor that can bypass a ruleset. + - EnterpriseOwner + description: The type of actor that can bypass a ruleset bypass_mode: type: string description: When the specified actor can bypass the ruleset. diff --git a/descriptions/ghec/dereferenced/ghec.deref.json b/descriptions/ghec/dereferenced/ghec.deref.json index 2a073cb2e..47e736406 100644 --- a/descriptions/ghec/dereferenced/ghec.deref.json +++ b/descriptions/ghec/dereferenced/ghec.deref.json @@ -23831,7 +23831,7 @@ "/enterprises/{enterprise}/code_security_and_analysis": { "get": { "summary": "Get code security and analysis features for an enterprise", - "description": "Gets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nGets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -23956,12 +23956,15 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true }, "patch": { "summary": "Update code security and analysis features for an enterprise", - "description": "Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nUpdates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -24074,8 +24077,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/enterprises/{enterprise}/consumed-licenses": { @@ -30229,7 +30235,7 @@ "/enterprises/{enterprise}/{security_product}/{enablement}": { "post": { "summary": "Enable or disable a security feature", - "description": "Enables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nEnables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -30317,8 +30323,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/events": { @@ -120836,7 +120845,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -121026,7 +121035,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -121290,7 +121299,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -127175,7 +127184,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -127184,9 +127193,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -128505,7 +128515,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -128514,9 +128524,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -129710,7 +129721,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -129719,9 +129730,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -131621,7 +131633,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -131630,9 +131642,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -132976,7 +132989,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -132985,9 +132998,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -134177,7 +134191,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -134186,9 +134200,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -387957,7 +387972,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -387966,9 +387981,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -389296,7 +389312,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -389305,9 +389321,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -390273,7 +390290,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -390282,9 +390299,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -392203,7 +392221,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -392212,9 +392230,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -393557,7 +393576,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -393566,9 +393585,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -394530,7 +394550,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -394539,9 +394559,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -1037521,7 +1037542,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1037530,9 +1037551,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -1040339,7 +1040361,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1040348,9 +1040370,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -1043157,7 +1043180,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -1043166,9 +1043189,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", diff --git a/descriptions/ghec/dereferenced/ghec.deref.yaml b/descriptions/ghec/dereferenced/ghec.deref.yaml index ed05d8c1e..1c85fb586 100644 --- a/descriptions/ghec/dereferenced/ghec.deref.yaml +++ b/descriptions/ghec/dereferenced/ghec.deref.yaml @@ -10387,6 +10387,9 @@ paths: get: summary: Get code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Gets code security and analysis settings for the specified enterprise. The authenticated user must be an administrator of the enterprise in order to use this endpoint. @@ -10476,9 +10479,15 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true patch: summary: Update code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -10556,6 +10565,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/enterprises/{enterprise}/consumed-licenses": get: summary: List enterprise consumed licenses @@ -13265,6 +13277,9 @@ paths: post: summary: Enable or disable a security feature description: |- + > [!WARNING] + > **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Enables or disables the specified security feature for all repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -13316,6 +13331,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/events": get: summary: List public events @@ -33314,7 +33332,7 @@ paths: - *121 - &239 name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: @@ -35105,8 +35123,9 @@ paths: description: The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should - be null. `OrganizationAdmin` is not applicable for personal - repositories. + be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + is ignored. `OrganizationAdmin` and `EnterpriseOwner` + are not applicable for personal repositories. actor_type: type: string enum: @@ -35115,7 +35134,8 @@ paths: - RepositoryRole - Team - DeployKey - description: The type of actor that can bypass a ruleset. + - EnterpriseOwner + description: The type of actor that can bypass a ruleset bypass_mode: type: string description: When the specified actor can bypass the ruleset. diff --git a/descriptions/ghec/ghec.2022-11-28.json b/descriptions/ghec/ghec.2022-11-28.json index a1a290934..359518e4d 100644 --- a/descriptions/ghec/ghec.2022-11-28.json +++ b/descriptions/ghec/ghec.2022-11-28.json @@ -4385,7 +4385,7 @@ "/enterprises/{enterprise}/code_security_and_analysis": { "get": { "summary": "Get code security and analysis features for an enterprise", - "description": "Gets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nGets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -4423,12 +4423,15 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true }, "patch": { "summary": "Update code security and analysis features for an enterprise", - "description": "Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nUpdates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -4512,8 +4515,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/enterprises/{enterprise}/consumed-licenses": { @@ -5491,7 +5497,7 @@ "/enterprises/{enterprise}/{security_product}/{enablement}": { "post": { "summary": "Enable or disable a security feature", - "description": "Enables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nEnables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -5526,8 +5532,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/events": { @@ -111013,7 +111022,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -111022,9 +111031,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -302546,7 +302556,7 @@ }, "custom-property-name": { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/ghec/ghec.2022-11-28.yaml b/descriptions/ghec/ghec.2022-11-28.yaml index 18950f404..c2968d615 100644 --- a/descriptions/ghec/ghec.2022-11-28.yaml +++ b/descriptions/ghec/ghec.2022-11-28.yaml @@ -3078,6 +3078,9 @@ paths: get: summary: Get code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Gets code security and analysis settings for the specified enterprise. The authenticated user must be an administrator of the enterprise in order to use this endpoint. @@ -3108,9 +3111,15 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true patch: summary: Update code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -3189,6 +3198,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/enterprises/{enterprise}/consumed-licenses": get: summary: List enterprise consumed licenses @@ -3893,6 +3905,9 @@ paths: post: summary: Enable or disable a security feature description: |- + > [!WARNING] + > **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Enables or disables the specified security feature for all repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -3921,6 +3936,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/events": get: summary: List public events @@ -81350,8 +81368,9 @@ components: nullable: true description: The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, - this should be null. `OrganizationAdmin` is not applicable for personal - repositories. + this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable + for personal repositories. actor_type: type: string enum: @@ -81360,7 +81379,8 @@ components: - RepositoryRole - Team - DeployKey - description: The type of actor that can bypass a ruleset. + - EnterpriseOwner + description: The type of actor that can bypass a ruleset bypass_mode: type: string description: When the specified actor can bypass the ruleset. `pull_request` @@ -229722,7 +229742,7 @@ components: type: integer custom-property-name: name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghec/ghec.json b/descriptions/ghec/ghec.json index a1a290934..359518e4d 100644 --- a/descriptions/ghec/ghec.json +++ b/descriptions/ghec/ghec.json @@ -4385,7 +4385,7 @@ "/enterprises/{enterprise}/code_security_and_analysis": { "get": { "summary": "Get code security and analysis features for an enterprise", - "description": "Gets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nGets code security and analysis settings for the specified enterprise.\n\nThe authenticated user must be an administrator of the enterprise in order to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `read:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -4423,12 +4423,15 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true }, "patch": { "summary": "Update code security and analysis features for an enterprise", - "description": "Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nUpdates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -4512,8 +4515,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/enterprises/{enterprise}/consumed-licenses": { @@ -5491,7 +5497,7 @@ "/enterprises/{enterprise}/{security_product}/{enablement}": { "post": { "summary": "Enable or disable a security feature", - "description": "Enables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", + "description": "> [!WARNING]\n> **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis).\n\nEnables or disables the specified security feature for all repositories in an enterprise.\n\nThe authenticated user must be an administrator of the enterprise to use this endpoint.\n\nOAuth app tokens and personal access tokens (classic) need the `admin:enterprise` scope to use this endpoint.", "tags": [ "enterprise-admin" ], @@ -5526,8 +5532,11 @@ "githubCloudOnly": true, "enabledForGitHubApps": false, "category": "enterprise-admin", - "subcategory": "code-security-and-analysis" - } + "subcategory": "code-security-and-analysis", + "deprecationDate": "2024-09-27", + "removalDate": "2025-09-27" + }, + "deprecated": true } }, "/events": { @@ -111013,7 +111022,7 @@ "actor_id": { "type": "integer", "nullable": true, - "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. `OrganizationAdmin` is not applicable for personal repositories." + "description": "The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable for personal repositories." }, "actor_type": { "type": "string", @@ -111022,9 +111031,10 @@ "OrganizationAdmin", "RepositoryRole", "Team", - "DeployKey" + "DeployKey", + "EnterpriseOwner" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -302546,7 +302556,7 @@ }, "custom-property-name": { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/ghec/ghec.yaml b/descriptions/ghec/ghec.yaml index 18950f404..c2968d615 100644 --- a/descriptions/ghec/ghec.yaml +++ b/descriptions/ghec/ghec.yaml @@ -3078,6 +3078,9 @@ paths: get: summary: Get code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to fetch code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Gets code security and analysis settings for the specified enterprise. The authenticated user must be an administrator of the enterprise in order to use this endpoint. @@ -3108,9 +3111,15 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true patch: summary: Update code security and analysis features for an enterprise description: |- + > [!WARNING] + > **Deprecation notice:** The ability to update code security and analysis settings for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Updates the settings for advanced security, Dependabot alerts, secret scanning, and push protection for new repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -3189,6 +3198,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/enterprises/{enterprise}/consumed-licenses": get: summary: List enterprise consumed licenses @@ -3893,6 +3905,9 @@ paths: post: summary: Enable or disable a security feature description: |- + > [!WARNING] + > **Deprecation notice:** The ability to enable or disable a security feature for an enterprise is deprecated. Please use [code security configurations](https://docs.github.com/enterprise-cloud@latest//rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-09-27-upcoming-replacement-of-enterprise-code-security-enablement-ui-and-apis). + Enables or disables the specified security feature for all repositories in an enterprise. The authenticated user must be an administrator of the enterprise to use this endpoint. @@ -3921,6 +3936,9 @@ paths: enabledForGitHubApps: false category: enterprise-admin subcategory: code-security-and-analysis + deprecationDate: '2024-09-27' + removalDate: '2025-09-27' + deprecated: true "/events": get: summary: List public events @@ -81350,8 +81368,9 @@ components: nullable: true description: The ID of the actor that can bypass a ruleset. If `actor_type` is `OrganizationAdmin`, this should be `1`. If `actor_type` is `DeployKey`, - this should be null. `OrganizationAdmin` is not applicable for personal - repositories. + this should be null. If `actor_type` is `EnterpriseOwner`, `actor_id` + is ignored. `OrganizationAdmin` and `EnterpriseOwner` are not applicable + for personal repositories. actor_type: type: string enum: @@ -81360,7 +81379,8 @@ components: - RepositoryRole - Team - DeployKey - description: The type of actor that can bypass a ruleset. + - EnterpriseOwner + description: The type of actor that can bypass a ruleset bypass_mode: type: string description: When the specified actor can bypass the ruleset. `pull_request` @@ -229722,7 +229742,7 @@ components: type: integer custom-property-name: name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.json b/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.json index 810a709b1..d33cc91d5 100644 --- a/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.json +++ b/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.json @@ -111991,7 +111991,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -112181,7 +112181,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -112445,7 +112445,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.yaml b/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.yaml index 6897b803b..5ffb7f1ac 100644 --- a/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.yaml +++ b/descriptions/ghes-3.13/dereferenced/ghes-3.13.2022-11-28.deref.yaml @@ -30411,7 +30411,7 @@ paths: - *135 - &232 name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.json b/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.json index 810a709b1..d33cc91d5 100644 --- a/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.json +++ b/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.json @@ -111991,7 +111991,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -112181,7 +112181,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -112445,7 +112445,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.yaml b/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.yaml index 6897b803b..5ffb7f1ac 100644 --- a/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.yaml +++ b/descriptions/ghes-3.13/dereferenced/ghes-3.13.deref.yaml @@ -30411,7 +30411,7 @@ paths: - *135 - &232 name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghes-3.13/ghes-3.13.2022-11-28.json b/descriptions/ghes-3.13/ghes-3.13.2022-11-28.json index 416a9bdcb..a0011e7f6 100644 --- a/descriptions/ghes-3.13/ghes-3.13.2022-11-28.json +++ b/descriptions/ghes-3.13/ghes-3.13.2022-11-28.json @@ -280346,7 +280346,7 @@ }, "custom-property-name": { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/ghes-3.13/ghes-3.13.2022-11-28.yaml b/descriptions/ghes-3.13/ghes-3.13.2022-11-28.yaml index 48329bafd..a3c884b15 100644 --- a/descriptions/ghes-3.13/ghes-3.13.2022-11-28.yaml +++ b/descriptions/ghes-3.13/ghes-3.13.2022-11-28.yaml @@ -211719,7 +211719,7 @@ components: type: integer custom-property-name: name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghes-3.13/ghes-3.13.json b/descriptions/ghes-3.13/ghes-3.13.json index 416a9bdcb..a0011e7f6 100644 --- a/descriptions/ghes-3.13/ghes-3.13.json +++ b/descriptions/ghes-3.13/ghes-3.13.json @@ -280346,7 +280346,7 @@ }, "custom-property-name": { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { diff --git a/descriptions/ghes-3.13/ghes-3.13.yaml b/descriptions/ghes-3.13/ghes-3.13.yaml index 48329bafd..a3c884b15 100644 --- a/descriptions/ghes-3.13/ghes-3.13.yaml +++ b/descriptions/ghes-3.13/ghes-3.13.yaml @@ -211719,7 +211719,7 @@ components: type: integer custom-property-name: name: custom_property_name - description: The custom property name. The name is case sensitive. + description: The custom property name in: path required: true schema: diff --git a/descriptions/ghes-3.14/dereferenced/ghes-3.14.2022-11-28.deref.json b/descriptions/ghes-3.14/dereferenced/ghes-3.14.2022-11-28.deref.json index 54100b338..d07533f11 100644 --- a/descriptions/ghes-3.14/dereferenced/ghes-3.14.2022-11-28.deref.json +++ b/descriptions/ghes-3.14/dereferenced/ghes-3.14.2022-11-28.deref.json @@ -114574,7 +114574,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -114764,7 +114764,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -115028,7 +115028,7 @@ }, { "name": "custom_property_name", - "description": "The custom property name. The name is case sensitive.", + "description": "The custom property name", "in": "path", "required": true, "schema": { @@ -120874,7 +120874,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -122005,7 +122005,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -123011,7 +123011,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -124721,7 +124721,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -125877,7 +125877,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -126879,7 +126879,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -357247,7 +357247,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -358387,7 +358387,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -359165,7 +359165,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a ruleset" }, "bypass_mode": { "type": "string", @@ -360894,7 +360894,7 @@ "Team", "DeployKey" ], - "description": "The type of actor that can bypass a ruleset." + "description": "The type of actor that can bypass a{"code":"internal","msg":"git-diff-tree: context deadline exceeded","meta":{"cause":"*fmt.wrapError"}}