Skip to content

Commit 5ba791f

Browse files
authored
Merge pull request #742 from github/openapi-update-cd4a86728285dca2eae13ab1327db926259b9849d40c6d995f0293b219100606
Update OpenAPI 3.0 Descriptions
2 parents a983527 + ef93d83 commit 5ba791f

File tree

4 files changed

+86
-30
lines changed

4 files changed

+86
-30
lines changed

descriptions/api.github.com/api.github.com.json

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3784,6 +3784,7 @@
37843784
"labels": {
37853785
"type": "array",
37863786
"minItems": 1,
3787+
"maxItems": 100,
37873788
"description": "The names of the custom labels to add to the runner.",
37883789
"items": {
37893790
"type": "string"
@@ -3850,6 +3851,7 @@
38503851
"labels": {
38513852
"type": "array",
38523853
"minItems": 0,
3854+
"maxItems": 100,
38533855
"description": "The names of the custom labels to set for the runner. You can pass an empty array to remove all custom labels.",
38543856
"items": {
38553857
"type": "string"
@@ -8781,6 +8783,7 @@
87818783
"labels": {
87828784
"type": "array",
87838785
"minItems": 1,
8786+
"maxItems": 100,
87848787
"description": "The names of the custom labels to add to the runner.",
87858788
"items": {
87868789
"type": "string"
@@ -8847,6 +8850,7 @@
88478850
"labels": {
88488851
"type": "array",
88498852
"minItems": 0,
8853+
"maxItems": 100,
88508854
"description": "The names of the custom labels to set for the runner. You can pass an empty array to remove all custom labels.",
88518855
"items": {
88528856
"type": "string"
@@ -18646,6 +18650,7 @@
1864618650
"labels": {
1864718651
"type": "array",
1864818652
"minItems": 1,
18653+
"maxItems": 100,
1864918654
"description": "The names of the custom labels to add to the runner.",
1865018655
"items": {
1865118656
"type": "string"
@@ -18715,6 +18720,7 @@
1871518720
"labels": {
1871618721
"type": "array",
1871718722
"minItems": 0,
18723+
"maxItems": 100,
1871818724
"description": "The names of the custom labels to set for the runner. You can pass an empty array to remove all custom labels.",
1871918725
"items": {
1872018726
"type": "string"
@@ -24629,7 +24635,7 @@
2462924635
"/repos/{owner}/{repo}/code-scanning/alerts": {
2463024636
"get": {
2463124637
"summary": "List code scanning alerts for a repository",
24632-
"description": "Lists all open code scanning alerts for the default branch (usually `main`\nor `master`). You must use an access token with the `security_events` scope to use\nthis endpoint. GitHub Apps must have the `security_events` read permission to use\nthis endpoint.\n\nThe response includes a `most_recent_instance` object.\nThis provides details of the most recent instance of this alert\nfor the default branch or for the specified Git reference\n(if you used `ref` in the request).",
24638+
"description": "Lists all open code scanning alerts for the default branch (usually `main`\nor `master`). You must use an access token with the `security_events` scope to use\nthis endpoint with private repos, the `public_repo` scope also grants permission to read\nsecurity events on public repos only. GitHub Apps must have the `security_events` read\npermission to use this endpoint.\n\nThe response includes a `most_recent_instance` object.\nThis provides details of the most recent instance of this alert\nfor the default branch or for the specified Git reference\n(if you used `ref` in the request).",
2463324639
"tags": [
2463424640
"code-scanning"
2463524641
],
@@ -24689,6 +24695,9 @@
2468924695
}
2469024696
}
2469124697
},
24698+
"304": {
24699+
"$ref": "#/components/responses/not_modified"
24700+
},
2469224701
"403": {
2469324702
"$ref": "#/components/responses/code_scanning_forbidden_read"
2469424703
},
@@ -24710,7 +24719,7 @@
2471024719
"/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}": {
2471124720
"get": {
2471224721
"summary": "Get a code scanning alert",
24713-
"description": "Gets a single code scanning alert. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` read permission to use this endpoint.\n\n**Deprecation notice**:\nThe instances field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The same information can now be retrieved via a GET request to the URL specified by `instances_url`.",
24722+
"description": "Gets a single code scanning alert. You must use an access token with the `security_events` scope to use this endpoint with private repos, the `public_repo` scope also grants permission to read security events on public repos only. GitHub Apps must have the `security_events` read permission to use this endpoint.\n\n**Deprecation notice**:\nThe instances field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The same information can now be retrieved via a GET request to the URL specified by `instances_url`.",
2471424723
"tags": [
2471524724
"code-scanning"
2471624725
],
@@ -24746,6 +24755,9 @@
2474624755
}
2474724756
}
2474824757
},
24758+
"304": {
24759+
"$ref": "#/components/responses/not_modified"
24760+
},
2474924761
"403": {
2475024762
"$ref": "#/components/responses/code_scanning_forbidden_read"
2475124763
},
@@ -24846,7 +24858,7 @@
2484624858
"/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/instances": {
2484724859
"get": {
2484824860
"summary": "List instances of a code scanning alert",
24849-
"description": "Lists all instances of the specified code scanning alert. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` read permission to use this endpoint.",
24861+
"description": "Lists all instances of the specified code scanning alert.\nYou must use an access token with the `security_events` scope to use this endpoint with private repos,\nthe `public_repo` scope also grants permission to read security events on public repos only.\nGitHub Apps must have the `security_events` read permission to use this endpoint.",
2485024862
"tags": [
2485124863
"code-scanning"
2485224864
],
@@ -24915,7 +24927,7 @@
2491524927
"/repos/{owner}/{repo}/code-scanning/analyses": {
2491624928
"get": {
2491724929
"summary": "List code scanning analyses for a repository",
24918-
"description": "Lists the details of all code scanning analyses for a repository,\nstarting with the most recent.\nThe response is paginated and you can use the `page` and `per_page` parameters\nto list the analyses you're interested in.\nBy default 30 analyses are listed per page.\n\nThe `rules_count` field in the response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nYou must use an access token with the `security_events` scope to use this endpoint.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\n**Deprecation notice**:\nThe `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.",
24930+
"description": "Lists the details of all code scanning analyses for a repository,\nstarting with the most recent.\nThe response is paginated and you can use the `page` and `per_page` parameters\nto list the analyses you're interested in.\nBy default 30 analyses are listed per page.\n\nThe `rules_count` field in the response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nYou must use an access token with the `security_events` scope to use this endpoint with private repos,\nthe `public_repo` scope also grants permission to read security events on public repos only.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\n**Deprecation notice**:\nThe `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.",
2491924931
"operationId": "code-scanning/list-recent-analyses",
2492024932
"tags": [
2492124933
"code-scanning"
@@ -25001,7 +25013,7 @@
2500125013
"/repos/{owner}/{repo}/code-scanning/analyses/{analysis_id}": {
2500225014
"get": {
2500325015
"summary": "Get a code scanning analysis for a repository",
25004-
"description": "Gets a specified code scanning analysis for a repository.\nYou must use an access token with the `security_events` scope to use this endpoint.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\nThe default JSON response contains fields that describe the analysis.\nThis includes the Git reference and commit SHA to which the analysis relates,\nthe datetime of the analysis, the name of the code scanning tool,\nand the number of alerts.\n\nThe `rules_count` field in the default response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nIf you use the Accept header `application/sarif+json`,\nthe response contains the analysis data that was uploaded.\nThis is formatted as\n[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).",
25016+
"description": "Gets a specified code scanning analysis for a repository.\nYou must use an access token with the `security_events` scope to use this endpoint with private repos,\nthe `public_repo` scope also grants permission to read security events on public repos only.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\nThe default JSON response contains fields that describe the analysis.\nThis includes the Git reference and commit SHA to which the analysis relates,\nthe datetime of the analysis, the name of the code scanning tool,\nand the number of alerts.\n\nThe `rules_count` field in the default response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nIf you use the Accept header `application/sarif+json`,\nthe response contains the analysis data that was uploaded.\nThis is formatted as\n[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).",
2500525017
"operationId": "code-scanning/get-analysis",
2500625018
"tags": [
2500725019
"code-scanning"
@@ -25241,7 +25253,7 @@
2524125253
"/repos/{owner}/{repo}/code-scanning/sarifs/{sarif_id}": {
2524225254
"get": {
2524325255
"summary": "Get information about a SARIF upload",
25244-
"description": "Gets information about a SARIF upload, including the status and the URL of the analysis that was uploaded so that you can retrieve details of the analysis. For more information, see \"[Get a code scanning analysis for a repository](/rest/reference/code-scanning#get-a-code-scanning-analysis-for-a-repository).\" You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` read permission to use this endpoint.",
25256+
"description": "Gets information about a SARIF upload, including the status and the URL of the analysis that was uploaded so that you can retrieve details of the analysis. For more information, see \"[Get a code scanning analysis for a repository](/rest/reference/code-scanning#get-a-code-scanning-analysis-for-a-repository).\" You must use an access token with the `security_events` scope to use this endpoint with private repos, the `public_repo` scope also grants permission to read security events on public repos only. GitHub Apps must have the `security_events` read permission to use this endpoint.",
2524525257
"operationId": "code-scanning/get-sarif",
2524625258
"tags": [
2524725259
"code-scanning"

descriptions/api.github.com/api.github.com.yaml

Lines changed: 25 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2742,6 +2742,7 @@ paths:
27422742
labels:
27432743
type: array
27442744
minItems: 1
2745+
maxItems: 100
27452746
description: The names of the custom labels to add to the runner.
27462747
items:
27472748
type: string
@@ -2791,6 +2792,7 @@ paths:
27912792
labels:
27922793
type: array
27932794
minItems: 0
2795+
maxItems: 100
27942796
description: The names of the custom labels to set for the runner.
27952797
You can pass an empty array to remove all custom labels.
27962798
items:
@@ -6304,6 +6306,7 @@ paths:
63046306
labels:
63056307
type: array
63066308
minItems: 1
6309+
maxItems: 100
63076310
description: The names of the custom labels to add to the runner.
63086311
items:
63096312
type: string
@@ -6353,6 +6356,7 @@ paths:
63536356
labels:
63546357
type: array
63556358
minItems: 0
6359+
maxItems: 100
63566360
description: The names of the custom labels to set for the runner.
63576361
You can pass an empty array to remove all custom labels.
63586362
items:
@@ -13378,6 +13382,7 @@ paths:
1337813382
labels:
1337913383
type: array
1338013384
minItems: 1
13385+
maxItems: 100
1338113386
description: The names of the custom labels to add to the runner.
1338213387
items:
1338313388
type: string
@@ -13429,6 +13434,7 @@ paths:
1342913434
labels:
1343013435
type: array
1343113436
minItems: 0
13437+
maxItems: 100
1343213438
description: The names of the custom labels to set for the runner.
1343313439
You can pass an empty array to remove all custom labels.
1343413440
items:
@@ -17714,8 +17720,9 @@ paths:
1771417720
description: |-
1771517721
Lists all open code scanning alerts for the default branch (usually `main`
1771617722
or `master`). You must use an access token with the `security_events` scope to use
17717-
this endpoint. GitHub Apps must have the `security_events` read permission to use
17718-
this endpoint.
17723+
this endpoint with private repos, the `public_repo` scope also grants permission to read
17724+
security events on public repos only. GitHub Apps must have the `security_events` read
17725+
permission to use this endpoint.
1771917726

1772017727
The response includes a `most_recent_instance` object.
1772117728
This provides details of the most recent instance of this alert
@@ -17754,6 +17761,8 @@ paths:
1775417761
examples:
1775517762
default:
1775617763
"$ref": "#/components/examples/code-scanning-alert-items"
17764+
'304':
17765+
"$ref": "#/components/responses/not_modified"
1775717766
'403':
1775817767
"$ref": "#/components/responses/code_scanning_forbidden_read"
1775917768
'404':
@@ -17769,7 +17778,7 @@ paths:
1776917778
get:
1777017779
summary: Get a code scanning alert
1777117780
description: |-
17772-
Gets a single code scanning alert. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` read permission to use this endpoint.
17781+
Gets a single code scanning alert. You must use an access token with the `security_events` scope to use this endpoint with private repos, the `public_repo` scope also grants permission to read security events on public repos only. GitHub Apps must have the `security_events` read permission to use this endpoint.
1777317782

1777417783
**Deprecation notice**:
1777517784
The instances field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The same information can now be retrieved via a GET request to the URL specified by `instances_url`.
@@ -17793,6 +17802,8 @@ paths:
1779317802
examples:
1779417803
default:
1779517804
"$ref": "#/components/examples/code-scanning-alert"
17805+
'304':
17806+
"$ref": "#/components/responses/not_modified"
1779617807
'403':
1779717808
"$ref": "#/components/responses/code_scanning_forbidden_read"
1779817809
'404':
@@ -17858,8 +17869,10 @@ paths:
1785817869
"/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/instances":
1785917870
get:
1786017871
summary: List instances of a code scanning alert
17861-
description: Lists all instances of the specified code scanning alert. You must
17862-
use an access token with the `security_events` scope to use this endpoint.
17872+
description: |-
17873+
Lists all instances of the specified code scanning alert.
17874+
You must use an access token with the `security_events` scope to use this endpoint with private repos,
17875+
the `public_repo` scope also grants permission to read security events on public repos only.
1786317876
GitHub Apps must have the `security_events` read permission to use this endpoint.
1786417877
tags:
1786517878
- code-scanning
@@ -17912,7 +17925,8 @@ paths:
1791217925
For very old analyses this data is not available,
1791317926
and `0` is returned in this field.
1791417927

17915-
You must use an access token with the `security_events` scope to use this endpoint.
17928+
You must use an access token with the `security_events` scope to use this endpoint with private repos,
17929+
the `public_repo` scope also grants permission to read security events on public repos only.
1791617930
GitHub Apps must have the `security_events` read permission to use this endpoint.
1791717931

1791817932
**Deprecation notice**:
@@ -17971,7 +17985,8 @@ paths:
1797117985
summary: Get a code scanning analysis for a repository
1797217986
description: |-
1797317987
Gets a specified code scanning analysis for a repository.
17974-
You must use an access token with the `security_events` scope to use this endpoint.
17988+
You must use an access token with the `security_events` scope to use this endpoint with private repos,
17989+
the `public_repo` scope also grants permission to read security events on public repos only.
1797517990
GitHub Apps must have the `security_events` read permission to use this endpoint.
1797617991

1797717992
The default JSON response contains fields that describe the analysis.
@@ -18244,8 +18259,9 @@ paths:
1824418259
of the analysis. For more information, see "[Get a code scanning analysis
1824518260
for a repository](/rest/reference/code-scanning#get-a-code-scanning-analysis-for-a-repository)."
1824618261
You must use an access token with the `security_events` scope to use this
18247-
endpoint. GitHub Apps must have the `security_events` read permission to use
18248-
this endpoint.
18262+
endpoint with private repos, the `public_repo` scope also grants permission
18263+
to read security events on public repos only. GitHub Apps must have the `security_events`
18264+
read permission to use this endpoint.
1824918265
operationId: code-scanning/get-sarif
1825018266
tags:
1825118267
- code-scanning

0 commit comments

Comments
 (0)