Skip to content

Commit 1e458bb

Browse files
Update OpenAPI Descriptions (github#18849)
1 parent 684451c commit 1e458bb

8 files changed

+80
-34
lines changed

Diff for: lib/rest/static/decorated/api.github.com.json

+4-4
Large diffs are not rendered by default.

Diff for: lib/rest/static/decorated/ghes-2.22.json

+3-3
Large diffs are not rendered by default.

Diff for: lib/rest/static/decorated/ghes-3.0.json

+3-3
Large diffs are not rendered by default.

Diff for: lib/rest/static/decorated/github.ae.json

+4-4
Large diffs are not rendered by default.

Diff for: lib/rest/static/dereferenced/api.github.com.deref.json

+21-6
Original file line numberDiff line numberDiff line change
@@ -164348,6 +164348,11 @@
164348164348
},
164349164349
"deletable": {
164350164350
"type": "boolean"
164351+
},
164352+
"warning": {
164353+
"type": "string",
164354+
"description": "Warning generated when processing the analysis",
164355+
"example": "123 results were ignored"
164351164356
}
164352164357
},
164353164358
"required": [
@@ -164363,7 +164368,8 @@
164363164368
"url",
164364164369
"sarif_id",
164365164370
"tool",
164366-
"deletable"
164371+
"deletable",
164372+
"warning"
164367164373
]
164368164374
}
164369164375
},
@@ -164387,7 +164393,8 @@
164387164393
"guid": null,
164388164394
"version": "2.4.0"
164389164395
},
164390-
"deletable": true
164396+
"deletable": true,
164397+
"warning": ""
164391164398
},
164392164399
{
164393164400
"ref": "refs/heads/my-branch",
@@ -164406,7 +164413,8 @@
164406164413
"guid": null,
164407164414
"version": "1.2.0"
164408164415
},
164409-
"deletable": true
164416+
"deletable": true,
164417+
"warning": ""
164410164418
}
164411164419
]
164412164420
}
@@ -164626,6 +164634,11 @@
164626164634
},
164627164635
"deletable": {
164628164636
"type": "boolean"
164637+
},
164638+
"warning": {
164639+
"type": "string",
164640+
"description": "Warning generated when processing the analysis",
164641+
"example": "123 results were ignored"
164629164642
}
164630164643
},
164631164644
"required": [
@@ -164641,7 +164654,8 @@
164641164654
"url",
164642164655
"sarif_id",
164643164656
"tool",
164644-
"deletable"
164657+
"deletable",
164658+
"warning"
164645164659
]
164646164660
},
164647164661
"examples": {
@@ -164664,7 +164678,8 @@
164664164678
"guid": null,
164665164679
"version": "2.4.0"
164666164680
},
164667-
"deletable": true
164681+
"deletable": true,
164682+
"warning": ""
164668164683
}
164669164684
}
164670164685
}
@@ -164991,7 +165006,7 @@
164991165006
"/repos/{owner}/{repo}/code-scanning/sarifs": {
164992165007
"post": {
164993165008
"summary": "Upload an analysis as SARIF data",
164994-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
165009+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64 -w0\n```\n\nSARIF upload supports a maximum of 5000 results per analysis run. Any results over this limit are ignored and any SARIF uploads with more than 25,000 results are rejected. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
164995165010
"operationId": "code-scanning/upload-sarif",
164996165011
"tags": [
164997165012
"code-scanning"

Diff for: lib/rest/static/dereferenced/ghes-2.22.deref.json

+12-4
Original file line numberDiff line numberDiff line change
@@ -145573,6 +145573,11 @@
145573145573
},
145574145574
"deletable": {
145575145575
"type": "boolean"
145576+
},
145577+
"warning": {
145578+
"type": "string",
145579+
"description": "Warning generated when processing the analysis",
145580+
"example": "123 results were ignored"
145576145581
}
145577145582
},
145578145583
"required": [
@@ -145588,7 +145593,8 @@
145588145593
"url",
145589145594
"sarif_id",
145590145595
"tool",
145591-
"deletable"
145596+
"deletable",
145597+
"warning"
145592145598
]
145593145599
}
145594145600
},
@@ -145612,7 +145618,8 @@
145612145618
"guid": null,
145613145619
"version": "2.4.0"
145614145620
},
145615-
"deletable": true
145621+
"deletable": true,
145622+
"warning": ""
145616145623
},
145617145624
{
145618145625
"ref": "refs/heads/my-branch",
@@ -145631,7 +145638,8 @@
145631145638
"guid": null,
145632145639
"version": "1.2.0"
145633145640
},
145634-
"deletable": true
145641+
"deletable": true,
145642+
"warning": ""
145635145643
}
145636145644
]
145637145645
}
@@ -145726,7 +145734,7 @@
145726145734
"/repos/{owner}/{repo}/code-scanning/sarifs": {
145727145735
"post": {
145728145736
"summary": "Upload an analysis as SARIF data",
145729-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
145737+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64 -w0\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
145730145738
"operationId": "code-scanning/upload-sarif",
145731145739
"tags": [
145732145740
"code-scanning"

Diff for: lib/rest/static/dereferenced/ghes-3.0.deref.json

+12-4
Original file line numberDiff line numberDiff line change
@@ -150856,6 +150856,11 @@
150856150856
},
150857150857
"deletable": {
150858150858
"type": "boolean"
150859+
},
150860+
"warning": {
150861+
"type": "string",
150862+
"description": "Warning generated when processing the analysis",
150863+
"example": "123 results were ignored"
150859150864
}
150860150865
},
150861150866
"required": [
@@ -150871,7 +150876,8 @@
150871150876
"url",
150872150877
"sarif_id",
150873150878
"tool",
150874-
"deletable"
150879+
"deletable",
150880+
"warning"
150875150881
]
150876150882
}
150877150883
},
@@ -150895,7 +150901,8 @@
150895150901
"guid": null,
150896150902
"version": "2.4.0"
150897150903
},
150898-
"deletable": true
150904+
"deletable": true,
150905+
"warning": ""
150899150906
},
150900150907
{
150901150908
"ref": "refs/heads/my-branch",
@@ -150914,7 +150921,8 @@
150914150921
"guid": null,
150915150922
"version": "1.2.0"
150916150923
},
150917-
"deletable": true
150924+
"deletable": true,
150925+
"warning": ""
150918150926
}
150919150927
]
150920150928
}
@@ -151009,7 +151017,7 @@
151009151017
"/repos/{owner}/{repo}/code-scanning/sarifs": {
151010151018
"post": {
151011151019
"summary": "Upload an analysis as SARIF data",
151012-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
151020+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64 -w0\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
151013151021
"operationId": "code-scanning/upload-sarif",
151014151022
"tags": [
151015151023
"code-scanning"

0 commit comments

Comments
 (0)