You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: lib/rest/static/dereferenced/api.github.com.deref.json
+21-6
Original file line number
Diff line number
Diff line change
@@ -164348,6 +164348,11 @@
164348
164348
},
164349
164349
"deletable": {
164350
164350
"type": "boolean"
164351
+
},
164352
+
"warning": {
164353
+
"type": "string",
164354
+
"description": "Warning generated when processing the analysis",
164355
+
"example": "123 results were ignored"
164351
164356
}
164352
164357
},
164353
164358
"required": [
@@ -164363,7 +164368,8 @@
164363
164368
"url",
164364
164369
"sarif_id",
164365
164370
"tool",
164366
-
"deletable"
164371
+
"deletable",
164372
+
"warning"
164367
164373
]
164368
164374
}
164369
164375
},
@@ -164387,7 +164393,8 @@
164387
164393
"guid": null,
164388
164394
"version": "2.4.0"
164389
164395
},
164390
-
"deletable": true
164396
+
"deletable": true,
164397
+
"warning": ""
164391
164398
},
164392
164399
{
164393
164400
"ref": "refs/heads/my-branch",
@@ -164406,7 +164413,8 @@
164406
164413
"guid": null,
164407
164414
"version": "1.2.0"
164408
164415
},
164409
-
"deletable": true
164416
+
"deletable": true,
164417
+
"warning": ""
164410
164418
}
164411
164419
]
164412
164420
}
@@ -164626,6 +164634,11 @@
164626
164634
},
164627
164635
"deletable": {
164628
164636
"type": "boolean"
164637
+
},
164638
+
"warning": {
164639
+
"type": "string",
164640
+
"description": "Warning generated when processing the analysis",
164641
+
"example": "123 results were ignored"
164629
164642
}
164630
164643
},
164631
164644
"required": [
@@ -164641,7 +164654,8 @@
164641
164654
"url",
164642
164655
"sarif_id",
164643
164656
"tool",
164644
-
"deletable"
164657
+
"deletable",
164658
+
"warning"
164645
164659
]
164646
164660
},
164647
164661
"examples": {
@@ -164664,7 +164678,8 @@
164664
164678
"guid": null,
164665
164679
"version": "2.4.0"
164666
164680
},
164667
-
"deletable": true
164681
+
"deletable": true,
164682
+
"warning": ""
164668
164683
}
164669
164684
}
164670
164685
}
@@ -164991,7 +165006,7 @@
164991
165006
"/repos/{owner}/{repo}/code-scanning/sarifs": {
164992
165007
"post": {
164993
165008
"summary": "Upload an analysis as SARIF data",
164994
-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
165009
+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64 -w0\n```\n\nSARIF upload supports a maximum of 5000 results per analysis run. Any results over this limit are ignored and any SARIF uploads with more than 25,000 results are rejected. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
Copy file name to clipboardExpand all lines: lib/rest/static/dereferenced/ghes-2.22.deref.json
+12-4
Original file line number
Diff line number
Diff line change
@@ -145573,6 +145573,11 @@
145573
145573
},
145574
145574
"deletable": {
145575
145575
"type": "boolean"
145576
+
},
145577
+
"warning": {
145578
+
"type": "string",
145579
+
"description": "Warning generated when processing the analysis",
145580
+
"example": "123 results were ignored"
145576
145581
}
145577
145582
},
145578
145583
"required": [
@@ -145588,7 +145593,8 @@
145588
145593
"url",
145589
145594
"sarif_id",
145590
145595
"tool",
145591
-
"deletable"
145596
+
"deletable",
145597
+
"warning"
145592
145598
]
145593
145599
}
145594
145600
},
@@ -145612,7 +145618,8 @@
145612
145618
"guid": null,
145613
145619
"version": "2.4.0"
145614
145620
},
145615
-
"deletable": true
145621
+
"deletable": true,
145622
+
"warning": ""
145616
145623
},
145617
145624
{
145618
145625
"ref": "refs/heads/my-branch",
@@ -145631,7 +145638,8 @@
145631
145638
"guid": null,
145632
145639
"version": "1.2.0"
145633
145640
},
145634
-
"deletable": true
145641
+
"deletable": true,
145642
+
"warning": ""
145635
145643
}
145636
145644
]
145637
145645
}
@@ -145726,7 +145734,7 @@
145726
145734
"/repos/{owner}/{repo}/code-scanning/sarifs": {
145727
145735
"post": {
145728
145736
"summary": "Upload an analysis as SARIF data",
145729
-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
145737
+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64 -w0\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
Copy file name to clipboardExpand all lines: lib/rest/static/dereferenced/ghes-3.0.deref.json
+12-4
Original file line number
Diff line number
Diff line change
@@ -150856,6 +150856,11 @@
150856
150856
},
150857
150857
"deletable": {
150858
150858
"type": "boolean"
150859
+
},
150860
+
"warning": {
150861
+
"type": "string",
150862
+
"description": "Warning generated when processing the analysis",
150863
+
"example": "123 results were ignored"
150859
150864
}
150860
150865
},
150861
150866
"required": [
@@ -150871,7 +150876,8 @@
150871
150876
"url",
150872
150877
"sarif_id",
150873
150878
"tool",
150874
-
"deletable"
150879
+
"deletable",
150880
+
"warning"
150875
150881
]
150876
150882
}
150877
150883
},
@@ -150895,7 +150901,8 @@
150895
150901
"guid": null,
150896
150902
"version": "2.4.0"
150897
150903
},
150898
-
"deletable": true
150904
+
"deletable": true,
150905
+
"warning": ""
150899
150906
},
150900
150907
{
150901
150908
"ref": "refs/heads/my-branch",
@@ -150914,7 +150921,8 @@
150914
150921
"guid": null,
150915
150922
"version": "1.2.0"
150916
150923
},
150917
-
"deletable": true
150924
+
"deletable": true,
150925
+
"warning": ""
150918
150926
}
150919
150927
]
150920
150928
}
@@ -151009,7 +151017,7 @@
151009
151017
"/repos/{owner}/{repo}/code-scanning/sarifs": {
151010
151018
"post": {
151011
151019
"summary": "Upload an analysis as SARIF data",
151012
-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
151020
+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64 -w0\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
0 commit comments