Skip to content

Commit 9e3e73c

Browse files
authored
fix: description updates (#64)
1 parent 82ca5d0 commit 9e3e73c

File tree

3 files changed

+19
-8
lines changed

3 files changed

+19
-8
lines changed

cache/openapi-schema.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"openapi": "3.0.3",
33
"info": {
4-
"version": "2.13.2",
4+
"version": "2.13.3",
55
"title": "GitHub's official OpenAPI spec + Octokit extension",
66
"description": "OpenAPI specs from https://github.com/github/rest-api-description with the 'x-octokit' extension required by the Octokit SDKs",
77
"license": { "name": "MIT", "url": "https://spdx.org/licenses/MIT" },
@@ -17831,7 +17831,7 @@
1783117831
"/repos/{owner}/{repo}/code-scanning/alerts": {
1783217832
"get": {
1783317833
"summary": "List code scanning alerts for a repository",
17834-
"description": "Lists all open code scanning alerts for the default branch (usually `main`\nor `master`). You must use an access token with the `security_events` scope to use\nthis endpoint. GitHub Apps must have the `security_events` read permission to use\nthis endpoint.\n\nThe response includes a `most_recent_instance` object.\nThis provides details of the most recent instance of this alert\nfor the the default branch or for the specified Git reference\n(if you used `ref` in the request).",
17834+
"description": "Lists all open code scanning alerts for the default branch (usually `main`\nor `master`). You must use an access token with the `security_events` scope to use\nthis endpoint. GitHub Apps must have the `security_events` read permission to use\nthis endpoint.\n\nThe response includes a `most_recent_instance` object.\nThis provides details of the most recent instance of this alert\nfor the default branch or for the specified Git reference\n(if you used `ref` in the request).",
1783517835
"tags": ["code-scanning"],
1783617836
"operationId": "code-scanning/list-alerts-for-repo",
1783717837
"externalDocs": {
@@ -18247,7 +18247,7 @@
1824718247
"/repos/{owner}/{repo}/code-scanning/sarifs": {
1824818248
"post": {
1824918249
"summary": "Upload an analysis as SARIF data",
18250-
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
18250+
"description": "Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.\n\nThere are two places where you can upload code scanning results.\n - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see \"[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests).\"\n - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see \"[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository).\"\n\nYou must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:\n\n```\ngzip -c analysis-data.sarif | base64\n```\n\nSARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.\n\nThe `202 Accepted`, response includes an `id` value.\nYou can use this ID to check the status of the upload by using this for the `/sarifs/{sarif_id}` endpoint.\nFor more information, see \"[Get information about a SARIF upload](/rest/reference/code-scanning#get-information-about-a-sarif-upload).\"",
1825118251
"operationId": "code-scanning/upload-sarif",
1825218252
"tags": ["code-scanning"],
1825318253
"externalDocs": {
@@ -45898,7 +45898,7 @@
4589845898
},
4589945899
"code-scanning-ref": {
4590045900
"type": "string",
45901-
"description": "The full Git reference, formatted as `refs/heads/<branch name>`."
45901+
"description": "The full Git reference, formatted as `refs/heads/<branch name>`,\n`refs/pull/<number>/merge`, or `refs/pull/<number>/head`."
4590245902
},
4590345903
"code-scanning-alert-state": {
4590445904
"type": "string",

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@
5353
]
5454
},
5555
"octokit": {
56-
"openapi-version": "2.13.2"
56+
"openapi-version": "2.13.3"
5757
},
5858
"@pika/pack": {
5959
"pipeline": [

src/generated/types.ts

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2468,7 +2468,7 @@ export interface paths {
24682468
*
24692469
* The response includes a `most_recent_instance` object.
24702470
* This provides details of the most recent instance of this alert
2471-
* for the the default branch or for the specified Git reference
2471+
* for the default branch or for the specified Git reference
24722472
* (if you used `ref` in the request).
24732473
*/
24742474
get: operations["code-scanning/list-alerts-for-repo"];
@@ -2607,6 +2607,10 @@ export interface paths {
26072607
/**
26082608
* Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.
26092609
*
2610+
* There are two places where you can upload code scanning results.
2611+
* - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see "[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests)."
2612+
* - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see "[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository)."
2613+
*
26102614
* You must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:
26112615
*
26122616
* ```
@@ -7706,7 +7710,10 @@ export interface components {
77067710
"code-scanning-analysis-tool-name": string;
77077711
/** The GUID of the tool used to generate the code scanning analysis, if provided in the uploaded SARIF data. */
77087712
"code-scanning-analysis-tool-guid": string | null;
7709-
/** The full Git reference, formatted as `refs/heads/<branch name>`. */
7713+
/**
7714+
* The full Git reference, formatted as `refs/heads/<branch name>`,
7715+
* `refs/pull/<number>/merge`, or `refs/pull/<number>/head`.
7716+
*/
77107717
"code-scanning-ref": string;
77117718
/** State of a code scanning alert. */
77127719
"code-scanning-alert-state": "open" | "dismissed" | "fixed";
@@ -20264,7 +20271,7 @@ export interface operations {
2026420271
*
2026520272
* The response includes a `most_recent_instance` object.
2026620273
* This provides details of the most recent instance of this alert
20267-
* for the the default branch or for the specified Git reference
20274+
* for the default branch or for the specified Git reference
2026820275
* (if you used `ref` in the request).
2026920276
*/
2027020277
"code-scanning/list-alerts-for-repo": {
@@ -20578,6 +20585,10 @@ export interface operations {
2057820585
/**
2057920586
* Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the `security_events` scope to use this endpoint. GitHub Apps must have the `security_events` write permission to use this endpoint.
2058020587
*
20588+
* There are two places where you can upload code scanning results.
20589+
* - If you upload to a pull request, for example `--ref refs/pull/42/merge` or `--ref refs/pull/42/head`, then the results appear as alerts in a pull request check. For more information, see "[Triaging code scanning alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests)."
20590+
* - If you upload to a branch, for example `--ref refs/heads/my-branch`, then the results appear in the **Security** tab for your repository. For more information, see "[Managing code scanning alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-the-alerts-for-a-repository)."
20591+
*
2058120592
* You must compress the SARIF-formatted analysis data that you want to upload, using `gzip`, and then encode it as a Base64 format string. For example:
2058220593
*
2058320594
* ```

0 commit comments

Comments
 (0)