From db5d0119793eb6595a0eaee4e4d7f4490c291d9d Mon Sep 17 00:00:00 2001 From: Sophie <29382425+sophietheking@users.noreply.github.com> Date: Fri, 9 May 2025 09:41:49 +0200 Subject: [PATCH 1/2] Remove release note and add errata to GHES 3.16 release notes (#55554) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --- data/release-notes/enterprise-server/3-16/0.yml | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/data/release-notes/enterprise-server/3-16/0.yml b/data/release-notes/enterprise-server/3-16/0.yml index eb5b434be6bf..6972de450ba4 100644 --- a/data/release-notes/enterprise-server/3-16/0.yml +++ b/data/release-notes/enterprise-server/3-16/0.yml @@ -32,9 +32,6 @@ sections: - heading: Dependabot notes: - # https://github.com/github/releases/issues/5434 - - | - Developers using `pnpm` workspaces can ensure more reliable dependency updates with full Dependabot support for `pnpm` workspace catalogs. Dependabot prevents lockfile inconsistencies, avoids broken dependency trees, and improves update reliability in monorepos. See [the GitHub blog post](https://github.blog/changelog/2025-02-04-dependabot-now-supports-pnpm-workspace-catalogs-ga/). # https://github.com/github/releases/issues/4982 - | Users can configure Dependabot to create pull requests to keep their repositories up to date with the .NET SDK latest version. When a new version is detected, Dependabot creates a pull request to update the `global.json` file to the new version. See [AUTOTITLE](/code-security/dependabot/dependabot-version-updates/configuring-dependabot-version-updates) and [AUTOTITLE](/code-security/dependabot/working-with-dependabot/dependabot-options-reference#package-ecosystem-). @@ -266,3 +263,5 @@ sections: The release notes previously mentioned GitHub App private key limits, which did not ship in 3.16 and will ship in 3.17. Similarly, PAT rotation policies were mentioned but will ship instead in 3.17. [Updated: 2025-03-21] - | The release notes previously did not mention VMware ESXi 8.0 support. [Updated: 2025-04-02] + - | + The release notes previously mentioned Dependabot support for `pnpm` workspace catalogs, which did not ship in 3.16 and will ship in 3.17. [Updated: 2025-05-08] From 769711c302ebc1533dfe516839414ce5f4d06bff Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Fri, 9 May 2025 02:12:14 -0700 Subject: [PATCH 2/2] Update OpenAPI Description (#55556) Co-authored-by: hubwriter --- src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/schema.json | 8 ++++---- src/rest/data/ghec-2022-11-28/schema.json | 8 ++++---- src/rest/data/ghes-3.13-2022-11-28/schema.json | 4 ++-- src/rest/data/ghes-3.14-2022-11-28/schema.json | 4 ++-- src/rest/data/ghes-3.15-2022-11-28/schema.json | 4 ++-- src/rest/data/ghes-3.16-2022-11-28/schema.json | 4 ++-- src/rest/lib/config.json | 2 +- src/webhooks/lib/config.json | 2 +- 9 files changed, 19 insertions(+), 19 deletions(-) diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 0a945c36c62e..657558be9260 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "924dff466f65278c173f50a71fb6cd4283c68caf" + "sha": "09072d8aecf89642ff0e83cf1189d006e64f9714" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 1140bd1b0a5f..3a22731511bc 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -219952,7 +219952,7 @@ } ], "previews": [], - "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nOrganization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.

\n

Team members will include the members of child teams.

\n

The authenticated user must have push access to the repository to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", + "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nThe permissions hash returned in the response contains the base role permissions of the collaborator. The role_name is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

\n

Team members will include the members of child teams.

\n

The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.\nOAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -221503,7 +221503,7 @@ } ], "previews": [], - "descriptionHTML": "

This endpoint triggers notifications. Creating content too quickly using this endpoint may result in secondary rate limiting. For more information, see \"Rate limits for the API\" and \"Best practices for using the REST API.\"

\n

Adding an outside collaborator may be restricted by enterprise administrators. For more information, see \"Enforcing repository management policies in your enterprise.\"

\n

For more information on permission levels, see \"Repository permission levels for an organization\". There are restrictions on which permissions can be granted to organization members when an organization base role is in place. In this case, the permission being given must be equal to or higher than the org base permission. Otherwise, the request will fail with:

\n
Cannot assign {member} permission of {role name}\n
\n

Note that, if you choose not to pass any parameters, you'll need to set Content-Length to zero when calling out to this endpoint. For more information, see \"HTTP method.\"

\n

The invitee will receive a notification that they have been invited to the repository, which they must accept or decline. They may do this via the notifications page, the email they receive, or by using the API.

\n

Updating an existing collaborator's permission level

\n

The endpoint can also be used to change the permissions of an existing collaborator without first removing and re-adding the collaborator. To change the permissions, use the same endpoint and pass a different permission parameter. The response will be a 204, with no other indication that the permission level changed.

\n

Rate limits

\n

You are limited to sending 50 invitations to a repository per 24 hour period. Note there is no limit if you are inviting organization members to an organization repository.

", + "descriptionHTML": "

Add a user to a repository with a specified level of access. If the repository is owned by an organization, this API does not add the user to the organization - a user that has repository access without being an organization member is called an \"outside collaborator\" (if they are not an Enterprise Managed User) or a \"repository collaborator\" if they are an Enterprise Managed User. These users are exempt from some organization policies - see \"Adding outside collaborators to repositories\" to learn more about these collaborator types.

\n

This endpoint triggers notifications.

\n

Adding an outside collaborator may be restricted by enterprise and organization administrators. For more information, see \"Enforcing repository management policies in your enterprise\" and \"Setting permissions for adding outside collaborators\" for organization settings.

\n

For more information on permission levels, see \"Repository permission levels for an organization\". There are restrictions on which permissions can be granted to organization members when an organization base role is in place. In this case, the role being given must be equal to or higher than the org base permission. Otherwise, the request will fail with:

\n
Cannot assign {member} permission of {role name}\n
\n

Note that, if you choose not to pass any parameters, you'll need to set Content-Length to zero when calling out to this endpoint. For more information, see \"HTTP method.\"

\n

The invitee will receive a notification that they have been invited to the repository, which they must accept or decline. They may do this via the notifications page, the email they receive, or by using the API.

\n

For Enterprise Managed Users, this endpoint does not send invitations - these users are automatically added to organizations and repositories. Enterprise Managed Users can only be added to organizations and repositories within their enterprise.

\n

Updating an existing collaborator's permission level

\n

The endpoint can also be used to change the permissions of an existing collaborator without first removing and re-adding the collaborator. To change the permissions, use the same endpoint and pass a different permission parameter. The response will be a 204, with no other indication that the permission level changed.

\n

Rate limits

\n

You are limited to sending 50 invitations to a repository per 24 hour period. Note there is no limit if you are inviting organization members to an organization repository.

", "statusCodes": [ { "httpStatusCode": "201", @@ -221519,7 +221519,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Response when:

\n" } ] }, @@ -221918,7 +221918,7 @@ } ], "previews": [], - "descriptionHTML": "

Checks the repository permission of a collaborator. The possible repository\npermissions are admin, write, read, and none.

\n

Note: The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read. To determine the role assigned to the\ncollaborator, see the role_name attribute, which will provide the full role name, including custom roles. The\npermissions hash can also be used to determine which base level of access the collaborator has to the repository.

", + "descriptionHTML": "

Checks the repository permission and role of a collaborator.

\n

The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read.\nThe role_name attribute provides the name of the assigned role, including custom roles. The\npermission can also be used to determine which base level of access the collaborator has to the repository.

\n

The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index c0879c88a2ca..586a70074146 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -231252,7 +231252,7 @@ } ], "previews": [], - "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nOrganization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.

\n

Team members will include the members of child teams.

\n

The authenticated user must have push access to the repository to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", + "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nThe permissions hash returned in the response contains the base role permissions of the collaborator. The role_name is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

\n

Team members will include the members of child teams.

\n

The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.\nOAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -232815,7 +232815,7 @@ } ], "previews": [], - "descriptionHTML": "

This endpoint triggers notifications. Creating content too quickly using this endpoint may result in secondary rate limiting. For more information, see \"Rate limits for the API\" and \"Best practices for using the REST API.\"

\n

Adding an outside collaborator may be restricted by enterprise administrators. For more information, see \"Enforcing repository management policies in your enterprise.\"

\n

For more information on permission levels, see \"Repository permission levels for an organization\". There are restrictions on which permissions can be granted to organization members when an organization base role is in place. In this case, the permission being given must be equal to or higher than the org base permission. Otherwise, the request will fail with:

\n
Cannot assign {member} permission of {role name}\n
\n

Note that, if you choose not to pass any parameters, you'll need to set Content-Length to zero when calling out to this endpoint. For more information, see \"HTTP method.\"

\n

The invitee will receive a notification that they have been invited to the repository, which they must accept or decline. They may do this via the notifications page, the email they receive, or by using the API.

\n

Updating an existing collaborator's permission level

\n

The endpoint can also be used to change the permissions of an existing collaborator without first removing and re-adding the collaborator. To change the permissions, use the same endpoint and pass a different permission parameter. The response will be a 204, with no other indication that the permission level changed.

\n

Rate limits

\n

You are limited to sending 50 invitations to a repository per 24 hour period. Note there is no limit if you are inviting organization members to an organization repository.

", + "descriptionHTML": "

Add a user to a repository with a specified level of access. If the repository is owned by an organization, this API does not add the user to the organization - a user that has repository access without being an organization member is called an \"outside collaborator\" (if they are not an Enterprise Managed User) or a \"repository collaborator\" if they are an Enterprise Managed User. These users are exempt from some organization policies - see \"Adding outside collaborators to repositories\" to learn more about these collaborator types.

\n

This endpoint triggers notifications.

\n

Adding an outside collaborator may be restricted by enterprise and organization administrators. For more information, see \"Enforcing repository management policies in your enterprise\" and \"Setting permissions for adding outside collaborators\" for organization settings.

\n

For more information on permission levels, see \"Repository permission levels for an organization\". There are restrictions on which permissions can be granted to organization members when an organization base role is in place. In this case, the role being given must be equal to or higher than the org base permission. Otherwise, the request will fail with:

\n
Cannot assign {member} permission of {role name}\n
\n

Note that, if you choose not to pass any parameters, you'll need to set Content-Length to zero when calling out to this endpoint. For more information, see \"HTTP method.\"

\n

The invitee will receive a notification that they have been invited to the repository, which they must accept or decline. They may do this via the notifications page, the email they receive, or by using the API.

\n

For Enterprise Managed Users, this endpoint does not send invitations - these users are automatically added to organizations and repositories. Enterprise Managed Users can only be added to organizations and repositories within their enterprise.

\n

Updating an existing collaborator's permission level

\n

The endpoint can also be used to change the permissions of an existing collaborator without first removing and re-adding the collaborator. To change the permissions, use the same endpoint and pass a different permission parameter. The response will be a 204, with no other indication that the permission level changed.

\n

Rate limits

\n

You are limited to sending 50 invitations to a repository per 24 hour period. Note there is no limit if you are inviting organization members to an organization repository.

", "statusCodes": [ { "httpStatusCode": "201", @@ -232831,7 +232831,7 @@ }, { "httpStatusCode": "422", - "description": "

Validation failed, or the endpoint has been spammed.

" + "description": "

Response when:

\n" } ] }, @@ -233230,7 +233230,7 @@ } ], "previews": [], - "descriptionHTML": "

Checks the repository permission of a collaborator. The possible repository\npermissions are admin, write, read, and none.

\n

Note: The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read. To determine the role assigned to the\ncollaborator, see the role_name attribute, which will provide the full role name, including custom roles. The\npermissions hash can also be used to determine which base level of access the collaborator has to the repository.

", + "descriptionHTML": "

Checks the repository permission and role of a collaborator.

\n

The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read.\nThe role_name attribute provides the name of the assigned role, including custom roles. The\npermission can also be used to determine which base level of access the collaborator has to the repository.

\n

The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.13-2022-11-28/schema.json b/src/rest/data/ghes-3.13-2022-11-28/schema.json index 6c5cf5cc2b68..dac35431290e 100644 --- a/src/rest/data/ghes-3.13-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.13-2022-11-28/schema.json @@ -160654,7 +160654,7 @@ } ], "previews": [], - "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nOrganization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.

\n

Team members will include the members of child teams.

\n

The authenticated user must have push access to the repository to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", + "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nThe permissions hash returned in the response contains the base role permissions of the collaborator. The role_name is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

\n

Team members will include the members of child teams.

\n

The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.\nOAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -161232,7 +161232,7 @@ } ], "previews": [], - "descriptionHTML": "

Checks the repository permission of a collaborator. The possible repository\npermissions are admin, write, read, and none.

\n

Note: The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read. To determine the role assigned to the\ncollaborator, see the role_name attribute, which will provide the full role name, including custom roles. The\npermissions hash can also be used to determine which base level of access the collaborator has to the repository.

", + "descriptionHTML": "

Checks the repository permission and role of a collaborator.

\n

The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read.\nThe role_name attribute provides the name of the assigned role, including custom roles. The\npermission can also be used to determine which base level of access the collaborator has to the repository.

\n

The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.14-2022-11-28/schema.json b/src/rest/data/ghes-3.14-2022-11-28/schema.json index d0febe0f980c..38793c8ec810 100644 --- a/src/rest/data/ghes-3.14-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.14-2022-11-28/schema.json @@ -160654,7 +160654,7 @@ } ], "previews": [], - "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nOrganization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.

\n

Team members will include the members of child teams.

\n

The authenticated user must have push access to the repository to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", + "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nThe permissions hash returned in the response contains the base role permissions of the collaborator. The role_name is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

\n

Team members will include the members of child teams.

\n

The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.\nOAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -161232,7 +161232,7 @@ } ], "previews": [], - "descriptionHTML": "

Checks the repository permission of a collaborator. The possible repository\npermissions are admin, write, read, and none.

\n

Note: The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read. To determine the role assigned to the\ncollaborator, see the role_name attribute, which will provide the full role name, including custom roles. The\npermissions hash can also be used to determine which base level of access the collaborator has to the repository.

", + "descriptionHTML": "

Checks the repository permission and role of a collaborator.

\n

The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read.\nThe role_name attribute provides the name of the assigned role, including custom roles. The\npermission can also be used to determine which base level of access the collaborator has to the repository.

\n

The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.15-2022-11-28/schema.json b/src/rest/data/ghes-3.15-2022-11-28/schema.json index 6358ecec45ce..ee4d068c9ea9 100644 --- a/src/rest/data/ghes-3.15-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.15-2022-11-28/schema.json @@ -164781,7 +164781,7 @@ } ], "previews": [], - "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nOrganization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.

\n

Team members will include the members of child teams.

\n

The authenticated user must have push access to the repository to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", + "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nThe permissions hash returned in the response contains the base role permissions of the collaborator. The role_name is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

\n

Team members will include the members of child teams.

\n

The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.\nOAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -165359,7 +165359,7 @@ } ], "previews": [], - "descriptionHTML": "

Checks the repository permission of a collaborator. The possible repository\npermissions are admin, write, read, and none.

\n

Note: The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read. To determine the role assigned to the\ncollaborator, see the role_name attribute, which will provide the full role name, including custom roles. The\npermissions hash can also be used to determine which base level of access the collaborator has to the repository.

", + "descriptionHTML": "

Checks the repository permission and role of a collaborator.

\n

The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read.\nThe role_name attribute provides the name of the assigned role, including custom roles. The\npermission can also be used to determine which base level of access the collaborator has to the repository.

\n

The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/data/ghes-3.16-2022-11-28/schema.json b/src/rest/data/ghes-3.16-2022-11-28/schema.json index 53b9079a93ed..146ecd00a5a4 100644 --- a/src/rest/data/ghes-3.16-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.16-2022-11-28/schema.json @@ -168431,7 +168431,7 @@ } ], "previews": [], - "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nOrganization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.

\n

Team members will include the members of child teams.

\n

The authenticated user must have push access to the repository to use this endpoint.

\n

OAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", + "descriptionHTML": "

For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.\nThe permissions hash returned in the response contains the base role permissions of the collaborator. The role_name is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

\n

Team members will include the members of child teams.

\n

The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.\nOAuth app tokens and personal access tokens (classic) need the read:org and repo scopes to use this endpoint.

", "statusCodes": [ { "httpStatusCode": "200", @@ -169009,7 +169009,7 @@ } ], "previews": [], - "descriptionHTML": "

Checks the repository permission of a collaborator. The possible repository\npermissions are admin, write, read, and none.

\n

Note: The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read. To determine the role assigned to the\ncollaborator, see the role_name attribute, which will provide the full role name, including custom roles. The\npermissions hash can also be used to determine which base level of access the collaborator has to the repository.

", + "descriptionHTML": "

Checks the repository permission and role of a collaborator.

\n

The permission attribute provides the legacy base roles of admin, write, read, and none, where the\nmaintain role is mapped to write and the triage role is mapped to read.\nThe role_name attribute provides the name of the assigned role, including custom roles. The\npermission can also be used to determine which base level of access the collaborator has to the repository.

\n

The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.\nThere is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.

", "statusCodes": [ { "httpStatusCode": "200", diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index 564446684009..d8959b299953 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -44,5 +44,5 @@ ] } }, - "sha": "924dff466f65278c173f50a71fb6cd4283c68caf" + "sha": "09072d8aecf89642ff0e83cf1189d006e64f9714" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index e79c5f4e3885..0445eb70b0af 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "924dff466f65278c173f50a71fb6cd4283c68caf" + "sha": "09072d8aecf89642ff0e83cf1189d006e64f9714" } \ No newline at end of file