diff --git a/descriptions-next/api.github.com/api.github.com.2022-11-28.json b/descriptions-next/api.github.com/api.github.com.2022-11-28.json index 248f3ea9d..59cba586d 100644 --- a/descriptions-next/api.github.com/api.github.com.2022-11-28.json +++ b/descriptions-next/api.github.com/api.github.com.2022-11-28.json @@ -19983,6 +19983,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -20479,6 +20488,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -35499,6 +35517,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -110538,6 +110565,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -115486,6 +115522,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -299844,16 +299889,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -299925,8 +299961,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -304140,16 +304185,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", diff --git a/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml b/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml index 6e3e180cd..c4ece3a79 100644 --- a/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml +++ b/descriptions-next/api.github.com/api.github.com.2022-11-28.yaml @@ -14623,6 +14623,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -15010,6 +15017,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -25972,6 +25986,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository @@ -80079,6 +80100,13 @@ components: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration associated with @@ -83719,6 +83747,13 @@ components: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS minimal-repository: title: Minimal Repository description: Minimal Repository @@ -220837,12 +220872,7 @@ components: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -220902,8 +220932,13 @@ components: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -224464,12 +224499,7 @@ components: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set diff --git a/descriptions-next/api.github.com/api.github.com.2026-03-10.json b/descriptions-next/api.github.com/api.github.com.2026-03-10.json index bb01af643..2bb1728ae 100644 --- a/descriptions-next/api.github.com/api.github.com.2026-03-10.json +++ b/descriptions-next/api.github.com/api.github.com.2026-03-10.json @@ -19941,6 +19941,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -20437,6 +20446,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -35445,6 +35463,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -110348,6 +110375,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -114922,6 +114958,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -298999,16 +299044,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -299080,8 +299116,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -303294,16 +303339,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", diff --git a/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml b/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml index fbd750ff3..e4789c4cf 100644 --- a/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml +++ b/descriptions-next/api.github.com/api.github.com.2026-03-10.yaml @@ -14589,6 +14589,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -14976,6 +14983,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -25931,6 +25945,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository @@ -79926,6 +79947,13 @@ components: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration associated with @@ -83303,6 +83331,13 @@ components: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS minimal-repository: title: Minimal Repository description: Minimal Repository @@ -220142,12 +220177,7 @@ components: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -220207,8 +220237,13 @@ components: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -223768,12 +223803,7 @@ components: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set diff --git a/descriptions-next/api.github.com/api.github.com.json b/descriptions-next/api.github.com/api.github.com.json index fd584fd94..9bca74f57 100644 --- a/descriptions-next/api.github.com/api.github.com.json +++ b/descriptions-next/api.github.com/api.github.com.json @@ -20085,6 +20085,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -20581,6 +20590,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -35711,6 +35729,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -111119,6 +111146,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -116210,6 +116246,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -301740,16 +301785,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -301821,8 +301857,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -306048,16 +306093,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", diff --git a/descriptions-next/api.github.com/api.github.com.yaml b/descriptions-next/api.github.com/api.github.com.yaml index 08227f8e0..d6eed62a8 100644 --- a/descriptions-next/api.github.com/api.github.com.yaml +++ b/descriptions-next/api.github.com/api.github.com.yaml @@ -14677,6 +14677,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -15064,6 +15071,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -26085,6 +26099,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository @@ -80455,6 +80476,13 @@ components: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration associated with @@ -84194,6 +84222,13 @@ components: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS minimal-repository: title: Minimal Repository description: Minimal Repository @@ -222066,12 +222101,7 @@ components: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -222131,8 +222161,13 @@ components: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -225699,12 +225734,7 @@ components: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json index 1b19ee226..2e8c265b6 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json @@ -23092,6 +23092,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -23817,6 +23826,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24325,6 +24343,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24447,16 +24474,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -24764,6 +24782,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -25449,6 +25476,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -26312,6 +26348,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -26433,8 +26478,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -82636,6 +82690,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -84025,6 +84088,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -101329,6 +101401,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -107625,6 +107706,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -109423,6 +109513,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -117762,6 +117861,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -117874,16 +117982,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -118233,6 +118332,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -118543,6 +118651,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -118659,8 +118776,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -118938,6 +119064,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -119060,16 +119195,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -119648,6 +119774,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -119764,8 +119899,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -120088,6 +120232,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -120386,6 +120539,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -121115,6 +121277,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -121236,8 +121407,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -123403,6 +123583,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -126562,6 +126751,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -130519,6 +130717,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -137184,6 +137391,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -138655,6 +138871,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -168127,6 +168352,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -170550,6 +170784,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -179100,6 +179343,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -183009,6 +183261,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -184386,6 +184647,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -187789,6 +188059,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -190095,6 +190374,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -225235,6 +225523,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -229778,6 +230075,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -247137,6 +247443,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -254785,6 +255100,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -261371,6 +261695,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -262259,6 +262592,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -266537,6 +266879,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -277889,6 +278240,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -278811,6 +279171,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -280847,6 +281216,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -281769,6 +282147,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -284649,6 +285036,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -285571,6 +285967,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -292949,6 +293354,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -293871,6 +294285,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -330705,6 +331128,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -332692,6 +333124,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -334189,6 +334630,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -336024,6 +336474,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -349734,6 +350193,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -351399,6 +351867,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -353565,6 +354042,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -355367,6 +355853,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -359194,6 +359689,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -374141,6 +374645,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -375567,6 +376080,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -412356,6 +412878,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -416837,6 +417368,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -429116,6 +429656,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -430676,6 +431225,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -554727,6 +555285,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -583719,6 +584286,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -585521,6 +586097,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -647660,6 +648245,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -653450,6 +654044,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -658174,6 +658777,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -659689,6 +660301,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -662086,6 +662707,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -663776,6 +664406,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -675084,6 +675723,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -680605,6 +681253,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -682962,6 +683619,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -684764,6 +685430,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -686875,6 +687550,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -689033,6 +689717,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -691007,6 +691700,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -697104,6 +697806,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -699550,6 +700261,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -701612,6 +702332,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -703409,6 +704138,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -723627,6 +724365,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -725269,6 +726016,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -726585,6 +727341,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -733805,6 +734570,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -735566,6 +736340,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -741497,6 +742280,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -755931,6 +756723,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -799572,6 +800373,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -800949,6 +801759,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -850008,6 +850827,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -854593,6 +855421,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -867515,6 +868352,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -872558,6 +873404,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -877601,6 +878456,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -882657,6 +883521,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1599105,6 +1599978,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1603469,6 +1604351,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml index f898702c0..274996e8c 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml @@ -10425,6 +10425,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration @@ -10896,12 +10903,7 @@ paths: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -11361,8 +11363,13 @@ paths: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -20305,6 +20312,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS custom_properties: type: object description: The custom properties that were defined for @@ -31052,12 +31066,7 @@ paths: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set @@ -31277,6 +31286,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -31645,6 +31661,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -55184,6 +55207,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json index a8ec14472..f1c2609c7 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.json @@ -23001,6 +23001,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -23726,6 +23735,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24234,6 +24252,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24356,16 +24383,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -24673,6 +24691,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -25358,6 +25385,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -26221,6 +26257,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -26342,8 +26387,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -78409,6 +78463,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -79795,6 +79858,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -97113,6 +97185,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -103368,6 +103449,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -105163,6 +105253,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -113461,6 +113560,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -113573,16 +113681,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -113932,6 +114031,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -114242,6 +114350,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -114358,8 +114475,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -114637,6 +114763,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -114759,16 +114894,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -115347,6 +115473,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -115463,8 +115598,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -115787,6 +115931,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -116085,6 +116238,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -116814,6 +116976,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -116935,8 +117106,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -119099,6 +119279,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -122255,6 +122444,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -126209,6 +126407,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -132836,6 +133043,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -134304,6 +134520,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -163278,6 +163503,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -165698,6 +165932,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -176480,6 +176723,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -177854,6 +178106,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -181254,6 +181515,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -183557,6 +183827,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -217866,6 +218145,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -222340,6 +222628,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -239741,6 +240038,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -247377,6 +247683,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -253860,6 +254175,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -254748,6 +255072,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -258957,6 +259290,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -270268,6 +270610,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -271187,6 +271538,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -273220,6 +273580,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -274139,6 +274508,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -277016,6 +277394,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -277935,6 +278322,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -285303,6 +285699,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -286222,6 +286627,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -323034,6 +323448,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -325018,6 +325441,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -326512,6 +326944,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -328344,6 +328785,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -342052,6 +342502,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -343714,6 +344173,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -345877,6 +346345,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -347676,6 +348153,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -351500,6 +351986,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -366220,6 +366715,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -367643,6 +368147,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -403965,6 +404478,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -408377,6 +408899,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -420653,6 +421184,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -422210,6 +422750,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -542824,6 +543373,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -570917,6 +571475,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -572716,6 +573283,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -634188,6 +634764,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -639975,6 +640560,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -644630,6 +645224,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -646142,6 +646745,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -648536,6 +649148,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -650223,6 +650844,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -661333,6 +661963,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -666842,6 +667481,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -669196,6 +669844,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -670995,6 +671652,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -673103,6 +673769,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -675258,6 +675933,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -677229,6 +677913,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -683257,6 +683950,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -685700,6 +686402,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -687759,6 +688470,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -689553,6 +690273,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -709452,6 +710181,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -710765,6 +711503,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -717897,6 +718644,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -719730,6 +720486,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -725695,6 +726460,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -739674,6 +740448,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -781988,6 +782771,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -783362,6 +784154,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -831244,6 +832045,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -835788,6 +836598,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -848647,6 +849466,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -853675,6 +854503,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -858703,6 +859540,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -863744,6 +864590,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1573860,6 +1574715,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1578155,6 +1579019,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml index 4bdcc258c..d60bfc122 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.2026-03-10.deref.yaml @@ -10376,6 +10376,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration @@ -10847,12 +10854,7 @@ paths: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -11312,8 +11314,13 @@ paths: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -19995,6 +20002,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS custom_properties: type: object description: The custom properties that were defined for @@ -30700,12 +30714,7 @@ paths: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set @@ -30925,6 +30934,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -31293,6 +31309,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -54772,6 +54795,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json index 8b9355745..e91068092 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.json @@ -23321,6 +23321,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24046,6 +24055,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24554,6 +24572,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -24676,16 +24703,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -24993,6 +25011,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -25678,6 +25705,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -26541,6 +26577,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -26662,8 +26707,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -84056,6 +84110,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -85456,6 +85519,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -103129,6 +103201,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -109642,6 +109723,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -111451,6 +111541,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -119857,6 +119956,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -119969,16 +120077,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -120328,6 +120427,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -120638,6 +120746,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -120754,8 +120871,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -121033,6 +121159,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -121155,16 +121290,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -121743,6 +121869,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -121859,8 +121994,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -122183,6 +122327,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -122481,6 +122634,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -123210,6 +123372,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -123331,8 +123502,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -125498,6 +125678,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -128668,6 +128857,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -132636,6 +132834,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -139352,6 +139559,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -140834,6 +141050,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -170891,6 +171116,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -173325,6 +173559,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -183981,6 +184224,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -188485,6 +188737,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -189873,6 +190134,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -193287,6 +193557,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -195604,6 +195883,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -231659,6 +231947,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -236522,6 +236819,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -254024,6 +254330,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -261703,6 +262018,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -268708,6 +269032,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -269616,6 +269949,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -274203,6 +274545,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -285781,6 +286132,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -286714,6 +287074,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -288761,6 +289130,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -289694,6 +290072,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -292585,6 +292972,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -293518,6 +293914,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -300923,6 +301328,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -301856,6 +302270,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -338728,6 +339151,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -340726,6 +341158,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -342234,6 +342675,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -344080,6 +344530,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -357826,6 +358285,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -359491,6 +359959,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -361668,6 +362145,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -363481,6 +363967,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -367319,6 +367814,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -382566,6 +383070,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -384003,6 +384516,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -421213,6 +421735,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -426014,6 +426545,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -438313,6 +438853,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -439884,6 +440433,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -566918,6 +567476,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -597143,6 +597710,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -598956,6 +599532,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -662183,6 +662768,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -667993,6 +668587,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -673037,6 +673640,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -674572,6 +675184,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -676980,6 +677601,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -678681,6 +679311,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -690137,6 +690776,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -695754,6 +696402,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -698122,6 +698779,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -699935,6 +700601,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -702057,6 +702732,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -704226,6 +704910,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -706211,6 +706904,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -712628,6 +713330,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -715094,6 +715805,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -717167,6 +717887,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -718975,6 +719704,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -741480,6 +742218,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -743717,6 +744464,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -745044,6 +745800,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -752687,6 +753452,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -754553,6 +755327,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -760786,6 +761569,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -775739,6 +776531,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -820411,6 +821212,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -821799,6 +822609,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -871973,6 +872792,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -876775,6 +877603,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -889833,6 +890670,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -894912,6 +895758,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -899991,6 +900846,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -905083,6 +905947,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1631613,6 +1632486,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1636286,6 +1637168,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml index f037f7f2d..134a5c288 100644 --- a/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml +++ b/descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml @@ -10573,6 +10573,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration @@ -11044,12 +11051,7 @@ paths: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -11509,8 +11511,13 @@ paths: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -20552,6 +20559,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS custom_properties: type: object description: The custom properties that were defined for @@ -31362,12 +31376,7 @@ paths: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set @@ -31587,6 +31596,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -31955,6 +31971,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -55762,6 +55785,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository diff --git a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json index aabda40a0..2f34b86ac 100644 --- a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json +++ b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.json @@ -43732,6 +43732,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -44457,6 +44466,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -44965,6 +44983,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -45087,16 +45114,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -45404,6 +45422,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -46089,6 +46116,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -46952,6 +46988,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -47073,8 +47118,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -134116,6 +134170,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -135517,6 +135580,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -151086,6 +151158,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -157394,6 +157475,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -159204,6 +159294,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -169068,6 +169167,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -169180,16 +169288,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -169539,6 +169638,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -169849,6 +169957,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -169965,8 +170082,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -170244,6 +170370,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -170366,16 +170501,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -170954,6 +171080,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -171070,8 +171205,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -171394,6 +171538,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -171692,6 +171845,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -172421,6 +172583,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -172542,8 +172713,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -174721,6 +174901,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -177892,6 +178081,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -181861,6 +182059,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -191742,6 +191949,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -194758,6 +194974,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -224728,6 +224953,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -227163,6 +227397,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -235725,6 +235968,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -240869,6 +241121,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -242258,6 +242519,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -245673,6 +245943,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -247991,6 +248270,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -283142,6 +283430,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -287698,6 +287995,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -305350,6 +305656,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -313582,6 +313897,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -320512,6 +320836,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -321416,6 +321749,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -325706,6 +326048,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -337072,6 +337423,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -338006,6 +338366,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -340054,6 +340423,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -340988,6 +341366,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -343880,6 +344267,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -344814,6 +345210,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -352204,6 +352609,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -353138,6 +353552,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -392167,6 +392590,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -394166,6 +394598,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -395675,6 +396116,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -397522,6 +397972,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -411232,6 +411691,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -412909,6 +413377,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -415087,6 +415564,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -416901,6 +417387,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -420740,6 +421235,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -435699,6 +436203,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -437137,6 +437650,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -477896,6 +478418,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -482389,6 +482920,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -494696,6 +495236,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -496268,6 +496817,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -620434,6 +620992,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -649442,6 +650009,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -651256,6 +651832,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -713413,6 +713998,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -719215,6 +719809,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -723951,6 +724554,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -725478,6 +726090,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -739332,6 +739953,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -741034,6 +741664,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -752354,6 +752993,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -758376,6 +759024,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -760745,6 +761402,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -762559,6 +763225,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -764682,6 +765357,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -766852,6 +767536,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -768838,6 +769531,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -774947,6 +775649,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -777405,6 +778116,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -779479,6 +780199,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -781288,6 +782017,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -801534,6 +802272,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -803188,6 +803935,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -804516,6 +805272,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -811748,6 +812513,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -813521,6 +814295,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -819464,6 +820247,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -833910,6 +834702,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -877579,6 +878380,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -878968,6 +879778,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -928039,6 +928858,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -931569,6 +932397,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -956835,6 +957672,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -961890,6 +962736,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -966945,6 +967800,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -972013,6 +972877,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1727520,6 +1728393,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -1731896,6 +1732778,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } diff --git a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml index 1c709bbf7..459e62dbc 100644 --- a/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml +++ b/descriptions-next/ghec/dereferenced/ghec.2022-11-28.deref.yaml @@ -17252,6 +17252,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS security_configuration_id: type: integer description: The ID of the security configuration @@ -17723,12 +17730,7 @@ paths: allow_advanced: false secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 1325 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled @@ -18184,8 +18186,13 @@ paths: allow_advanced: false code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled - secret_scanning_push_protection: disabled - secret_scanning_delegated_bypass: disabled + secret_scanning_push_protection: enabled + secret_scanning_delegated_bypass: enabled + secret_scanning_delegated_bypass_options: + reviewers: + - security_configuration_id: 1325 + reviewer_id: 5678 + reviewer_type: TEAM secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled @@ -35918,6 +35925,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS custom_properties: type: object description: The custom properties that were defined for @@ -44561,12 +44575,7 @@ paths: code_scanning_delegated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled - secret_scanning_delegated_bypass: enabled - secret_scanning_delegated_bypass_options: - reviewers: - - security_configuration_id: 17 - reviewer_id: 5678 - reviewer_type: TEAM + secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: enabled secret_scanning_non_provider_patterns: enabled secret_scanning_delegated_alert_dismissal: not_set @@ -44786,6 +44795,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -45154,6 +45170,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS secret_scanning_validity_checks: type: string description: The enablement status of secret scanning validity checks @@ -68187,6 +68210,13 @@ paths: enum: - TEAM - ROLE + mode: + type: string + description: The bypass mode for the reviewer + enum: + - ALWAYS + - EXEMPT + default: ALWAYS has_issues: type: boolean description: Either `true` to enable issues for this repository diff --git a/descriptions-next/ghec/dereferenced/ghec.2026-03-10.deref.json b/descriptions-next/ghec/dereferenced/ghec.2026-03-10.deref.json index 6f872c233..f7ca6bcc9 100644 --- a/descriptions-next/ghec/dereferenced/ghec.2026-03-10.deref.json +++ b/descriptions-next/ghec/dereferenced/ghec.2026-03-10.deref.json @@ -43603,6 +43603,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -44328,6 +44337,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -44836,6 +44854,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -44958,16 +44985,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -45275,6 +45293,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -45960,6 +45987,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -46823,6 +46859,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -46944,8 +46989,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -129851,6 +129905,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -131249,6 +131312,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -146583,6 +146655,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -152850,6 +152931,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -154657,6 +154747,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -164480,6 +164579,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -164592,16 +164700,7 @@ "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 17, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_delegated_alert_dismissal": "not_set", @@ -164951,6 +165050,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -165261,6 +165369,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -165377,8 +165494,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -165656,6 +165782,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -165778,16 +165913,7 @@ }, "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", - "secret_scanning_delegated_bypass": "enabled", - "secret_scanning_delegated_bypass_options": { - "reviewers": [ - { - "security_configuration_id": 1325, - "reviewer_id": 5678, - "reviewer_type": "TEAM" - } - ] - }, + "secret_scanning_delegated_bypass": "disabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", @@ -166366,6 +166492,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -166482,8 +166617,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -166806,6 +166950,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -167104,6 +167257,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -167833,6 +167995,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -167954,8 +168125,17 @@ }, "code_scanning_delegated_alert_dismissal": "disabled", "secret_scanning": "enabled", - "secret_scanning_push_protection": "disabled", - "secret_scanning_delegated_bypass": "disabled", + "secret_scanning_push_protection": "enabled", + "secret_scanning_delegated_bypass": "enabled", + "secret_scanning_delegated_bypass_options": { + "reviewers": [ + { + "security_configuration_id": 1325, + "reviewer_id": 5678, + "reviewer_type": "TEAM" + } + ] + }, "secret_scanning_validity_checks": "disabled", "secret_scanning_non_provider_patterns": "disabled", "secret_scanning_generic_secrets": "disabled", @@ -170130,6 +170310,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -173298,6 +173487,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -177264,6 +177462,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -187107,6 +187314,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -190120,6 +190336,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -219592,6 +219817,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -222024,6 +222258,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -234041,6 +234284,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -235427,6 +235679,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -238839,6 +239100,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -241154,6 +241424,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -275474,6 +275753,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -279961,6 +280249,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -297655,6 +297952,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -305875,6 +306181,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -312702,6 +313017,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -313606,6 +313930,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -317827,6 +318160,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -329152,6 +329494,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -330083,6 +330434,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -332128,6 +332488,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -333059,6 +333428,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -335948,6 +336326,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -336879,6 +337266,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -344259,6 +344655,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -345190,6 +345595,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -384197,6 +384611,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -386193,6 +386616,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -387699,6 +388131,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -389543,6 +389984,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -403251,6 +403701,15 @@ "ROLE" ] }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" + }, "security_configuration_id": { "type": "integer", "description": "The ID of the security configuration associated with this bypass reviewer" @@ -404925,6 +405384,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -407100,6 +407568,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -408911,6 +409388,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -412747,6 +413233,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -427479,6 +427974,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -428914,6 +429418,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -469206,6 +469719,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -473630,6 +474152,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -485934,6 +486465,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -487503,6 +488043,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -608232,6 +608781,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -636341,6 +636899,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -638152,6 +638719,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -699642,6 +700218,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -705441,6 +706026,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -710108,6 +710702,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -711632,6 +712235,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -725483,6 +726095,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -727182,6 +727803,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -738304,6 +738934,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -744314,6 +744953,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -746680,6 +747328,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -748491,6 +749148,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -750611,6 +751277,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -752778,6 +753453,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -754761,6 +755445,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -760801,6 +761494,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -763256,6 +763958,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -765327,6 +766038,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -767133,6 +767853,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -787060,6 +787789,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -788385,6 +789123,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -795529,6 +796276,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -797374,6 +798130,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -803351,6 +804116,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -817342,6 +818116,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -859684,6 +860467,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -861070,6 +861862,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -908964,6 +909765,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -912453,6 +913263,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -937596,6 +938415,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -942636,6 +943464,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } } @@ -947676,6 +948513,15 @@ "TEAM", "ROLE" ] + }, + "mode": { + "type": "string", + "description": "The bypass mode for the reviewer", + "enum": [ + "ALWAYS", + "EXEMPT" + ], + "default": "ALWAYS" } } {"code":"deadline_exceeded","msg":"operation timed out"}