Skip to content

Commit ea520f7

Browse files
Commit via running ake Sources/actions
1 parent fd9dbe2 commit ea520f7

File tree

2 files changed

+10
-9
lines changed

2 files changed

+10
-9
lines changed

Sources/actions/Client.swift

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6809,8 +6809,8 @@ public struct Client: APIProtocol {
68096809
///
68106810
/// Approve or reject custom deployment protection rules provided by a GitHub App for a workflow run. For more information, see "[Using environments for deployment](https://docs.github.com/actions/deployment/targeting-different-environments/using-environments-for-deployment)."
68116811
///
6812-
/// **Note:** GitHub Apps can only review their own custom deployment protection rules.
6813-
/// To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
6812+
/// > [!NOTE]
6813+
/// > GitHub Apps can only review their own custom deployment protection rules. To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
68146814
///
68156815
/// OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with a private repository.
68166816
///

Sources/actions/Types.swift

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -984,8 +984,8 @@ public protocol APIProtocol: Sendable {
984984
///
985985
/// Approve or reject custom deployment protection rules provided by a GitHub App for a workflow run. For more information, see "[Using environments for deployment](https://docs.github.com/actions/deployment/targeting-different-environments/using-environments-for-deployment)."
986986
///
987-
/// **Note:** GitHub Apps can only review their own custom deployment protection rules.
988-
/// To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
987+
/// > [!NOTE]
988+
/// > GitHub Apps can only review their own custom deployment protection rules. To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
989989
///
990990
/// OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with a private repository.
991991
///
@@ -3027,8 +3027,8 @@ extension APIProtocol {
30273027
///
30283028
/// Approve or reject custom deployment protection rules provided by a GitHub App for a workflow run. For more information, see "[Using environments for deployment](https://docs.github.com/actions/deployment/targeting-different-environments/using-environments-for-deployment)."
30293029
///
3030-
/// **Note:** GitHub Apps can only review their own custom deployment protection rules.
3031-
/// To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
3030+
/// > [!NOTE]
3031+
/// > GitHub Apps can only review their own custom deployment protection rules. To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
30323032
///
30333033
/// OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with a private repository.
30343034
///
@@ -6341,7 +6341,8 @@ public enum Components {
63416341
public var verified_allowed: Swift.Bool?
63426342
/// Specifies a list of string-matching patterns to allow specific action(s) and reusable workflow(s). Wildcards, tags, and SHAs are allowed. For example, `monalisa/octocat@*`, `monalisa/octocat@v2`, `monalisa/*`.
63436343
///
6344-
/// **Note**: The `patterns_allowed` setting only applies to public repositories.
6344+
/// > [!NOTE]
6345+
/// > The `patterns_allowed` setting only applies to public repositories.
63456346
///
63466347
/// - Remark: Generated from `#/components/schemas/selected-actions/patterns_allowed`.
63476348
public var patterns_allowed: [Swift.String]?
@@ -23019,8 +23020,8 @@ public enum Operations {
2301923020
///
2302023021
/// Approve or reject custom deployment protection rules provided by a GitHub App for a workflow run. For more information, see "[Using environments for deployment](https://docs.github.com/actions/deployment/targeting-different-environments/using-environments-for-deployment)."
2302123022
///
23022-
/// **Note:** GitHub Apps can only review their own custom deployment protection rules.
23023-
/// To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
23023+
/// > [!NOTE]
23024+
/// > GitHub Apps can only review their own custom deployment protection rules. To approve or reject pending deployments that are waiting for review from a specific person or team, see [`POST /repos/{owner}/{repo}/actions/runs/{run_id}/pending_deployments`](/rest/actions/workflow-runs#review-pending-deployments-for-a-workflow-run).
2302423025
///
2302523026
/// OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with a private repository.
2302623027
///

0 commit comments

Comments
 (0)