diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 5efadab1fe..b78f487ffc 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -34,14 +34,14 @@ jobs: # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL - uses: github/codeql-action/init@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0 + uses: github/codeql-action/init@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5 with: languages: ${{ matrix.language }} - name: Autobuild - uses: github/codeql-action/autobuild@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0 + uses: github/codeql-action/autobuild@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@662472033e021d55d94146f66f6058822b0b39fd # v3.27.0 + uses: github/codeql-action/analyze@f09c1c0a94de965c15400f5634aa42fac8fb8f88 # v3.27.5 with: category: "/language:${{matrix.language}}" diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index 91f4b1bb7a..58111722a9 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -35,7 +35,7 @@ jobs: passphrase: ${{ secrets.PASSPHRASE }} - name: Run GoReleaser - uses: goreleaser/goreleaser-action@286f3b13b1b49da4ac219696163fb8c1c93e1200 # v6.0.0 + uses: goreleaser/goreleaser-action@9ed2f89a662bf1735a48bc8557fd212fa902bebf # v6.1.0 with: args: release --clean version: latest diff --git a/website/docs/r/repository_dependabot_security_updates.html.markdown b/website/docs/r/repository_dependabot_security_updates.html.markdown index e2d143e85d..0a029929c1 100644 --- a/website/docs/r/repository_dependabot_security_updates.html.markdown +++ b/website/docs/r/repository_dependabot_security_updates.html.markdown @@ -25,7 +25,7 @@ resource "github_repository" "repo" { resource "github_repository_dependabot_security_updates" "example" { - repository = github_repository.test.id + repository = github_repository.test.name enabled = true } ``` @@ -34,7 +34,7 @@ resource "github_repository_dependabot_security_updates" "example" { The following arguments are supported: -* `repository` - (Required) The repository to manage. +* `repository` - (Required) The name of the GitHub repository. * `enabled` - (Required) The state of the automated security fixes. diff --git a/website/docs/r/repository_ruleset.html.markdown b/website/docs/r/repository_ruleset.html.markdown index b047fbc119..c26d5759ef 100644 --- a/website/docs/r/repository_ruleset.html.markdown +++ b/website/docs/r/repository_ruleset.html.markdown @@ -49,7 +49,7 @@ resource "github_repository_ruleset" "example" { required_deployment_environments = ["test"] } - + } } ``` @@ -104,7 +104,7 @@ The `rules` block supports the following: * `required_code_scanning` - (Optional) (Block List, Max: 1) Define which tools must provide code scanning results before the reference is updated. When configured, code scanning must be enabled and have results for both the commit and the reference being updated. Multiple code scanning tools can be specified. (see [below for nested schema](#rules.required_code_scanning)) * `update` - (Optional) (Boolean) Only allow users with bypass permission to update matching refs. - + * `update_allows_fetch_and_merge` - (Optional) (Boolean) Branch can pull changes from its upstream repository. This is only applicable to forked repositories. Requires `update` to be set to `true`. Note: behaviour is affected by a known bug on the GitHub side which may cause issues when using this parameter. #### rules.branch_name_pattern #### @@ -179,7 +179,7 @@ The `rules` block supports the following: * `context` - (Required) (String) The status check context name that must be present on the commit. -* `integration_id` - (Optional) (Number) The optional integration ID that this status check must originate from. +* `integration_id` - (Optional) (Number) The optional integration ID that this status check must originate from. It's a GitHub App ID, which can be obtained by following instructions from the [Get an App API docs](https://docs.github.com/en/rest/apps/apps?apiVersion=2022-11-28#get-an-app). #### rules.tag_name_pattern #### @@ -205,7 +205,7 @@ The `rules` block supports the following: #### bypass_actors #### -* `actor_id` - (Required) (Number) The ID of the actor that can bypass a ruleset. +* `actor_id` - (Required) (Number) The ID of the actor that can bypass a ruleset. If `actor_type` is `Integration`, `actor_id` is a GitHub App ID. App ID can be obtained by following instructions from the [Get an App API docs](https://docs.github.com/en/rest/apps/apps?apiVersion=2022-11-28#get-an-app) * `actor_type` (String) The type of actor that can bypass a ruleset. Can be one of: `RepositoryRole`, `Team`, `Integration`, `OrganizationAdmin`.