diff --git a/lib/redirects/static/client-side-rest-api-redirects.json b/lib/redirects/static/client-side-rest-api-redirects.json
index 5dbdebf9aa..9b9d657ec9 100644
--- a/lib/redirects/static/client-side-rest-api-redirects.json
+++ b/lib/redirects/static/client-side-rest-api-redirects.json
@@ -446,6 +446,8 @@
"/rest/teams#list-idp-groups-for-a-team": "/rest/teams/team-sync#list-idp-groups-for-a-team",
"/rest/teams#create-or-update-idp-group-connections": "/rest/teams/team-sync#create-or-update-idp-group-connections",
"/rest/teams#list-child-teams": "/rest/teams/teams#list-child-teams",
+ "/rest/orgs#enable-or-disable-security-product-on-all-org-repos": "/rest/orgs/orgs#enable-or-disable-security-product-on-all-org-repos",
+ "/rest/orgs#orgs": "/rest/orgs/orgs",
"/rest/projects#get-a-project-card": "/rest/projects/cards#get-a-project-card",
"/rest/projects#cards": "/rest/projects/cards",
"/rest/projects#update-a-project-card": "/rest/projects/cards#update-a-project-card",
diff --git a/lib/rest/static/apps/enabled-for-apps.json b/lib/rest/static/apps/enabled-for-apps.json
index b9f2afbfaa..743ae27ca2 100644
--- a/lib/rest/static/apps/enabled-for-apps.json
+++ b/lib/rest/static/apps/enabled-for-apps.json
@@ -2454,6 +2454,12 @@
"verb": "delete",
"requestPath": "/orgs/{org}/security-managers/teams/{team_slug}"
},
+ {
+ "slug": "enable-or-disable-a-security-feature-for-an-organization",
+ "subcategory": "orgs",
+ "verb": "post",
+ "requestPath": "/orgs/{org}/{security_product}/{enablement}"
+ },
{
"slug": "list-organizations-for-a-user",
"subcategory": "orgs",
diff --git a/lib/rest/static/decorated/api.github.com.json b/lib/rest/static/decorated/api.github.com.json
index 7a6e14f597..eff66e74d9 100644
--- a/lib/rest/static/decorated/api.github.com.json
+++ b/lib/rest/static/decorated/api.github.com.json
@@ -391924,6 +391924,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -392127,6 +392169,42 @@
"name": "blog",
"in": "body",
"description": ""
+ },
+ {
+ "type": "boolean",
+ "name": "advanced_security_enabled_for_new_repositories",
+ "in": "body",
+ "description": "
Whether GitHub Advanced Security is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "dependabot_alerts_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether Dependabot alerts is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "dependabot_security_updates_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether Dependabot security updates is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "dependency_graph_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether dependency graph is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "secret_scanning_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether secret scanning is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "secret_scanning_push_protection_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
}
],
"enabledForGitHubApps": true,
@@ -392555,6 +392633,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -394138,6 +394258,87 @@
],
"subcategory": "orgs"
},
+ {
+ "serverUrl": "https://api.github.com",
+ "verb": "post",
+ "requestPath": "/orgs/{org}/{security_product}/{enablement}",
+ "title": "Enable or disable a security feature for an organization",
+ "category": "orgs",
+ "subcategory": "orgs",
+ "parameters": [
+ {
+ "name": "org",
+ "description": "The organization name. The name is not case sensitive.
",
+ "in": "path",
+ "required": true,
+ "schema": {
+ "type": "string"
+ }
+ },
+ {
+ "name": "security_product",
+ "in": "path",
+ "description": "The security feature to enable or disable.
",
+ "required": true,
+ "schema": {
+ "type": "string",
+ "enum": [
+ "dependency_graph",
+ "dependabot_alerts",
+ "dependabot_security_updates",
+ "advanced_security",
+ "secret_scanning",
+ "secret_scanning_push_protection"
+ ]
+ }
+ },
+ {
+ "name": "enablement",
+ "in": "path",
+ "description": "The action to take.
\nenable_all means to enable the specified security feature for all repositories in the organization.\ndisable_all means to disable the specified security feature for all repositories in the organization.
",
+ "required": true,
+ "schema": {
+ "type": "string",
+ "enum": [
+ "enable_all",
+ "disable_all"
+ ]
+ }
+ }
+ ],
+ "bodyParameters": [],
+ "enabledForGitHubApps": true,
+ "codeExamples": [
+ {
+ "key": "default",
+ "request": {
+ "description": "Example",
+ "acceptHeader": "application/vnd.github.v3+json",
+ "parameters": {
+ "org": "ORG",
+ "security_product": "SECURITY_PRODUCT",
+ "enablement": "ENABLEMENT"
+ }
+ },
+ "response": {
+ "statusCode": "204",
+ "description": "Action started
"
+ }
+ }
+ ],
+ "previews": [],
+ "descriptionHTML": "Enables or disables the specified security feature for all repositories in an organization.
\nTo use this endpoint, you must be an organization owner or be member of a team with the security manager role.\nA token with the 'write:org' scope is also required.
\nGitHub Apps must have the organization_administration:write permission to use this endpoint.
\nFor more information, see \"Managing security managers in your organization.\"
",
+ "statusCodes": [
+ {
+ "httpStatusCode": "204",
+ "description": "Action started
"
+ },
+ {
+ "httpStatusCode": "422",
+ "description": "The action could not be taken due to an in progress enablement, or a policy is preventing enablement
"
+ }
+ ]
+ },
{
"serverUrl": "https://api.github.com",
"verb": "get",
@@ -396658,10 +396859,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -504889,7 +505086,7 @@
}
],
"previews": [],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/decorated/ghes-3.2.json b/lib/rest/static/decorated/ghes-3.2.json
index bb8e01cd51..e09e1532e4 100644
--- a/lib/rest/static/decorated/ghes-3.2.json
+++ b/lib/rest/static/decorated/ghes-3.2.json
@@ -305435,10 +305435,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -398202,7 +398198,7 @@
}
}
],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/decorated/ghes-3.3.json b/lib/rest/static/decorated/ghes-3.3.json
index 68edc3c232..d7407be305 100644
--- a/lib/rest/static/decorated/ghes-3.3.json
+++ b/lib/rest/static/decorated/ghes-3.3.json
@@ -307040,10 +307040,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -394276,7 +394272,7 @@
}
}
],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/decorated/ghes-3.4.json b/lib/rest/static/decorated/ghes-3.4.json
index da986888d5..dafeaa895b 100644
--- a/lib/rest/static/decorated/ghes-3.4.json
+++ b/lib/rest/static/decorated/ghes-3.4.json
@@ -327977,10 +327977,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -415363,7 +415359,7 @@
}
}
],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/decorated/ghes-3.5.json b/lib/rest/static/decorated/ghes-3.5.json
index 4b52df908b..4804c2185a 100644
--- a/lib/rest/static/decorated/ghes-3.5.json
+++ b/lib/rest/static/decorated/ghes-3.5.json
@@ -337881,10 +337881,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -425386,7 +425382,7 @@
}
}
],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/decorated/ghes-3.6.json b/lib/rest/static/decorated/ghes-3.6.json
index 3b5fa4e904..ce21f0d32d 100644
--- a/lib/rest/static/decorated/ghes-3.6.json
+++ b/lib/rest/static/decorated/ghes-3.6.json
@@ -344482,10 +344482,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -433437,7 +433433,7 @@
}
}
],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/decorated/github.ae.json b/lib/rest/static/decorated/github.ae.json
index 340aace2d9..1dee3d9d66 100644
--- a/lib/rest/static/decorated/github.ae.json
+++ b/lib/rest/static/decorated/github.ae.json
@@ -284393,6 +284393,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -284596,6 +284638,42 @@
"name": "blog",
"in": "body",
"description": ""
+ },
+ {
+ "type": "boolean",
+ "name": "advanced_security_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "dependabot_alerts_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether Dependabot alerts is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "dependabot_security_updates_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether Dependabot security updates is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "dependency_graph_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether dependency graph is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "secret_scanning_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether secret scanning is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
+ },
+ {
+ "type": "boolean",
+ "name": "secret_scanning_push_protection_enabled_for_new_repositories",
+ "in": "body",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories.
\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"Managing security managers in your organization.\"
\nYou can check which security and analysis features are currently enabled by using a GET /orgs/{org} request.
"
}
],
"enabledForGitHubApps": true,
@@ -285024,6 +285102,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -287067,10 +287187,6 @@
"httpStatusCode": "200",
"description": "OK
"
},
- {
- "httpStatusCode": "302",
- "description": "Response if requester is not an organization member
"
- },
{
"httpStatusCode": "422",
"description": "Validation failed
"
@@ -372746,7 +372862,7 @@
}
],
"previews": [],
- "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
+ "descriptionHTML": "Creates a new repository using a repository template. Use the template_owner and template_repo route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template key is true.
\nOAuth scope requirements
\nWhen using OAuth, authorizations must include:
\n\npublic_repo scope or repo scope to create a public repository. Note: For GitHub AE, use repo scope to create an internal repository. \nrepo scope to create a private repository \n
",
"statusCodes": [
{
"httpStatusCode": "201",
diff --git a/lib/rest/static/dereferenced/api.github.com.deref.json b/lib/rest/static/dereferenced/api.github.com.deref.json
index 66729b635b..b26aa13508 100644
--- a/lib/rest/static/dereferenced/api.github.com.deref.json
+++ b/lib/rest/static/dereferenced/api.github.com.deref.json
@@ -59823,6 +59823,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -60077,6 +60119,30 @@
"examples": [
"\"http://github.blog\""
]
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether Dependabot alerts is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether Dependabot security updates is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
}
}
},
@@ -60448,6 +60514,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -98496,17 +98604,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -143482,6 +143579,78 @@
}
}
},
+ "/orgs/{org}/{security_product}/{enablement}": {
+ "post": {
+ "summary": "Enable or disable a security feature for an organization",
+ "description": "Enables or disables the specified security feature for all repositories in an organization.\n\nTo use this endpoint, you must be an organization owner or be member of a team with the security manager role.\nA token with the 'write:org' scope is also required.\n\nGitHub Apps must have the `organization_administration:write` permission to use this endpoint.\n\nFor more information, see \"[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"",
+ "tags": [
+ "orgs"
+ ],
+ "operationId": "orgs/enable-or-disable-security-product-on-all-org-repos",
+ "externalDocs": {
+ "description": "API method documentation",
+ "url": "https://docs.github.com/rest/reference/orgs#enable-or-disable-security-product-on-all-org-repos"
+ },
+ "parameters": [
+ {
+ "name": "org",
+ "description": "The organization name. The name is not case sensitive.",
+ "in": "path",
+ "required": true,
+ "schema": {
+ "type": "string"
+ }
+ },
+ {
+ "name": "security_product",
+ "in": "path",
+ "description": "The security feature to enable or disable.",
+ "required": true,
+ "schema": {
+ "type": "string",
+ "enum": [
+ "dependency_graph",
+ "dependabot_alerts",
+ "dependabot_security_updates",
+ "advanced_security",
+ "secret_scanning",
+ "secret_scanning_push_protection"
+ ]
+ }
+ },
+ {
+ "name": "enablement",
+ "in": "path",
+ "description": "The action to take.\n\n`enable_all` means to enable the specified security feature for all repositories in the organization.\n`disable_all` means to disable the specified security feature for all repositories in the organization.",
+ "required": true,
+ "schema": {
+ "type": "string",
+ "enum": [
+ "enable_all",
+ "disable_all"
+ ]
+ }
+ }
+ ],
+ "responses": {
+ "204": {
+ "description": "Action started"
+ },
+ "422": {
+ "description": "The action could not be taken due to an in progress enablement, or a policy is preventing enablement"
+ }
+ },
+ "x-github": {
+ "githubCloudOnly": false,
+ "enabledForGitHubApps": true,
+ "previews": [
+
+ ],
+ "category": "orgs",
+ "subcategory": "orgs"
+ }
+ }
+ },
"/projects/columns/cards/{card_id}": {
"get": {
"summary": "Get a project card",
@@ -460454,7 +460623,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],
diff --git a/lib/rest/static/dereferenced/ghes-3.2.deref.json b/lib/rest/static/dereferenced/ghes-3.2.deref.json
index 1c4a1cfacb..1447abbb9f 100644
--- a/lib/rest/static/dereferenced/ghes-3.2.deref.json
+++ b/lib/rest/static/dereferenced/ghes-3.2.deref.json
@@ -93619,17 +93619,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -389733,7 +389722,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.2/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.2/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.2/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.2/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],
diff --git a/lib/rest/static/dereferenced/ghes-3.3.deref.json b/lib/rest/static/dereferenced/ghes-3.3.deref.json
index b5c9714ad4..4046144335 100644
--- a/lib/rest/static/dereferenced/ghes-3.3.deref.json
+++ b/lib/rest/static/dereferenced/ghes-3.3.deref.json
@@ -94407,17 +94407,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -392420,7 +392409,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.3/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.3/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.3/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.3/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],
diff --git a/lib/rest/static/dereferenced/ghes-3.4.deref.json b/lib/rest/static/dereferenced/ghes-3.4.deref.json
index d729e6eeb6..fd96e69e92 100644
--- a/lib/rest/static/dereferenced/ghes-3.4.deref.json
+++ b/lib/rest/static/dereferenced/ghes-3.4.deref.json
@@ -98588,17 +98588,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -409169,7 +409158,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.4/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.4/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.4/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.4/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],
diff --git a/lib/rest/static/dereferenced/ghes-3.5.deref.json b/lib/rest/static/dereferenced/ghes-3.5.deref.json
index e1f9fa5b10..0681d6560b 100644
--- a/lib/rest/static/dereferenced/ghes-3.5.deref.json
+++ b/lib/rest/static/dereferenced/ghes-3.5.deref.json
@@ -100941,17 +100941,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -419770,7 +419759,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.5/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.5/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.5/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.5/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],
diff --git a/lib/rest/static/dereferenced/ghes-3.6.deref.json b/lib/rest/static/dereferenced/ghes-3.6.deref.json
index f2404ccc60..312c316a95 100644
--- a/lib/rest/static/dereferenced/ghes-3.6.deref.json
+++ b/lib/rest/static/dereferenced/ghes-3.6.deref.json
@@ -102767,17 +102767,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -428049,7 +428038,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.6/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.6/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/enterprise-server@3.6/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/enterprise-server@3.6/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],
diff --git a/lib/rest/static/dereferenced/github.ae.deref.json b/lib/rest/static/dereferenced/github.ae.deref.json
index f51c2bc6bc..ce5b029ca7 100644
--- a/lib/rest/static/dereferenced/github.ae.deref.json
+++ b/lib/rest/static/dereferenced/github.ae.deref.json
@@ -48055,6 +48055,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -48309,6 +48351,30 @@
"examples": [
"\"http://github.blog\""
]
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/github-ae@latest/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether Dependabot alerts is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/github-ae@latest/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether Dependabot security updates is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/github-ae@latest/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/github-ae@latest/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/github-ae@latest/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories.\n\nTo use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"[Managing security managers in your organization](https://docs.github.com/github-ae@latest/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization).\"\n\nYou can check which security and analysis features are currently enabled by using a `GET /orgs/{org}` request."
}
}
},
@@ -48680,6 +48746,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
+ },
+ "advanced_security_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_alerts_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependabot_security_updates_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "dependency_graph_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
+ },
+ "secret_scanning_push_protection_enabled_for_new_repositories": {
+ "type": "boolean",
+ "description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
+ "examples": [
+ false
+ ]
}
},
"required": [
@@ -67007,17 +67115,6 @@
}
}
},
- "302": {
- "description": "Response if requester is not an organization member",
- "headers": {
- "Location": {
- "example": "https://api.github.com/orgs/github/public_members",
- "schema": {
- "type": "string"
- }
- }
- }
- },
"422": {
"description": "Validation failed",
"content": {
@@ -376973,7 +377070,7 @@
"/repos/{template_owner}/{template_repo}/generate": {
"post": {
"summary": "Create a repository using a template",
- "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/github-ae@latest/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/github-ae@latest/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
+ "description": "Creates a new repository using a repository template. Use the `template_owner` and `template_repo` route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the [Get a repository](https://docs.github.com/github-ae@latest/rest/reference/repos#get-a-repository) endpoint and check that the `is_template` key is `true`.\n\n**OAuth scope requirements**\n\nWhen using [OAuth](https://docs.github.com/github-ae@latest/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/), authorizations must include:\n\n* `public_repo` scope or `repo` scope to create a public repository. Note: For GitHub AE, use `repo` scope to create an internal repository.\n* `repo` scope to create a private repository",
"tags": [
"repos"
],