1
0
mirror of synced 2025-12-30 12:02:01 -05:00

Update OpenAPI Descriptions (#30417)

Co-authored-by: github-openapi-bot <github-openapi-bot@users.noreply.github.com>
This commit is contained in:
github-openapi-bot
2022-08-31 10:22:27 -07:00
committed by GitHub
parent 19277524c2
commit 0e8b6d2ed5
16 changed files with 631 additions and 119 deletions

View File

@@ -391924,6 +391924,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
},
"advanced_security_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"dependabot_alerts_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"dependabot_security_updates_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"dependency_graph_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"secret_scanning_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"secret_scanning_push_protection_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
}
},
"required": [
@@ -392127,6 +392169,42 @@
"name": "blog",
"in": "body",
"description": ""
},
{
"type": "boolean",
"name": "advanced_security_enabled_for_new_repositories",
"in": "body",
"description": "<p>Whether GitHub Advanced Security is automatically enabled for new repositories.</p>\n<p>To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>\n<p>You can check which security and analysis features are currently enabled by using a <code>GET /orgs/{org}</code> request.</p>"
},
{
"type": "boolean",
"name": "dependabot_alerts_enabled_for_new_repositories",
"in": "body",
"description": "<p>Whether Dependabot alerts is automatically enabled for new repositories.</p>\n<p>To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>\n<p>You can check which security and analysis features are currently enabled by using a <code>GET /orgs/{org}</code> request.</p>"
},
{
"type": "boolean",
"name": "dependabot_security_updates_enabled_for_new_repositories",
"in": "body",
"description": "<p>Whether Dependabot security updates is automatically enabled for new repositories.</p>\n<p>To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>\n<p>You can check which security and analysis features are currently enabled by using a <code>GET /orgs/{org}</code> request.</p>"
},
{
"type": "boolean",
"name": "dependency_graph_enabled_for_new_repositories",
"in": "body",
"description": "<p>Whether dependency graph is automatically enabled for new repositories.</p>\n<p>To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>\n<p>You can check which security and analysis features are currently enabled by using a <code>GET /orgs/{org}</code> request.</p>"
},
{
"type": "boolean",
"name": "secret_scanning_enabled_for_new_repositories",
"in": "body",
"description": "<p>Whether secret scanning is automatically enabled for new repositories.</p>\n<p>To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>\n<p>You can check which security and analysis features are currently enabled by using a <code>GET /orgs/{org}</code> request.</p>"
},
{
"type": "boolean",
"name": "secret_scanning_push_protection_enabled_for_new_repositories",
"in": "body",
"description": "<p>Whether secret scanning push protection is automatically enabled for new repositories.</p>\n<p>To use this parameter, you must have admin permissions for the repository or be an owner or security manager for the organization that owns the repository. For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>\n<p>You can check which security and analysis features are currently enabled by using a <code>GET /orgs/{org}</code> request.</p>"
}
],
"enabledForGitHubApps": true,
@@ -392555,6 +392633,48 @@
"updated_at": {
"type": "string",
"format": "date-time"
},
"advanced_security_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether GitHub Advanced Security is enabled for new repositories and repositories transferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"dependabot_alerts_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether GitHub Advanced Security is automatically enabled for new repositories and repositories transferred to\nthis organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"dependabot_security_updates_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether dependabot security updates are automatically enabled for new repositories and repositories transferred\nto this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"dependency_graph_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether dependency graph is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"secret_scanning_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether secret scanning is automatically enabled for new repositories and repositories transferred to this\norganization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
},
"secret_scanning_push_protection_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether secret scanning push protection is automatically enabled for new repositories and repositories\ntransferred to this organization.\n\nThis field is only visible to organization owners or members of a team with the security manager role.",
"examples": [
false
]
}
},
"required": [
@@ -394138,6 +394258,87 @@
],
"subcategory": "orgs"
},
{
"serverUrl": "https://api.github.com",
"verb": "post",
"requestPath": "/orgs/{org}/{security_product}/{enablement}",
"title": "Enable or disable a security feature for an organization",
"category": "orgs",
"subcategory": "orgs",
"parameters": [
{
"name": "org",
"description": "<p>The organization name. The name is not case sensitive.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
},
{
"name": "security_product",
"in": "path",
"description": "<p>The security feature to enable or disable.</p>",
"required": true,
"schema": {
"type": "string",
"enum": [
"dependency_graph",
"dependabot_alerts",
"dependabot_security_updates",
"advanced_security",
"secret_scanning",
"secret_scanning_push_protection"
]
}
},
{
"name": "enablement",
"in": "path",
"description": "<p>The action to take.</p>\n<p><code>enable_all</code> means to enable the specified security feature for all repositories in the organization.\n<code>disable_all</code> means to disable the specified security feature for all repositories in the organization.</p>",
"required": true,
"schema": {
"type": "string",
"enum": [
"enable_all",
"disable_all"
]
}
}
],
"bodyParameters": [],
"enabledForGitHubApps": true,
"codeExamples": [
{
"key": "default",
"request": {
"description": "Example",
"acceptHeader": "application/vnd.github.v3+json",
"parameters": {
"org": "ORG",
"security_product": "SECURITY_PRODUCT",
"enablement": "ENABLEMENT"
}
},
"response": {
"statusCode": "204",
"description": "<p>Action started</p>"
}
}
],
"previews": [],
"descriptionHTML": "<p>Enables or disables the specified security feature for all repositories in an organization.</p>\n<p>To use this endpoint, you must be an organization owner or be member of a team with the security manager role.\nA token with the 'write:org' scope is also required.</p>\n<p>GitHub Apps must have the <code>organization_administration:write</code> permission to use this endpoint.</p>\n<p>For more information, see \"<a href=\"https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization\">Managing security managers in your organization</a>.\"</p>",
"statusCodes": [
{
"httpStatusCode": "204",
"description": "<p>Action started</p>"
},
{
"httpStatusCode": "422",
"description": "<p>The action could not be taken due to an in progress enablement, or a policy is preventing enablement</p>"
}
]
},
{
"serverUrl": "https://api.github.com",
"verb": "get",
@@ -396658,10 +396859,6 @@
"httpStatusCode": "200",
"description": "<p>OK</p>"
},
{
"httpStatusCode": "302",
"description": "<p>Response if requester is not an organization member</p>"
},
{
"httpStatusCode": "422",
"description": "<p>Validation failed</p>"
@@ -504889,7 +505086,7 @@
}
],
"previews": [],
"descriptionHTML": "<p>Creates a new repository using a repository template. Use the <code>template_owner</code> and <code>template_repo</code> route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the <a href=\"https://docs.github.com/rest/reference/repos#get-a-repository\">Get a repository</a> endpoint and check that the <code>is_template</code> key is <code>true</code>.</p>\n<p><strong>OAuth scope requirements</strong></p>\n<p>When using <a href=\"https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/\">OAuth</a>, authorizations must include:</p>\n<ul>\n<li><code>public_repo</code> scope or <code>repo</code> scope to create a public repository. Note: For GitHub AE, use <code>repo</code> scope to create an internal repository.</li>\n<li><code>repo</code> scope to create a private repository</li>\n</ul>",
"descriptionHTML": "<p>Creates a new repository using a repository template. Use the <code>template_owner</code> and <code>template_repo</code> route parameters to specify the repository to use as the template. If the repository is not public, the authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the <a href=\"https://docs.github.com/rest/reference/repos#get-a-repository\">Get a repository</a> endpoint and check that the <code>is_template</code> key is <code>true</code>.</p>\n<p><strong>OAuth scope requirements</strong></p>\n<p>When using <a href=\"https://docs.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/\">OAuth</a>, authorizations must include:</p>\n<ul>\n<li><code>public_repo</code> scope or <code>repo</code> scope to create a public repository. Note: For GitHub AE, use <code>repo</code> scope to create an internal repository.</li>\n<li><code>repo</code> scope to create a private repository</li>\n</ul>",
"statusCodes": [
{
"httpStatusCode": "201",