1
0
mirror of synced 2026-01-10 00:03:04 -05:00

Merge pull request #16036 from github/repo-sync

repo sync
This commit is contained in:
Octomerger Bot
2022-03-03 17:54:14 -08:00
committed by GitHub
31 changed files with 76 additions and 76 deletions

View File

@@ -513,7 +513,7 @@ const article: PlaygroundArticleT = {
- name: Test with pytest
run: pytest tests.py --doctest-modules --junitxml=junit/test-results-\${{ matrix.python-version }}.xml
- name: Upload pytest test results
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: pytest-results-\${{ matrix.python-version }}
path: junit/test-results-\${{ matrix.python-version }}.xml

View File

@@ -119,7 +119,7 @@ steps:
distribution: 'adopt'
- run: ant -noinput -buildfile build.xml
- uses: actions/upload-artifact@v2
- uses: actions/upload-artifact@v3
with:
name: Package
path: build/jar

View File

@@ -138,7 +138,7 @@ steps:
uses: gradle/gradle-build-action@937999e9cc2425eddc7fd62d1053baf041147db7
with:
arguments: build
- uses: actions/upload-artifact@v2
- uses: actions/upload-artifact@v3
with:
name: Package
path: build/libs

View File

@@ -140,7 +140,7 @@ steps:
distribution: 'adopt'
- run: mvn --batch-mode --update-snapshots verify
- run: mkdir staging && cp target/*.jar staging
- uses: actions/upload-artifact@v2
- uses: actions/upload-artifact@v3
with:
name: Package
path: staging

View File

@@ -218,7 +218,7 @@ jobs:
- name: Test with dotnet
run: dotnet test --logger trx --results-directory "TestResults-${{ matrix.dotnet-version }}"
- name: Upload dotnet test results
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: dotnet-results-${{ matrix.dotnet-version }}
path: TestResults-${{ matrix.dotnet-version }}

View File

@@ -213,7 +213,7 @@ jobs:
shell: pwsh
run: Invoke-Pester Unit.Tests.ps1 -Passthru | Export-CliXml -Path Unit.Tests.xml
- name: Upload test results
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: ubuntu-Unit-Tests
path: Unit.Tests.xml

View File

@@ -380,7 +380,7 @@ jobs:
- name: Test with pytest
run: pytest tests.py --doctest-modules --junitxml=junit/test-results-${{ matrix.python-version }}.xml
- name: Upload pytest test results
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: pytest-results-${{ matrix.python-version }}
path: junit/test-results-${{ matrix.python-version }}.xml

View File

@@ -95,7 +95,7 @@ jobs:
run: mvn clean install
- name: Upload artifact for deployment job
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: java-app
path: '{% raw %}${{ github.workspace }}{% endraw %}/target/*.jar'
@@ -109,7 +109,7 @@ jobs:
steps:
- name: Download artifact from build job
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: java-app

View File

@@ -105,7 +105,7 @@ jobs:
run: dotnet publish -c Release -o {% raw %}${{env.DOTNET_ROOT}}{% endraw %}/myapp
- name: Upload artifact for deployment job
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: .net-app
path: {% raw %}${{env.DOTNET_ROOT}}{% endraw %}/myapp
@@ -119,7 +119,7 @@ jobs:
steps:
- name: Download artifact from build job
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: .net-app

View File

@@ -100,7 +100,7 @@ jobs:
npm run build --if-present
npm run test --if-present
- name: Upload artifact for deployment job
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: node-app
path: .
@@ -114,7 +114,7 @@ jobs:
steps:
- name: Download artifact from build job
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: node-app

View File

@@ -116,7 +116,7 @@ jobs:
run: composer validate --no-check-publish && composer install --prefer-dist --no-progress
- name: Upload artifact for deployment job
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: php-app
path: .
@@ -130,7 +130,7 @@ jobs:
steps:
- name: Download artifact from build job
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: php-app

View File

@@ -111,7 +111,7 @@ jobs:
# Optional: Add a step to run tests here (PyTest, Django test suites, etc.)
- name: Upload artifact for deployment jobs
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: python-app
path: |
@@ -126,7 +126,7 @@ jobs:
steps:
- name: Download artifact from build job
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: python-app
path: .

View File

@@ -516,7 +516,7 @@ jobs:
./build.sh --log-path ${{ runner.temp }}/build_logs
- name: Upload logs on fail
if: ${{ failure() }}
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: Build failure logs
path: ${{ runner.temp }}/build_logs
@@ -598,7 +598,7 @@ jobs:
- uses: actions/checkout@v2
- run: npm test > test-job-${{ strategy.job-index }}.txt
- name: Upload logs
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: Build log for job ${{ strategy.job-index }}
path: test-job-${{ strategy.job-index }}.txt

View File

@@ -75,7 +75,7 @@ jobs:
run: |
expr 1 + 1 > output.log
- name: Upload output file
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: output-log-file
path: output.log
@@ -88,7 +88,7 @@ jobs:
example-job:
steps:
- name: Download a single artifact
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: output-log-file
```

View File

@@ -157,7 +157,7 @@ GitHub Actions
{% raw %}
```yaml
- name: Upload math result for job 1
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: homework
path: math-homework.txt
@@ -165,7 +165,7 @@ GitHub Actions
...
- name: Download math result for job 1
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: homework
```

View File

@@ -391,7 +391,7 @@ artifacts:
{% raw %}
```yaml
- name: Upload math result for job 1
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: homework
path: math-homework.txt

View File

@@ -1429,7 +1429,7 @@ jobs:
run: |
mkdir -p ./pr
echo $PR_NUMBER > ./pr/pr_number
- uses: actions/upload-artifact@v2
- uses: actions/upload-artifact@v3
with:
name: pr_number
path: pr/

View File

@@ -101,14 +101,14 @@ jobs:
npm run build --if-present
npm test
- name: Archive production artifacts
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: dist-without-markdown
path: |
dist
!dist/**/*.md
- name: Archive code coverage results
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: code-coverage-report
path: output/test/code-coverage.html
@@ -120,7 +120,7 @@ You can define a custom retention period for individual artifacts created by a w
```yaml{:copy}
- name: 'Upload Artifact'
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: my-artifact
path: my_file.txt
@@ -149,7 +149,7 @@ Specify an artifact's name to download an individual artifact. If you uploaded a
```yaml
- name: Download a single artifact
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: my-artifact
```
@@ -158,7 +158,7 @@ You can also download all artifacts in a workflow run by not specifying a name.
```yaml
- name: Download all workflow run artifacts
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
```
If you download all workflow run's artifacts, a directory for each artifact is created using its name.
@@ -200,7 +200,7 @@ jobs:
run: |
expr 3 + 7 > math-homework.txt
- name: Upload math result for job 1
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: homework
path: math-homework.txt
@@ -211,7 +211,7 @@ jobs:
runs-on: windows-latest
steps:
- name: Download math result for job 1
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: homework
- shell: bash
@@ -219,7 +219,7 @@ jobs:
value=`cat math-homework.txt`
expr $value \* 9 > math-homework.txt
- name: Upload math result for job 2
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
name: homework
path: math-homework.txt
@@ -230,7 +230,7 @@ jobs:
runs-on: macOS-latest
steps:
- name: Download math result for job 2
uses: actions/download-artifact@v2
uses: actions/download-artifact@v3
with:
name: homework
- name: Print the final result

View File

@@ -72,7 +72,7 @@ You can populate the runner tool cache by running a {% data variables.product.pr
cd "${{ runner.tool_cache }}"
tar -czf tool_cache.tar.gz *
- name: Upload tool cache artifact
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v3
with:
path: ${{runner.tool_cache}}/tool_cache.tar.gz
```

View File

@@ -80969,12 +80969,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",
@@ -81088,12 +81088,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",
@@ -81206,12 +81206,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",
@@ -81264,7 +81264,7 @@
"category": "secret-scanning",
"notes": [],
"bodyParameters": [],
"descriptionHTML": "<p>Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"descriptionHTML": "<p>Lists secret scanning alerts for an eligible repository, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the <code>repo</code> scope or <code>security_events</code> scope.\nFor public repositories, you may instead use the <code>public_repo</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"responses": [
{
"httpStatusCode": "200",
@@ -81340,7 +81340,7 @@
"category": "secret-scanning",
"notes": [],
"bodyParameters": [],
"descriptionHTML": "<p>Gets a single secret scanning alert detected in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"descriptionHTML": "<p>Gets a single secret scanning alert detected in an eligible repository.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the <code>repo</code> scope or <code>security_events</code> scope.\nFor public repositories, you may instead use the <code>public_repo</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"responses": [
{
"httpStatusCode": "200",
@@ -81468,7 +81468,7 @@
"slug": "update-a-secret-scanning-alert",
"category": "secret-scanning",
"notes": [],
"descriptionHTML": "<p>Updates the status of a secret scanning alert in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> write permission to use this endpoint.</p>",
"descriptionHTML": "<p>Updates the status of a secret scanning alert in an eligible repository.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the <code>repo</code> scope or <code>security_events</code> scope.\nFor public repositories, you may instead use the <code>public_repo</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> write permission to use this endpoint.</p>",
"bodyParameters": [
{
"description": "<p><strong>Required</strong>. Sets the state of the secret scanning alert. Can be either <code>open</code> or <code>resolved</code>. You must provide <code>resolution</code> when you set the state to <code>resolved</code>.</p>",
@@ -81601,7 +81601,7 @@
"category": "secret-scanning",
"notes": [],
"bodyParameters": [],
"descriptionHTML": "<p>Lists all locations for a given secret scanning alert for a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"descriptionHTML": "<p>Lists all locations for a given secret scanning alert for an eligible repository.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the <code>repo</code> scope or <code>security_events</code> scope.\nFor public repositories, you may instead use the <code>public_repo</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"responses": [
{
"httpStatusCode": "200",

View File

@@ -66019,12 +66019,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.1/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.1/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.1/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.1/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",

View File

@@ -68239,12 +68239,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.2/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.2/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.2/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.2/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",

View File

@@ -68420,12 +68420,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.3/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.3/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.3/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.3/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",
@@ -68538,12 +68538,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.3/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.3/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.3/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.3/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",

View File

@@ -72056,12 +72056,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",
@@ -72175,12 +72175,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",
@@ -72293,12 +72293,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",

View File

@@ -61132,12 +61132,12 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/github-ae@latest/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/github-ae@latest/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
},
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/github-ae@latest/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories\">About secret scanning for private repositories</a>\"\nfor a complete list of secret types (API slug).</p>"
"descriptionHTML": "<p>A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"<a href=\"https://docs.github.com/github-ae@latest/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security\">Secret scanning patterns</a>\"\nfor a complete list of secret types (API slug).</p>"
},
{
"name": "resolution",

View File

@@ -22928,7 +22928,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
@@ -103013,7 +103013,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
@@ -359526,7 +359526,7 @@
"/repos/{owner}/{repo}/secret-scanning/alerts": {
"get": {
"summary": "List secret scanning alerts for a repository",
"description": "Lists secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Lists secret scanning alerts for an eligible repository, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the `repo` scope or `security_events` scope.\nFor public repositories, you may instead use the `public_repo` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],
@@ -359568,7 +359568,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
@@ -359887,7 +359887,7 @@
"/repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}": {
"get": {
"summary": "Get a secret scanning alert",
"description": "Gets a single secret scanning alert detected in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Gets a single secret scanning alert detected in an eligible repository.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the `repo` scope or `security_events` scope.\nFor public repositories, you may instead use the `public_repo` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],
@@ -360174,7 +360174,7 @@
},
"patch": {
"summary": "Update a secret scanning alert",
"description": "Updates the status of a secret scanning alert in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` write permission to use this endpoint.",
"description": "Updates the status of a secret scanning alert in an eligible repository.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the `repo` scope or `security_events` scope.\nFor public repositories, you may instead use the `public_repo` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` write permission to use this endpoint.",
"operationId": "secret-scanning/update-alert",
"tags": [
"secret-scanning"
@@ -360520,7 +360520,7 @@
"/repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}/locations": {
"get": {
"summary": "List locations for a secret scanning alert",
"description": "Lists all locations for a given secret scanning alert for a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Lists all locations for a given secret scanning alert for an eligible repository.\nTo use this endpoint, you must be an administrator for the repository or for the organization that owns the repository, and you must use a personal access token with the `repo` scope or `security_events` scope.\nFor public repositories, you may instead use the `public_repo` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],

View File

@@ -305005,7 +305005,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.1/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.1/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"

View File

@@ -312390,7 +312390,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.2/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.2/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"

View File

@@ -84262,7 +84262,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.3/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.3/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
@@ -315432,7 +315432,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.3/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.3/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"

View File

@@ -29281,7 +29281,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
@@ -94318,7 +94318,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"
@@ -329266,7 +329266,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/enterprise-server@3.4/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/enterprise-server@3.4/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"

View File

@@ -286905,7 +286905,7 @@
{
"name": "secret_type",
"in": "query",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[About secret scanning for private repositories](https://docs.github.com/github-ae@latest/code-security/secret-security/about-secret-scanning#about-secret-scanning-for-private-repositories)\"\nfor a complete list of secret types (API slug).",
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"[Secret scanning patterns](https://docs.github.com/github-ae@latest/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)\"\nfor a complete list of secret types (API slug).",
"required": false,
"schema": {
"type": "string"