diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json index 97902a0751..063dea8b4e 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json @@ -6353,6 +6353,15 @@ "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}", "additional-permissions": [], "access": "write" + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "additional-permissions": [], + "access": "write" } ] }, diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json index 816da9b4e7..53e34bdce4 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json @@ -4099,6 +4099,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json index 951e0a286f..94ad2f1983 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json @@ -7776,6 +7776,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": [] + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": [] } ] }, diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json index ba7b11244e..17477f750d 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json @@ -3711,6 +3711,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json index e018f1865b..edd214d8ec 100644 --- a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json @@ -4165,6 +4165,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index 29df538ea1..8fc6bbd338 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -6934,6 +6934,15 @@ "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}", "additional-permissions": [], "access": "write" + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "additional-permissions": [], + "access": "write" } ] }, diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json index 8db521057e..d691c2761a 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json @@ -4387,6 +4387,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index 6b65d97000..be8efd050f 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -8492,6 +8492,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": [] + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": [] } ] }, diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json index 852867a632..e073e8c3b5 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json @@ -3999,6 +3999,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index 588844d04b..51bb15d689 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -4453,6 +4453,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 278757d82e..d4d3bebac4 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370" + "sha": "af631f687d9e4aedb65f9351d66a955b63f56f15" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 020746ca70..578366da5c 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -513970,6 +513970,92 @@ "description": "

Validation failed, or the endpoint has been spammed.

" } ] + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "title": "Request a CVE for a repository security advisory", + "category": "security-advisories", + "subcategory": "repository-advisories", + "parameters": [ + { + "name": "owner", + "description": "

The account owner of the repository. The name is not case sensitive.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "

The name of the repository without the .git extension. The name is not case sensitive.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "ghsa_id", + "description": "

The GHSA (GitHub Security Advisory) identifier of the advisory.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [], + "enabledForGitHubApps": true, + "codeExamples": [ + { + "key": "default", + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO", + "ghsa_id": "GHSA_ID" + } + }, + "response": { + "statusCode": "202", + "contentType": "application/json", + "description": "

Accepted

", + "example": null, + "schema": { + "type": "object" + } + } + } + ], + "previews": [], + "descriptionHTML": "

If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"Requesting a CVE identification number.\"

\n

You may request a CVE for public repositories, but cannot do so for private repositories.

\n

You must authenticate using an access token with the repo scope or repository_advisories:write permission to use this endpoint.

\n

In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.

", + "statusCodes": [ + { + "httpStatusCode": "202", + "description": "

Accepted

" + }, + { + "httpStatusCode": "400", + "description": "

Bad Request

" + }, + { + "httpStatusCode": "403", + "description": "

Forbidden

" + }, + { + "httpStatusCode": "404", + "description": "

Resource not found

" + }, + { + "httpStatusCode": "422", + "description": "

Validation failed, or the endpoint has been spammed.

" + } + ] } ] }, diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index 08f6015854..2d41c69b29 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -248900,7 +248900,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets the audit log for an enterprise. To use this endpoint, you must be an enterprise admin, and you must use an access token with the read:audit_log scope.

", + "descriptionHTML": "

Gets the audit log for an enterprise. To use this endpoint, you must\nbe an enterprise admin, and you must use an access token with the read:audit_log\nscope.

\n

This endpoint has a rate limit of 1,750 queries per hour per user and IP address. If your integration receives a rate limit error (typically a 403 or 429 response), it should wait before making another request to the GitHub API. For more information, see \"Resources in the REST API\" and \"Best practices for integrators.\"

", "statusCodes": [ { "httpStatusCode": "200", @@ -363698,7 +363698,7 @@ } ], "previews": [], - "descriptionHTML": "

Gets the audit log for an organization. For more information, see \"Reviewing the audit log for your organization.\"

\n

To use this endpoint, you must be an organization owner, and you must use an access token with the read:audit_log scope. GitHub Apps must have the organization_administration read permission to use this endpoint.

\n

By default, the response includes up to 30 events from the past three months. Use the phrase parameter to filter results and retrieve older events. For example, use the phrase parameter with the created qualifier to filter events based on when the events occurred. For more information, see \"Reviewing the audit log for your organization.\"

\n

Use pagination to retrieve fewer or more than 30 events. For more information, see \"Resources in the REST API.\"

", + "descriptionHTML": "

Gets the audit log for an organization. For more information, see \"Reviewing the audit log for your organization.\"

\n

To use this endpoint, you must be an organization owner, and you must use an access token with the read:audit_log scope. GitHub Apps must have the organization_administration read permission to use this endpoint.

\n

By default, the response includes up to 30 events from the past three months. Use the phrase parameter to filter results and retrieve older events. For example, use the phrase parameter with the created qualifier to filter events based on when the events occurred. For more information, see \"Reviewing the audit log for your organization.\"

\n

Use pagination to retrieve fewer or more than 30 events. For more information, see \"Resources in the REST API.\"

\n

This endpoint has a rate limit of 1,750 queries per hour per user and IP address. If your integration receives a rate limit error (typically a 403 or 429 response), it should wait before making another request to the GitHub API. For more information, see \"Resources in the REST API\" and \"Best practices for integrators.\"

", "statusCodes": [ { "httpStatusCode": "200", @@ -533503,6 +533503,92 @@ "description": "

Validation failed, or the endpoint has been spammed.

" } ] + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "title": "Request a CVE for a repository security advisory", + "category": "security-advisories", + "subcategory": "repository-advisories", + "parameters": [ + { + "name": "owner", + "description": "

The account owner of the repository. The name is not case sensitive.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "

The name of the repository without the .git extension. The name is not case sensitive.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "ghsa_id", + "description": "

The GHSA (GitHub Security Advisory) identifier of the advisory.

", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [], + "enabledForGitHubApps": true, + "codeExamples": [ + { + "key": "default", + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO", + "ghsa_id": "GHSA_ID" + } + }, + "response": { + "statusCode": "202", + "contentType": "application/json", + "description": "

Accepted

", + "example": null, + "schema": { + "type": "object" + } + } + } + ], + "previews": [], + "descriptionHTML": "

If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"Requesting a CVE identification number.\"

\n

You may request a CVE for public repositories, but cannot do so for private repositories.

\n

You must authenticate using an access token with the repo scope or repository_advisories:write permission to use this endpoint.

\n

In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.

", + "statusCodes": [ + { + "httpStatusCode": "202", + "description": "

Accepted

" + }, + { + "httpStatusCode": "400", + "description": "

Bad Request

" + }, + { + "httpStatusCode": "403", + "description": "

Forbidden

" + }, + { + "httpStatusCode": "404", + "description": "

Resource not found

" + }, + { + "httpStatusCode": "422", + "description": "

Validation failed, or the endpoint has been spammed.

" + } + ] } ] }, diff --git a/src/rest/data/ghes-3.9-2022-11-28/schema.json b/src/rest/data/ghes-3.9-2022-11-28/schema.json index d9ad0a5c40..3369f3b9af 100644 --- a/src/rest/data/ghes-3.9-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.9-2022-11-28/schema.json @@ -202586,7 +202586,7 @@ "serverUrl": "http(s)://HOSTNAME", "verb": "get", "requestPath": "/manage/v1/config/nodes", - "title": "Get all GHES node metadata for all nodes", + "title": "Get GHES node metadata for all nodes", "category": "enterprise-admin", "subcategory": "manage-ghes", "parameters": [ @@ -202668,6 +202668,9 @@ "uuid": { "type": "string" }, + "replica": { + "type": "boolean" + }, "cluster_roles": { "type": "array", "items": { @@ -202700,7 +202703,7 @@ } ], "previews": [], - "descriptionHTML": "

Get all node metadata for existing nodes in the current cluster. For more information, see \"About clustering.\"

", + "descriptionHTML": "

Get node metadata for all configured nodes in the current cluster. For more information, see \"About clustering.\"

", "statusCodes": [ { "httpStatusCode": "200", @@ -202709,6 +202712,10 @@ { "httpStatusCode": "401", "description": "

Unauthorized

" + }, + { + "httpStatusCode": "500", + "description": "

Internal error

" } ] }, @@ -202878,6 +202885,10 @@ { "httpStatusCode": "401", "description": "

Unauthorized

" + }, + { + "httpStatusCode": "500", + "description": "

Internal error

" } ] }, @@ -202985,6 +202996,10 @@ { "httpStatusCode": "401", "description": "

Unauthorized

" + }, + { + "httpStatusCode": "500", + "description": "

Internal error

" } ] } diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index dc5786c708..e3746a0645 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -33,5 +33,5 @@ ] } }, - "sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370" + "sha": "af631f687d9e4aedb65f9351d66a955b63f56f15" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index a551a2d769..f095425375 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370" + "sha": "af631f687d9e4aedb65f9351d66a955b63f56f15" } \ No newline at end of file