diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json index 97902a075185..063dea8b4eb5 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json @@ -6353,6 +6353,15 @@ "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}", "additional-permissions": [], "access": "write" + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "additional-permissions": [], + "access": "write" } ] }, diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json index 816da9b4e74e..53e34bdce4e0 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json @@ -4099,6 +4099,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json index 951e0a286f85..94ad2f198340 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json @@ -7776,6 +7776,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": [] + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": [] } ] }, diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json index ba7b11244e95..17477f750d98 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json @@ -3711,6 +3711,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json index e018f1865b47..edd214d8ecd6 100644 --- a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json @@ -4165,6 +4165,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index 29df538ea192..8fc6bbd33852 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -6934,6 +6934,15 @@ "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}", "additional-permissions": [], "access": "write" + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "additional-permissions": [], + "access": "write" } ] }, diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json index 8db521057e9e..d691c2761acb 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json @@ -4387,6 +4387,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index 6b65d9700055..be8efd050f39 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -8492,6 +8492,17 @@ "user-to-server": true, "server-to-server": true, "additional-permissions": [] + }, + { + "category": "security-advisories", + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": [] } ] }, diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json index 852867a632f7..e073e8c3b5f0 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json @@ -3999,6 +3999,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index 588844d04bab..51bb15d68951 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -4453,6 +4453,12 @@ "subcategory": "repository-advisories", "verb": "patch", "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}" + }, + { + "slug": "request-a-cve-for-a-repository-security-advisory", + "subcategory": "repository-advisories", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve" } ], "teams": [ diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 278757d82e96..d4d3bebac412 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370" + "sha": "af631f687d9e4aedb65f9351d66a955b63f56f15" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 020746ca700e..578366da5c39 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -513970,6 +513970,92 @@ "description": "
Validation failed, or the endpoint has been spammed.
" } ] + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "title": "Request a CVE for a repository security advisory", + "category": "security-advisories", + "subcategory": "repository-advisories", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
The GHSA (GitHub Security Advisory) identifier of the advisory.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [], + "enabledForGitHubApps": true, + "codeExamples": [ + { + "key": "default", + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO", + "ghsa_id": "GHSA_ID" + } + }, + "response": { + "statusCode": "202", + "contentType": "application/json", + "description": "Accepted
", + "example": null, + "schema": { + "type": "object" + } + } + } + ], + "previews": [], + "descriptionHTML": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"Requesting a CVE identification number.\"
\nYou may request a CVE for public repositories, but cannot do so for private repositories.
\nYou must authenticate using an access token with the repo scope or repository_advisories:write permission to use this endpoint.
In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.
", + "statusCodes": [ + { + "httpStatusCode": "202", + "description": "Accepted
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "422", + "description": "Validation failed, or the endpoint has been spammed.
" + } + ] } ] }, diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index 08f601585470..2d41c69b29d5 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -248900,7 +248900,7 @@ } ], "previews": [], - "descriptionHTML": "Gets the audit log for an enterprise. To use this endpoint, you must be an enterprise admin, and you must use an access token with the read:audit_log scope.
Gets the audit log for an enterprise. To use this endpoint, you must\nbe an enterprise admin, and you must use an access token with the read:audit_log\nscope.
This endpoint has a rate limit of 1,750 queries per hour per user and IP address. If your integration receives a rate limit error (typically a 403 or 429 response), it should wait before making another request to the GitHub API. For more information, see \"Resources in the REST API\" and \"Best practices for integrators.\"
", "statusCodes": [ { "httpStatusCode": "200", @@ -363698,7 +363698,7 @@ } ], "previews": [], - "descriptionHTML": "Gets the audit log for an organization. For more information, see \"Reviewing the audit log for your organization.\"
\nTo use this endpoint, you must be an organization owner, and you must use an access token with the read:audit_log scope. GitHub Apps must have the organization_administration read permission to use this endpoint.
By default, the response includes up to 30 events from the past three months. Use the phrase parameter to filter results and retrieve older events. For example, use the phrase parameter with the created qualifier to filter events based on when the events occurred. For more information, see \"Reviewing the audit log for your organization.\"
Use pagination to retrieve fewer or more than 30 events. For more information, see \"Resources in the REST API.\"
", + "descriptionHTML": "Gets the audit log for an organization. For more information, see \"Reviewing the audit log for your organization.\"
\nTo use this endpoint, you must be an organization owner, and you must use an access token with the read:audit_log scope. GitHub Apps must have the organization_administration read permission to use this endpoint.
By default, the response includes up to 30 events from the past three months. Use the phrase parameter to filter results and retrieve older events. For example, use the phrase parameter with the created qualifier to filter events based on when the events occurred. For more information, see \"Reviewing the audit log for your organization.\"
Use pagination to retrieve fewer or more than 30 events. For more information, see \"Resources in the REST API.\"
\nThis endpoint has a rate limit of 1,750 queries per hour per user and IP address. If your integration receives a rate limit error (typically a 403 or 429 response), it should wait before making another request to the GitHub API. For more information, see \"Resources in the REST API\" and \"Best practices for integrators.\"
", "statusCodes": [ { "httpStatusCode": "200", @@ -533503,6 +533503,92 @@ "description": "Validation failed, or the endpoint has been spammed.
" } ] + }, + { + "serverUrl": "https://api.github.com", + "verb": "post", + "requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve", + "title": "Request a CVE for a repository security advisory", + "category": "security-advisories", + "subcategory": "repository-advisories", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
The GHSA (GitHub Security Advisory) identifier of the advisory.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "bodyParameters": [], + "enabledForGitHubApps": true, + "codeExamples": [ + { + "key": "default", + "request": { + "description": "Example", + "acceptHeader": "application/vnd.github.v3+json", + "parameters": { + "owner": "OWNER", + "repo": "REPO", + "ghsa_id": "GHSA_ID" + } + }, + "response": { + "statusCode": "202", + "contentType": "application/json", + "description": "Accepted
", + "example": null, + "schema": { + "type": "object" + } + } + } + ], + "previews": [], + "descriptionHTML": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"Requesting a CVE identification number.\"
\nYou may request a CVE for public repositories, but cannot do so for private repositories.
\nYou must authenticate using an access token with the repo scope or repository_advisories:write permission to use this endpoint.
In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.
", + "statusCodes": [ + { + "httpStatusCode": "202", + "description": "Accepted
" + }, + { + "httpStatusCode": "400", + "description": "Bad Request
" + }, + { + "httpStatusCode": "403", + "description": "Forbidden
" + }, + { + "httpStatusCode": "404", + "description": "Resource not found
" + }, + { + "httpStatusCode": "422", + "description": "Validation failed, or the endpoint has been spammed.
" + } + ] } ] }, diff --git a/src/rest/data/ghes-3.9-2022-11-28/schema.json b/src/rest/data/ghes-3.9-2022-11-28/schema.json index d9ad0a5c408c..3369f3b9aff7 100644 --- a/src/rest/data/ghes-3.9-2022-11-28/schema.json +++ b/src/rest/data/ghes-3.9-2022-11-28/schema.json @@ -202586,7 +202586,7 @@ "serverUrl": "http(s)://HOSTNAME", "verb": "get", "requestPath": "/manage/v1/config/nodes", - "title": "Get all GHES node metadata for all nodes", + "title": "Get GHES node metadata for all nodes", "category": "enterprise-admin", "subcategory": "manage-ghes", "parameters": [ @@ -202668,6 +202668,9 @@ "uuid": { "type": "string" }, + "replica": { + "type": "boolean" + }, "cluster_roles": { "type": "array", "items": { @@ -202700,7 +202703,7 @@ } ], "previews": [], - "descriptionHTML": "Get all node metadata for existing nodes in the current cluster. For more information, see \"About clustering.\"
", + "descriptionHTML": "Get node metadata for all configured nodes in the current cluster. For more information, see \"About clustering.\"
", "statusCodes": [ { "httpStatusCode": "200", @@ -202709,6 +202712,10 @@ { "httpStatusCode": "401", "description": "Unauthorized
" + }, + { + "httpStatusCode": "500", + "description": "Internal error
" } ] }, @@ -202878,6 +202885,10 @@ { "httpStatusCode": "401", "description": "Unauthorized
" + }, + { + "httpStatusCode": "500", + "description": "Internal error
" } ] }, @@ -202985,6 +202996,10 @@ { "httpStatusCode": "401", "description": "Unauthorized
" + }, + { + "httpStatusCode": "500", + "description": "Internal error
" } ] } diff --git a/src/rest/lib/config.json b/src/rest/lib/config.json index dc5786c70821..e3746a0645da 100644 --- a/src/rest/lib/config.json +++ b/src/rest/lib/config.json @@ -33,5 +33,5 @@ ] } }, - "sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370" + "sha": "af631f687d9e4aedb65f9351d66a955b63f56f15" } \ No newline at end of file diff --git a/src/webhooks/lib/config.json b/src/webhooks/lib/config.json index a551a2d76925..f09542537511 100644 --- a/src/webhooks/lib/config.json +++ b/src/webhooks/lib/config.json @@ -1,3 +1,3 @@ { - "sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370" + "sha": "af631f687d9e4aedb65f9351d66a955b63f56f15" } \ No newline at end of file