Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -6353,6 +6353,15 @@
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}",
"additional-permissions": [],
"access": "write"
},
{
"category": "security-advisories",
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve",
"additional-permissions": [],
"access": "write"
}
]
},
Expand Down
6 changes: 6 additions & 0 deletions src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json
Original file line number Diff line number Diff line change
Expand Up @@ -4099,6 +4099,12 @@
"subcategory": "repository-advisories",
"verb": "patch",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}"
},
{
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve"
}
],
"teams": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7776,6 +7776,17 @@
"user-to-server": true,
"server-to-server": true,
"additional-permissions": []
},
{
"category": "security-advisories",
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve",
"access": "write",
"user-to-server": true,
"server-to-server": true,
"additional-permissions": []
}
]
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3711,6 +3711,12 @@
"subcategory": "repository-advisories",
"verb": "patch",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}"
},
{
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve"
}
],
"teams": [
Expand Down
6 changes: 6 additions & 0 deletions src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json
Original file line number Diff line number Diff line change
Expand Up @@ -4165,6 +4165,12 @@
"subcategory": "repository-advisories",
"verb": "patch",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}"
},
{
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve"
}
],
"teams": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6934,6 +6934,15 @@
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}",
"additional-permissions": [],
"access": "write"
},
{
"category": "security-advisories",
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve",
"additional-permissions": [],
"access": "write"
}
]
},
Expand Down
6 changes: 6 additions & 0 deletions src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json
Original file line number Diff line number Diff line change
Expand Up @@ -4387,6 +4387,12 @@
"subcategory": "repository-advisories",
"verb": "patch",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}"
},
{
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve"
}
],
"teams": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8492,6 +8492,17 @@
"user-to-server": true,
"server-to-server": true,
"additional-permissions": []
},
{
"category": "security-advisories",
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve",
"access": "write",
"user-to-server": true,
"server-to-server": true,
"additional-permissions": []
}
]
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3999,6 +3999,12 @@
"subcategory": "repository-advisories",
"verb": "patch",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}"
},
{
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve"
}
],
"teams": [
Expand Down
6 changes: 6 additions & 0 deletions src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json
Original file line number Diff line number Diff line change
Expand Up @@ -4453,6 +4453,12 @@
"subcategory": "repository-advisories",
"verb": "patch",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}"
},
{
"slug": "request-a-cve-for-a-repository-security-advisory",
"subcategory": "repository-advisories",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve"
}
],
"teams": [
Expand Down
2 changes: 1 addition & 1 deletion src/github-apps/lib/config.json
Original file line number Diff line number Diff line change
Expand Up @@ -60,5 +60,5 @@
"2022-11-28"
]
},
"sha": "902841d79e04ac06ca03c8499a6fe4d32cd39370"
"sha": "af631f687d9e4aedb65f9351d66a955b63f56f15"
}
86 changes: 86 additions & 0 deletions src/rest/data/fpt-2022-11-28/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -513970,6 +513970,92 @@
"description": "<p>Validation failed, or the endpoint has been spammed.</p>"
}
]
},
{
"serverUrl": "https://api.github.com",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve",
"title": "Request a CVE for a repository security advisory",
"category": "security-advisories",
"subcategory": "repository-advisories",
"parameters": [
{
"name": "owner",
"description": "<p>The account owner of the repository. The name is not case sensitive.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
},
{
"name": "repo",
"description": "<p>The name of the repository without the <code>.git</code> extension. The name is not case sensitive.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
},
{
"name": "ghsa_id",
"description": "<p>The GHSA (GitHub Security Advisory) identifier of the advisory.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
}
],
"bodyParameters": [],
"enabledForGitHubApps": true,
"codeExamples": [
{
"key": "default",
"request": {
"description": "Example",
"acceptHeader": "application/vnd.github.v3+json",
"parameters": {
"owner": "OWNER",
"repo": "REPO",
"ghsa_id": "GHSA_ID"
}
},
"response": {
"statusCode": "202",
"contentType": "application/json",
"description": "<p>Accepted</p>",
"example": null,
"schema": {
"type": "object"
}
}
}
],
"previews": [],
"descriptionHTML": "<p>If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"<a href=\"https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional\">Requesting a CVE identification number</a>.\"</p>\n<p>You may request a CVE for public repositories, but cannot do so for private repositories.</p>\n<p>You must authenticate using an access token with the <code>repo</code> scope or <code>repository_advisories:write</code> permission to use this endpoint.</p>\n<p>In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.</p>",
"statusCodes": [
{
"httpStatusCode": "202",
"description": "<p>Accepted</p>"
},
{
"httpStatusCode": "400",
"description": "<p>Bad Request</p>"
},
{
"httpStatusCode": "403",
"description": "<p>Forbidden</p>"
},
{
"httpStatusCode": "404",
"description": "<p>Resource not found</p>"
},
{
"httpStatusCode": "422",
"description": "<p>Validation failed, or the endpoint has been spammed.</p>"
}
]
}
]
},
Expand Down
90 changes: 88 additions & 2 deletions src/rest/data/ghec-2022-11-28/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -248900,7 +248900,7 @@
}
],
"previews": [],
"descriptionHTML": "<p>Gets the audit log for an enterprise. To use this endpoint, you must be an enterprise admin, and you must use an access token with the <code>read:audit_log</code> scope.</p>",
"descriptionHTML": "<p>Gets the audit log for an enterprise. To use this endpoint, you must\nbe an enterprise admin, and you must use an access token with the <code>read:audit_log</code>\nscope.</p>\n<p>This endpoint has a rate limit of 1,750 queries per hour per user and IP address. If your integration receives a rate limit error (typically a 403 or 429 response), it should wait before making another request to the GitHub API. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//rest/overview/resources-in-the-rest-api#exceeding-the-rate-limit\">Resources in the REST API</a>\" and \"<a href=\"https://docs.github.com/enterprise-cloud@latest//rest/guides/best-practices-for-integrators#dealing-with-rate-limits\">Best practices for integrators</a>.\"</p>",
"statusCodes": [
{
"httpStatusCode": "200",
Expand Down Expand Up @@ -363698,7 +363698,7 @@
}
],
"previews": [],
"descriptionHTML": "<p>Gets the audit log for an organization. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//github/setting-up-and-managing-organizations-and-teams/reviewing-the-audit-log-for-your-organization\">Reviewing the audit log for your organization</a>.\"</p>\n<p>To use this endpoint, you must be an organization owner, and you must use an access token with the <code>read:audit_log</code> scope. GitHub Apps must have the <code>organization_administration</code> read permission to use this endpoint.</p>\n<p>By default, the response includes up to 30 events from the past three months. Use the <code>phrase</code> parameter to filter results and retrieve older events. For example, use the <code>phrase</code> parameter with the <code>created</code> qualifier to filter events based on when the events occurred. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#searching-the-audit-log\">Reviewing the audit log for your organization</a>.\"</p>\n<p>Use pagination to retrieve fewer or more than 30 events. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//rest/overview/resources-in-the-rest-api#pagination\">Resources in the REST API</a>.\"</p>",
"descriptionHTML": "<p>Gets the audit log for an organization. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//github/setting-up-and-managing-organizations-and-teams/reviewing-the-audit-log-for-your-organization\">Reviewing the audit log for your organization</a>.\"</p>\n<p>To use this endpoint, you must be an organization owner, and you must use an access token with the <code>read:audit_log</code> scope. GitHub Apps must have the <code>organization_administration</code> read permission to use this endpoint.</p>\n<p>By default, the response includes up to 30 events from the past three months. Use the <code>phrase</code> parameter to filter results and retrieve older events. For example, use the <code>phrase</code> parameter with the <code>created</code> qualifier to filter events based on when the events occurred. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#searching-the-audit-log\">Reviewing the audit log for your organization</a>.\"</p>\n<p>Use pagination to retrieve fewer or more than 30 events. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//rest/overview/resources-in-the-rest-api#pagination\">Resources in the REST API</a>.\"</p>\n<p>This endpoint has a rate limit of 1,750 queries per hour per user and IP address. If your integration receives a rate limit error (typically a 403 or 429 response), it should wait before making another request to the GitHub API. For more information, see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//rest/overview/resources-in-the-rest-api#exceeding-the-rate-limit\">Resources in the REST API</a>\" and \"<a href=\"https://docs.github.com/enterprise-cloud@latest//rest/guides/best-practices-for-integrators#dealing-with-rate-limits\">Best practices for integrators</a>.\"</p>",
"statusCodes": [
{
"httpStatusCode": "200",
Expand Down Expand Up @@ -533503,6 +533503,92 @@
"description": "<p>Validation failed, or the endpoint has been spammed.</p>"
}
]
},
{
"serverUrl": "https://api.github.com",
"verb": "post",
"requestPath": "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve",
"title": "Request a CVE for a repository security advisory",
"category": "security-advisories",
"subcategory": "repository-advisories",
"parameters": [
{
"name": "owner",
"description": "<p>The account owner of the repository. The name is not case sensitive.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
},
{
"name": "repo",
"description": "<p>The name of the repository without the <code>.git</code> extension. The name is not case sensitive.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
},
{
"name": "ghsa_id",
"description": "<p>The GHSA (GitHub Security Advisory) identifier of the advisory.</p>",
"in": "path",
"required": true,
"schema": {
"type": "string"
}
}
],
"bodyParameters": [],
"enabledForGitHubApps": true,
"codeExamples": [
{
"key": "default",
"request": {
"description": "Example",
"acceptHeader": "application/vnd.github.v3+json",
"parameters": {
"owner": "OWNER",
"repo": "REPO",
"ghsa_id": "GHSA_ID"
}
},
"response": {
"statusCode": "202",
"contentType": "application/json",
"description": "<p>Accepted</p>",
"example": null,
"schema": {
"type": "object"
}
}
}
],
"previews": [],
"descriptionHTML": "<p>If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"<a href=\"https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional\">Requesting a CVE identification number</a>.\"</p>\n<p>You may request a CVE for public repositories, but cannot do so for private repositories.</p>\n<p>You must authenticate using an access token with the <code>repo</code> scope or <code>repository_advisories:write</code> permission to use this endpoint.</p>\n<p>In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.</p>",
"statusCodes": [
{
"httpStatusCode": "202",
"description": "<p>Accepted</p>"
},
{
"httpStatusCode": "400",
"description": "<p>Bad Request</p>"
},
{
"httpStatusCode": "403",
"description": "<p>Forbidden</p>"
},
{
"httpStatusCode": "404",
"description": "<p>Resource not found</p>"
},
{
"httpStatusCode": "422",
"description": "<p>Validation failed, or the endpoint has been spammed.</p>"
}
]
}
]
},
Expand Down
Loading