summaryrefslogtreecommitdiffstats
path: root/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml
diff options
context:
space:
mode:
authorgithub-openapi-bot <security+github-openapi-bot@github.com>2025-02-25 15:09:29 -0800
committergithub-openapi-bot <security+github-openapi-bot@github.com>2025-02-25 15:09:29 -0800
commit8a2cb49636e8c887b12ef542a9079fe792455642 (patch)
tree0ec8c27786ef7b51de0015b850190e09c1f4b432 /descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml
parent2d90b0feb3246497649850821757a0eeec84e915 (diff)
downloadrest-api-description-8a2cb49636e8c887b12ef542a9079fe792455642.tar.gz
rest-api-description-8a2cb49636e8c887b12ef542a9079fe792455642.zip
Update OpenAPI 3.0 Descriptions
Diffstat (limited to 'descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml')
-rw-r--r--descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml31
1 files changed, 29 insertions, 2 deletions
diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml
index 4f52b823f..194e60333 100644
--- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml
+++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml
@@ -7102,6 +7102,14 @@ paths:
- enabled
- disabled
- not_set
+ secret_scanning_delegated_alert_dismissal:
+ type: string
+ description: The enablement status of secret scanning delegated
+ alert dismissal
+ enum:
+ - enabled
+ - disabled
+ - not_set
private_vulnerability_reporting:
type: string
description: The enablement status of private vulnerability
@@ -15234,7 +15242,7 @@ paths:
description: |-
Gets information about an organization.
- When the value of `two_factor_requirement_enabled` is `true`, the organization requires all members, billing managers, and outside collaborators to enable [two-factor authentication](https://docs.github.com/articles/securing-your-account-with-two-factor-authentication-2fa/).
+ When the value of `two_factor_requirement_enabled` is `true`, the organization requires all members, billing managers, outside collaborators, guest collaborators, repository collaborators, or everyone with access to any repository within the organization to enable [two-factor authentication](https://docs.github.com/articles/securing-your-account-with-two-factor-authentication-2fa/).
To see the full details about an organization, the authenticated user must be an organization owner.
@@ -20950,6 +20958,7 @@ paths:
reviewer_type: TEAM
secret_scanning_validity_checks: enabled
secret_scanning_non_provider_patterns: enabled
+ secret_scanning_delegated_alert_dismissal: not_set
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/17
@@ -20974,6 +20983,7 @@ paths:
secret_scanning_delegated_bypass: disabled
secret_scanning_validity_checks: disabled
secret_scanning_non_provider_patterns: disabled
+ secret_scanning_delegated_alert_dismissal: disabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1326
@@ -21142,6 +21152,14 @@ paths:
- disabled
- not_set
default: disabled
+ secret_scanning_delegated_alert_dismissal:
+ type: string
+ description: The enablement status of secret scanning delegated
+ alert dismissal
+ enum:
+ - enabled
+ - disabled
+ - not_set
private_vulnerability_reporting:
type: string
description: The enablement status of private vulnerability reporting
@@ -21444,6 +21462,14 @@ paths:
- enabled
- disabled
- not_set
+ secret_scanning_delegated_alert_dismissal:
+ type: string
+ description: The enablement status of secret scanning delegated
+ alert dismissal
+ enum:
+ - enabled
+ - disabled
+ - not_set
private_vulnerability_reporting:
type: string
description: The enablement status of private vulnerability reporting
@@ -54249,7 +54275,7 @@ paths:
description: |-
Commits an autofix for a code scanning alert.
- If an autofix is commited as a result of this request, then this endpoint will return a 201 Created response.
+ If an autofix is committed as a result of this request, then this endpoint will return a 201 Created response.
OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint with private or public repositories, or the `public_repo` scope to use this endpoint with only public repositories.
tags:
@@ -56193,6 +56219,7 @@ paths:
secret_scanning_delegated_bypass: disabled
secret_scanning_validity_checks: disabled
secret_scanning_non_provider_patterns: disabled
+ secret_scanning_delegated_alert_dismissal: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325