diff options
Diffstat (limited to 'descriptions/api.github.com/api.github.com.yaml')
-rw-r--r-- | descriptions/api.github.com/api.github.com.yaml | 832 |
1 files changed, 832 insertions, 0 deletions
diff --git a/descriptions/api.github.com/api.github.com.yaml b/descriptions/api.github.com/api.github.com.yaml index d9df3f7e1..45638423b 100644 --- a/descriptions/api.github.com/api.github.com.yaml +++ b/descriptions/api.github.com/api.github.com.yaml @@ -22251,6 +22251,163 @@ paths: enabledForGitHubApps: true category: repos subcategory: + "/repos/{owner}/{repo}/dependabot/alerts": + get: + summary: List Dependabot alerts for a repository + description: |- + You must use an access token with the `security_events` scope to use this endpoint with private repositories. + You can also use tokens with the `public_repo` scope for public repositories only. + GitHub Apps must have **Dependabot alerts** read permission to use this endpoint. + tags: + - dependabot + operationId: dependabot/list-alerts-for-repo + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/reference/dependabot#list-dependabot-alerts-for-a-repository + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/dependabot-alert-state" + - "$ref": "#/components/parameters/dependabot-alert-severity" + - "$ref": "#/components/parameters/dependabot-alert-ecosystem" + - "$ref": "#/components/parameters/dependabot-alert-package" + - "$ref": "#/components/parameters/dependabot-alert-manifest" + - "$ref": "#/components/parameters/dependabot-alert-scope" + - "$ref": "#/components/parameters/dependabot-alert-sort" + - "$ref": "#/components/parameters/direction" + - "$ref": "#/components/parameters/page" + - "$ref": "#/components/parameters/per-page" + responses: + '200': + description: Response + content: + application/json: + schema: + type: array + items: + "$ref": "#/components/schemas/dependabot-alert" + examples: + default: + "$ref": "#/components/examples/dependabot-alerts" + '304': + "$ref": "#/components/responses/not_modified" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + '422': + "$ref": "#/components/responses/validation_failed_simple" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + previews: [] + category: dependabot + subcategory: alerts + "/repos/{owner}/{repo}/dependabot/alerts/{alert_number}": + get: + summary: Get a Dependabot alert + description: |- + You must use an access token with the `security_events` scope to use this endpoint with private repositories. + You can also use tokens with the `public_repo` scope for public repositories only. + GitHub Apps must have **Dependabot alerts** read permission to use this endpoint. + tags: + - dependabot + operationId: dependabot/get-alert + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/reference/dependabot#get-a-dependabot-alert + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/dependabot-alert-number" + responses: + '200': + description: Response + content: + application/json: + schema: + "$ref": "#/components/schemas/dependabot-alert" + examples: + default: + "$ref": "#/components/examples/dependabot-alert-open" + '304': + "$ref": "#/components/responses/not_modified" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + previews: [] + category: dependabot + subcategory: alerts + patch: + summary: Update a Dependabot alert + description: |- + You must use an access token with the `security_events` scope to use this endpoint with private repositories. + You can also use tokens with the `public_repo` scope for public repositories only. + GitHub Apps must have **Dependabot alerts** write permission to use this endpoint. + tags: + - dependabot + operationId: dependabot/update-alert + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/reference/dependabot#update-a-dependabot-alert + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/dependabot-alert-number" + requestBody: + required: true + content: + application/json: + schema: + type: object + properties: + state: + "$ref": "#/components/schemas/dependabot-alert-set-state" + dismissed_reason: + "$ref": "#/components/schemas/dependabot-alert-dismissed-reason" + dismissed_comment: + "$ref": "#/components/schemas/dependabot-alert-dismissed-comment" + required: + - state + additionalProperties: false + examples: + default: + value: + state: dismissed + dismissed_reason: tolerable_risk + dismissed_comment: This alert is accurate but we use a sanitizer. + responses: + '200': + description: Response + content: + application/json: + schema: + "$ref": "#/components/schemas/dependabot-alert" + examples: + default: + "$ref": "#/components/examples/dependabot-alert-dismissed" + '304': + "$ref": "#/components/responses/not_modified" + '400': + "$ref": "#/components/responses/bad_request" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + '409': + "$ref": "#/components/responses/conflict" + '422': + "$ref": "#/components/responses/validation_failed_simple" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + previews: [] + category: dependabot + subcategory: alerts "/repos/{owner}/{repo}/dependabot/secrets": get: summary: List repository secrets @@ -54383,6 +54540,274 @@ components: required: - contributions - type + dependabot-alert-scope: + type: string + description: The scope of the vulnerable dependency. + nullable: true + readOnly: true + enum: + - development + - runtime + dependabot-alert-state: + type: string + description: State of a Dependabot alert. + enum: + - dismissed + - fixed + - open + dependabot-alert-package: + type: object + description: The details of the vulnerable package. + readOnly: true + properties: + ecosystem: + type: string + name: + type: string + dependabot-alert-dependency: + type: object + readOnly: true + properties: + package: + "$ref": "#/components/schemas/dependabot-alert-package" + manifest_path: + type: string + description: The path to the manifest filename. + readOnly: true + scope: + "$ref": "#/components/schemas/dependabot-alert-scope" + dependabot-alert-security-advisory: + type: object + description: The details of the security advisory, including summary, description, + and severity. + readOnly: true + properties: + ghsa_id: + type: string + cve_id: + type: string + nullable: true + summary: + type: string + description: + type: string + severity: + type: string + enum: + - low + - medium + - high + - critical + identifiers: + type: array + items: + type: object + properties: + type: + type: string + enum: + - GHSA + - CVE + value: + type: string + required: + - value + - type + additionalProperties: false + references: + type: array + items: + type: object + properties: + url: + type: string + format: uri + required: + - url + additionalProperties: false + cvss: + type: object + properties: + score: + type: number + vector_string: + type: string + nullable: true + required: + - vector_string + - score + additionalProperties: false + cwes: + type: array + items: + type: object + properties: + cwe_id: + type: string + name: + type: string + required: + - cwe_id + - name + additionalProperties: false + published_at: + type: string + format: date-time + updated_at: + type: string + format: date-time + vulnerabilities: + type: array + items: + type: object + properties: + first_patched_version: + type: object + nullable: true + properties: + identifier: + type: string + required: + - identifier + additionalProperties: false + package: + type: object + properties: + ecosystem: + type: string + name: + type: string + required: + - ecosystem + - name + additionalProperties: false + severity: + type: string + vulnerable_version_range: + type: string + required: + - package + - severity + - vulnerable_version_range + - first_patched_version + additionalProperties: false + withdrawn_at: + type: string + format: date-time + nullable: true + required: + - cvss + - cwes + - ghsa_id + - summary + - description + - severity + - identifiers + - references + - published_at + - updated_at + - withdrawn_at + - vulnerabilities + additionalProperties: false + dependabot-alert-security-vulnerability: + type: object + description: The details of the vulnerability of a security advisory. + readOnly: true + properties: + package: + "$ref": "#/components/schemas/dependabot-alert-package" + severity: + type: string + vulnerable_version_range: + type: string + first_patched_version: + type: object + properties: + identifier: + type: string + dependabot-alert-dismissed_at: + type: string + description: 'The time that the alert was dismissed in ISO 8601 format: `YYYY-MM-DDTHH:MM:SSZ`.' + format: date-time + readOnly: true + nullable: true + dependabot-alert-dismissed-reason: + type: string + description: "**Required when the `state` is `dismissed`.** The reason for dismissing + the Dependabot alert." + nullable: true + enum: + - fix_started + - inaccurate + - no_bandwidth + - not_used + - tolerable_risk + dependabot-alert-dismissed-comment: + type: string + description: An optional comment associated with the alert's dismissal. The + maximum size is 280 characters. + nullable: true + maxLength: 280 + dependabot-alert-fixed-at: + type: string + description: 'The time that the alert was no longer detected and was considered + fixed in ISO 8601 format: `YYYY-MM-DDTHH:MM:SSZ`.' + format: date-time + readOnly: true + nullable: true + dependabot-alert: + type: object + properties: + number: + "$ref": "#/components/schemas/alert-number" + state: + "$ref": "#/components/schemas/dependabot-alert-state" + dependency: + "$ref": "#/components/schemas/dependabot-alert-dependency" + security_advisory: + "$ref": "#/components/schemas/dependabot-alert-security-advisory" + security_vulnerability: + "$ref": "#/components/schemas/dependabot-alert-security-vulnerability" + created_at: + "$ref": "#/components/schemas/alert-created-at" + updated_at: + "$ref": "#/components/schemas/alert-updated-at" + url: + "$ref": "#/components/schemas/alert-url" + html_url: + "$ref": "#/components/schemas/alert-html-url" + dismissed_at: + "$ref": "#/components/schemas/dependabot-alert-dismissed_at" + dismissed_by: + "$ref": "#/components/schemas/nullable-simple-user" + dismissed_reason: + "$ref": "#/components/schemas/dependabot-alert-dismissed-reason" + dismissed_comment: + "$ref": "#/components/schemas/dependabot-alert-dismissed-comment" + fixed_at: + "$ref": "#/components/schemas/dependabot-alert-fixed-at" + required: + - number + - state + - dependency + - security_advisory + - security_vulnerability + - url + - html_url + - dismissed_at + - dismissed_by + - dismissed_reason + - dismissed_comment + - fixed_at + - created_at + - updated_at + dependabot-alert-set-state: + description: Sets the status of the dependabot alert. You must provide `dismissed_reason` + when you set the state to `dismissed`. + type: string + enum: + - dismissed + - open dependabot-secret: title: Dependabot Secret description: Set secrets for Dependabot. @@ -74851,6 +75276,342 @@ components: type: User site_admin: false contributions: 32 + dependabot-alerts: + value: + - number: 2 + state: dismissed + dependency: + package: + ecosystem: pip + name: django + manifest_path: path/to/requirements.txt + scope: runtime + security_advisory: + ghsa_id: GHSA-rf4j-j272-fj86 + cve_id: CVE-2018-6188 + summary: Django allows remote attackers to obtain potentially sensitive + information by leveraging data exposure from the confirm_login_allowed() + method, as demonstrated by discovering whether a user account is inactive + description: django.contrib.auth.forms.AuthenticationForm in Django 2.0 + before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain + potentially sensitive information by leveraging data exposure from the + confirm_login_allowed() method, as demonstrated by discovering whether + a user account is inactive. + severity: high + identifiers: + - type: GHSA + value: GHSA-rf4j-j272-fj86 + - type: CVE + value: CVE-2018-6188 + references: + - url: https://nvd.nist.gov/vuln/detail/CVE-2018-6188 + - url: https://github.com/advisories/GHSA-rf4j-j272-fj86 + - url: https://usn.ubuntu.com/3559-1/ + - url: https://www.djangoproject.com/weblog/2018/feb/01/security-releases/ + - url: http://www.securitytracker.com/id/1040422 + published_at: '2018-10-03T21:13:54Z' + updated_at: '2022-04-26T18:35:37Z' + withdrawn_at: + vulnerabilities: + - package: + ecosystem: pip + name: django + severity: high + vulnerable_version_range: ">= 2.0.0, < 2.0.2" + first_patched_version: + identifier: 2.0.2 + - package: + ecosystem: pip + name: django + severity: high + vulnerable_version_range: ">= 1.11.8, < 1.11.10" + first_patched_version: + identifier: 1.11.10 + cvss: + vector_string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + score: 7.5 + cwes: + - cwe_id: CWE-200 + name: Exposure of Sensitive Information to an Unauthorized Actor + security_vulnerability: + package: + ecosystem: pip + name: django + severity: high + vulnerable_version_range: ">= 2.0.0, < 2.0.2" + first_patched_version: + identifier: 2.0.2 + url: https://api.github.com/repos/octocat/hello-world/dependabot/alerts/2 + html_url: https://github.com/octocat/hello-world/security/dependabot/2 + created_at: '2022-06-15T07:43:03Z' + updated_at: '2022-08-23T14:29:47Z' + dismissed_at: '2022-08-23T14:29:47Z' + dismissed_by: + login: octocat + id: 1 + node_id: MDQ6VXNlcjE= + avatar_url: https://github.com/images/error/octocat_happy.gif + gravatar_id: '' + url: https://api.github.com/users/octocat + html_url: https://github.com/octocat + followers_url: https://api.github.com/users/octocat/followers + following_url: https://api.github.com/users/octocat/following{/other_user} + gists_url: https://api.github.com/users/octocat/gists{/gist_id} + starred_url: https://api.github.com/users/octocat/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/octocat/subscriptions + organizations_url: https://api.github.com/users/octocat/orgs + repos_url: https://api.github.com/users/octocat/repos + events_url: https://api.github.com/users/octocat/events{/privacy} + received_events_url: https://api.github.com/users/octocat/received_events + type: User + site_admin: false + dismissed_reason: tolerable_risk + dismissed_comment: This alert is accurate but we use a sanitizer. + fixed_at: + - number: 1 + state: open + dependency: + package: + ecosystem: pip + name: ansible + manifest_path: path/to/requirements.txt + scope: runtime + security_advisory: + ghsa_id: GHSA-8f4m-hccc-8qph + cve_id: CVE-2021-20191 + summary: Insertion of Sensitive Information into Log File in ansible + description: A flaw was found in ansible. Credentials, such as secrets, + are being disclosed in console log by default and not protected by no_log + feature when using those modules. An attacker can take advantage of this + information to steal those credentials. The highest threat from this vulnerability + is to data confidentiality. + severity: medium + identifiers: + - type: GHSA + value: GHSA-8f4m-hccc-8qph + - type: CVE + value: CVE-2021-20191 + references: + - url: https://nvd.nist.gov/vuln/detail/CVE-2021-20191 + - url: https://access.redhat.com/security/cve/cve-2021-20191 + - url: https://bugzilla.redhat.com/show_bug.cgi?id=1916813 + published_at: '2021-06-01T17:38:00Z' + updated_at: '2021-08-12T23:06:00Z' + withdrawn_at: + vulnerabilities: + - package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: ">= 2.9.0, < 2.9.18" + first_patched_version: + identifier: 2.9.18 + - package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: "< 2.8.19" + first_patched_version: + identifier: 2.8.19 + - package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: ">= 2.10.0, < 2.10.7" + first_patched_version: + identifier: 2.10.7 + cvss: + vector_string: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + score: 5.5 + cwes: + - cwe_id: CWE-532 + name: Insertion of Sensitive Information into Log File + security_vulnerability: + package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: "< 2.8.19" + first_patched_version: + identifier: 2.8.19 + url: https://api.github.com/repos/octocat/hello-world/dependabot/alerts/1 + html_url: https://github.com/octocat/hello-world/security/dependabot/1 + created_at: '2022-06-14T15:21:52Z' + updated_at: '2022-06-14T15:21:52Z' + dismissed_at: + dismissed_by: + dismissed_reason: + dismissed_comment: + fixed_at: + dependabot-alert-open: + value: + number: 1 + state: open + dependency: + package: + ecosystem: pip + name: ansible + manifest_path: path/to/requirements.txt + scope: runtime + security_advisory: + ghsa_id: GHSA-8f4m-hccc-8qph + cve_id: CVE-2021-20191 + summary: Insertion of Sensitive Information into Log File in ansible + description: A flaw was found in ansible. Credentials, such as secrets, + are being disclosed in console log by default and not protected by no_log + feature when using those modules. An attacker can take advantage of this + information to steal those credentials. The highest threat from this vulnerability + is to data confidentiality. + severity: medium + identifiers: + - type: GHSA + value: GHSA-8f4m-hccc-8qph + - type: CVE + value: CVE-2021-20191 + references: + - url: https://nvd.nist.gov/vuln/detail/CVE-2021-20191 + - url: https://access.redhat.com/security/cve/cve-2021-20191 + - url: https://bugzilla.redhat.com/show_bug.cgi?id=1916813 + published_at: '2021-06-01T17:38:00Z' + updated_at: '2021-08-12T23:06:00Z' + withdrawn_at: + vulnerabilities: + - package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: ">= 2.9.0, < 2.9.18" + first_patched_version: + identifier: 2.9.18 + - package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: "< 2.8.19" + first_patched_version: + identifier: 2.8.19 + - package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: ">= 2.10.0, < 2.10.7" + first_patched_version: + identifier: 2.10.7 + cvss: + vector_string: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + score: 5.5 + cwes: + - cwe_id: CWE-532 + name: Insertion of Sensitive Information into Log File + security_vulnerability: + package: + ecosystem: pip + name: ansible + severity: medium + vulnerable_version_range: "< 2.8.19" + first_patched_version: + identifier: 2.8.19 + url: https://api.github.com/repos/octocat/hello-world/dependabot/alerts/1 + html_url: https://github.com/octocat/hello-world/security/dependabot/1 + created_at: '2022-06-14T15:21:52Z' + updated_at: '2022-06-14T15:21:52Z' + dismissed_at: + dismissed_by: + dismissed_reason: + dismissed_comment: + fixed_at: + dependabot-alert-dismissed: + value: + number: 2 + state: dismissed + dependency: + package: + ecosystem: pip + name: django + manifest_path: path/to/requirements.txt + scope: runtime + security_advisory: + ghsa_id: GHSA-rf4j-j272-fj86 + cve_id: CVE-2018-6188 + summary: Django allows remote attackers to obtain potentially sensitive + information by leveraging data exposure from the confirm_login_allowed() + method, as demonstrated by discovering whether a user account is inactive + description: django.contrib.auth.forms.AuthenticationForm in Django 2.0 + before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain + potentially sensitive information by leveraging data exposure from the + confirm_login_allowed() method, as demonstrated by discovering whether + a user account is inactive. + severity: high + identifiers: + - type: GHSA + value: GHSA-rf4j-j272-fj86 + - type: CVE + value: CVE-2018-6188 + references: + - url: https://nvd.nist.gov/vuln/detail/CVE-2018-6188 + - url: https://github.com/advisories/GHSA-rf4j-j272-fj86 + - url: https://usn.ubuntu.com/3559-1/ + - url: https://www.djangoproject.com/weblog/2018/feb/01/security-releases/ + - url: http://www.securitytracker.com/id/1040422 + published_at: '2018-10-03T21:13:54Z' + updated_at: '2022-04-26T18:35:37Z' + withdrawn_at: + vulnerabilities: + - package: + ecosystem: pip + name: django + severity: high + vulnerable_version_range: ">= 2.0.0, < 2.0.2" + first_patched_version: + identifier: 2.0.2 + - package: + ecosystem: pip + name: django + severity: high + vulnerable_version_range: ">= 1.11.8, < 1.11.10" + first_patched_version: + identifier: 1.11.10 + cvss: + vector_string: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + score: 7.5 + cwes: + - cwe_id: CWE-200 + name: Exposure of Sensitive Information to an Unauthorized Actor + security_vulnerability: + package: + ecosystem: pip + name: django + severity: high + vulnerable_version_range: ">= 2.0.0, < 2.0.2" + first_patched_version: + identifier: 2.0.2 + url: https://api.github.com/repos/octocat/hello-world/dependabot/alerts/2 + html_url: https://github.com/octocat/hello-world/security/dependabot/2 + created_at: '2022-06-15T07:43:03Z' + updated_at: '2022-08-23T14:29:47Z' + dismissed_at: '2022-08-23T14:29:47Z' + dismissed_by: + login: octocat + id: 1 + node_id: MDQ6VXNlcjE= + avatar_url: https://github.com/images/error/octocat_happy.gif + gravatar_id: '' + url: https://api.github.com/users/octocat + html_url: https://github.com/octocat + followers_url: https://api.github.com/users/octocat/followers + following_url: https://api.github.com/users/octocat/following{/other_user} + gists_url: https://api.github.com/users/octocat/gists{/gist_id} + starred_url: https://api.github.com/users/octocat/starred{/owner}{/repo} + subscriptions_url: https://api.github.com/users/octocat/subscriptions + organizations_url: https://api.github.com/users/octocat/orgs + repos_url: https://api.github.com/users/octocat/repos + events_url: https://api.github.com/users/octocat/events{/privacy} + received_events_url: https://api.github.com/users/octocat/received_events + type: User + site_admin: false + dismissed_reason: tolerable_risk + dismissed_comment: This alert is accurate but we use a sanitizer. + fixed_at: dependabot-secret-paginated: value: total_count: 2 @@ -84031,6 +84792,77 @@ components: schema: type: string x-multi-segment: true + dependabot-alert-state: + name: state + description: |- + A comma-separated list of states. If specified, only alerts with these states will be returned. + + Can be: `dismissed`, `fixed`, `open` + in: query + schema: + type: string + dependabot-alert-severity: + name: severity + description: |- + A comma-separated list of severities. If specified, only alerts with these severities will be returned. + + Can be: `low`, `medium`, `high`, `critical` + in: query + schema: + type: string + dependabot-alert-ecosystem: + name: ecosystem + description: |- + A comma-separated list of ecosystems. If specified, only alerts for these ecosystems will be returned. + + Can be: `composer`, `go`, `maven`, `npm`, `nuget`, `pip`, `rubygems`, `rust` + in: query + schema: + type: string + dependabot-alert-package: + name: package + description: A comma-separated list of package names. If specified, only alerts + for these packages will be returned. + in: query + schema: + type: string + dependabot-alert-manifest: + name: manifest + description: A comma-separated list of full manifest paths. If specified, only + alerts for these manifests will be returned. + in: query + schema: + type: string + dependabot-alert-scope: + name: scope + description: Scope of the dependency on a Dependabot alert. + in: query + schema: + "$ref": "#/components/schemas/dependabot-alert-scope" + dependabot-alert-sort: + name: sort + description: |- + The property by which to sort the results. + `created` means when the alert was created. + `updated` means when the alert's state last changed. + in: query + required: false + schema: + type: string + enum: + - created + - updated + default: created + dependabot-alert-number: + name: alert_number + in: path + description: The number that identifies a Dependabot alert in its repository. + You can find this at the end of the URL for a Dependabot alert within GitHub, + or in `number` fields in the response from the `GET /repos/{owner}/{repo}/dependabot/alerts` + operation. + required: true + schema: + "$ref": "#/components/schemas/alert-number" manifest-path: name: name description: The full path, relative to the repository root, of the dependency |