You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: descriptions/api.github.com/api.github.com.json
+25-3Lines changed: 25 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -17400,12 +17400,22 @@
17400
17400
},
17401
17401
"security_and_analysis": {
17402
17402
"type": "object",
17403
-
"description": "Specify which security and analysis features to enable or disable.",
17403
+
"description": "Specify which security and analysis features to enable or disable. For example, to enable GitHub Advanced Security, use this data in the body of the PATCH request: `{\"security_and_analysis\": {\"advanced_security\": {\"status\": \"enabled\"}}}`. If you have admin permissions for a private repository covered by an Advanced Security license, you can check which security and analysis features are currently enabled by using a `GET /repos/{owner}/{repo}` request.",
17404
17404
"nullable": true,
17405
17405
"properties": {
17406
17406
"advanced_security": {
17407
17407
"type": "object",
17408
-
"description": "Use the `status` property to enable or disable GitHub Advanced Security for this repository. For more information, see \"[About GitHub Advanced Security](/github/getting-started-with-github/learning-about-github/about-github-advanced-security).\" If you're an admin user for a repository covered by an Advanced Security license, you can check whether Advanced Security is currently enabled by using a `GET /repos/{owner}/{repo}` request.",
17408
+
"description": "Use the `status` property to enable or disable GitHub Advanced Security for this repository. For more information, see \"[About GitHub Advanced Security](/github/getting-started-with-github/learning-about-github/about-github-advanced-security).\"",
17409
+
"properties": {
17410
+
"status": {
17411
+
"type": "string",
17412
+
"description": "Can be `enabled` or `disabled`."
17413
+
}
17414
+
}
17415
+
},
17416
+
"secret_scanning": {
17417
+
"type": "object",
17418
+
"description": "Use the `status` property to enable or disable secret scanning for this repository. For more information, see \"[About secret scanning](/code-security/secret-security/about-secret-scanning).\"",
"summary": "Get a code scanning analysis for a repository",
24313
-
"description": "Gets a specified code scanning analysis for a repository.\nYou must use an access token with the `security_events` scope to use this endpoint.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\nThe default JSON response contains fields that describe the analysis.\nThis includes the Git reference and commit SHA to which the analysis relates,\nthe datetime of the analysis, the name of the code scanning tool,\nand the number of alerts.\n\nThe `rules_count` field in the default response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nIf you use the Accept header `application/sarif+json`,\nthe response contains the analysis data that was uploaded.\nThis is formatted as\n[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).\nFor an example response, see \"[Custom media type for code scanning](#custom-media-type-for-code-scanning).\"\n\n**Deprecation notice**:\nThe `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.",
24323
+
"description": "Gets a specified code scanning analysis for a repository.\nYou must use an access token with the `security_events` scope to use this endpoint.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\nThe default JSON response contains fields that describe the analysis.\nThis includes the Git reference and commit SHA to which the analysis relates,\nthe datetime of the analysis, the name of the code scanning tool,\nand the number of alerts.\n\nThe `rules_count` field in the default response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nIf you use the Accept header `application/sarif+json`,\nthe response contains the analysis data that was uploaded.\nThis is formatted as\n[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).\n\n**Deprecation notice**:\nThe `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.",
Copy file name to clipboardExpand all lines: descriptions/api.github.com/api.github.com.yaml
+24-7Lines changed: 24 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -12439,19 +12439,29 @@ paths:
12439
12439
- internal
12440
12440
security_and_analysis:
12441
12441
type: object
12442
-
description: Specify which security and analysis features to enable
12443
-
or disable.
12442
+
description: 'Specify which security and analysis features to enable
12443
+
or disable. For example, to enable GitHub Advanced Security, use
12444
+
this data in the body of the PATCH request: `{"security_and_analysis":
12445
+
{"advanced_security": {"status": "enabled"}}}`. If you have admin
12446
+
permissions for a private repository covered by an Advanced Security
12447
+
license, you can check which security and analysis features are
12448
+
currently enabled by using a `GET /repos/{owner}/{repo}` request.'
12444
12449
nullable: true
12445
12450
properties:
12446
12451
advanced_security:
12447
12452
type: object
12448
12453
description: Use the `status` property to enable or disable
12449
12454
GitHub Advanced Security for this repository. For more information,
12450
12455
see "[About GitHub Advanced Security](/github/getting-started-with-github/learning-about-github/about-github-advanced-security)."
12451
-
If you're an admin user for a repository covered by an Advanced
12452
-
Security license, you can check whether Advanced Security
12453
-
is currently enabled by using a `GET /repos/{owner}/{repo}`
12454
-
request.
12456
+
properties:
12457
+
status:
12458
+
type: string
12459
+
description: Can be `enabled` or `disabled`.
12460
+
secret_scanning:
12461
+
type: object
12462
+
description: Use the `status` property to enable or disable
12463
+
secret scanning for this repository. For more information,
12464
+
see "[About secret scanning](/code-security/secret-security/about-secret-scanning)."
12455
12465
properties:
12456
12466
status:
12457
12467
type: string
@@ -17392,7 +17402,6 @@ paths:
17392
17402
the response contains the analysis data that was uploaded.
17393
17403
This is formatted as
17394
17404
[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).
17395
-
For an example response, see "[Custom media type for code scanning](#custom-media-type-for-code-scanning)."
17396
17405
17397
17406
**Deprecation notice**:
17398
17407
The `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.
Copy file name to clipboardExpand all lines: descriptions/api.github.com/dereferenced/api.github.com.deref.json
+49-3Lines changed: 49 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -115022,6 +115022,18 @@
115022
115022
]
115023
115023
}
115024
115024
}
115025
+
},
115026
+
"secret_scanning": {
115027
+
"type": "object",
115028
+
"properties": {
115029
+
"status": {
115030
+
"type": "string",
115031
+
"enum": [
115032
+
"enabled",
115033
+
"disabled"
115034
+
]
115035
+
}
115036
+
}
115025
115037
}
115026
115038
}
115027
115039
}
@@ -116289,12 +116301,22 @@
116289
116301
},
116290
116302
"security_and_analysis": {
116291
116303
"type": "object",
116292
-
"description": "Specify which security and analysis features to enable or disable.",
116304
+
"description": "Specify which security and analysis features to enable or disable. For example, to enable GitHub Advanced Security, use this data in the body of the PATCH request: `{\"security_and_analysis\": {\"advanced_security\": {\"status\": \"enabled\"}}}`. If you have admin permissions for a private repository covered by an Advanced Security license, you can check which security and analysis features are currently enabled by using a `GET /repos/{owner}/{repo}` request.",
116293
116305
"nullable": true,
116294
116306
"properties": {
116295
116307
"advanced_security": {
116296
116308
"type": "object",
116297
-
"description": "Use the `status` property to enable or disable GitHub Advanced Security for this repository. For more information, see \"[About GitHub Advanced Security](/github/getting-started-with-github/learning-about-github/about-github-advanced-security).\" If you're an admin user for a repository covered by an Advanced Security license, you can check whether Advanced Security is currently enabled by using a `GET /repos/{owner}/{repo}` request.",
116309
+
"description": "Use the `status` property to enable or disable GitHub Advanced Security for this repository. For more information, see \"[About GitHub Advanced Security](/github/getting-started-with-github/learning-about-github/about-github-advanced-security).\"",
116310
+
"properties": {
116311
+
"status": {
116312
+
"type": "string",
116313
+
"description": "Can be `enabled` or `disabled`."
116314
+
}
116315
+
}
116316
+
},
116317
+
"secret_scanning": {
116318
+
"type": "object",
116319
+
"description": "Use the `status` property to enable or disable secret scanning for this repository. For more information, see \"[About secret scanning](/code-security/secret-security/about-secret-scanning).\"",
"summary": "Get a code scanning analysis for a repository",
171896
-
"description": "Gets a specified code scanning analysis for a repository.\nYou must use an access token with the `security_events` scope to use this endpoint.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\nThe default JSON response contains fields that describe the analysis.\nThis includes the Git reference and commit SHA to which the analysis relates,\nthe datetime of the analysis, the name of the code scanning tool,\nand the number of alerts.\n\nThe `rules_count` field in the default response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nIf you use the Accept header `application/sarif+json`,\nthe response contains the analysis data that was uploaded.\nThis is formatted as\n[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).\nFor an example response, see \"[Custom media type for code scanning](#custom-media-type-for-code-scanning).\"\n\n**Deprecation notice**:\nThe `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.",
171930
+
"description": "Gets a specified code scanning analysis for a repository.\nYou must use an access token with the `security_events` scope to use this endpoint.\nGitHub Apps must have the `security_events` read permission to use this endpoint.\n\nThe default JSON response contains fields that describe the analysis.\nThis includes the Git reference and commit SHA to which the analysis relates,\nthe datetime of the analysis, the name of the code scanning tool,\nand the number of alerts.\n\nThe `rules_count` field in the default response give the number of rules\nthat were run in the analysis.\nFor very old analyses this data is not available,\nand `0` is returned in this field.\n\nIf you use the Accept header `application/sarif+json`,\nthe response contains the analysis data that was uploaded.\nThis is formatted as\n[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).\n\n**Deprecation notice**:\nThe `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.",
Copy file name to clipboardExpand all lines: descriptions/api.github.com/dereferenced/api.github.com.deref.yaml
+24-7Lines changed: 24 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -26498,6 +26498,14 @@ paths:
26498
26498
enum:
26499
26499
- enabled
26500
26500
- disabled
26501
+
secret_scanning:
26502
+
type: object
26503
+
properties:
26504
+
status:
26505
+
type: string
26506
+
enum:
26507
+
- enabled
26508
+
- disabled
26501
26509
required: &217
26502
26510
- archive_url
26503
26511
- assignees_url
@@ -27643,19 +27651,29 @@ paths:
27643
27651
- internal
27644
27652
security_and_analysis:
27645
27653
type: object
27646
-
description: Specify which security and analysis features to enable
27647
-
or disable.
27654
+
description: 'Specify which security and analysis features to enable
27655
+
or disable. For example, to enable GitHub Advanced Security, use
27656
+
this data in the body of the PATCH request: `{"security_and_analysis":
27657
+
{"advanced_security": {"status": "enabled"}}}`. If you have admin
27658
+
permissions for a private repository covered by an Advanced Security
27659
+
license, you can check which security and analysis features are
27660
+
currently enabled by using a `GET /repos/{owner}/{repo}` request.'
27648
27661
nullable: true
27649
27662
properties:
27650
27663
advanced_security:
27651
27664
type: object
27652
27665
description: Use the `status` property to enable or disable
27653
27666
GitHub Advanced Security for this repository. For more information,
27654
27667
see "[About GitHub Advanced Security](/github/getting-started-with-github/learning-about-github/about-github-advanced-security)."
27655
-
If you're an admin user for a repository covered by an Advanced
27656
-
Security license, you can check whether Advanced Security
27657
-
is currently enabled by using a `GET /repos/{owner}/{repo}`
27658
-
request.
27668
+
properties:
27669
+
status:
27670
+
type: string
27671
+
description: Can be `enabled` or `disabled`.
27672
+
secret_scanning:
27673
+
type: object
27674
+
description: Use the `status` property to enable or disable
27675
+
secret scanning for this repository. For more information,
27676
+
see "[About secret scanning](/code-security/secret-security/about-secret-scanning)."
27659
27677
properties:
27660
27678
status:
27661
27679
type: string
@@ -39006,7 +39024,6 @@ paths:
39006
39024
the response contains the analysis data that was uploaded.
39007
39025
This is formatted as
39008
39026
[SARIF version 2.1.0](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html).
39009
-
For an example response, see "[Custom media type for code scanning](#custom-media-type-for-code-scanning)."
39010
39027
39011
39028
**Deprecation notice**:
39012
39029
The `tool_name` field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the `tool` field.
0 commit comments