Skip to content

Commit

Permalink
Merge pull request #15323 from github/repo-sync
Browse files Browse the repository at this point in the history
repo sync
  • Loading branch information
Octomerger authored Feb 10, 2022
2 parents 2659ea3 + ecf2e21 commit 6603024
Show file tree
Hide file tree
Showing 4 changed files with 15 additions and 15 deletions.
16 changes: 8 additions & 8 deletions lib/rest/static/decorated/api.git.luolix.top.json
Original file line number Diff line number Diff line change
Expand Up @@ -19557,7 +19557,7 @@
},
{
"name": "state",
"description": "Set to `open`, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"description": "Set to `open`, `closed, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"in": "query",
"required": false,
"schema": {
Expand All @@ -19570,7 +19570,7 @@
"fixed"
]
},
"descriptionHTML": "<p>Set to <code>open</code>, <code>fixed</code>, or <code>dismissed</code> to list code scanning alerts in a specific state.</p>"
"descriptionHTML": "<p>Set to <code>open</code>, <code>closed, </code>fixed<code>, or </code>dismissed` to list code scanning alerts in a specific state.</p>"
},
{
"name": "sort",
Expand Down Expand Up @@ -19601,7 +19601,7 @@
}
],
"summary": "List code scanning alerts for an organization",
"description": "Lists all code scanning alerts for the default branch (usually `main`\nor `master`) for all eligible repositories in an organization.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `code_scanning_alerts` read permission to use this endpoint.",
"description": "Lists all code scanning alerts for the default branch (usually `main`\nor `master`) for all eligible repositories in an organization.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `security_events` read permission to use this endpoint.",
"tags": [
"code-scanning"
],
Expand All @@ -19621,7 +19621,7 @@
"categoryLabel": "Code scanning",
"notes": [],
"bodyParameters": [],
"descriptionHTML": "<p>Lists all code scanning alerts for the default branch (usually <code>main</code>\nor <code>master</code>) for all eligible repositories in an organization.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>code_scanning_alerts</code> read permission to use this endpoint.</p>",
"descriptionHTML": "<p>Lists all code scanning alerts for the default branch (usually <code>main</code>\nor <code>master</code>) for all eligible repositories in an organization.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>security_events</code> read permission to use this endpoint.</p>",
"responses": [
{
"httpStatusCode": "200",
Expand Down Expand Up @@ -27287,7 +27287,7 @@
}
],
"summary": "List secret scanning alerts for an organization",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],
Expand All @@ -27307,7 +27307,7 @@
"categoryLabel": "Secret scanning",
"notes": [],
"bodyParameters": [],
"descriptionHTML": "<p>Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"descriptionHTML": "<p>Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"responses": [
{
"httpStatusCode": "200",
Expand Down Expand Up @@ -51916,7 +51916,7 @@
},
{
"name": "state",
"description": "Set to `open`, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"description": "Set to `open`, `closed, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"in": "query",
"required": false,
"schema": {
Expand All @@ -51929,7 +51929,7 @@
"fixed"
]
},
"descriptionHTML": "<p>Set to <code>open</code>, <code>fixed</code>, or <code>dismissed</code> to list code scanning alerts in a specific state.</p>"
"descriptionHTML": "<p>Set to <code>open</code>, <code>closed, </code>fixed<code>, or </code>dismissed` to list code scanning alerts in a specific state.</p>"
}
],
"x-codeSamples": [
Expand Down
4 changes: 2 additions & 2 deletions lib/rest/static/decorated/ghes-3.3.json
Original file line number Diff line number Diff line change
Expand Up @@ -25883,7 +25883,7 @@
}
],
"summary": "List secret scanning alerts for an organization",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],
Expand All @@ -25903,7 +25903,7 @@
"categoryLabel": "Secret scanning",
"notes": [],
"bodyParameters": [],
"descriptionHTML": "<p>Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"descriptionHTML": "<p>Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the <code>repo</code> scope or <code>security_events</code> scope.</p>\n<p>GitHub Apps must have the <code>secret_scanning_alerts</code> read permission to use this endpoint.</p>",
"responses": [
{
"httpStatusCode": "200",
Expand Down
8 changes: 4 additions & 4 deletions lib/rest/static/dereferenced/api.git.luolix.top.deref.json
Original file line number Diff line number Diff line change
Expand Up @@ -67410,7 +67410,7 @@
"/orgs/{org}/code-scanning/alerts": {
"get": {
"summary": "List code scanning alerts for an organization",
"description": "Lists all code scanning alerts for the default branch (usually `main`\nor `master`) for all eligible repositories in an organization.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `code_scanning_alerts` read permission to use this endpoint.",
"description": "Lists all code scanning alerts for the default branch (usually `main`\nor `master`) for all eligible repositories in an organization.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `security_events` read permission to use this endpoint.",
"tags": [
"code-scanning"
],
Expand Down Expand Up @@ -67480,7 +67480,7 @@
},
{
"name": "state",
"description": "Set to `open`, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"description": "Set to `open`, `closed, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"in": "query",
"required": false,
"schema": {
Expand Down Expand Up @@ -102979,7 +102979,7 @@
"/orgs/{org}/secret-scanning/alerts": {
"get": {
"summary": "List secret scanning alerts for an organization",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],
Expand Down Expand Up @@ -191528,7 +191528,7 @@
},
{
"name": "state",
"description": "Set to `open`, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"description": "Set to `open`, `closed, `fixed`, or `dismissed` to list code scanning alerts in a specific state.",
"in": "query",
"required": false,
"schema": {
Expand Down
2 changes: 1 addition & 1 deletion lib/rest/static/dereferenced/ghes-3.3.deref.json
Original file line number Diff line number Diff line change
Expand Up @@ -84228,7 +84228,7 @@
"/orgs/{org}/secret-scanning/alerts": {
"get": {
"summary": "List secret scanning alerts for an organization",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"description": "Lists secret scanning alerts for eligible repositories in an organization, from newest to oldest.\nTo use this endpoint, you must be an administrator or security manager for the organization, and you must use an access token with the `repo` scope or `security_events` scope.\n\nGitHub Apps must have the `secret_scanning_alerts` read permission to use this endpoint.",
"tags": [
"secret-scanning"
],
Expand Down

0 comments on commit 6603024

Please sign in to comment.