Skip to content

Commit 0a8fdd9

Browse files
authored
feat: new Projects v2 endpoints, new code scanning dismissal endpoints, many other endpoints (#814)
1 parent a60572f commit 0a8fdd9

File tree

95 files changed

+7399
-1463
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+7399
-1463
lines changed

docs/actions/setGithubActionsPermissionsOrganization.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@ The policy that controls the repositories in the organization that are allowed t
4444

4545
The permissions policy that controls the actions and reusable workflows that are allowed to run.
4646

47+
</td></tr>
48+
<tr><td>sha_pinning_required</td><td>no</td><td>
49+
50+
Whether actions must be pinned to a full-length commit SHA.
51+
4752
</td></tr>
4853
</tbody>
4954
</table>

docs/actions/setGithubActionsPermissionsRepository.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,11 @@ Whether GitHub Actions is enabled on the repository.
5050

5151
The permissions policy that controls the actions and reusable workflows that are allowed to run.
5252

53+
</td></tr>
54+
<tr><td>sha_pinning_required</td><td>no</td><td>
55+
56+
Whether actions must be pinned to a full-length commit SHA.
57+
5358
</td></tr>
5459
</tbody>
5560
</table>

docs/apps/deleteInstallation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ type: API method
88

99
# Delete an installation for the authenticated app
1010

11-
Uninstalls a GitHub App on a user, organization, or business account. If you prefer to temporarily suspend an app's access to your account's resources, then we recommend the "[Suspend an app installation](https://docs.github.com/rest/apps/apps#suspend-an-app-installation)" endpoint.
11+
Uninstalls a GitHub App on a user, organization, or enterprise account. If you prefer to temporarily suspend an app's access to your account's resources, then we recommend the "[Suspend an app installation](https://docs.github.com/rest/apps/apps#suspend-an-app-installation)" endpoint.
1212

1313
You must use a [JWT](https://docs.github.com/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app) to access this endpoint.
1414

docs/apps/suspendInstallation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ type: API method
88

99
# Suspend an app installation
1010

11-
Suspends a GitHub App on a user, organization, or business account, which blocks the app from accessing the account's resources. When a GitHub App is suspended, the app's access to the GitHub API or webhook events is blocked for that account.
11+
Suspends a GitHub App on a user, organization, or enterprise account, which blocks the app from accessing the account's resources. When a GitHub App is suspended, the app's access to the GitHub API or webhook events is blocked for that account.
1212

1313
You must use a [JWT](https://docs.github.com/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app) to access this endpoint.
1414

docs/codeScanning/updateDefaultSetup.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,11 @@ Runner label to be used if the runner type is labeled.
5959

6060
CodeQL query suite to be used.
6161

62+
</td></tr>
63+
<tr><td>threat_model</td><td>no</td><td>
64+
65+
Threat model to be used for code scanning analysis. Use `remote` to analyze only network sources and `remote_and_local` to include local sources like filesystem access, command-line arguments, database reads, environment variable and standard input.
66+
6267
</td></tr>
6368
<tr><td>languages</td><td>no</td><td>
6469

docs/codeSecurity/attachEnterpriseConfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ octokit.rest.codeSecurity.attachEnterpriseConfiguration({
3737
<tbody>
3838
<tr><td>enterprise</td><td>yes</td><td>
3939

40-
The slug version of the enterprise name. You can also substitute this value with the enterprise id.
40+
The slug version of the enterprise name.
4141

4242
</td></tr>
4343
<tr><td>configuration_id</td><td>yes</td><td>

docs/codeSecurity/createConfiguration.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,13 @@ A description of the code security configuration
5454

5555
The enablement status of GitHub Advanced Security features. `enabled` will enable both Code Security and Secret Protection features.
5656

57+
> [!WARNING] > `code_security` and `secret_protection` are deprecated values for this field. Prefer the individual `code_security` and `secret_protection` fields to set the status of these features.
58+
59+
</td></tr>
60+
<tr><td>code_security</td><td>no</td><td>
61+
62+
The enablement status of GitHub Code Security features.
63+
5764
</td></tr>
5865
<tr><td>dependency_graph</td><td>no</td><td>
5966

@@ -84,6 +91,16 @@ The enablement status of Dependabot alerts
8491

8592
The enablement status of Dependabot security updates
8693

94+
</td></tr>
95+
<tr><td>code_scanning_options</td><td>no</td><td>
96+
97+
Security Configuration feature options for code scanning
98+
99+
</td></tr>
100+
<tr><td>code_scanning_options.allow_advanced</td><td>no</td><td>
101+
102+
Whether to allow repos which use advanced setup
103+
87104
</td></tr>
88105
<tr><td>code_scanning_default_setup</td><td>no</td><td>
89106

@@ -109,6 +126,11 @@ The label of the runner to use for code scanning default setup when runner_type
109126

110127
The enablement status of code scanning delegated alert dismissal
111128

129+
</td></tr>
130+
<tr><td>secret_protection</td><td>no</td><td>
131+
132+
The enablement status of GitHub Secret Protection features.
133+
112134
</td></tr>
113135
<tr><td>secret_scanning</td><td>no</td><td>
114136

docs/codeSecurity/createConfigurationForEnterprise.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ octokit.rest.codeSecurity.createConfigurationForEnterprise({
3535
<tbody>
3636
<tr><td>enterprise</td><td>yes</td><td>
3737

38-
The slug version of the enterprise name. You can also substitute this value with the enterprise id.
38+
The slug version of the enterprise name.
3939

4040
</td></tr>
4141
<tr><td>name</td><td>yes</td><td>
@@ -52,6 +52,13 @@ A description of the code security configuration
5252

5353
The enablement status of GitHub Advanced Security features. `enabled` will enable both Code Security and Secret Protection features.
5454

55+
> [!WARNING] > `code_security` and `secret_protection` are deprecated values for this field. Prefer the individual `code_security` and `secret_protection` fields to set the status of these features.
56+
57+
</td></tr>
58+
<tr><td>code_security</td><td>no</td><td>
59+
60+
The enablement status of GitHub Code Security features.
61+
5562
</td></tr>
5663
<tr><td>dependency_graph</td><td>no</td><td>
5764

@@ -82,6 +89,16 @@ The enablement status of Dependabot alerts
8289

8390
The enablement status of Dependabot security updates
8491

92+
</td></tr>
93+
<tr><td>code_scanning_options</td><td>no</td><td>
94+
95+
Security Configuration feature options for code scanning
96+
97+
</td></tr>
98+
<tr><td>code_scanning_options.allow_advanced</td><td>no</td><td>
99+
100+
Whether to allow repos which use advanced setup
101+
85102
</td></tr>
86103
<tr><td>code_scanning_default_setup</td><td>no</td><td>
87104

@@ -107,6 +124,11 @@ The label of the runner to use for code scanning default setup when runner_type
107124

108125
The enablement status of code scanning delegated alert dismissal
109126

127+
</td></tr>
128+
<tr><td>secret_protection</td><td>no</td><td>
129+
130+
The enablement status of GitHub Secret Protection features.
131+
110132
</td></tr>
111133
<tr><td>secret_scanning</td><td>no</td><td>
112134

docs/codeSecurity/deleteConfigurationForEnterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ octokit.rest.codeSecurity.deleteConfigurationForEnterprise({
3636
<tbody>
3737
<tr><td>enterprise</td><td>yes</td><td>
3838

39-
The slug version of the enterprise name. You can also substitute this value with the enterprise id.
39+
The slug version of the enterprise name.
4040

4141
</td></tr>
4242
<tr><td>configuration_id</td><td>yes</td><td>

docs/codeSecurity/detachConfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The organization name. The name is not case sensitive.
3939
</td></tr>
4040
<tr><td>selected_repository_ids</td><td>no</td><td>
4141

42-
An array of repository IDs to detach from configurations.
42+
An array of repository IDs to detach from configurations. Up to 250 IDs can be provided.
4343

4444
</td></tr>
4545
</tbody>

0 commit comments

Comments
 (0)