diff --git a/descriptions/api.github.com/api.github.com.2022-11-28.json b/descriptions/api.github.com/api.github.com.2022-11-28.json index cc9913a953..33c92f6956 100644 --- a/descriptions/api.github.com/api.github.com.2022-11-28.json +++ b/descriptions/api.github.com/api.github.com.2022-11-28.json @@ -47567,6 +47567,54 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "$ref": "#/components/parameters/owner" + }, + { + "$ref": "#/components/parameters/repo" + }, + { + "$ref": "#/components/parameters/ghsa_id" + } + ], + "responses": { + "202": { + "$ref": "#/components/responses/accepted" + }, + "400": { + "$ref": "#/components/responses/bad_request" + }, + "403": { + "$ref": "#/components/responses/forbidden" + }, + "404": { + "$ref": "#/components/responses/not_found" + }, + "422": { + "$ref": "#/components/responses/validation_failed" + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/api.github.com/api.github.com.2022-11-28.yaml b/descriptions/api.github.com/api.github.com.2022-11-28.yaml index c71efb40b7..fa5ae6f6e9 100644 --- a/descriptions/api.github.com/api.github.com.2022-11-28.yaml +++ b/descriptions/api.github.com/api.github.com.2022-11-28.yaml @@ -33884,6 +33884,43 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/ghsa_id" + responses: + '202': + "$ref": "#/components/responses/accepted" + '400': + "$ref": "#/components/responses/bad_request" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + '422': + "$ref": "#/components/responses/validation_failed" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/api.github.com/api.github.com.json b/descriptions/api.github.com/api.github.com.json index cc9913a953..33c92f6956 100644 --- a/descriptions/api.github.com/api.github.com.json +++ b/descriptions/api.github.com/api.github.com.json @@ -47567,6 +47567,54 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "$ref": "#/components/parameters/owner" + }, + { + "$ref": "#/components/parameters/repo" + }, + { + "$ref": "#/components/parameters/ghsa_id" + } + ], + "responses": { + "202": { + "$ref": "#/components/responses/accepted" + }, + "400": { + "$ref": "#/components/responses/bad_request" + }, + "403": { + "$ref": "#/components/responses/forbidden" + }, + "404": { + "$ref": "#/components/responses/not_found" + }, + "422": { + "$ref": "#/components/responses/validation_failed" + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/api.github.com/api.github.com.yaml b/descriptions/api.github.com/api.github.com.yaml index c71efb40b7..fa5ae6f6e9 100644 --- a/descriptions/api.github.com/api.github.com.yaml +++ b/descriptions/api.github.com/api.github.com.yaml @@ -33884,6 +33884,43 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/ghsa_id" + responses: + '202': + "$ref": "#/components/responses/accepted" + '400': + "$ref": "#/components/responses/bad_request" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + '422': + "$ref": "#/components/responses/validation_failed" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json index 0a0872fa4d..f1ce54950a 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.json @@ -378519,6 +378519,253 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the `.git` extension. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "ghsa_id", + "description": "The GHSA (GitHub Security Advisory) identifier of the advisory.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "responses": { + "202": { + "description": "Accepted", + "content": { + "application/json": { + "schema": { + "type": "object" + }, + "examples": { + "default": { + "value": null + } + } + } + } + }, + "400": { + "description": "Bad Request", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + }, + "application/scim+json": { + "schema": { + "title": "Scim Error", + "description": "Scim Error", + "type": "object", + "properties": { + "message": { + "type": "string", + "nullable": true + }, + "documentation_url": { + "type": "string", + "nullable": true + }, + "detail": { + "type": "string", + "nullable": true + }, + "status": { + "type": "integer" + }, + "scimType": { + "type": "string", + "nullable": true + }, + "schemas": { + "type": "array", + "items": { + "type": "string" + } + } + } + } + } + } + }, + "403": { + "description": "Forbidden", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "404": { + "description": "Resource not found", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "422": { + "description": "Validation failed, or the endpoint has been spammed.", + "content": { + "application/json": { + "schema": { + "title": "Validation Error", + "description": "Validation Error", + "type": "object", + "required": [ + "message", + "documentation_url" + ], + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "errors": { + "type": "array", + "items": { + "type": "object", + "required": [ + "code" + ], + "properties": { + "resource": { + "type": "string" + }, + "field": { + "type": "string" + }, + "message": { + "type": "string" + }, + "code": { + "type": "string" + }, + "index": { + "type": "integer" + }, + "value": { + "oneOf": [ + { + "type": "string", + "nullable": true + }, + { + "type": "integer", + "nullable": true + }, + { + "type": "array", + "nullable": true, + "items": { + "type": "string" + } + } + ] + } + } + } + } + } + } + } + } + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml index ba49b6a249..5f7d4f2738 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.2022-11-28.deref.yaml @@ -72153,6 +72153,38 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - *203 + - *204 + - *477 + responses: + '202': *84 + '400': *14 + '403': *28 + '404': *6 + '422': *15 + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.json b/descriptions/api.github.com/dereferenced/api.github.com.deref.json index 0a0872fa4d..f1ce54950a 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.json +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.json @@ -378519,6 +378519,253 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the `.git` extension. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "ghsa_id", + "description": "The GHSA (GitHub Security Advisory) identifier of the advisory.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "responses": { + "202": { + "description": "Accepted", + "content": { + "application/json": { + "schema": { + "type": "object" + }, + "examples": { + "default": { + "value": null + } + } + } + } + }, + "400": { + "description": "Bad Request", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + }, + "application/scim+json": { + "schema": { + "title": "Scim Error", + "description": "Scim Error", + "type": "object", + "properties": { + "message": { + "type": "string", + "nullable": true + }, + "documentation_url": { + "type": "string", + "nullable": true + }, + "detail": { + "type": "string", + "nullable": true + }, + "status": { + "type": "integer" + }, + "scimType": { + "type": "string", + "nullable": true + }, + "schemas": { + "type": "array", + "items": { + "type": "string" + } + } + } + } + } + } + }, + "403": { + "description": "Forbidden", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "404": { + "description": "Resource not found", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "422": { + "description": "Validation failed, or the endpoint has been spammed.", + "content": { + "application/json": { + "schema": { + "title": "Validation Error", + "description": "Validation Error", + "type": "object", + "required": [ + "message", + "documentation_url" + ], + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "errors": { + "type": "array", + "items": { + "type": "object", + "required": [ + "code" + ], + "properties": { + "resource": { + "type": "string" + }, + "field": { + "type": "string" + }, + "message": { + "type": "string" + }, + "code": { + "type": "string" + }, + "index": { + "type": "integer" + }, + "value": { + "oneOf": [ + { + "type": "string", + "nullable": true + }, + { + "type": "integer", + "nullable": true + }, + { + "type": "array", + "nullable": true, + "items": { + "type": "string" + } + } + ] + } + } + } + } + } + } + } + } + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml index ba49b6a249..5f7d4f2738 100644 --- a/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml +++ b/descriptions/api.github.com/dereferenced/api.github.com.deref.yaml @@ -72153,6 +72153,38 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - *203 + - *204 + - *477 + responses: + '202': *84 + '400': *14 + '403': *28 + '404': *6 + '422': *15 + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json index 6cff12bc0a..32817d2531 100644 --- a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json +++ b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.json @@ -395934,6 +395934,253 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the `.git` extension. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "ghsa_id", + "description": "The GHSA (GitHub Security Advisory) identifier of the advisory.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "responses": { + "202": { + "description": "Accepted", + "content": { + "application/json": { + "schema": { + "type": "object" + }, + "examples": { + "default": { + "value": null + } + } + } + } + }, + "400": { + "description": "Bad Request", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + }, + "application/scim+json": { + "schema": { + "title": "Scim Error", + "description": "Scim Error", + "type": "object", + "properties": { + "message": { + "type": "string", + "nullable": true + }, + "documentation_url": { + "type": "string", + "nullable": true + }, + "detail": { + "type": "string", + "nullable": true + }, + "status": { + "type": "integer" + }, + "scimType": { + "type": "string", + "nullable": true + }, + "schemas": { + "type": "array", + "items": { + "type": "string" + } + } + } + } + } + } + }, + "403": { + "description": "Forbidden", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "404": { + "description": "Resource not found", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "422": { + "description": "Validation failed, or the endpoint has been spammed.", + "content": { + "application/json": { + "schema": { + "title": "Validation Error", + "description": "Validation Error", + "type": "object", + "required": [ + "message", + "documentation_url" + ], + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "errors": { + "type": "array", + "items": { + "type": "object", + "required": [ + "code" + ], + "properties": { + "resource": { + "type": "string" + }, + "field": { + "type": "string" + }, + "message": { + "type": "string" + }, + "code": { + "type": "string" + }, + "index": { + "type": "integer" + }, + "value": { + "oneOf": [ + { + "type": "string", + "nullable": true + }, + { + "type": "integer", + "nullable": true + }, + { + "type": "array", + "nullable": true, + "items": { + "type": "string" + } + } + ] + } + } + } + } + } + } + } + } + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml index 98be3f1e07..d7a74c21ed 100644 --- a/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml +++ b/descriptions/ghec/dereferenced/ghec.2022-11-28.deref.yaml @@ -77440,6 +77440,38 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - *261 + - *262 + - *521 + responses: + '202': *113 + '400': *14 + '403': *28 + '404': *6 + '422': *15 + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/ghec/dereferenced/ghec.deref.json b/descriptions/ghec/dereferenced/ghec.deref.json index 6cff12bc0a..32817d2531 100644 --- a/descriptions/ghec/dereferenced/ghec.deref.json +++ b/descriptions/ghec/dereferenced/ghec.deref.json @@ -395934,6 +395934,253 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the `.git` extension. The name is not case sensitive.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "ghsa_id", + "description": "The GHSA (GitHub Security Advisory) identifier of the advisory.", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + } + ], + "responses": { + "202": { + "description": "Accepted", + "content": { + "application/json": { + "schema": { + "type": "object" + }, + "examples": { + "default": { + "value": null + } + } + } + } + }, + "400": { + "description": "Bad Request", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + }, + "application/scim+json": { + "schema": { + "title": "Scim Error", + "description": "Scim Error", + "type": "object", + "properties": { + "message": { + "type": "string", + "nullable": true + }, + "documentation_url": { + "type": "string", + "nullable": true + }, + "detail": { + "type": "string", + "nullable": true + }, + "status": { + "type": "integer" + }, + "scimType": { + "type": "string", + "nullable": true + }, + "schemas": { + "type": "array", + "items": { + "type": "string" + } + } + } + } + } + } + }, + "403": { + "description": "Forbidden", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "404": { + "description": "Resource not found", + "content": { + "application/json": { + "schema": { + "title": "Basic Error", + "description": "Basic Error", + "type": "object", + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "url": { + "type": "string" + }, + "status": { + "type": "string" + } + } + } + } + } + }, + "422": { + "description": "Validation failed, or the endpoint has been spammed.", + "content": { + "application/json": { + "schema": { + "title": "Validation Error", + "description": "Validation Error", + "type": "object", + "required": [ + "message", + "documentation_url" + ], + "properties": { + "message": { + "type": "string" + }, + "documentation_url": { + "type": "string" + }, + "errors": { + "type": "array", + "items": { + "type": "object", + "required": [ + "code" + ], + "properties": { + "resource": { + "type": "string" + }, + "field": { + "type": "string" + }, + "message": { + "type": "string" + }, + "code": { + "type": "string" + }, + "index": { + "type": "integer" + }, + "value": { + "oneOf": [ + { + "type": "string", + "nullable": true + }, + { + "type": "integer", + "nullable": true + }, + { + "type": "array", + "nullable": true, + "items": { + "type": "string" + } + } + ] + } + } + } + } + } + } + } + } + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/ghec/dereferenced/ghec.deref.yaml b/descriptions/ghec/dereferenced/ghec.deref.yaml index 98be3f1e07..d7a74c21ed 100644 --- a/descriptions/ghec/dereferenced/ghec.deref.yaml +++ b/descriptions/ghec/dereferenced/ghec.deref.yaml @@ -77440,6 +77440,38 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - *261 + - *262 + - *521 + responses: + '202': *113 + '400': *14 + '403': *28 + '404': *6 + '422': *15 + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/ghec/ghec.2022-11-28.json b/descriptions/ghec/ghec.2022-11-28.json index 01de267cbe..d97aa92fd0 100644 --- a/descriptions/ghec/ghec.2022-11-28.json +++ b/descriptions/ghec/ghec.2022-11-28.json @@ -52552,6 +52552,54 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "$ref": "#/components/parameters/owner" + }, + { + "$ref": "#/components/parameters/repo" + }, + { + "$ref": "#/components/parameters/ghsa_id" + } + ], + "responses": { + "202": { + "$ref": "#/components/responses/accepted" + }, + "400": { + "$ref": "#/components/responses/bad_request" + }, + "403": { + "$ref": "#/components/responses/forbidden" + }, + "404": { + "$ref": "#/components/responses/not_found" + }, + "422": { + "$ref": "#/components/responses/validation_failed" + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/ghec/ghec.2022-11-28.yaml b/descriptions/ghec/ghec.2022-11-28.yaml index c6d3b46d75..99b9d8eea9 100644 --- a/descriptions/ghec/ghec.2022-11-28.yaml +++ b/descriptions/ghec/ghec.2022-11-28.yaml @@ -37497,6 +37497,43 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/ghsa_id" + responses: + '202': + "$ref": "#/components/responses/accepted" + '400': + "$ref": "#/components/responses/bad_request" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + '422': + "$ref": "#/components/responses/validation_failed" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/ghec/ghec.json b/descriptions/ghec/ghec.json index 01de267cbe..d97aa92fd0 100644 --- a/descriptions/ghec/ghec.json +++ b/descriptions/ghec/ghec.json @@ -52552,6 +52552,54 @@ } } }, + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": { + "post": { + "summary": "Request a CVE for a repository security advisory", + "description": "If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see \"[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional).\"\n\nYou may request a CVE for public repositories, but cannot do so for private repositories.\n\nYou must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint.\n\nIn order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository.", + "tags": [ + "security-advisories" + ], + "operationId": "security-advisories/create-repository-advisory-cve-request", + "externalDocs": { + "description": "API method documentation", + "url": "https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory" + }, + "parameters": [ + { + "$ref": "#/components/parameters/owner" + }, + { + "$ref": "#/components/parameters/repo" + }, + { + "$ref": "#/components/parameters/ghsa_id" + } + ], + "responses": { + "202": { + "$ref": "#/components/responses/accepted" + }, + "400": { + "$ref": "#/components/responses/bad_request" + }, + "403": { + "$ref": "#/components/responses/forbidden" + }, + "404": { + "$ref": "#/components/responses/not_found" + }, + "422": { + "$ref": "#/components/responses/validation_failed" + } + }, + "x-github": { + "githubCloudOnly": false, + "enabledForGitHubApps": true, + "category": "security-advisories", + "subcategory": "repository-advisories" + } + } + }, "/repos/{owner}/{repo}/stargazers": { "get": { "summary": "List stargazers", diff --git a/descriptions/ghec/ghec.yaml b/descriptions/ghec/ghec.yaml index c6d3b46d75..99b9d8eea9 100644 --- a/descriptions/ghec/ghec.yaml +++ b/descriptions/ghec/ghec.yaml @@ -37497,6 +37497,43 @@ paths: enabledForGitHubApps: true category: security-advisories subcategory: repository-advisories + "/repos/{owner}/{repo}/security-advisories/{ghsa_id}/cve": + post: + summary: Request a CVE for a repository security advisory + description: |- + If you want a CVE identification number for the security vulnerability in your project, and don't already have one, you can request a CVE identification number from GitHub. For more information see "[Requesting a CVE identification number](https://docs.github.com/enterprise-cloud@latest//code-security/security-advisories/repository-security-advisories/publishing-a-repository-security-advisory#requesting-a-cve-identification-number-optional)." + + You may request a CVE for public repositories, but cannot do so for private repositories. + + You must authenticate using an access token with the `repo` scope or `repository_advisories:write` permission to use this endpoint. + + In order to request a CVE for a repository security advisory, you must be a security manager or administrator of that repository. + tags: + - security-advisories + operationId: security-advisories/create-repository-advisory-cve-request + externalDocs: + description: API method documentation + url: https://docs.github.com/enterprise-cloud@latest//rest/security-advisories/repository-advisories#request-a-cve-for-a-repository-security-advisory + parameters: + - "$ref": "#/components/parameters/owner" + - "$ref": "#/components/parameters/repo" + - "$ref": "#/components/parameters/ghsa_id" + responses: + '202': + "$ref": "#/components/responses/accepted" + '400': + "$ref": "#/components/responses/bad_request" + '403': + "$ref": "#/components/responses/forbidden" + '404': + "$ref": "#/components/responses/not_found" + '422': + "$ref": "#/components/responses/validation_failed" + x-github: + githubCloudOnly: false + enabledForGitHubApps: true + category: security-advisories + subcategory: repository-advisories "/repos/{owner}/{repo}/stargazers": get: summary: List stargazers diff --git a/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.json b/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.json index ab9b4aeb28..324c3f2c9c 100644 --- a/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.json +++ b/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.json @@ -57539,8 +57539,8 @@ }, "/manage/v1/config/nodes": { "get": { - "summary": "Get all GHES node metadata for all nodes", - "description": "Get all node metadata for existing nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", + "summary": "Get GHES node metadata for all nodes", + "description": "Get node metadata for all configured nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", "operationId": "enterprise-admin/get-config-nodes", "tags": [ "enterprise-admin" @@ -57611,6 +57611,9 @@ "uuid": { "type": "string" }, + "replica": { + "type": "boolean" + }, "cluster_roles": { "type": "array", "items": { @@ -57672,6 +57675,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -57858,6 +57864,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -57980,6 +57989,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { diff --git a/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.yaml b/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.yaml index 5471ce283c..84a1ad6f97 100644 --- a/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.yaml +++ b/descriptions/ghes-3.9/dereferenced/ghes-3.9.2022-11-28.deref.yaml @@ -17044,8 +17044,8 @@ paths: subcategory: licenses "/manage/v1/config/nodes": get: - summary: Get all GHES node metadata for all nodes - description: Get all node metadata for existing nodes in the current cluster. + summary: Get GHES node metadata for all nodes + description: Get node metadata for all configured nodes in the current cluster. For more information, see "[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering)." operationId: enterprise-admin/get-config-nodes tags: @@ -17100,6 +17100,8 @@ paths: type: string uuid: type: string + replica: + type: boolean cluster_roles: type: array items: @@ -17140,6 +17142,8 @@ paths: - PagesServer '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -17240,6 +17244,8 @@ paths: details: replication is in sync '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -17314,6 +17320,8 @@ paths: build_date: '2023-05-02' '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false diff --git a/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.json b/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.json index ab9b4aeb28..324c3f2c9c 100644 --- a/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.json +++ b/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.json @@ -57539,8 +57539,8 @@ }, "/manage/v1/config/nodes": { "get": { - "summary": "Get all GHES node metadata for all nodes", - "description": "Get all node metadata for existing nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", + "summary": "Get GHES node metadata for all nodes", + "description": "Get node metadata for all configured nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", "operationId": "enterprise-admin/get-config-nodes", "tags": [ "enterprise-admin" @@ -57611,6 +57611,9 @@ "uuid": { "type": "string" }, + "replica": { + "type": "boolean" + }, "cluster_roles": { "type": "array", "items": { @@ -57672,6 +57675,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -57858,6 +57864,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -57980,6 +57989,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { diff --git a/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.yaml b/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.yaml index 5471ce283c..84a1ad6f97 100644 --- a/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.yaml +++ b/descriptions/ghes-3.9/dereferenced/ghes-3.9.deref.yaml @@ -17044,8 +17044,8 @@ paths: subcategory: licenses "/manage/v1/config/nodes": get: - summary: Get all GHES node metadata for all nodes - description: Get all node metadata for existing nodes in the current cluster. + summary: Get GHES node metadata for all nodes + description: Get node metadata for all configured nodes in the current cluster. For more information, see "[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering)." operationId: enterprise-admin/get-config-nodes tags: @@ -17100,6 +17100,8 @@ paths: type: string uuid: type: string + replica: + type: boolean cluster_roles: type: array items: @@ -17140,6 +17142,8 @@ paths: - PagesServer '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -17240,6 +17244,8 @@ paths: details: replication is in sync '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -17314,6 +17320,8 @@ paths: build_date: '2023-05-02' '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false diff --git a/descriptions/ghes-3.9/ghes-3.9.2022-11-28.json b/descriptions/ghes-3.9/ghes-3.9.2022-11-28.json index 883c13d4c9..b67b6b3105 100644 --- a/descriptions/ghes-3.9/ghes-3.9.2022-11-28.json +++ b/descriptions/ghes-3.9/ghes-3.9.2022-11-28.json @@ -9322,8 +9322,8 @@ }, "/manage/v1/config/nodes": { "get": { - "summary": "Get all GHES node metadata for all nodes", - "description": "Get all node metadata for existing nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", + "summary": "Get GHES node metadata for all nodes", + "description": "Get node metadata for all configured nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", "operationId": "enterprise-admin/get-config-nodes", "tags": [ "enterprise-admin" @@ -9373,6 +9373,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -9436,6 +9439,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -9499,6 +9505,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -91225,6 +91234,9 @@ "uuid": { "type": "string" }, + "replica": { + "type": "boolean" + }, "cluster_roles": { "type": "array", "items": { diff --git a/descriptions/ghes-3.9/ghes-3.9.2022-11-28.yaml b/descriptions/ghes-3.9/ghes-3.9.2022-11-28.yaml index 5196f1fdc0..9fc5b8495e 100644 --- a/descriptions/ghes-3.9/ghes-3.9.2022-11-28.yaml +++ b/descriptions/ghes-3.9/ghes-3.9.2022-11-28.yaml @@ -6475,8 +6475,8 @@ paths: subcategory: licenses "/manage/v1/config/nodes": get: - summary: Get all GHES node metadata for all nodes - description: Get all node metadata for existing nodes in the current cluster. + summary: Get GHES node metadata for all nodes + description: Get node metadata for all configured nodes in the current cluster. For more information, see "[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering)." operationId: enterprise-admin/get-config-nodes tags: @@ -6508,6 +6508,8 @@ paths: "$ref": "#/components/examples/ghes-config-nodes" '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -6549,6 +6551,8 @@ paths: "$ref": "#/components/examples/ghes-replication-status" '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -6590,6 +6594,8 @@ paths: "$ref": "#/components/examples/ghes-version" '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -65179,6 +65185,8 @@ components: type: string uuid: type: string + replica: + type: boolean cluster_roles: type: array items: diff --git a/descriptions/ghes-3.9/ghes-3.9.json b/descriptions/ghes-3.9/ghes-3.9.json index 883c13d4c9..b67b6b3105 100644 --- a/descriptions/ghes-3.9/ghes-3.9.json +++ b/descriptions/ghes-3.9/ghes-3.9.json @@ -9322,8 +9322,8 @@ }, "/manage/v1/config/nodes": { "get": { - "summary": "Get all GHES node metadata for all nodes", - "description": "Get all node metadata for existing nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", + "summary": "Get GHES node metadata for all nodes", + "description": "Get node metadata for all configured nodes in the current cluster. For more information, see \"[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering).\"", "operationId": "enterprise-admin/get-config-nodes", "tags": [ "enterprise-admin" @@ -9373,6 +9373,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -9436,6 +9439,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -9499,6 +9505,9 @@ }, "401": { "description": "Unauthorized" + }, + "500": { + "description": "Internal error" } }, "x-github": { @@ -91225,6 +91234,9 @@ "uuid": { "type": "string" }, + "replica": { + "type": "boolean" + }, "cluster_roles": { "type": "array", "items": { diff --git a/descriptions/ghes-3.9/ghes-3.9.yaml b/descriptions/ghes-3.9/ghes-3.9.yaml index 5196f1fdc0..9fc5b8495e 100644 --- a/descriptions/ghes-3.9/ghes-3.9.yaml +++ b/descriptions/ghes-3.9/ghes-3.9.yaml @@ -6475,8 +6475,8 @@ paths: subcategory: licenses "/manage/v1/config/nodes": get: - summary: Get all GHES node metadata for all nodes - description: Get all node metadata for existing nodes in the current cluster. + summary: Get GHES node metadata for all nodes + description: Get node metadata for all configured nodes in the current cluster. For more information, see "[About clustering](https://docs.github.com/enterprise-server@3.9/admin/enterprise-management/configuring-clustering/about-clustering)." operationId: enterprise-admin/get-config-nodes tags: @@ -6508,6 +6508,8 @@ paths: "$ref": "#/components/examples/ghes-config-nodes" '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -6549,6 +6551,8 @@ paths: "$ref": "#/components/examples/ghes-replication-status" '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -6590,6 +6594,8 @@ paths: "$ref": "#/components/examples/ghes-version" '401': description: Unauthorized + '500': + description: Internal error x-github: githubCloudOnly: false enabledForGitHubApps: false @@ -65179,6 +65185,8 @@ components: type: string uuid: type: string + replica: + type: boolean cluster_roles: type: array items: