Solicitações de dispensa de alerta
Use a API REST para gerenciar solicitações de dispensa de alerta para verificação de segredo.
List alert dismissal requests for secret scanning for an org
Lists requests to dismiss secret scanning alerts in an org.
Delegated alert dismissal must be enabled on repositories in the org and the user must be an org admin, security manager, or have the "Review and manage secret scanning alert dismissal requests" permission to access this endpoint.
Tokens de acesso refinados para "List alert dismissal requests for secret scanning for an org"
Esse ponto de extremidade funciona com os seguintes tipos de token refinados:
- Tokens de acesso de usuário do aplicativo GitHub
- Tokens de acesso à instalação do aplicativo GitHub
- Tokens de acesso pessoal refinados
O token refinado deve ter os seguintes conjuntos de permissões:
- "Secret scanning alert dismissal requests" organization permissions (read) and "Secret scanning alerts" repository permissions (read)
Parâmetros para "List alert dismissal requests for secret scanning for an org"
| Nome, Tipo, Descrição | 
|---|
| acceptstringSetting to  | 
| Nome, Tipo, Descrição | 
|---|
| orgstring ObrigatórioThe organization name. The name is not case sensitive. | 
| Nome, Tipo, Descrição | 
|---|
| repository_namestringThe name of the repository to filter on. | 
| reviewerstringFilter bypass requests by the handle of the GitHub user who reviewed the bypass request. | 
| requesterstringFilter bypass requests by the handle of the GitHub user who requested the bypass. | 
| time_periodstringThe time period to filter by. For example,  Padrão:  Pode ser um dos:  | 
| request_statusstringThe status of the dismissal request to filter on. When specified, only requests with this status will be returned. Padrão:  Pode ser um dos:  | 
| per_pageintegerThe number of results per page (max 100). For more information, see "Using pagination in the REST API." Padrão:  | 
| pageintegerThe page number of the results to fetch. For more information, see "Using pagination in the REST API." Padrão:  | 
Códigos de status de resposta HTTP para "List alert dismissal requests for secret scanning for an org"
| Código de status | Descrição | 
|---|---|
| 200 | A list of the alert dismissal requests. | 
| 403 | Forbidden | 
| 404 | Resource not found | 
| 500 | Internal Error | 
Exemplos de código para "List alert dismissal requests for secret scanning for an org"
Se você acessar o GitHub em GHE.com, substitua api.github.com pelo subdomínio dedicado da sua empresa em api.SUBDOMAIN.ghe.com.
Exemplo de solicitação
curl -L \
  -H "Accept: application/vnd.github+json" \
  -H "Authorization: Bearer <YOUR-TOKEN>" \
  -H "X-GitHub-Api-Version: 2022-11-28" \
  https://api.github.com/orgs/ORG/dismissal-requests/secret-scanningA list of the alert dismissal requests.
Status: 200[
  {
    "id": 21,
    "number": 42,
    "repository": {
      "id": 1,
      "name": "smile",
      "full_name": "octo-org/smile"
    },
    "organization": {
      "id": 1,
      "name": "octo-org"
    },
    "requester": {
      "actor_id": 12,
      "actor_name": "monalisa"
    },
    "request_type": "secret_scanning_closure",
    "data": [
      {
        "secret_type": "adafruit_io_key",
        "alert_number": 17,
        "reason": "false_positive"
      }
    ],
    "resource_identifier": 17,
    "status": "denied",
    "requester_comment": "Test token used in the readme as an example",
    "expires_at": "2024-07-08T08:43:03Z",
    "created_at": "2024-07-01T08:43:03Z",
    "responses": [
      {
        "id": 42,
        "reviewer": {
          "actor_id": 4,
          "actor_name": "octocat"
        },
        "status": "denied",
        "created_at": "2024-07-02T08:43:04Z"
      }
    ],
    "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/secret-scanning/21",
    "html_url": "https://github.com/octo-org/smile/security/secret-scanning/17"
  },
  {
    "id": 22,
    "number": 43,
    "repository": {
      "id": 1,
      "name": "smile",
      "full_name": "octo-org/smile"
    },
    "organization": {
      "id": 1,
      "name": "octo-org"
    },
    "requester": {
      "actor_id": 12,
      "actor_name": "monalisa"
    },
    "request_type": "secret_scanning_closure",
    "data": [
      {
        "secret_type": "adafruit_io_key",
        "alert_number": 19
      }
    ],
    "resource_identifier": 19,
    "status": "denied",
    "requester_comment": "Test token used in the readme as an example",
    "expires_at": "2024-07-08T08:43:03Z",
    "created_at": "2024-07-01T08:43:03Z",
    "responses": [
      {
        "id": 46,
        "reviewer": {
          "actor_id": 4,
          "actor_name": "octocat"
        },
        "status": "approved",
        "created_at": "2024-07-02T08:43:04Z"
      }
    ],
    "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/secret-scanning/22",
    "html_url": "https://github.com/octo-org/smile/security/secret-scanning/19"
  }
]List alert dismissal requests for secret scanning for a repository
Lists requests to dismiss secret scanning alerts in a repository.
Delegated alert dismissal must be enabled on the repository and the user must be an org admin, security manager, or have the "Review and manage secret scanning alert dismissal requests" permission to access this endpoint.
Tokens de acesso refinados para "List alert dismissal requests for secret scanning for a repository"
Esse ponto de extremidade funciona com os seguintes tipos de token refinados:
- Tokens de acesso de usuário do aplicativo GitHub
- Tokens de acesso à instalação do aplicativo GitHub
- Tokens de acesso pessoal refinados
O token refinado deve ter pelo menos um dos seguintes conjuntos de permissões:
- "Secret scanning alerts" repository permissions (read) and "Contents" repository permissions (read) and "Secret scanning alert dismissal requests" repository permissions (read)
- "Secret scanning alerts" repository permissions (read) and "Contents" repository permissions (read) and "Secret scanning alert dismissal requests" organization permissions (read)
Parâmetros para "List alert dismissal requests for secret scanning for a repository"
| Nome, Tipo, Descrição | 
|---|
| acceptstringSetting to  | 
| Nome, Tipo, Descrição | 
|---|
| ownerstring ObrigatórioThe account owner of the repository. The name is not case sensitive. | 
| repostring ObrigatórioThe name of the repository without the  | 
| Nome, Tipo, Descrição | 
|---|
| reviewerstringFilter bypass requests by the handle of the GitHub user who reviewed the bypass request. | 
| requesterstringFilter bypass requests by the handle of the GitHub user who requested the bypass. | 
| time_periodstringThe time period to filter by. For example,  Padrão:  Pode ser um dos:  | 
| request_statusstringThe status of the dismissal request to filter on. When specified, only requests with this status will be returned. Padrão:  Pode ser um dos:  | 
| per_pageintegerThe number of results per page (max 100). For more information, see "Using pagination in the REST API." Padrão:  | 
| pageintegerThe page number of the results to fetch. For more information, see "Using pagination in the REST API." Padrão:  | 
Códigos de status de resposta HTTP para "List alert dismissal requests for secret scanning for a repository"
| Código de status | Descrição | 
|---|---|
| 200 | A list of the alert dismissal requests. | 
| 403 | Forbidden | 
| 404 | Resource not found | 
| 500 | Internal Error | 
Exemplos de código para "List alert dismissal requests for secret scanning for a repository"
Se você acessar o GitHub em GHE.com, substitua api.github.com pelo subdomínio dedicado da sua empresa em api.SUBDOMAIN.ghe.com.
Exemplo de solicitação
curl -L \
  -H "Accept: application/vnd.github+json" \
  -H "Authorization: Bearer <YOUR-TOKEN>" \
  -H "X-GitHub-Api-Version: 2022-11-28" \
  https://api.github.com/repos/OWNER/REPO/dismissal-requests/secret-scanningA list of the alert dismissal requests.
Status: 200[
  {
    "id": 21,
    "number": 42,
    "repository": {
      "id": 1,
      "name": "smile",
      "full_name": "octo-org/smile"
    },
    "organization": {
      "id": 1,
      "name": "octo-org"
    },
    "requester": {
      "actor_id": 12,
      "actor_name": "monalisa"
    },
    "request_type": "secret_scanning_closure",
    "data": [
      {
        "secret_type": "adafruit_io_key",
        "alert_number": 17,
        "reason": "false_positive"
      }
    ],
    "resource_identifier": 17,
    "status": "denied",
    "requester_comment": "Test token used in the readme as an example",
    "expires_at": "2024-07-08T08:43:03Z",
    "created_at": "2024-07-01T08:43:03Z",
    "responses": [
      {
        "id": 42,
        "reviewer": {
          "actor_id": 4,
          "actor_name": "octocat"
        },
        "status": "denied",
        "created_at": "2024-07-02T08:43:04Z"
      }
    ],
    "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/secret-scanning/21",
    "html_url": "https://github.com/octo-org/smile/security/secret-scanning/17"
  },
  {
    "id": 22,
    "number": 43,
    "repository": {
      "id": 1,
      "name": "smile",
      "full_name": "octo-org/smile"
    },
    "organization": {
      "id": 1,
      "name": "octo-org"
    },
    "requester": {
      "actor_id": 12,
      "actor_name": "monalisa"
    },
    "request_type": "secret_scanning_closure",
    "data": [
      {
        "secret_type": "adafruit_io_key",
        "alert_number": 19
      }
    ],
    "resource_identifier": 19,
    "status": "denied",
    "requester_comment": "Test token used in the readme as an example",
    "expires_at": "2024-07-08T08:43:03Z",
    "created_at": "2024-07-01T08:43:03Z",
    "responses": [
      {
        "id": 46,
        "reviewer": {
          "actor_id": 4,
          "actor_name": "octocat"
        },
        "status": "approved",
        "created_at": "2024-07-02T08:43:04Z"
      }
    ],
    "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/secret-scanning/22",
    "html_url": "https://github.com/octo-org/smile/security/secret-scanning/19"
  }
]Get an alert dismissal request for secret scanning
Gets a specific request to dismiss a secret scanning alert in a repository.
Delegated alert dismissal must be enabled on the repository and the user must be an org admin, security manager,
or have the "Review and manage secret scanning alert dismissal requests" permission to access this endpoint.
Personal access tokens (classic) need the security_events scope to use this endpoint.
Tokens de acesso refinados para "Get an alert dismissal request for secret scanning"
Esse ponto de extremidade funciona com os seguintes tipos de token refinados:
- Tokens de acesso de usuário do aplicativo GitHub
- Tokens de acesso à instalação do aplicativo GitHub
- Tokens de acesso pessoal refinados
O token refinado deve ter os seguintes conjuntos de permissões:
- "Secret scanning alerts" repository permissions (read) and "Contents" repository permissions (read)
Parâmetros para "Get an alert dismissal request for secret scanning"
| Nome, Tipo, Descrição | 
|---|
| acceptstringSetting to  | 
| Nome, Tipo, Descrição | 
|---|
| ownerstring ObrigatórioThe account owner of the repository. The name is not case sensitive. | 
| repostring ObrigatórioThe name of the repository without the  | 
| alert_numberinteger ObrigatórioThe number that identifies the secret scanning alert in a repository. | 
Códigos de status de resposta HTTP para "Get an alert dismissal request for secret scanning"
| Código de status | Descrição | 
|---|---|
| 200 | A single dismissal request. | 
| 403 | Forbidden | 
| 404 | Resource not found | 
| 500 | Internal Error | 
Exemplos de código para "Get an alert dismissal request for secret scanning"
Se você acessar o GitHub em GHE.com, substitua api.github.com pelo subdomínio dedicado da sua empresa em api.SUBDOMAIN.ghe.com.
Exemplo de solicitação
curl -L \
  -H "Accept: application/vnd.github+json" \
  -H "Authorization: Bearer <YOUR-TOKEN>" \
  -H "X-GitHub-Api-Version: 2022-11-28" \
  https://api.github.com/repos/OWNER/REPO/dismissal-requests/secret-scanning/ALERT_NUMBERA single dismissal request.
Status: 200{
  "id": 21,
  "number": 42,
  "repository": {
    "id": 1,
    "name": "smile",
    "full_name": "octo-org/smile"
  },
  "organization": {
    "id": 1,
    "name": "octo-org"
  },
  "requester": {
    "actor_id": 12,
    "actor_name": "monalisa"
  },
  "request_type": "secret_scanning_closure",
  "data": [
    {
      "secret_type": "adafruit_io_key",
      "alert_number": 17,
      "reason": "false_positive"
    }
  ],
  "resource_identifier": 17,
  "status": "denied",
  "requester_comment": "Test token used in the readme as an example",
  "expires_at": "2024-07-08T08:43:03Z",
  "created_at": "2024-07-01T08:43:03Z",
  "responses": [
    {
      "id": 42,
      "reviewer": {
        "actor_id": 4,
        "actor_name": "octocat"
      },
      "status": "denied",
      "created_at": "2024-07-02T08:43:04Z"
    }
  ],
  "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/secret-scanning/21",
  "html_url": "https://github.com/octo-org/smile/security/secret-scanning/17"
}Review an alert dismissal request for secret scanning
Approve or deny a request to dismiss a secret scanning alert in a repository.
Delegated alert dismissal must be enabled on the repository and the user must be an org admin, security manager,
or have the "Review and manage secret scanning alert dismissal requests" permission to access this endpoint.
Personal access tokens (classic) need the security_events scope to use this endpoint.
Tokens de acesso refinados para "Review an alert dismissal request for secret scanning"
Esse ponto de extremidade funciona com os seguintes tipos de token refinados:
- Tokens de acesso de usuário do aplicativo GitHub
- Tokens de acesso à instalação do aplicativo GitHub
- Tokens de acesso pessoal refinados
O token refinado deve ter pelo menos um dos seguintes conjuntos de permissões:
- "Secret scanning alerts" repository permissions (read) and "Contents" repository permissions (read) and "Secret scanning alert dismissal requests" organization permissions (write)
- "Secret scanning alerts" repository permissions (read) and "Contents" repository permissions (read) and "Secret scanning alert dismissal requests" repository permissions (write)
Parâmetros para "Review an alert dismissal request for secret scanning"
| Nome, Tipo, Descrição | 
|---|
| acceptstringSetting to  | 
| Nome, Tipo, Descrição | 
|---|
| ownerstring ObrigatórioThe account owner of the repository. The name is not case sensitive. | 
| repostring ObrigatórioThe name of the repository without the  | 
| alert_numberinteger ObrigatórioThe number that identifies the secret scanning alert in a repository. | 
| Nome, Tipo, Descrição | 
|---|
| statusstring ObrigatórioThe review action to perform on the dismissal request. Pode ser um dos:  | 
| messagestring ObrigatórioA message to include with the review. Has a maximum character length of 2048. | 
Códigos de status de resposta HTTP para "Review an alert dismissal request for secret scanning"
| Código de status | Descrição | 
|---|---|
| 200 | The review of the dismissal request. | 
| 403 | Forbidden | 
| 404 | Resource not found | 
| 422 | Validation failed, or the endpoint has been spammed. | 
| 500 | Internal Error | 
Exemplos de código para "Review an alert dismissal request for secret scanning"
Se você acessar o GitHub em GHE.com, substitua api.github.com pelo subdomínio dedicado da sua empresa em api.SUBDOMAIN.ghe.com.
Exemplo de solicitação
curl -L \
  -X PATCH \
  -H "Accept: application/vnd.github+json" \
  -H "Authorization: Bearer <YOUR-TOKEN>" \
  -H "X-GitHub-Api-Version: 2022-11-28" \
  https://api.github.com/repos/OWNER/REPO/dismissal-requests/secret-scanning/ALERT_NUMBER \
  -d '{"status":"deny","message":"This secret has not been revoked."}'The review of the dismissal request.
Status: 200{
  "dismissal_review_id": 1
}