Skip to content

Commit 67ef2ae

Browse files
authored
Merge pull request #1500 from github/openapi-update-9bf53c14149ecd6c0140cd7f2c7f2c89cd4295d7c0eda924c03c18da45955996
Update OpenAPI 3.1 Descriptions
2 parents 00d43be + f1bcead commit 67ef2ae

28 files changed

+343
-28
lines changed

descriptions-next/api.github.com/api.github.com.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62642,6 +62642,13 @@
6264262642
"null"
6264362643
],
6264462644
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
62645+
},
62646+
"help_uri": {
62647+
"type": [
62648+
"string",
62649+
"null"
62650+
],
62651+
"description": "A link to the documentation for the rule used to detect the alert."
6264562652
}
6264662653
}
6264762654
},
@@ -101554,7 +101561,8 @@
101554101561
"security",
101555101562
"external/cwe/cwe-022"
101556101563
],
101557-
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
101564+
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
101565+
"help_uri": "https://codeql.github.com/"
101558101566
},
101559101567
"tool": {
101560101568
"name": "CodeQL",
@@ -101626,7 +101634,8 @@
101626101634
"security",
101627101635
"external/cwe/cwe-022"
101628101636
],
101629-
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
101637+
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
101638+
"help_uri": "https://codeql.github.com/"
101630101639
},
101631101640
"tool": {
101632101641
"name": "CodeQL",

descriptions-next/api.github.com/api.github.com.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45062,6 +45062,12 @@ components:
4506245062
- string
4506345063
- 'null'
4506445064
description: Detailed documentation for the rule as GitHub Flavored Markdown.
45065+
help_uri:
45066+
type:
45067+
- string
45068+
- 'null'
45069+
description: A link to the documentation for the rule used to detect the
45070+
alert.
4506545071
code-scanning-analysis-tool-version:
4506645072
type:
4506745073
- string
@@ -75132,6 +75138,7 @@ components:
7513275138
files from a malicious zip archive without validating that the destination
7513375139
file path is within the destination directory can cause files outside
7513475140
the destination directory to be overwritten ...'
75141+
help_uri: https://codeql.github.com/
7513575142
tool:
7513675143
name: CodeQL
7513775144
guid:
@@ -75200,6 +75207,7 @@ components:
7520075207
files from a malicious zip archive without validating that the destination
7520175208
file path is within the destination directory can cause files outside
7520275209
the destination directory to be overwritten ...'
75210+
help_uri: https://codeql.github.com/
7520375211
tool:
7520475212
name: CodeQL
7520575213
guid:

descriptions-next/api.github.com/dereferenced/api.github.com.deref.json

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21237,6 +21237,13 @@
2123721237
"null"
2123821238
],
2123921239
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
21240+
},
21241+
"help_uri": {
21242+
"type": [
21243+
"string",
21244+
"null"
21245+
],
21246+
"description": "A link to the documentation for the rule used to detect the alert."
2124021247
}
2124121248
}
2124221249
},
@@ -76193,6 +76200,13 @@
7619376200
"null"
7619476201
],
7619576202
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
76203+
},
76204+
"help_uri": {
76205+
"type": [
76206+
"string",
76207+
"null"
76208+
],
76209+
"description": "A link to the documentation for the rule used to detect the alert."
7619676210
}
7619776211
}
7619876212
},
@@ -241179,6 +241193,13 @@
241179241193
"null"
241180241194
],
241181241195
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
241196+
},
241197+
"help_uri": {
241198+
"type": [
241199+
"string",
241200+
"null"
241201+
],
241202+
"description": "A link to the documentation for the rule used to detect the alert."
241182241203
}
241183241204
}
241184241205
},
@@ -241348,7 +241369,8 @@
241348241369
"security",
241349241370
"external/cwe/cwe-022"
241350241371
],
241351-
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
241372+
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
241373+
"help_uri": "https://codeql.github.com/"
241352241374
},
241353241375
"tool": {
241354241376
"name": "CodeQL",
@@ -241887,6 +241909,13 @@
241887241909
"null"
241888241910
],
241889241911
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
241912+
},
241913+
"help_uri": {
241914+
"type": [
241915+
"string",
241916+
"null"
241917+
],
241918+
"description": "A link to the documentation for the rule used to detect the alert."
241890241919
}
241891241920
}
241892241921
},
@@ -242056,7 +242085,8 @@
242056242085
"security",
242057242086
"external/cwe/cwe-022"
242058242087
],
242059-
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
242088+
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
242089+
"help_uri": "https://codeql.github.com/"
242060242090
},
242061242091
"tool": {
242062242092
"name": "CodeQL",

descriptions-next/api.github.com/dereferenced/api.github.com.deref.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8256,6 +8256,12 @@ paths:
82568256
- 'null'
82578257
description: Detailed documentation for the rule as GitHub
82588258
Flavored Markdown.
8259+
help_uri:
8260+
type:
8261+
- string
8262+
- 'null'
8263+
description: A link to the documentation for the rule used
8264+
to detect the alert.
82598265
tool: &282
82608266
type: object
82618267
properties:
@@ -42380,6 +42386,7 @@ paths:
4238042386
the destination file path is within the destination directory
4238142387
can cause files outside the destination directory to be overwritten
4238242388
...'
42389+
help_uri: https://codeql.github.com/
4238342390
tool:
4238442391
name: CodeQL
4238542392
guid:
@@ -42509,6 +42516,7 @@ paths:
4250942516
the destination file path is within the destination directory
4251042517
can cause files outside the destination directory to be overwritten
4251142518
...'
42519+
help_uri: https://codeql.github.com/
4251242520
tool:
4251342521
name: CodeQL
4251442522
guid:

descriptions-next/ghes-3.2/dereferenced/ghes-3.2.deref.json

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -196822,6 +196822,13 @@
196822196822
"null"
196823196823
],
196824196824
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
196825+
},
196826+
"help_uri": {
196827+
"type": [
196828+
"string",
196829+
"null"
196830+
],
196831+
"description": "A link to the documentation for the rule used to detect the alert."
196825196832
}
196826196833
}
196827196834
},
@@ -196991,7 +196998,8 @@
196991196998
"security",
196992196999
"external/cwe/cwe-022"
196993197000
],
196994-
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
197001+
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
197002+
"help_uri": "https://codeql.github.com/"
196995197003
},
196996197004
"tool": {
196997197005
"name": "CodeQL",
@@ -197496,6 +197504,13 @@
197496197504
"null"
197497197505
],
197498197506
"description": "Detailed documentation for the rule as GitHub Flavored Markdown."
197507+
},
197508+
"help_uri": {
197509+
"type": [
197510+
"string",
197511+
"null"
197512+
],
197513+
"description": "A link to the documentation for the rule used to detect the alert."
197499197514
}
197500197515
}
197501197516
},
@@ -197665,7 +197680,8 @@
197665197680
"security",
197666197681
"external/cwe/cwe-022"
197667197682
],
197668-
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ..."
197683+
"help": "# Arbitrary file write during zip extraction (\"Zip Slip\")\\nExtracting files from a malicious zip archive without validating that the destination file path is within the destination directory can cause files outside the destination directory to be overwritten ...",
197684+
"help_uri": "https://codeql.github.com/"
197669197685
},
197670197686
"tool": {
197671197687
"name": "CodeQL",

descriptions-next/ghes-3.2/dereferenced/ghes-3.2.deref.yaml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36442,6 +36442,12 @@ paths:
3644236442
- 'null'
3644336443
description: Detailed documentation for the rule as GitHub
3644436444
Flavored Markdown.
36445+
help_uri:
36446+
type:
36447+
- string
36448+
- 'null'
36449+
description: A link to the documentation for the rule used
36450+
to detect the alert.
3644536451
tool: *232
3644636452
most_recent_instance: *233
3644736453
instances:
@@ -36506,6 +36512,7 @@ paths:
3650636512
the destination file path is within the destination directory
3650736513
can cause files outside the destination directory to be overwritten
3650836514
...'
36515+
help_uri: https://codeql.github.com/
3650936516
tool:
3651036517
name: CodeQL
3651136518
guid:
@@ -36627,6 +36634,7 @@ paths:
3662736634
the destination file path is within the destination directory
3662836635
can cause files outside the destination directory to be overwritten
3662936636
...'
36637+
help_uri: https://codeql.github.com/
3663036638
tool:
3663136639
name: CodeQL
3663236640
guid:

0 commit comments

Comments
 (0)