Skip to main content
Die REST-API verfügt jetzt über eine Versionskontrolle. Weitere Informationen findest du unter Informationen zur API-Versionsverwaltung.

REST-API-Endpunkte für code scanning-Anforderungen zum Verwerfen von Warnungen

Verwende die REST-API, um über ein Repository mit code scanning-Anforderungen zum Verwerfen von Warnungen zu interagieren.

List dismissal requests for code scanning alerts for an organization

Lists dismissal requests for code scanning alerts for all repositories in an organization.

The user must be authorized to review dismissal requests for the organization. Personal access tokens (classic) need the security_events scope to use this endpoint.

Differenzierte Zugriffstoken für "List dismissal requests for code scanning alerts for an organization"

Dieser Endpunkt funktioniert mit den folgenden differenzierten Tokentypen.:

Das differenzierte Token muss einen der folgenden Berechtigungssätze aufweisen.:

  • "Organization dismissal requests for code scanning" organization permissions (read)

Parameter für „List dismissal requests for code scanning alerts for an organization“

Header
Name, type, BESCHREIBUNG
accept string

Setting to application/vnd.github+json is recommended.

Pfadparameter
Name, type, BESCHREIBUNG
org string Erforderlich

The organization name. The name is not case sensitive.

Abfrageparameter
Name, type, BESCHREIBUNG
reviewer string

Filter alert dismissal requests by the handle of the GitHub user who reviewed the dismissal request.

requester string

Filter alert dismissal requests by the handle of the GitHub user who requested the dismissal.

time_period string

The time period to filter by.

For example, day will filter for rule suites that occurred in the past 24 hours, and week will filter for insights that occurred in the past 7 days (168 hours).

Standard: month

Kann eine der Folgenden sein: hour, day, week, month

request_status string

Filter alert dismissal requests by status. When specified, only requests with this status will be returned.

Standard: all

Kann eine der Folgenden sein: open, approved, expired, denied, all

repository_name string

The name of the repository to filter on.

per_page integer

The number of results per page (max 100). For more information, see "Using pagination in the REST API."

Standard: 30

page integer

The page number of the results to fetch. For more information, see "Using pagination in the REST API."

Standard: 1

HTTP-Antwortstatuscodes für „List dismissal requests for code scanning alerts for an organization“

StatuscodeBESCHREIBUNG
200

A list of alert dismissal requests.

403

Forbidden

404

Resource not found

422

Validation failed, or the endpoint has been spammed.

500

Internal Error

Codebeispiele für „List dismissal requests for code scanning alerts for an organization“

Wenn du unter GHE.com auf GitHub zugreifst, ersetze api.github.com unter api.SUBDOMAIN.ghe.com mit der dedizierten Unterdomäne deines Unternehmens.

Anforderungsbeispiel

get/orgs/{org}/dismissal-requests/code-scanning
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/orgs/ORG/dismissal-requests/code-scanning

A list of alert dismissal requests.

Status: 200
[ { "id": 21, "number": 42, "repository": { "id": 1, "name": "smile", "full_name": "octo-org/smile" }, "organization": { "id": 1, "name": "octo-org" }, "requester": { "actor_id": 12, "actor_name": "monalisa" }, "request_type": "code_scanning_alert_dismissal", "data": [ { "reason": "won't fix", "alert_number": 1 } ], "resource_identifier": "123/10", "status": "denied", "requester_comment": "Won't fix", "expires_at": "2024-07-08T08:43:03Z", "created_at": "2024-07-01T08:43:03Z", "responses": [ { "id": 42, "reviewer": { "actor_id": 4, "actor_name": "octocat" }, "status": "denied", "created_at": "2024-07-02T08:43:04Z" } ], "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/code-scanning/1", "html_url": "https://github.com/octo-org/smile/code-scanning/alerts/1" }, { "id": 12, "number": 24, "repository": { "id": 1, "name": "smile", "full_name": "octo-org/smile" }, "organization": { "id": 1, "name": "octo-org" }, "requester": { "actor_id": 12, "actor_name": "monalisa" }, "request_type": "code_scanning_alert_dismissal", "data": [ { "reason": "won't fix", "alert_number": 2 } ], "resource_identifier": "123/12", "status": "denied", "requester_comment": "Token is already revoked, I'll remove it later", "expires_at": "2024-07-08T07:43:03Z", "created_at": "2024-07-01T07:43:03Z", "responses": [ { "id": 42, "reviewer": { "actor_id": 4, "actor_name": "octocat" }, "status": "denied", "created_at": "2024-07-02T08:43:04Z" } ], "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/code-scanning/2", "html_url": "https://github.com/octo-org/smile/code-scanning/alerts/2" } ]

List dismissal requests for code scanning alerts for a repository

Lists dismissal requests for code scanning alerts for a repository.

Delegated alert dismissal must be enabled on the repository. Personal access tokens (classic) need the security_events scope to use this endpoint.

Differenzierte Zugriffstoken für "List dismissal requests for code scanning alerts for a repository"

Dieser Endpunkt funktioniert mit den folgenden differenzierten Tokentypen.:

Das differenzierte Token muss einen der folgenden Berechtigungssätze aufweisen.:

  • "Organization dismissal requests for code scanning" organization permissions (read) and "Code scanning alerts" repository permissions (read)

Parameter für „List dismissal requests for code scanning alerts for a repository“

Header
Name, type, BESCHREIBUNG
accept string

Setting to application/vnd.github+json is recommended.

Pfadparameter
Name, type, BESCHREIBUNG
owner string Erforderlich

The account owner of the repository. The name is not case sensitive.

repo string Erforderlich

The name of the repository without the .git extension. The name is not case sensitive.

Abfrageparameter
Name, type, BESCHREIBUNG
reviewer string

Filter alert dismissal requests by the handle of the GitHub user who reviewed the dismissal request.

requester string

Filter alert dismissal requests by the handle of the GitHub user who requested the dismissal.

time_period string

The time period to filter by.

For example, day will filter for rule suites that occurred in the past 24 hours, and week will filter for insights that occurred in the past 7 days (168 hours).

Standard: month

Kann eine der Folgenden sein: hour, day, week, month

request_status string

Filter alert dismissal requests by status. When specified, only requests with this status will be returned.

Standard: all

Kann eine der Folgenden sein: open, approved, expired, denied, all

per_page integer

The number of results per page (max 100). For more information, see "Using pagination in the REST API."

Standard: 30

page integer

The page number of the results to fetch. For more information, see "Using pagination in the REST API."

Standard: 1

HTTP-Antwortstatuscodes für „List dismissal requests for code scanning alerts for a repository“

StatuscodeBESCHREIBUNG
200

A list of alert dismissal requests.

403

Forbidden

404

Resource not found

500

Internal Error

Codebeispiele für „List dismissal requests for code scanning alerts for a repository“

Wenn du unter GHE.com auf GitHub zugreifst, ersetze api.github.com unter api.SUBDOMAIN.ghe.com mit der dedizierten Unterdomäne deines Unternehmens.

Anforderungsbeispiel

get/repos/{owner}/{repo}/dismissal-requests/code-scanning
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/dismissal-requests/code-scanning

A list of alert dismissal requests.

Status: 200
[ { "id": 21, "number": 42, "repository": { "id": 1, "name": "smile", "full_name": "octo-org/smile" }, "organization": { "id": 1, "name": "octo-org" }, "requester": { "actor_id": 12, "actor_name": "monalisa" }, "request_type": "code_scanning_alert_dismissal", "data": [ { "reason": "won't fix", "alert_number": 1 } ], "resource_identifier": "123/10", "status": "denied", "requester_comment": "Won't fix", "expires_at": "2024-07-08T08:43:03Z", "created_at": "2024-07-01T08:43:03Z", "responses": [ { "id": 42, "reviewer": { "actor_id": 4, "actor_name": "octocat" }, "status": "denied", "created_at": "2024-07-02T08:43:04Z" } ], "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/code-scanning/1", "html_url": "https://github.com/octo-org/smile/code-scanning/alerts/1" }, { "id": 12, "number": 24, "repository": { "id": 1, "name": "smile", "full_name": "octo-org/smile" }, "organization": { "id": 1, "name": "octo-org" }, "requester": { "actor_id": 12, "actor_name": "monalisa" }, "request_type": "code_scanning_alert_dismissal", "data": [ { "reason": "won't fix", "alert_number": 2 } ], "resource_identifier": "123/12", "status": "denied", "requester_comment": "Token is already revoked, I'll remove it later", "expires_at": "2024-07-08T07:43:03Z", "created_at": "2024-07-01T07:43:03Z", "responses": [ { "id": 42, "reviewer": { "actor_id": 4, "actor_name": "octocat" }, "status": "denied", "created_at": "2024-07-02T08:43:04Z" } ], "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/code-scanning/2", "html_url": "https://github.com/octo-org/smile/code-scanning/alerts/2" } ]

Get a dismissal request for a code scanning alert for a repository

Gets a dismissal request to dismiss a code scanning alert in a repository.

Delegated alert dismissal must be enabled on the repository. Personal access tokens (classic) need the security_events scope to use this endpoint.

Differenzierte Zugriffstoken für "Get a dismissal request for a code scanning alert for a repository"

Dieser Endpunkt funktioniert mit den folgenden differenzierten Tokentypen.:

Das differenzierte Token muss einen der folgenden Berechtigungssätze aufweisen.:

  • "Organization dismissal requests for code scanning" organization permissions (read) and "Code scanning alerts" repository permissions (read)

Parameter für „Get a dismissal request for a code scanning alert for a repository“

Header
Name, type, BESCHREIBUNG
accept string

Setting to application/vnd.github+json is recommended.

Pfadparameter
Name, type, BESCHREIBUNG
owner string Erforderlich

The account owner of the repository. The name is not case sensitive.

repo string Erforderlich

The name of the repository without the .git extension. The name is not case sensitive.

alert_number integer Erforderlich

The number that identifies the code scanning alert.

HTTP-Antwortstatuscodes für „Get a dismissal request for a code scanning alert for a repository“

StatuscodeBESCHREIBUNG
200

A single dismissal request.

403

Forbidden

404

Resource not found

500

Internal Error

Codebeispiele für „Get a dismissal request for a code scanning alert for a repository“

Wenn du unter GHE.com auf GitHub zugreifst, ersetze api.github.com unter api.SUBDOMAIN.ghe.com mit der dedizierten Unterdomäne deines Unternehmens.

Anforderungsbeispiel

get/repos/{owner}/{repo}/dismissal-requests/code-scanning/{alert_number}
curl -L \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/dismissal-requests/code-scanning/ALERT_NUMBER

A single dismissal request.

Status: 200
{ "id": 21, "number": 42, "repository": { "id": 1, "name": "smile", "full_name": "octo-org/smile" }, "organization": { "id": 1, "name": "octo-org" }, "requester": { "actor_id": 12, "actor_name": "monalisa" }, "request_type": "code_scanning_alert_dismissal", "data": [ { "reason": "won't fix", "alert_number": 2 } ], "resource_identifier": "1/1", "status": "denied", "requester_comment": "Won't fix", "expires_at": "2024-07-08T08:43:03Z", "created_at": "2024-07-01T08:43:03Z", "responses": [ { "id": 42, "reviewer": { "actor_id": 4, "actor_name": "octocat" }, "status": "denied", "created_at": "2024-07-02T08:43:04Z" } ], "url": "https://api.github.com/repos/octo-org/smile/dismissal-requests/code-scanning/1", "html_url": "https://github.com/octo-org/smile/code-scanning/alerts/1" }

Review a dismissal request for a code scanning alert for a repository

Approve or deny a dismissal request to dismiss a code scanning alert in a repository.

Delegated alert dismissal must be enabled on the repository and the user must be a dismissal reviewer to access this endpoint. Personal access tokens (classic) need the security_events scope to use this endpoint.

Differenzierte Zugriffstoken für "Review a dismissal request for a code scanning alert for a repository"

Dieser Endpunkt funktioniert mit den folgenden differenzierten Tokentypen.:

Das differenzierte Token muss einen der folgenden Berechtigungssätze aufweisen.:

  • "Organization dismissal requests for code scanning" organization permissions (write) and "Code scanning alerts" repository permissions (read)

Parameter für „Review a dismissal request for a code scanning alert for a repository“

Header
Name, type, BESCHREIBUNG
accept string

Setting to application/vnd.github+json is recommended.

Pfadparameter
Name, type, BESCHREIBUNG
owner string Erforderlich

The account owner of the repository. The name is not case sensitive.

repo string Erforderlich

The name of the repository without the .git extension. The name is not case sensitive.

alert_number integer Erforderlich

The number that identifies the code scanning alert.

Textparameter
Name, type, BESCHREIBUNG
status string Erforderlich

The review action to perform on the bypass request.

Kann eine der Folgenden sein: approve, deny

message string Erforderlich

A message to include with the review. Has a maximum character length of 2048.

HTTP-Antwortstatuscodes für „Review a dismissal request for a code scanning alert for a repository“

StatuscodeBESCHREIBUNG
204

Successful update

403

Forbidden

404

Resource not found

422

Validation failed, or the endpoint has been spammed.

500

Internal Error

Codebeispiele für „Review a dismissal request for a code scanning alert for a repository“

Wenn du unter GHE.com auf GitHub zugreifst, ersetze api.github.com unter api.SUBDOMAIN.ghe.com mit der dedizierten Unterdomäne deines Unternehmens.

Anforderungsbeispiel

patch/repos/{owner}/{repo}/dismissal-requests/code-scanning/{alert_number}
curl -L \ -X PATCH \ -H "Accept: application/vnd.github+json" \ -H "Authorization: Bearer <YOUR-TOKEN>" \ -H "X-GitHub-Api-Version: 2022-11-28" \ https://api.github.com/repos/OWNER/REPO/dismissal-requests/code-scanning/ALERT_NUMBER \ -d '{"status":"approve","message":"Used in tests."}'

Successful update

Status: 204