gitabu 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.rspec +3 -0
- data/.rubocop.yml +33 -0
- data/CHANGELOG.md +3 -0
- data/Gemfile +10 -0
- data/Gemfile.lock +65 -0
- data/LICENSE.txt +21 -0
- data/README.md +42 -0
- data/Rakefile +12 -0
- data/gitabu.gemspec +41 -0
- data/lib/gitabu/api/v3/actions.rb +3724 -0
- data/lib/gitabu/api/v3/activity.rb +835 -0
- data/lib/gitabu/api/v3/apps.rb +961 -0
- data/lib/gitabu/api/v3/billing.rb +217 -0
- data/lib/gitabu/api/v3/branches.rb +1098 -0
- data/lib/gitabu/api/v3/checks.rb +384 -0
- data/lib/gitabu/api/v3/code_scanning.rb +315 -0
- data/lib/gitabu/api/v3/codes_of_conduct.rb +92 -0
- data/lib/gitabu/api/v3/codespaces.rb +650 -0
- data/lib/gitabu/api/v3/collaborators.rb +341 -0
- data/lib/gitabu/api/v3/commits.rb +428 -0
- data/lib/gitabu/api/v3/dependabot.rb +419 -0
- data/lib/gitabu/api/v3/deploy_keys.rb +152 -0
- data/lib/gitabu/api/v3/deployments.rb +356 -0
- data/lib/gitabu/api/v3/emojis.rb +67 -0
- data/lib/gitabu/api/v3/enterprise_admin.rb +495 -0
- data/lib/gitabu/api/v3/gists.rb +552 -0
- data/lib/gitabu/api/v3/git.rb +409 -0
- data/lib/gitabu/api/v3/gitignore.rb +92 -0
- data/lib/gitabu/api/v3/interactions.rb +275 -0
- data/lib/gitabu/api/v3/issues.rb +1119 -0
- data/lib/gitabu/api/v3/licenses.rb +118 -0
- data/lib/gitabu/api/v3/markdown.rb +94 -0
- data/lib/gitabu/api/v3/meta.rb +142 -0
- data/lib/gitabu/api/v3/metrics.rb +302 -0
- data/lib/gitabu/api/v3/migrations.rb +631 -0
- data/lib/gitabu/api/v3/orgs.rb +1291 -0
- data/lib/gitabu/api/v3/packages.rb +686 -0
- data/lib/gitabu/api/v3/pages.rb +282 -0
- data/lib/gitabu/api/v3/projects.rb +693 -0
- data/lib/gitabu/api/v3/pulls.rb +816 -0
- data/lib/gitabu/api/v3/rate_limit.rb +67 -0
- data/lib/gitabu/api/v3/reactions.rb +734 -0
- data/lib/gitabu/api/v3/releases.rb +411 -0
- data/lib/gitabu/api/v3/repos.rb +1136 -0
- data/lib/gitabu/api/v3/scim.rb +214 -0
- data/lib/gitabu/api/v3/search.rb +217 -0
- data/lib/gitabu/api/v3/secret_scanning.rb +201 -0
- data/lib/gitabu/api/v3/teams.rb +1963 -0
- data/lib/gitabu/api/v3/users.rb +851 -0
- data/lib/gitabu/api/v3/webhooks.rb +379 -0
- data/lib/gitabu/builder.rb +37 -0
- data/lib/gitabu/client.rb +8 -0
- data/lib/gitabu/generator.rb +75 -0
- data/lib/gitabu/http_client.rb +96 -0
- data/lib/gitabu/items.rb +110 -0
- data/lib/gitabu/public/api/v3/actions.json +5779 -0
- data/lib/gitabu/public/api/v3/activity.json +1248 -0
- data/lib/gitabu/public/api/v3/apps.json +1174 -0
- data/lib/gitabu/public/api/v3/billing.json +183 -0
- data/lib/gitabu/public/api/v3/branches.json +1886 -0
- data/lib/gitabu/public/api/v3/checks.json +856 -0
- data/lib/gitabu/public/api/v3/code_scanning.json +666 -0
- data/lib/gitabu/public/api/v3/codes_of_conduct.json +41 -0
- data/lib/gitabu/public/api/v3/codespaces.json +884 -0
- data/lib/gitabu/public/api/v3/collaborators.json +464 -0
- data/lib/gitabu/public/api/v3/commits.json +830 -0
- data/lib/gitabu/public/api/v3/dependabot.json +596 -0
- data/lib/gitabu/public/api/v3/deploy_keys.json +195 -0
- data/lib/gitabu/public/api/v3/deployments.json +698 -0
- data/lib/gitabu/public/api/v3/emojis.json +18 -0
- data/lib/gitabu/public/api/v3/enterprise_admin.json +881 -0
- data/lib/gitabu/public/api/v3/gists.json +689 -0
- data/lib/gitabu/public/api/v3/git.json +735 -0
- data/lib/gitabu/public/api/v3/gitignore.json +41 -0
- data/lib/gitabu/public/api/v3/interactions.json +265 -0
- data/lib/gitabu/public/api/v3/issues.json +2359 -0
- data/lib/gitabu/public/api/v3/licenses.json +100 -0
- data/lib/gitabu/public/api/v3/markdown.json +59 -0
- data/lib/gitabu/public/api/v3/meta.json +69 -0
- data/lib/gitabu/public/api/v3/metrics.json +342 -0
- data/lib/gitabu/public/api/v3/migrations.json +960 -0
- data/lib/gitabu/public/api/v3/orgs.json +1989 -0
- data/lib/gitabu/public/api/v3/packages.json +1078 -0
- data/lib/gitabu/public/api/v3/pages.json +373 -0
- data/lib/gitabu/public/api/v3/projects.json +966 -0
- data/lib/gitabu/public/api/v3/pulls.json +1768 -0
- data/lib/gitabu/public/api/v3/rate_limit.json +18 -0
- data/lib/gitabu/public/api/v3/reactions.json +1425 -0
- data/lib/gitabu/public/api/v3/releases.json +753 -0
- data/lib/gitabu/public/api/v3/repos.json +2314 -0
- data/lib/gitabu/public/api/v3/scim.json +412 -0
- data/lib/gitabu/public/api/v3/search.json +408 -0
- data/lib/gitabu/public/api/v3/secret_scanning.json +385 -0
- data/lib/gitabu/public/api/v3/teams.json +3126 -0
- data/lib/gitabu/public/api/v3/users.json +956 -0
- data/lib/gitabu/public/api/v3/webhooks.json +667 -0
- data/lib/gitabu/run.rb +237 -0
- data/lib/gitabu/scraper.rb +86 -0
- data/lib/gitabu/templates/template.rb.erb +70 -0
- data/lib/gitabu/version.rb +6 -0
- data/lib/gitabu.rb +57 -0
- data/sig/gitabu.rbs +4 -0
- metadata +177 -0
|
@@ -0,0 +1,385 @@
|
|
|
1
|
+
{
|
|
2
|
+
"result": [
|
|
3
|
+
{
|
|
4
|
+
"namespace_description": "List secret scanning alerts for an enterprise",
|
|
5
|
+
"method": "get",
|
|
6
|
+
"endpoint": "/enterprises/{enterprise}/secret-scanning/alerts",
|
|
7
|
+
"field_0": {
|
|
8
|
+
"field_type": "header",
|
|
9
|
+
"fields": {
|
|
10
|
+
"name": "accept",
|
|
11
|
+
"type": "string",
|
|
12
|
+
"in": "header",
|
|
13
|
+
"description": "Setting toapplication/vnd.github.v3+json is recommended."
|
|
14
|
+
}
|
|
15
|
+
},
|
|
16
|
+
"field_1": {
|
|
17
|
+
"field_type": "path",
|
|
18
|
+
"fields": {
|
|
19
|
+
"name": "enterprise",
|
|
20
|
+
"type": "string",
|
|
21
|
+
"in": "path",
|
|
22
|
+
"description": "The slug version of the enterprise name. You can also substitute this value with the enterprise id."
|
|
23
|
+
}
|
|
24
|
+
},
|
|
25
|
+
"field_2": {
|
|
26
|
+
"field_type": "query",
|
|
27
|
+
"fields": {
|
|
28
|
+
"name": "state",
|
|
29
|
+
"type": "string",
|
|
30
|
+
"in": "query",
|
|
31
|
+
"description": "Set to open or resolved to only list secret scanning alerts in a specific state."
|
|
32
|
+
}
|
|
33
|
+
},
|
|
34
|
+
"field_3": {
|
|
35
|
+
"field_type": "query",
|
|
36
|
+
"fields": {
|
|
37
|
+
"name": "secret_type",
|
|
38
|
+
"type": "string",
|
|
39
|
+
"in": "query",
|
|
40
|
+
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"Secret scanning patterns\"\nfor a complete list of secret types (API slug)."
|
|
41
|
+
}
|
|
42
|
+
},
|
|
43
|
+
"field_4": {
|
|
44
|
+
"field_type": "query",
|
|
45
|
+
"fields": {
|
|
46
|
+
"name": "resolution",
|
|
47
|
+
"type": "string",
|
|
48
|
+
"in": "query",
|
|
49
|
+
"description": "A comma-separated list of resolutions. Only secret scanning alerts with one of these resolutions are listed. Valid resolutions are false_positive, wont_fix, revoked, pattern_edited, pattern_deleted or used_in_tests."
|
|
50
|
+
}
|
|
51
|
+
},
|
|
52
|
+
"field_5": {
|
|
53
|
+
"field_type": "query",
|
|
54
|
+
"fields": {
|
|
55
|
+
"name": "per_page",
|
|
56
|
+
"type": "integer",
|
|
57
|
+
"in": "query",
|
|
58
|
+
"description": "Results per page (max 100)Default: 30"
|
|
59
|
+
}
|
|
60
|
+
},
|
|
61
|
+
"field_6": {
|
|
62
|
+
"field_type": "query",
|
|
63
|
+
"fields": {
|
|
64
|
+
"name": "before",
|
|
65
|
+
"type": "string",
|
|
66
|
+
"in": "query",
|
|
67
|
+
"description": "A cursor, as given in the Link header. If specified, the query only searches for events before this cursor."
|
|
68
|
+
}
|
|
69
|
+
},
|
|
70
|
+
"field_7": {
|
|
71
|
+
"field_type": "query",
|
|
72
|
+
"fields": {
|
|
73
|
+
"name": "after",
|
|
74
|
+
"type": "string",
|
|
75
|
+
"in": "query",
|
|
76
|
+
"description": "A cursor, as given in the Link header. If specified, the query only searches for events after this cursor."
|
|
77
|
+
}
|
|
78
|
+
}
|
|
79
|
+
},
|
|
80
|
+
{
|
|
81
|
+
"namespace_description": "List secret scanning alerts for an organization",
|
|
82
|
+
"method": "get",
|
|
83
|
+
"endpoint": "/orgs/{org}/secret-scanning/alerts",
|
|
84
|
+
"field_0": {
|
|
85
|
+
"field_type": "header",
|
|
86
|
+
"fields": {
|
|
87
|
+
"name": "accept",
|
|
88
|
+
"type": "string",
|
|
89
|
+
"in": "header",
|
|
90
|
+
"description": "Setting toapplication/vnd.github.v3+json is recommended."
|
|
91
|
+
}
|
|
92
|
+
},
|
|
93
|
+
"field_1": {
|
|
94
|
+
"field_type": "path",
|
|
95
|
+
"fields": {
|
|
96
|
+
"name": "org",
|
|
97
|
+
"type": "string",
|
|
98
|
+
"in": "path",
|
|
99
|
+
"description": ""
|
|
100
|
+
}
|
|
101
|
+
},
|
|
102
|
+
"field_2": {
|
|
103
|
+
"field_type": "query",
|
|
104
|
+
"fields": {
|
|
105
|
+
"name": "state",
|
|
106
|
+
"type": "string",
|
|
107
|
+
"in": "query",
|
|
108
|
+
"description": "Set to open or resolved to only list secret scanning alerts in a specific state."
|
|
109
|
+
}
|
|
110
|
+
},
|
|
111
|
+
"field_3": {
|
|
112
|
+
"field_type": "query",
|
|
113
|
+
"fields": {
|
|
114
|
+
"name": "secret_type",
|
|
115
|
+
"type": "string",
|
|
116
|
+
"in": "query",
|
|
117
|
+
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"Secret scanning patterns\"\nfor a complete list of secret types (API slug)."
|
|
118
|
+
}
|
|
119
|
+
},
|
|
120
|
+
"field_4": {
|
|
121
|
+
"field_type": "query",
|
|
122
|
+
"fields": {
|
|
123
|
+
"name": "resolution",
|
|
124
|
+
"type": "string",
|
|
125
|
+
"in": "query",
|
|
126
|
+
"description": "A comma-separated list of resolutions. Only secret scanning alerts with one of these resolutions are listed. Valid resolutions are false_positive, wont_fix, revoked, pattern_edited, pattern_deleted or used_in_tests."
|
|
127
|
+
}
|
|
128
|
+
},
|
|
129
|
+
"field_5": {
|
|
130
|
+
"field_type": "query",
|
|
131
|
+
"fields": {
|
|
132
|
+
"name": "page",
|
|
133
|
+
"type": "integer",
|
|
134
|
+
"in": "query",
|
|
135
|
+
"description": "Page number of the results to fetch.Default: 1"
|
|
136
|
+
}
|
|
137
|
+
},
|
|
138
|
+
"field_6": {
|
|
139
|
+
"field_type": "query",
|
|
140
|
+
"fields": {
|
|
141
|
+
"name": "per_page",
|
|
142
|
+
"type": "integer",
|
|
143
|
+
"in": "query",
|
|
144
|
+
"description": "Results per page (max 100)Default: 30"
|
|
145
|
+
}
|
|
146
|
+
}
|
|
147
|
+
},
|
|
148
|
+
{
|
|
149
|
+
"namespace_description": "List secret scanning alerts for a repository",
|
|
150
|
+
"method": "get",
|
|
151
|
+
"endpoint": "/repos/{owner}/{repo}/secret-scanning/alerts",
|
|
152
|
+
"field_0": {
|
|
153
|
+
"field_type": "header",
|
|
154
|
+
"fields": {
|
|
155
|
+
"name": "accept",
|
|
156
|
+
"type": "string",
|
|
157
|
+
"in": "header",
|
|
158
|
+
"description": "Setting toapplication/vnd.github.v3+json is recommended."
|
|
159
|
+
}
|
|
160
|
+
},
|
|
161
|
+
"field_1": {
|
|
162
|
+
"field_type": "path",
|
|
163
|
+
"fields": {
|
|
164
|
+
"name": "owner",
|
|
165
|
+
"type": "string",
|
|
166
|
+
"in": "path",
|
|
167
|
+
"description": ""
|
|
168
|
+
}
|
|
169
|
+
},
|
|
170
|
+
"field_2": {
|
|
171
|
+
"field_type": "path",
|
|
172
|
+
"fields": {
|
|
173
|
+
"name": "repo",
|
|
174
|
+
"type": "string",
|
|
175
|
+
"in": "path",
|
|
176
|
+
"description": ""
|
|
177
|
+
}
|
|
178
|
+
},
|
|
179
|
+
"field_3": {
|
|
180
|
+
"field_type": "query",
|
|
181
|
+
"fields": {
|
|
182
|
+
"name": "state",
|
|
183
|
+
"type": "string",
|
|
184
|
+
"in": "query",
|
|
185
|
+
"description": "Set to open or resolved to only list secret scanning alerts in a specific state."
|
|
186
|
+
}
|
|
187
|
+
},
|
|
188
|
+
"field_4": {
|
|
189
|
+
"field_type": "query",
|
|
190
|
+
"fields": {
|
|
191
|
+
"name": "secret_type",
|
|
192
|
+
"type": "string",
|
|
193
|
+
"in": "query",
|
|
194
|
+
"description": "A comma-separated list of secret types to return. By default all secret types are returned.\nSee \"Secret scanning patterns\"\nfor a complete list of secret types (API slug)."
|
|
195
|
+
}
|
|
196
|
+
},
|
|
197
|
+
"field_5": {
|
|
198
|
+
"field_type": "query",
|
|
199
|
+
"fields": {
|
|
200
|
+
"name": "resolution",
|
|
201
|
+
"type": "string",
|
|
202
|
+
"in": "query",
|
|
203
|
+
"description": "A comma-separated list of resolutions. Only secret scanning alerts with one of these resolutions are listed. Valid resolutions are false_positive, wont_fix, revoked, pattern_edited, pattern_deleted or used_in_tests."
|
|
204
|
+
}
|
|
205
|
+
},
|
|
206
|
+
"field_6": {
|
|
207
|
+
"field_type": "query",
|
|
208
|
+
"fields": {
|
|
209
|
+
"name": "page",
|
|
210
|
+
"type": "integer",
|
|
211
|
+
"in": "query",
|
|
212
|
+
"description": "Page number of the results to fetch.Default: 1"
|
|
213
|
+
}
|
|
214
|
+
},
|
|
215
|
+
"field_7": {
|
|
216
|
+
"field_type": "query",
|
|
217
|
+
"fields": {
|
|
218
|
+
"name": "per_page",
|
|
219
|
+
"type": "integer",
|
|
220
|
+
"in": "query",
|
|
221
|
+
"description": "Results per page (max 100)Default: 30"
|
|
222
|
+
}
|
|
223
|
+
}
|
|
224
|
+
},
|
|
225
|
+
{
|
|
226
|
+
"namespace_description": "Get a secret scanning alert",
|
|
227
|
+
"method": "get",
|
|
228
|
+
"endpoint": "/repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}",
|
|
229
|
+
"field_0": {
|
|
230
|
+
"field_type": "header",
|
|
231
|
+
"fields": {
|
|
232
|
+
"name": "accept",
|
|
233
|
+
"type": "string",
|
|
234
|
+
"in": "header",
|
|
235
|
+
"description": "Setting toapplication/vnd.github.v3+json is recommended."
|
|
236
|
+
}
|
|
237
|
+
},
|
|
238
|
+
"field_1": {
|
|
239
|
+
"field_type": "path",
|
|
240
|
+
"fields": {
|
|
241
|
+
"name": "owner",
|
|
242
|
+
"type": "string",
|
|
243
|
+
"in": "path",
|
|
244
|
+
"description": ""
|
|
245
|
+
}
|
|
246
|
+
},
|
|
247
|
+
"field_2": {
|
|
248
|
+
"field_type": "path",
|
|
249
|
+
"fields": {
|
|
250
|
+
"name": "repo",
|
|
251
|
+
"type": "string",
|
|
252
|
+
"in": "path",
|
|
253
|
+
"description": ""
|
|
254
|
+
}
|
|
255
|
+
},
|
|
256
|
+
"field_3": {
|
|
257
|
+
"field_type": "path",
|
|
258
|
+
"fields": {
|
|
259
|
+
"name": "alert_number",
|
|
260
|
+
"type": "integer",
|
|
261
|
+
"in": "path",
|
|
262
|
+
"description": "The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the number field in the response from the GET /repos/{owner}/{repo}/code-scanning/alerts operation."
|
|
263
|
+
}
|
|
264
|
+
}
|
|
265
|
+
},
|
|
266
|
+
{
|
|
267
|
+
"namespace_description": "Update a secret scanning alert",
|
|
268
|
+
"method": "patch",
|
|
269
|
+
"endpoint": "/repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}",
|
|
270
|
+
"field_0": {
|
|
271
|
+
"field_type": "header",
|
|
272
|
+
"fields": {
|
|
273
|
+
"name": "accept",
|
|
274
|
+
"type": "string",
|
|
275
|
+
"in": "header",
|
|
276
|
+
"description": "Setting toapplication/vnd.github.v3+json is recommended."
|
|
277
|
+
}
|
|
278
|
+
},
|
|
279
|
+
"field_1": {
|
|
280
|
+
"field_type": "path",
|
|
281
|
+
"fields": {
|
|
282
|
+
"name": "owner",
|
|
283
|
+
"type": "string",
|
|
284
|
+
"in": "path",
|
|
285
|
+
"description": ""
|
|
286
|
+
}
|
|
287
|
+
},
|
|
288
|
+
"field_2": {
|
|
289
|
+
"field_type": "path",
|
|
290
|
+
"fields": {
|
|
291
|
+
"name": "repo",
|
|
292
|
+
"type": "string",
|
|
293
|
+
"in": "path",
|
|
294
|
+
"description": ""
|
|
295
|
+
}
|
|
296
|
+
},
|
|
297
|
+
"field_3": {
|
|
298
|
+
"field_type": "path",
|
|
299
|
+
"fields": {
|
|
300
|
+
"name": "alert_number",
|
|
301
|
+
"type": "integer",
|
|
302
|
+
"in": "path",
|
|
303
|
+
"description": "The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the number field in the response from the GET /repos/{owner}/{repo}/code-scanning/alerts operation."
|
|
304
|
+
}
|
|
305
|
+
},
|
|
306
|
+
"field_4": {
|
|
307
|
+
"field_type": "body",
|
|
308
|
+
"fields": {
|
|
309
|
+
"name": "state",
|
|
310
|
+
"type": "string",
|
|
311
|
+
"in": "body",
|
|
312
|
+
"description": "Required. Sets the state of the secret scanning alert. Can be either open or resolved. You must provide resolution when you set the state to resolved."
|
|
313
|
+
}
|
|
314
|
+
},
|
|
315
|
+
"field_5": {
|
|
316
|
+
"field_type": "body",
|
|
317
|
+
"fields": {
|
|
318
|
+
"name": "resolution",
|
|
319
|
+
"type": "string or null",
|
|
320
|
+
"in": "body",
|
|
321
|
+
"description": "Required when the state is resolved. The reason for resolving the alert. Can be one of false_positive, wont_fix, revoked, or used_in_tests."
|
|
322
|
+
}
|
|
323
|
+
}
|
|
324
|
+
},
|
|
325
|
+
{
|
|
326
|
+
"namespace_description": "List locations for a secret scanning alert",
|
|
327
|
+
"method": "get",
|
|
328
|
+
"endpoint": "/repos/{owner}/{repo}/secret-scanning/alerts/{alert_number}/locations",
|
|
329
|
+
"field_0": {
|
|
330
|
+
"field_type": "header",
|
|
331
|
+
"fields": {
|
|
332
|
+
"name": "accept",
|
|
333
|
+
"type": "string",
|
|
334
|
+
"in": "header",
|
|
335
|
+
"description": "Setting toapplication/vnd.github.v3+json is recommended."
|
|
336
|
+
}
|
|
337
|
+
},
|
|
338
|
+
"field_1": {
|
|
339
|
+
"field_type": "path",
|
|
340
|
+
"fields": {
|
|
341
|
+
"name": "owner",
|
|
342
|
+
"type": "string",
|
|
343
|
+
"in": "path",
|
|
344
|
+
"description": ""
|
|
345
|
+
}
|
|
346
|
+
},
|
|
347
|
+
"field_2": {
|
|
348
|
+
"field_type": "path",
|
|
349
|
+
"fields": {
|
|
350
|
+
"name": "repo",
|
|
351
|
+
"type": "string",
|
|
352
|
+
"in": "path",
|
|
353
|
+
"description": ""
|
|
354
|
+
}
|
|
355
|
+
},
|
|
356
|
+
"field_3": {
|
|
357
|
+
"field_type": "path",
|
|
358
|
+
"fields": {
|
|
359
|
+
"name": "alert_number",
|
|
360
|
+
"type": "integer",
|
|
361
|
+
"in": "path",
|
|
362
|
+
"description": "The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the number field in the response from the GET /repos/{owner}/{repo}/code-scanning/alerts operation."
|
|
363
|
+
}
|
|
364
|
+
},
|
|
365
|
+
"field_4": {
|
|
366
|
+
"field_type": "query",
|
|
367
|
+
"fields": {
|
|
368
|
+
"name": "page",
|
|
369
|
+
"type": "integer",
|
|
370
|
+
"in": "query",
|
|
371
|
+
"description": "Page number of the results to fetch.Default: 1"
|
|
372
|
+
}
|
|
373
|
+
},
|
|
374
|
+
"field_5": {
|
|
375
|
+
"field_type": "query",
|
|
376
|
+
"fields": {
|
|
377
|
+
"name": "per_page",
|
|
378
|
+
"type": "integer",
|
|
379
|
+
"in": "query",
|
|
380
|
+
"description": "Results per page (max 100)Default: 30"
|
|
381
|
+
}
|
|
382
|
+
}
|
|
383
|
+
}
|
|
384
|
+
]
|
|
385
|
+
}
|