Configurations de l’organisation
Utilisez l’API REST pour gérer les configurations du registre privé pour les organisations.
List private registries for an organization
Lists all private registry configurations available at the organization-level without revealing their encrypted values.
OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Jetons d’accès affinés pour « List private registries for an organization »
Ce point de terminaison fonctionne avec les types de tokens à granularité fine suivants:
- Jetons d’accès utilisateur d’application GitHub
- Jetons d’accès d’installation d’application GitHub
- Tokens d’accès personnel à granularité fine
Le token à granularité fine doit disposer de l’ensemble d’autorisations suivant:
- "Organization private registries" organization permissions (read)
Paramètres pour « List private registries for an organization »
| Nom, Type, Description |
|---|
accept string Setting to |
| Nom, Type, Description |
|---|
org string RequisThe organization name. The name is not case sensitive. |
| Nom, Type, Description |
|---|
per_page integer The number of results per page (max 100). For more information, see "Using pagination in the REST API." Par défaut: |
page integer The page number of the results to fetch. For more information, see "Using pagination in the REST API." Par défaut: |
Codes d’état de la réponse HTTP pour « List private registries for an organization »
| Code de statut | Description |
|---|---|
200 | OK |
400 | Bad Request |
404 | Resource not found |
Exemples de code pour « List private registries for an organization »
Exemple de requête
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2022-11-28" \
http(s)://HOSTNAME/api/v3/orgs/ORG/private-registriesResponse
Status: 200{
"total_count": 1,
"configurations": [
{
"name": "MAVEN_REPOSITORY_SECRET",
"registry_type": "maven_repository",
"username": "monalisa",
"created_at": "2019-08-10T14:59:22Z",
"updated_at": "2020-01-10T14:59:22Z",
"visibility": "selected"
}
]
}Get private registries public key for an organization
Gets the org public key, which is needed to encrypt private registry secrets. You need to encrypt a secret before you can create or update secrets.
OAuth tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Jetons d’accès affinés pour « Get private registries public key for an organization »
Ce point de terminaison fonctionne avec les types de tokens à granularité fine suivants:
- Jetons d’accès utilisateur d’application GitHub
- Jetons d’accès d’installation d’application GitHub
- Tokens d’accès personnel à granularité fine
Le token à granularité fine doit disposer de l’ensemble d’autorisations suivant:
- "Organization private registries" organization permissions (read)
Paramètres pour « Get private registries public key for an organization »
| Nom, Type, Description |
|---|
accept string Setting to |
| Nom, Type, Description |
|---|
org string RequisThe organization name. The name is not case sensitive. |
Codes d’état de la réponse HTTP pour « Get private registries public key for an organization »
| Code de statut | Description |
|---|---|
200 | OK |
404 | Resource not found |
Exemples de code pour « Get private registries public key for an organization »
Exemple de requête
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2022-11-28" \
http(s)://HOSTNAME/api/v3/orgs/ORG/private-registries/public-keyResponse
Status: 200{
"key_id": "012345678912345678",
"key": "2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvv1234"
}Get a private registry for an organization
Get the configuration of a single private registry defined for an organization, omitting its encrypted value.
OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Jetons d’accès affinés pour « Get a private registry for an organization »
Ce point de terminaison fonctionne avec les types de tokens à granularité fine suivants:
- Jetons d’accès utilisateur d’application GitHub
- Jetons d’accès d’installation d’application GitHub
- Tokens d’accès personnel à granularité fine
Le token à granularité fine doit disposer de l’ensemble d’autorisations suivant:
- "Organization private registries" organization permissions (read)
Paramètres pour « Get a private registry for an organization »
| Nom, Type, Description |
|---|
accept string Setting to |
| Nom, Type, Description |
|---|
org string RequisThe organization name. The name is not case sensitive. |
secret_name string RequisThe name of the secret. |
Codes d’état de la réponse HTTP pour « Get a private registry for an organization »
| Code de statut | Description |
|---|---|
200 | The specified private registry configuration for the organization |
404 | Resource not found |
Exemples de code pour « Get a private registry for an organization »
Exemple de requête
curl -L \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2022-11-28" \
http(s)://HOSTNAME/api/v3/orgs/ORG/private-registries/SECRET_NAMEThe specified private registry configuration for the organization
Status: 200{
"name": "MAVEN_REPOSITORY_SECRET",
"registry_type": "maven_repository",
"username": "monalisa",
"visibility": "private",
"created_at": "2019-08-10T14:59:22Z",
"updated_at": "2020-01-10T14:59:22Z"
}Update a private registry for an organization
Updates a private registry configuration with an encrypted value for an organization. Encrypt your secret using LibSodium. For more information, see "Encrypting secrets for the REST API."
For OIDC-based registries (oidc_azure, oidc_aws, or oidc_jfrog), the encrypted_value and key_id fields should be omitted.
OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Jetons d’accès affinés pour « Update a private registry for an organization »
Ce point de terminaison fonctionne avec les types de tokens à granularité fine suivants:
- Jetons d’accès utilisateur d’application GitHub
- Jetons d’accès d’installation d’application GitHub
- Tokens d’accès personnel à granularité fine
Le token à granularité fine doit disposer de l’ensemble d’autorisations suivant:
- "Organization private registries" organization permissions (write)
Paramètres pour « Update a private registry for an organization »
| Nom, Type, Description |
|---|
accept string Setting to |
| Nom, Type, Description |
|---|
org string RequisThe organization name. The name is not case sensitive. |
secret_name string RequisThe name of the secret. |
| Nom, Type, Description |
|---|
registry_type string The registry type. Peut être l'un des: |
url string The URL of the private registry. |
username string or null The username to use when authenticating with the private registry. This field should be omitted if the private registry does not require a username for authentication. |
replaces_base boolean Whether this private registry should replace the base registry (e.g., npmjs.org for npm, rubygems.org for rubygems). When set to Par défaut: |
encrypted_value string The value for your secret, encrypted with LibSodium using the public key retrieved from the Get private registries public key for an organization endpoint. |
key_id string The ID of the key you used to encrypt the secret. |
visibility string Which type of organization repositories have access to the private registry. Peut être l'un des: |
selected_repository_ids array of integers An array of repository IDs that can access the organization private registry. You can only provide a list of repository IDs when |
auth_type string The authentication type for the private registry. This field cannot be changed after creation. If provided, it must match the existing Peut être l'un des: |
tenant_id string The tenant ID of the Azure AD application. Required when |
client_id string The client ID of the Azure AD application. Required when |
aws_region string The AWS region. Required when |
account_id string The AWS account ID. Required when |
role_name string The AWS IAM role name. Required when |
domain string The CodeArtifact domain. Required when |
domain_owner string The CodeArtifact domain owner (AWS account ID). Required when |
jfrog_oidc_provider_name string The JFrog OIDC provider name. Required when |
audience string The OIDC audience. Optional for |
identity_mapping_name string The JFrog identity mapping name. Optional for |
Codes d’état de la réponse HTTP pour « Update a private registry for an organization »
| Code de statut | Description |
|---|---|
204 | No Content |
404 | Resource not found |
422 | Validation failed, or the endpoint has been spammed. |
Delete a private registry for an organization
Delete a private registry configuration at the organization-level.
OAuth app tokens and personal access tokens (classic) need the admin:org scope to use this endpoint.
Jetons d’accès affinés pour « Delete a private registry for an organization »
Ce point de terminaison fonctionne avec les types de tokens à granularité fine suivants:
- Jetons d’accès utilisateur d’application GitHub
- Jetons d’accès d’installation d’application GitHub
- Tokens d’accès personnel à granularité fine
Le token à granularité fine doit disposer de l’ensemble d’autorisations suivant:
- "Organization private registries" organization permissions (write)
Paramètres pour « Delete a private registry for an organization »
| Nom, Type, Description |
|---|
accept string Setting to |
| Nom, Type, Description |
|---|
org string RequisThe organization name. The name is not case sensitive. |
secret_name string RequisThe name of the secret. |
Codes d’état de la réponse HTTP pour « Delete a private registry for an organization »
| Code de statut | Description |
|---|---|
204 | No Content |
400 | Bad Request |
404 | Resource not found |
Exemples de code pour « Delete a private registry for an organization »
Exemple de requête
curl -L \
-X DELETE \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer <YOUR-TOKEN>" \
-H "X-GitHub-Api-Version: 2022-11-28" \
http(s)://HOSTNAME/api/v3/orgs/ORG/private-registries/SECRET_NAMEResponse
Status: 204