diff --git a/clients/GitHub/etc/openapi-client-generator.state b/clients/GitHub/etc/openapi-client-generator.state index 94816a07a15..f2cdfa57b83 100644 --- a/clients/GitHub/etc/openapi-client-generator.state +++ b/clients/GitHub/etc/openapi-client-generator.state @@ -1,5 +1,5 @@ { - "specHash": "27d2025567219eabd469390370e022c1", + "specHash": "12cb03fcf4474304824f71a72f6d6238", "generatedFiles": { "files": [ { @@ -400,7 +400,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningAlertRule.php", - "hash": "f064fca88803f12f782b11188bad5429" + "hash": "9fc242a2a4d28599c7bd0845889c47eb" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningAnalysisToolVersion.php", @@ -440,7 +440,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningOrganizationAlertItems.php", - "hash": "3710c419a0a4d200bcd85f0227a47fbc" + "hash": "f37228ffa5baf182bffc1d0b7530cf6b" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodespaceMachine.php", @@ -844,15 +844,15 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningAlertRuleSummary.php", - "hash": "3d313d12408b39ac2145d20fa08ad45c" + "hash": "c5e4487bb2f2a1fc55261c3c06cdab89" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningAlertItems.php", - "hash": "25e47067404179c058125d6893424f86" + "hash": "de27c3958f8f4de9bc13e0950722abe5" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningAlert.php", - "hash": "a77284a1697008d3074e84f8086ec606" + "hash": "b370451840d6f1e8bf0b576de497a2df" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeScanningAlertSetState.php", @@ -5612,7 +5612,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Repos.php", - "hash": "6d99341ffc796ac03a95943c1ccee969" + "hash": "af3d3a3094434c46deb56bfd146053fc" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Billing.php", @@ -29736,11 +29736,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfiguration.php", - "hash": "2929d09f16a601a5e6f975ba05b59593" + "hash": "b2f59f01b94913f3d1a89504dde0b9fc" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityDefaultConfigurations.php", - "hash": "c0f711c94f6e2ee9fa37caaf94926b16" + "hash": "8ddbbdc7b8bfab1c3b91c4dc70408f63" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationRepositories.php", @@ -29772,11 +29772,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/CreateConfiguration\/Request\/ApplicationJson.php", - "hash": "6a73bd5ff2999e5fabd297689772695b" + "hash": "e7b4a6ed3db038b78c345e3858310437" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/UpdateConfiguration\/Request\/ApplicationJson.php", - "hash": "3e6bd2e263559ef3e41ee383f8456b0b" + "hash": "20d35e34f6680647d2573edab241377b" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/AttachConfiguration\/Request\/ApplicationJson.php", @@ -29788,7 +29788,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefault\/Response\/ApplicationJson\/Ok.php", - "hash": "77824b8868a85c0cba42241c1794aa49" + "hash": "a9fc6ccdcf6905ac3c34891ff7a0e3f5" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Router\/Get\/CodeSecurity.php", @@ -29816,7 +29816,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations.php", - "hash": "2721e9279c5ded99d6e11c3e0b051a52" + "hash": "0b954781d811dc57c0cb6babcb558261" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/Defaults.php", @@ -29824,7 +29824,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId.php", - "hash": "a46a61151298e9426e71dbce9890eb33" + "hash": "43ed702a6db58b95e65eed8bd8f002bd" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Attach.php", @@ -29832,7 +29832,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Defaults.php", - "hash": "0988e5a54185c8882a54b2e8d17e8274" + "hash": "b8642ec16a84428d1b41df3685980d04" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Repositories.php", @@ -30380,11 +30380,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationForRepository.php", - "hash": "4784a45bcc6839be000b61414c6fc878" + "hash": "bc5b87c96f040b8b0cf5f87ed821bd18" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/CodeSecurityConfiguration.php", - "hash": "6722483c203b44b54f486cfc06c938de" + "hash": "7dcec4c06679a3cc92277d71c122ff67" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/RepositoryRuleViolationError.php", diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php index 2a6d47eadb9..77f81d1f56d 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php @@ -280,6 +280,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningValidityChecks: + $value = $payload['secret_scanning_non_provider_patterns'] ?? null; + + if ($value === null) { + $properties['secretScanningNonProviderPatterns'] = null; + goto after_secretScanningNonProviderPatterns; + } + + $properties['secretScanningNonProviderPatterns'] = $value; + + after_secretScanningNonProviderPatterns: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -644,6 +655,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningValidityChecks: $result['secret_scanning_validity_checks'] = $secretScanningValidityChecks; + $secretScanningNonProviderPatterns = $object->secretScanningNonProviderPatterns; + + if ($secretScanningNonProviderPatterns === null) { + goto after_secretScanningNonProviderPatterns; + } + + after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php index ef77a4d6b84..81fdc07064f 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php @@ -219,6 +219,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningValidityChecks: + $value = $payload['secret_scanning_non_provider_patterns'] ?? null; + + if ($value === null) { + $properties['secretScanningNonProviderPatterns'] = null; + goto after_secretScanningNonProviderPatterns; + } + + $properties['secretScanningNonProviderPatterns'] = $value; + + after_secretScanningNonProviderPatterns: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -692,6 +703,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningValidityChecks: $result['secret_scanning_validity_checks'] = $secretScanningValidityChecks; + $secretScanningNonProviderPatterns = $object->secretScanningNonProviderPatterns; + + if ($secretScanningNonProviderPatterns === null) { + goto after_secretScanningNonProviderPatterns; + } + + after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php index b9c78803b3b..774d55187fa 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php @@ -269,6 +269,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningValidityChecks: + $value = $payload['secret_scanning_non_provider_patterns'] ?? null; + + if ($value === null) { + $properties['secretScanningNonProviderPatterns'] = null; + goto after_secretScanningNonProviderPatterns; + } + + $properties['secretScanningNonProviderPatterns'] = $value; + + after_secretScanningNonProviderPatterns: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -682,6 +693,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningValidityChecks: $result['secret_scanning_validity_checks'] = $secretScanningValidityChecks; + $secretScanningNonProviderPatterns = $object->secretScanningNonProviderPatterns; + + if ($secretScanningNonProviderPatterns === null) { + goto after_secretScanningNonProviderPatterns; + } + + after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php index e6e224cd87d..c9a4c5702ff 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php @@ -268,6 +268,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningValidityChecks: + $value = $payload['secret_scanning_non_provider_patterns'] ?? null; + + if ($value === null) { + $properties['secretScanningNonProviderPatterns'] = null; + goto after_secretScanningNonProviderPatterns; + } + + $properties['secretScanningNonProviderPatterns'] = $value; + + after_secretScanningNonProviderPatterns: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -681,6 +692,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningValidityChecks: $result['secret_scanning_validity_checks'] = $secretScanningValidityChecks; + $secretScanningNonProviderPatterns = $object->secretScanningNonProviderPatterns; + + if ($secretScanningNonProviderPatterns === null) { + goto after_secretScanningNonProviderPatterns; + } + + after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Schema/CodeScanningAlert.php b/clients/GitHub/src/Schema/CodeScanningAlert.php index a4e5d1ce362..6c8326e064d 100644 --- a/clients/GitHub/src/Schema/CodeScanningAlert.php +++ b/clients/GitHub/src/Schema/CodeScanningAlert.php @@ -326,7 +326,7 @@ }, "full_description": { "type": "string", - "description": "description of the rule used to detect the alert." + "description": "A description of the rule used to detect the alert." }, "tags": { "type": [ diff --git a/clients/GitHub/src/Schema/CodeScanningAlertItems.php b/clients/GitHub/src/Schema/CodeScanningAlertItems.php index 9e28e568539..8be329d0d10 100644 --- a/clients/GitHub/src/Schema/CodeScanningAlertItems.php +++ b/clients/GitHub/src/Schema/CodeScanningAlertItems.php @@ -324,6 +324,10 @@ "type": "string", "description": "A short description of the rule used to detect the alert." }, + "full_description": { + "type": "string", + "description": "A description of the rule used to detect the alert." + }, "tags": { "type": [ "array", @@ -333,6 +337,20 @@ "type": "string" }, "description": "A set of tags applicable for the rule." + }, + "help": { + "type": [ + "string", + "null" + ], + "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "type": [ + "string", + "null" + ], + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -487,7 +505,10 @@ "severity": "error", "security_severity_level": "low", "description": "generated", - "tags": null + "full_description": "generated", + "tags": null, + "help": "generated", + "help_uri": "generated" }, "tool": { "name": "generated", diff --git a/clients/GitHub/src/Schema/CodeScanningAlertRule.php b/clients/GitHub/src/Schema/CodeScanningAlertRule.php index 17bef270e11..c5c3ce0fb4d 100644 --- a/clients/GitHub/src/Schema/CodeScanningAlertRule.php +++ b/clients/GitHub/src/Schema/CodeScanningAlertRule.php @@ -56,7 +56,7 @@ }, "full_description": { "type": "string", - "description": "description of the rule used to detect the alert." + "description": "A description of the rule used to detect the alert." }, "tags": { "type": [ @@ -104,7 +104,7 @@ * severity: The severity of the alert. * securitySeverityLevel: The security severity of the alert. * description: A short description of the rule used to detect the alert. - * fullDescription: description of the rule used to detect the alert. + * fullDescription: A description of the rule used to detect the alert. * tags: A set of tags applicable for the rule. * help: Detailed documentation for the rule as GitHub Flavored Markdown. * helpUri: A link to the documentation for the rule used to detect the alert. diff --git a/clients/GitHub/src/Schema/CodeScanningAlertRuleSummary.php b/clients/GitHub/src/Schema/CodeScanningAlertRuleSummary.php index a9306176ede..a7a5a801bf2 100644 --- a/clients/GitHub/src/Schema/CodeScanningAlertRuleSummary.php +++ b/clients/GitHub/src/Schema/CodeScanningAlertRuleSummary.php @@ -54,6 +54,10 @@ "type": "string", "description": "A short description of the rule used to detect the alert." }, + "full_description": { + "type": "string", + "description": "A description of the rule used to detect the alert." + }, "tags": { "type": [ "array", @@ -63,6 +67,20 @@ "type": "string" }, "description": "A set of tags applicable for the rule." + }, + "help": { + "type": [ + "string", + "null" + ], + "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "type": [ + "string", + "null" + ], + "description": "A link to the documentation for the rule used to detect the alert." } } }'; @@ -74,7 +92,10 @@ "severity": "error", "security_severity_level": "low", "description": "generated", - "tags": null + "full_description": "generated", + "tags": null, + "help": "generated", + "help_uri": "generated" }'; /** @@ -83,10 +104,15 @@ * severity: The severity of the alert. * securitySeverityLevel: The security severity of the alert. * description: A short description of the rule used to detect the alert. + * fullDescription: A description of the rule used to detect the alert. * tags: A set of tags applicable for the rule. + * help: Detailed documentation for the rule as GitHub Flavored Markdown. + * helpUri: A link to the documentation for the rule used to detect the alert. */ public function __construct(public string|null $id, public string|null $name, public string|null $severity, #[MapFrom('security_severity_level')] - public string|null $securitySeverityLevel, public string|null $description, public array|null $tags,) + public string|null $securitySeverityLevel, public string|null $description, #[MapFrom('full_description')] + public string|null $fullDescription, public array|null $tags, public string|null $help, #[MapFrom('help_uri')] + public string|null $helpUri,) { } } diff --git a/clients/GitHub/src/Schema/CodeScanningOrganizationAlertItems.php b/clients/GitHub/src/Schema/CodeScanningOrganizationAlertItems.php index 75448f9f4d5..600e09c0fd0 100644 --- a/clients/GitHub/src/Schema/CodeScanningOrganizationAlertItems.php +++ b/clients/GitHub/src/Schema/CodeScanningOrganizationAlertItems.php @@ -325,6 +325,10 @@ "type": "string", "description": "A short description of the rule used to detect the alert." }, + "full_description": { + "type": "string", + "description": "A description of the rule used to detect the alert." + }, "tags": { "type": [ "array", @@ -334,6 +338,20 @@ "type": "string" }, "description": "A set of tags applicable for the rule." + }, + "help": { + "type": [ + "string", + "null" + ], + "description": "Detailed documentation for the rule as GitHub Flavored Markdown." + }, + "help_uri": { + "type": [ + "string", + "null" + ], + "description": "A link to the documentation for the rule used to detect the alert." } } }, @@ -1033,7 +1051,10 @@ "severity": "error", "security_severity_level": "low", "description": "generated", - "tags": null + "full_description": "generated", + "tags": null, + "help": "generated", + "help_uri": "generated" }, "tool": { "name": "generated", diff --git a/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php index e9eff030190..1a504a80744 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php @@ -125,6 +125,16 @@ "description": "The enablement status of secret scanning validity checks", "default": "disabled" }, + "secret_scanning_non_provider_patterns": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning non provider patterns", + "default": "disabled" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -164,6 +174,7 @@ "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", + "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -181,6 +192,7 @@ * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningValidityChecks: The enablement status of secret scanning validity checks + * secretScanningNonProviderPatterns: The enablement status of secret scanning non provider patterns * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -194,7 +206,8 @@ public function __construct(public string $name, public string $description, #[M public string|null $codeScanningDefaultSetup, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_validity_checks')] - public string|null $secretScanningValidityChecks, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php index 9269b9653b3..412891b897b 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php @@ -111,6 +111,15 @@ "type": "string", "description": "The enablement status of secret scanning validity checks" }, + "secret_scanning_non_provider_patterns": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning non-provider patterns" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -148,6 +157,7 @@ "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", + "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -165,6 +175,7 @@ * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningValidityChecks: The enablement status of secret scanning validity checks + * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -178,7 +189,8 @@ public function __construct(public string|null $name, public string|null $descri public string|null $codeScanningDefaultSetup, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_validity_checks')] - public string|null $secretScanningValidityChecks, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHub/src/Schema/CodeSecurityConfiguration.php b/clients/GitHub/src/Schema/CodeSecurityConfiguration.php index 1362edfc3f9..a0812be6750 100644 --- a/clients/GitHub/src/Schema/CodeSecurityConfiguration.php +++ b/clients/GitHub/src/Schema/CodeSecurityConfiguration.php @@ -122,6 +122,15 @@ "type": "string", "description": "The enablement status of secret scanning validity checks" }, + "secret_scanning_non_provider_patterns": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning non-provider patterns" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -179,6 +188,7 @@ "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", + "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", @@ -202,6 +212,7 @@ * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningValidityChecks: The enablement status of secret scanning validity checks + * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration * url: The URL of the configuration @@ -218,7 +229,8 @@ public function __construct(public int|null $id, public string|null $name, #[Map public string|null $codeScanningDefaultSetup, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_validity_checks')] - public string|null $secretScanningValidityChecks, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement, public string|null $url, #[MapFrom('html_url')] public string|null $htmlUrl, #[MapFrom('created_at')] public string|null $createdAt, #[MapFrom('updated_at')] diff --git a/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php b/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php index 333e59e45e7..5fc1108899b 100644 --- a/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php +++ b/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php @@ -138,6 +138,15 @@ "type": "string", "description": "The enablement status of secret scanning validity checks" }, + "secret_scanning_non_provider_patterns": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning non-provider patterns" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -200,6 +209,7 @@ "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", + "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php b/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php index e38f8414119..2122d230d24 100644 --- a/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php +++ b/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php @@ -133,6 +133,15 @@ "type": "string", "description": "The enablement status of secret scanning validity checks" }, + "secret_scanning_non_provider_patterns": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning non-provider patterns" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -194,6 +203,7 @@ "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", + "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php index eaca6d71236..8b1a3ac9f7f 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php @@ -135,6 +135,15 @@ "type": "string", "description": "The enablement status of secret scanning validity checks" }, + "secret_scanning_non_provider_patterns": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning non-provider patterns" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -196,6 +205,7 @@ "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", + "secret_scanning_non_provider_patterns": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", diff --git a/etc/specs/GitHub/current.spec.yaml b/etc/specs/GitHub/current.spec.yaml index bef6abb6fff..b10bbf6808f 100644 --- a/etc/specs/GitHub/current.spec.yaml +++ b/etc/specs/GitHub/current.spec.yaml @@ -6385,6 +6385,15 @@ paths: - disabled - not_set default: disabled + secret_scanning_non_provider_patterns: + type: string + description: The enablement status of secret scanning non provider + patterns + enum: + - enabled + - disabled + - not_set + default: disabled private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -6663,6 +6672,14 @@ paths: - enabled - disabled - not_set + secret_scanning_non_provider_patterns: + type: string + description: The enablement status of secret scanning non-provider + patterns + enum: + - enabled + - disabled + - not_set private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -71384,6 +71401,9 @@ components: description: type: string description: A short description of the rule used to detect the alert. + full_description: + type: string + description: A description of the rule used to detect the alert. tags: type: - array @@ -71391,6 +71411,17 @@ components: description: A set of tags applicable for the rule. items: type: string + help: + type: + - string + - 'null' + description: Detailed documentation for the rule as GitHub Flavored Markdown. + help_uri: + type: + - string + - 'null' + description: A link to the documentation for the rule used to detect the + alert. code-scanning-analysis-tool-version: type: - string @@ -71622,6 +71653,13 @@ components: - enabled - disabled - not_set + secret_scanning_non_provider_patterns: + type: string + description: The enablement status of secret scanning non-provider patterns + enum: + - enabled + - disabled + - not_set private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -79646,7 +79684,7 @@ components: description: A short description of the rule used to detect the alert. full_description: type: string - description: description of the rule used to detect the alert. + description: A description of the rule used to detect the alert. tags: type: - array