diff --git a/clients/GitHubEnterpriseCloud/etc/openapi-client-generator.state b/clients/GitHubEnterpriseCloud/etc/openapi-client-generator.state index 7f1548b0a11..67c068f9b17 100644 --- a/clients/GitHubEnterpriseCloud/etc/openapi-client-generator.state +++ b/clients/GitHubEnterpriseCloud/etc/openapi-client-generator.state @@ -1,5 +1,5 @@ { - "specHash": "95df4267202b432fe4f72cf542eb28c8", + "specHash": "bb053ea7f78df19d2e4d4872d9eed9c7", "generatedFiles": { "files": [ { @@ -312,7 +312,7 @@ }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/EnterpriseSecurityAnalysisSettings.php", - "hash": "fa55f13a444ba977099d0bfd3158c1d8" + "hash": "a75152065f60b36da8b303139762d15e" }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/GetConsumedLicenses.php", @@ -572,7 +572,7 @@ }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroup.php", - "hash": "cebbab02e23621517b4aca34ba476df4" + "hash": "0512e75d753ee10ea8578ea10188a2dd" }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroups.php", @@ -2876,7 +2876,7 @@ }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroup\/Members.php", - "hash": "9bd3d378bed94d8f19e46429ae1ecc83" + "hash": "48eee34ca95087dab3972109c20c3379" }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroups\/Groups.php", @@ -4672,7 +4672,7 @@ }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/SecretScanning\/PatchSecurityAnalysisSettingsForEnterprise\/Request\/ApplicationJson.php", - "hash": "78aed89e2889f054803c520c35e36e4e" + "hash": "a521f4f54420aeb0e2cf46ac934cbcae" }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/Gists\/Create\/Request\/ApplicationJson.php", @@ -27008,7 +27008,7 @@ }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurityAndAnalysis.php", - "hash": "0e44529ca73fa31f83b0647c27e0a9d6" + "hash": "537d8a3eaa539ad3acb231fe2e853fbc" }, { "name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/Dependabot\/Alerts.php", diff --git a/clients/GitHubEnterpriseCloud/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurityAndAnalysis.php b/clients/GitHubEnterpriseCloud/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurityAndAnalysis.php index 618d1af28e4..75bd0461415 100644 --- a/clients/GitHubEnterpriseCloud/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurityAndAnalysis.php +++ b/clients/GitHubEnterpriseCloud/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurityAndAnalysis.php @@ -116,6 +116,17 @@ private function hydrateApiClients⚡️Client⚡️GitHubEnterpriseCloud⚡️S after_secretScanningPushProtectionCustomLink: + $value = $payload['secret_scanning_non_provider_patterns_enabled_for_new_repositories'] ?? null; + + if ($value === null) { + $properties['secretScanningNonProviderPatternsEnabledForNewRepositories'] = null; + goto after_secretScanningNonProviderPatternsEnabledForNewRepositories; + } + + $properties['secretScanningNonProviderPatternsEnabledForNewRepositories'] = $value; + + after_secretScanningNonProviderPatternsEnabledForNewRepositories: + $value = $payload['secret_scanning_validity_checks_enabled'] ?? null; if ($value === null) { @@ -332,6 +343,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHubEnterpriseClou after_secretScanningPushProtectionCustomLink: $result['secret_scanning_push_protection_custom_link'] = $secretScanningPushProtectionCustomLink; + $secretScanningNonProviderPatternsEnabledForNewRepositories = $object->secretScanningNonProviderPatternsEnabledForNewRepositories; + + if ($secretScanningNonProviderPatternsEnabledForNewRepositories === null) { + goto after_secretScanningNonProviderPatternsEnabledForNewRepositories; + } + + after_secretScanningNonProviderPatternsEnabledForNewRepositories: $result['secret_scanning_non_provider_patterns_enabled_for_new_repositories'] = $secretScanningNonProviderPatternsEnabledForNewRepositories; + $secretScanningValidityChecksEnabled = $object->secretScanningValidityChecksEnabled; if ($secretScanningValidityChecksEnabled === null) { diff --git a/clients/GitHubEnterpriseCloud/src/Schema/EnterpriseSecurityAnalysisSettings.php b/clients/GitHubEnterpriseCloud/src/Schema/EnterpriseSecurityAnalysisSettings.php index 4ad3dca0f05..3fa4beb4260 100644 --- a/clients/GitHubEnterpriseCloud/src/Schema/EnterpriseSecurityAnalysisSettings.php +++ b/clients/GitHubEnterpriseCloud/src/Schema/EnterpriseSecurityAnalysisSettings.php @@ -63,6 +63,13 @@ "https:\\/\\/github.com\\/test-org\\/test-repo\\/blob\\/main\\/README.md" ] }, + "secret_scanning_non_provider_patterns_enabled_for_new_repositories": { + "type": "boolean", + "description": "Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise.", + "examples": [ + false + ] + }, "secret_scanning_validity_checks_enabled": { "type": "boolean", "description": "Whether secret scanning automatic validity checks on supported partner tokens is enabled for all repositories under this enterprise.", @@ -81,6 +88,7 @@ "secret_scanning_enabled_for_new_repositories": false, "secret_scanning_push_protection_enabled_for_new_repositories": false, "secret_scanning_push_protection_custom_link": "https:\\/\\/github.com\\/test-org\\/test-repo\\/blob\\/main\\/README.md", + "secret_scanning_non_provider_patterns_enabled_for_new_repositories": false, "secret_scanning_validity_checks_enabled": false }'; @@ -95,6 +103,7 @@ * secretScanningPushProtectionEnabledForNewRepositories: Whether secret scanning push protection is automatically enabled for new repositories and repositories transferred to this enterprise. * secretScanningPushProtectionCustomLink: An optional URL string to display to contributors who are blocked from pushing a secret. + * secretScanningNonProviderPatternsEnabledForNewRepositories: Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise. * secretScanningValidityChecksEnabled: Whether secret scanning automatic validity checks on supported partner tokens is enabled for all repositories under this enterprise. */ public function __construct(#[MapFrom('advanced_security_enabled_for_new_repositories')] @@ -103,7 +112,8 @@ public function __construct(#[MapFrom('advanced_security_enabled_for_new_reposit public bool $dependabotAlertsEnabledForNewRepositories, #[MapFrom('secret_scanning_enabled_for_new_repositories')] public bool $secretScanningEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_enabled_for_new_repositories')] public bool $secretScanningPushProtectionEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_custom_link')] - public string|null $secretScanningPushProtectionCustomLink, #[MapFrom('secret_scanning_validity_checks_enabled')] + public string|null $secretScanningPushProtectionCustomLink, #[MapFrom('secret_scanning_non_provider_patterns_enabled_for_new_repositories')] + public bool|null $secretScanningNonProviderPatternsEnabledForNewRepositories, #[MapFrom('secret_scanning_validity_checks_enabled')] public bool|null $secretScanningValidityChecksEnabled,) { } diff --git a/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup.php b/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup.php index 8c118a81a28..45cf68498fb 100644 --- a/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup.php +++ b/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup.php @@ -82,6 +82,7 @@ "required": [ "member_id", "member_login", + "member_name", "member_email" ], "type": "object", @@ -101,10 +102,7 @@ ] }, "member_name": { - "type": [ - "string", - "null" - ], + "type": "string", "description": "The user display name\\/profile name", "examples": [ "Mona Lisa" diff --git a/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup/Members.php b/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup/Members.php index 9f692d736fc..0b36783bc9f 100644 --- a/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup/Members.php +++ b/clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup/Members.php @@ -12,6 +12,7 @@ "required": [ "member_id", "member_login", + "member_name", "member_email" ], "type": "object", @@ -31,10 +32,7 @@ ] }, "member_name": { - "type": [ - "string", - "null" - ], + "type": "string", "description": "The user display name\\/profile name", "examples": [ "Mona Lisa" @@ -67,7 +65,7 @@ public function __construct(#[MapFrom('member_id')] public int $memberId, #[MapFrom('member_login')] public string $memberLogin, #[MapFrom('member_name')] - public string|null $memberName, #[MapFrom('member_email')] + public string $memberName, #[MapFrom('member_email')] public string $memberEmail,) { } diff --git a/clients/GitHubEnterpriseCloud/src/Schema/SecretScanning/PatchSecurityAnalysisSettingsForEnterprise/Request/ApplicationJson.php b/clients/GitHubEnterpriseCloud/src/Schema/SecretScanning/PatchSecurityAnalysisSettingsForEnterprise/Request/ApplicationJson.php index 3c20306c8ed..9066cc652d4 100644 --- a/clients/GitHubEnterpriseCloud/src/Schema/SecretScanning/PatchSecurityAnalysisSettingsForEnterprise/Request/ApplicationJson.php +++ b/clients/GitHubEnterpriseCloud/src/Schema/SecretScanning/PatchSecurityAnalysisSettingsForEnterprise/Request/ApplicationJson.php @@ -37,6 +37,13 @@ "null" ], "description": "The URL that will be displayed to contributors who are blocked from pushing a secret. For more information, see \\"[Protecting pushes with secret scanning](https:\\/\\/docs.github.com\\/enterprise-cloud@latest\\/\\/code-security\\/secret-scanning\\/protecting-pushes-with-secret-scanning).\\"\\nTo disable this functionality, set this field to `null`." + }, + "secret_scanning_non_provider_patterns_enabled_for_new_repositories": { + "type": [ + "boolean", + "null" + ], + "description": "Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise." } } }'; @@ -48,7 +55,8 @@ "dependabot_alerts_enabled_for_new_repositories": false, "secret_scanning_enabled_for_new_repositories": false, "secret_scanning_push_protection_enabled_for_new_repositories": false, - "secret_scanning_push_protection_custom_link": "generated" + "secret_scanning_push_protection_custom_link": "generated", + "secret_scanning_non_provider_patterns_enabled_for_new_repositories": false }'; /** @@ -59,6 +67,7 @@ * secretScanningPushProtectionEnabledForNewRepositories: Whether secret scanning push protection is automatically enabled for new repositories. For more information, see "[Protecting pushes with secret scanning](https://docs.github.com/enterprise-cloud@latest//code-security/secret-scanning/protecting-pushes-with-secret-scanning)." * secretScanningPushProtectionCustomLink: The URL that will be displayed to contributors who are blocked from pushing a secret. For more information, see "[Protecting pushes with secret scanning](https://docs.github.com/enterprise-cloud@latest//code-security/secret-scanning/protecting-pushes-with-secret-scanning)." To disable this functionality, set this field to `null`. + * secretScanningNonProviderPatternsEnabledForNewRepositories: Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise. */ public function __construct(#[MapFrom('advanced_security_enabled_for_new_repositories')] public bool|null $advancedSecurityEnabledForNewRepositories, #[MapFrom('advanced_security_enabled_new_user_namespace_repos')] @@ -66,7 +75,8 @@ public function __construct(#[MapFrom('advanced_security_enabled_for_new_reposit public bool|null $dependabotAlertsEnabledForNewRepositories, #[MapFrom('secret_scanning_enabled_for_new_repositories')] public bool|null $secretScanningEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_enabled_for_new_repositories')] public bool|null $secretScanningPushProtectionEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_custom_link')] - public string|null $secretScanningPushProtectionCustomLink,) + public string|null $secretScanningPushProtectionCustomLink, #[MapFrom('secret_scanning_non_provider_patterns_enabled_for_new_repositories')] + public bool|null $secretScanningNonProviderPatternsEnabledForNewRepositories,) { } } diff --git a/etc/specs/GitHubEnterpriseCloud/current.spec.yaml b/etc/specs/GitHubEnterpriseCloud/current.spec.yaml index 2dfd242ad16..1495685e2f3 100644 --- a/etc/specs/GitHubEnterpriseCloud/current.spec.yaml +++ b/etc/specs/GitHubEnterpriseCloud/current.spec.yaml @@ -3170,6 +3170,12 @@ paths: description: |- The URL that will be displayed to contributors who are blocked from pushing a secret. For more information, see "[Protecting pushes with secret scanning](https://docs.github.com/enterprise-cloud@latest//code-security/secret-scanning/protecting-pushes-with-secret-scanning)." To disable this functionality, set this field to `null`. + secret_scanning_non_provider_patterns_enabled_for_new_repositories: + type: + - boolean + - 'null' + description: Whether secret scanning of non-provider patterns is + enabled for new repositories under this enterprise. examples: default: value: @@ -3179,6 +3185,7 @@ paths: secret_scanning_enabled_for_new_repositories: true secret_scanning_push_protection_enabled_for_new_repositories: true secret_scanning_push_protection_custom_link: https://github.com/test-org/test-repo/blob/main/README.md + secret_scanning_non_provider_patterns_enabled_for_new_repositories: true responses: '204': description: Action started @@ -19000,7 +19007,7 @@ paths: The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint. - OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint. + OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint. tags: - orgs operationId: orgs/enable-or-disable-security-product-on-all-org-repos @@ -74810,6 +74817,12 @@ components: from pushing a secret. examples: - https://github.com/test-org/test-repo/blob/main/README.md + secret_scanning_non_provider_patterns_enabled_for_new_repositories: + type: boolean + description: Whether secret scanning of non-provider patterns is enabled + for new repositories under this enterprise. + examples: + - false secret_scanning_validity_checks_enabled: type: boolean description: Whether secret scanning automatic validity checks on supported @@ -79717,6 +79730,7 @@ components: required: - member_id - member_login + - member_name - member_email properties: member_id: @@ -79731,9 +79745,7 @@ components: - mona-lisa_eocsaxrs member_name: description: The user display name/profile name - type: - - string - - 'null' + type: string examples: - Mona Lisa member_email: @@ -208502,6 +208514,7 @@ components: secret_scanning_enabled_for_new_repositories: true secret_scanning_push_protection_enabled_for_new_repositories: true secret_scanning_push_protection_custom_link: https://github.com/test-org/test-repo/blob/main/README.md + secret_scanning_non_provider_patterns_enabled_for_new_repositories: true secret_scanning_validity_checks_enabled: true get-consumed-licenses: value: @@ -211533,6 +211546,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_validity_checks: enabled + secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/17 @@ -211555,6 +211569,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: enabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1326 @@ -211578,6 +211593,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -211603,6 +211619,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_validity_checks: enabled + secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -211650,6 +211667,7 @@ components: secret_scanning: disabled secret_scanning_push_protection: disabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -219238,6 +219256,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -232954,6 +232973,7 @@ components: - dependabot_alerts - secret_scanning - secret_scanning_push_protection + - secret_scanning_non_provider_patterns enterprise-security-product-enablement: name: enablement in: path