diff --git a/clients/GitHubEnterprise-3.15/etc/openapi-client-generator.state b/clients/GitHubEnterprise-3.15/etc/openapi-client-generator.state index 0592b171075..c80964f22a9 100644 --- a/clients/GitHubEnterprise-3.15/etc/openapi-client-generator.state +++ b/clients/GitHubEnterprise-3.15/etc/openapi-client-generator.state @@ -1,5 +1,5 @@ { - "specHash": "13765a979ded08b549109e71b65bcfcf", + "specHash": "3d1d0aa20a5ebee462aa16b1bf828099", "generatedFiles": { "files": [ { @@ -11056,7 +11056,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Operator\/EnterpriseAdmin\/ListProvisionedGroupsEnterprise.php", - "hash": "5ebd59b377fa56da84093860b074238a" + "hash": "75b7740fb512adfb41a711553a784db0" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/tests\/\/Internal\/Operation\/EnterpriseAdmin\/ListProvisionedGroupsEnterpriseTest.php", @@ -11128,7 +11128,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Operator\/EnterpriseAdmin\/ListProvisionedIdentitiesEnterprise.php", - "hash": "612cab6a7bf4459cf097650381dd5e75" + "hash": "613713434ca904649774a4361befc2fc" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/tests\/\/Internal\/Operation\/EnterpriseAdmin\/ListProvisionedIdentitiesEnterpriseTest.php", @@ -14136,11 +14136,11 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfiguration.php", - "hash": "77fe796fb9be30d76e9f7fb278cc7516" + "hash": "69f164f9a1e1334629fb710ef6c94620" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurityDefaultConfigurations.php", - "hash": "7c6a3796d7dc1eeb749770484c093fd8" + "hash": "5e84f90fbeaee5f94f552cefe4c98e8b" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationRepositories.php", @@ -14324,7 +14324,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/RepositoryRuleParamsRequiredReviewerConfiguration.php", - "hash": "47e0a5cbb3905406509b518cd447e517" + "hash": "8b7146363355a95c07cbf18c8466fc6c" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/RepositoryRulePullRequest.php", @@ -14716,7 +14716,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationForRepository.php", - "hash": "6b0fcce4cd5c07953cf64ebe3369a205" + "hash": "7f8f314ff97dba2f58ef1371c5803b96" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeownersErrors.php", @@ -25252,7 +25252,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/CreateConfiguration\/Request\/ApplicationJson.php", - "hash": "1108bfe82e79bd16d0b1ac26b7846ccf" + "hash": "a0d012dd8881066e4e16efd8b6916b26" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/DetachConfiguration\/Request\/ApplicationJson.php", @@ -25260,7 +25260,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/UpdateConfiguration\/Request\/ApplicationJson.php", - "hash": "7d4717de53d02f4366ef4643d9e0311e" + "hash": "ea9b2518eb520cd33fdceffed5ee9705" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/AttachConfiguration\/Request\/ApplicationJson.php", @@ -25272,7 +25272,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefault\/Response\/ApplicationJson\/Ok.php", - "hash": "9e025b0882641a7a6b39873d1af3c2c0" + "hash": "472fee19c1f7e13540e9c54f0d2f7e79" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/Operations\/Dependabot\/ListOrgSecrets\/Response\/ApplicationJson\/Ok.php", @@ -26660,7 +26660,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Router\/Get\/EnterpriseAdmin.php", - "hash": "3e9e34b8ec3f67e8458d4a00c2630835" + "hash": "9bd0fbc257fd34fe9c6661d7966a18cc" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Router\/Get\/SecurityAdvisories.php", @@ -27212,7 +27212,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Router\/Get\/Six.php", - "hash": "dcbf2b1bb7fb9cc9416745e8c13fcc14" + "hash": "03a78049cc14a10e8b8ad6bf8778c4ab" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Router\/Get\/Two.php", @@ -27424,11 +27424,11 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/PHPStan\/ClientCallReturnTypes.php", - "hash": "72c7f105d61896c8c4afa1b6a78f418b" + "hash": "057a0e66c0fac8be025f4333a6d16a9b" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/tests\/\/Types\/ClientCallReturnTypes.php", - "hash": "31e0c425fc6d0e0eb3032545e05117c0" + "hash": "0afba759e55aef88b3e3a19ce1993b10" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/..\/etc\/phpstan-extension.neon", @@ -27444,7 +27444,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Operation\/EnterpriseAdmin.php", - "hash": "28fab98c49c28961e606d06041d34534" + "hash": "7283ab444baadbfc831c091e6cd63c0d" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Operation\/SecurityAdvisories.php", @@ -28416,7 +28416,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations.php", - "hash": "7da42ecae4cf3c76a2762f30d6b49c58" + "hash": "ea9ae900f54ec0fe8170f7d43e2f0745" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/Defaults.php", @@ -28428,7 +28428,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId.php", - "hash": "cf7a6ff6f1f8c86201c4a3a48ec03ce1" + "hash": "12cbb19be2f4667f57a557e52a4f20f9" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Attach.php", @@ -28436,7 +28436,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Defaults.php", - "hash": "6fb830df7d6313b33ae5afd6b2e49d53" + "hash": "dbb03089b8ce31c9939450c8ed011af9" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Repositories.php", @@ -29072,7 +29072,7 @@ }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/CodeSecurityConfiguration.php", - "hash": "f69d395e426965e1d93ecb15dd6f1265" + "hash": "56977c8dc7a99add3a2d545a908fd214" }, { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/Codeowners\/Errors.php", @@ -30285,6 +30285,10 @@ { "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/WebhookCodeScanningAlertClosedByUser\/Alert\/DismissalApprovedBy.php", "hash": "b21a2b229d82f916d8ec095470db0021" + }, + { + "name": ".\/clients\/GitHubEnterprise-3.15\/etc\/..\/\/src\/\/Schema\/RepositoryRuleParamsReviewer.php", + "hash": "9fb5f3613d9deee11da6ff5294c91b66" } ] }, diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php index d8aec9ad3e3..2f869f2a150 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php @@ -291,6 +291,17 @@ private function hydrateApiClients⚡️Client⚡️GitHubEnterprise⚡️Schema after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['enforcement'] ?? null; if ($value === null) { @@ -652,6 +663,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHubEnterprise⚡ after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $enforcement = $object->enforcement; if ($enforcement === null) { diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php index 49da540dc26..8275050311f 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php @@ -230,6 +230,17 @@ private function hydrateApiClients⚡️Client⚡️GitHubEnterprise⚡️Schema after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['enforcement'] ?? null; if ($value === null) { @@ -700,6 +711,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHubEnterprise⚡ after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $enforcement = $object->enforcement; if ($enforcement === null) { diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php index 347228e1c2e..7809ae8fd23 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php @@ -280,6 +280,17 @@ private function hydrateApiClients⚡️Client⚡️GitHubEnterprise⚡️Schema after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['enforcement'] ?? null; if ($value === null) { @@ -690,6 +701,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHubEnterprise⚡ after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $enforcement = $object->enforcement; if ($enforcement === null) { diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php index 9b6d3e40a6a..a45a032a0dd 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php @@ -279,6 +279,17 @@ private function hydrateApiClients⚡️Client⚡️GitHubEnterprise⚡️Schema after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['enforcement'] ?? null; if ($value === null) { @@ -689,6 +700,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHubEnterprise⚡ after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $enforcement = $object->enforcement; if ($enforcement === null) { diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedGroupsEnterprise.php b/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedGroupsEnterprise.php index 4eeb755ec5d..0b938d14897 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedGroupsEnterprise.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedGroupsEnterprise.php @@ -25,6 +25,7 @@ public function __construct(private Browser $browser, private AuthenticationInte { } + /** @return */ public function call(string $filter, string $excludedAttributes, string $enterprise, int $startIndex = 1, int $count = 30): ScimEnterpriseGroupList|WithoutBody { $operation = new \ApiClients\Client\GitHubEnterprise\Internal\Operation\EnterpriseAdmin\ListProvisionedGroupsEnterprise($this->responseSchemaValidator, $this->hydrator, $filter, $excludedAttributes, $enterprise, $startIndex, $count); diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedIdentitiesEnterprise.php b/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedIdentitiesEnterprise.php index 397fdf6ac2b..9d765474662 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedIdentitiesEnterprise.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Operator/EnterpriseAdmin/ListProvisionedIdentitiesEnterprise.php @@ -25,6 +25,7 @@ public function __construct(private Browser $browser, private AuthenticationInte { } + /** @return */ public function call(string $filter, string $enterprise, int $startIndex = 1, int $count = 30): ScimEnterpriseUserList|WithoutBody { $operation = new \ApiClients\Client\GitHubEnterprise\Internal\Operation\EnterpriseAdmin\ListProvisionedIdentitiesEnterprise($this->responseSchemaValidator, $this->hydrator, $filter, $enterprise, $startIndex, $count); diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/EnterpriseAdmin.php b/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/EnterpriseAdmin.php index 8aba02d7952..5e0899d9257 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/EnterpriseAdmin.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/EnterpriseAdmin.php @@ -663,6 +663,7 @@ public function getPreReceiveHookForRepo(array $params): RepositoryPreReceiveHoo return $operator->call($arguments['owner'], $arguments['repo'], $arguments['pre_receive_hook_id']); } + /** @return */ public function listProvisionedGroupsEnterprise(array $params): ScimEnterpriseGroupList|WithoutBody { $arguments = []; @@ -701,6 +702,7 @@ public function listProvisionedGroupsEnterprise(array $params): ScimEnterpriseGr return $operator->call($arguments['filter'], $arguments['excludedAttributes'], $arguments['enterprise'], $arguments['startIndex'], $arguments['count']); } + /** @return */ public function listProvisionedIdentitiesEnterprise(array $params): ScimEnterpriseUserList|WithoutBody { $arguments = []; diff --git a/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/Six.php b/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/Six.php index 5954018a00d..d580d991783 100644 --- a/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/Six.php +++ b/clients/GitHubEnterprise-3.15/src/Internal/Router/Get/Six.php @@ -70,7 +70,7 @@ public function __construct(private Routers $routers) { } - /** @return |Observable|Observable|WithoutBody|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Schema\Operations\Repos\GetCodeFrequencyStats\Response\ApplicationJson\Accepted\Application\Json|Observable|Schema\Operations\Repos\GetCommitActivityStats\Response\ApplicationJson\Accepted\Application\Json|Observable|Schema\Operations\Repos\GetContributorsStats\Response\ApplicationJson\Accepted\Application\Json|Observable|Schema\ScimEnterpriseGroupList|\ApiClients\Tools\OpenApiClient\Utils\Response\WithoutBody|Schema\ScimEnterpriseUserList|Observable|Observable|Observable|Observable */ + /** @return |Observable|Observable|WithoutBody|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Observable|Schema\Operations\Repos\GetCodeFrequencyStats\Response\ApplicationJson\Accepted\Application\Json|Observable|Schema\Operations\Repos\GetCommitActivityStats\Response\ApplicationJson\Accepted\Application\Json|Observable|Schema\Operations\Repos\GetContributorsStats\Response\ApplicationJson\Accepted\Application\Json|Observable|Observable|Observable|Observable|Observable */ public function call(string $call, array $params, array $pathChunks): PreReceiveEnvironmentDownloadStatus|ActionsCacheUsageOrgEnterprise|ActionsCacheUsagePolicyEnterprise|Ok|SelectedActions|ActionsGetDefaultWorkflowPermissions|RunnerGroupsEnterprise|iterable|Runner|AdvancedSecurityActiveCommitters|\ApiClients\Client\GitHubEnterprise\Schema\Operations\EnterpriseAdmin\GetManageConfigApplyEvents\Response\ApplicationJson\Ok|WithoutBody|GhesLicenseCheck|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\GetActionsCacheUsageByRepoForOrg\Response\ApplicationJson\Ok|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListSelectedRepositoriesEnabledGithubActionsOrganization\Response\ApplicationJson\Ok|RunnerGroupsOrg|ActionsPublicKey|OrganizationActionsSecret|OrganizationActionsVariable|CodeSecurityConfiguration|DependabotPublicKey|OrganizationDependabotSecret|WebhookConfig|Package|CustomProperty|RuleSuite|ExternalGroups|ProjectCollaboratorPermission|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListArtifactsForRepo\Response\ApplicationJson\Ok|ActionsCacheList|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListRepoOrganizationSecrets\Response\ApplicationJson\Ok|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListRepoOrganizationVariables\Response\ApplicationJson\Ok|ActionsRepositoryPermissions|Json|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListWorkflowRunsForRepo\Response\ApplicationJson\Ok|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListRepoSecrets\Response\ApplicationJson\Ok\Application\Json|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListRepoVariables\Response\ApplicationJson\Ok\Application\Json|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Actions\ListRepoWorkflows\Response\ApplicationJson\Ok|Autolink|BranchWithProtection|BasicError|CheckRun|CheckSuite|CodeScanningDefaultSetup|CodeownersErrors|CommitComment|Commit|CommitComparison|ContentDirectory|ContentFile|ContentSymlink|ContentSubmodule|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Dependabot\ListRepoSecrets\Response\ApplicationJson\Ok|DependencyGraphSpdxSbom|Deployment|Environment|Hook|Issue|DeployKey|Label|Milestone|RepositoryPreReceiveHook|PullRequest|Release|RepositoryRuleset|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Repos\GetCodeFrequencyStats\Response\ApplicationJson\Accepted\Application\Json|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Repos\GetCommitActivityStats\Response\ApplicationJson\Accepted\Application\Json|\ApiClients\Client\GitHubEnterprise\Schema\Operations\Repos\GetContributorsStats\Response\ApplicationJson\Accepted\Application\Json|ParticipationStats|ScimEnterpriseGroupList|ScimEnterpriseUserList|TeamRepository { if ($pathChunks[0] === '') { diff --git a/clients/GitHubEnterprise-3.15/src/Operation/EnterpriseAdmin.php b/clients/GitHubEnterprise-3.15/src/Operation/EnterpriseAdmin.php index 6c1705f572a..695719962cc 100644 --- a/clients/GitHubEnterprise-3.15/src/Operation/EnterpriseAdmin.php +++ b/clients/GitHubEnterprise-3.15/src/Operation/EnterpriseAdmin.php @@ -774,6 +774,7 @@ public function updatePreReceiveHookEnforcementForRepo(string $owner, string $re return $this->operators->enterpriseAdmin👷UpdatePreReceiveHookEnforcementForRepo()->call($owner, $repo, $preReceiveHookId, $params); } + /** @return */ public function listProvisionedGroupsEnterprise(string $filter, string $excludedAttributes, string $enterprise, int $startIndex, int $count): ScimEnterpriseGroupList|WithoutBody { return $this->operators->enterpriseAdmin👷ListProvisionedGroupsEnterprise()->call($filter, $excludedAttributes, $enterprise, $startIndex, $count); @@ -809,6 +810,7 @@ public function updateAttributeForEnterpriseGroup(string $scimGroupId, string $e return $this->operators->enterpriseAdmin👷UpdateAttributeForEnterpriseGroup()->call($scimGroupId, $enterprise, $params); } + /** @return */ public function listProvisionedIdentitiesEnterprise(string $filter, string $enterprise, int $startIndex, int $count): ScimEnterpriseUserList|WithoutBody { return $this->operators->enterpriseAdmin👷ListProvisionedIdentitiesEnterprise()->call($filter, $enterprise, $startIndex, $count); diff --git a/clients/GitHubEnterprise-3.15/src/PHPStan/ClientCallReturnTypes.php b/clients/GitHubEnterprise-3.15/src/PHPStan/ClientCallReturnTypes.php index fde21772f77..1fab040d149 100644 --- a/clients/GitHubEnterprise-3.15/src/PHPStan/ClientCallReturnTypes.php +++ b/clients/GitHubEnterprise-3.15/src/PHPStan/ClientCallReturnTypes.php @@ -3904,7 +3904,7 @@ public function getTypeFromMethodCall(MethodReflection $methodReflection, Method } if ($call === 'GET /scim/v2/enterprises/{enterprise}/Groups') { - return $this->typeResolver->resolve('Schema\\ScimEnterpriseGroupList|\\ApiClients\\Tools\\OpenApiClient\\Utils\\Response\\WithoutBody'); + return $this->typeResolver->resolve(''); } if ($call === 'POST /scim/v2/enterprises/{enterprise}/Groups') { @@ -3928,7 +3928,7 @@ public function getTypeFromMethodCall(MethodReflection $methodReflection, Method } if ($call === 'GET /scim/v2/enterprises/{enterprise}/Users') { - return $this->typeResolver->resolve('Schema\\ScimEnterpriseUserList|\\ApiClients\\Tools\\OpenApiClient\\Utils\\Response\\WithoutBody'); + return $this->typeResolver->resolve(''); } if ($call === 'POST /scim/v2/enterprises/{enterprise}/Users') { diff --git a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php index 38797bed531..9ebe2dbec6e 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php @@ -155,6 +155,15 @@ "description": "The enablement status of secret scanning non provider patterns", "default": "disabled" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -204,6 +213,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -222,6 +232,7 @@ * secretScanningDelegatedBypassOptions: Feature options for secret scanning delegated bypass * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non provider patterns + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -236,7 +247,8 @@ public function __construct(public string $name, public string $description, #[M public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] public Schema\CodeSecurity\CreateConfiguration\Request\ApplicationJson\SecretScanningDelegatedBypassOptions|null $secretScanningDelegatedBypassOptions, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] - public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php index b0e4bfae449..d1653a83a56 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php @@ -141,6 +141,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -188,6 +197,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -206,6 +216,7 @@ * secretScanningDelegatedBypassOptions: Feature options for secret scanning delegated bypass * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -220,7 +231,8 @@ public function __construct(public string|null $name, public string|null $descri public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] public Schema\CodeSecurity\UpdateConfiguration\Request\ApplicationJson\SecretScanningDelegatedBypassOptions|null $secretScanningDelegatedBypassOptions, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] - public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfiguration.php b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfiguration.php index d0ccb74ac92..fa20626457b 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfiguration.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfiguration.php @@ -153,6 +153,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "enforcement": { "enum": [ "enforced", @@ -211,6 +220,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", "html_url": "https:\\/\\/example.com\\/", @@ -234,6 +244,7 @@ * secretScanningDelegatedBypassOptions: Feature options for secret scanning delegated bypass * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * enforcement: The enforcement status for a security configuration * url: The URL of the configuration * htmlUrl: The URL of the configuration @@ -250,7 +261,8 @@ public function __construct(public int|null $id, public string|null $name, #[Map public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] public Schema\CodeSecurityConfiguration\SecretScanningDelegatedBypassOptions|null $secretScanningDelegatedBypassOptions, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] - public string|null $secretScanningNonProviderPatterns, public string|null $enforcement, public string|null $url, #[MapFrom('html_url')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, public string|null $enforcement, public string|null $url, #[MapFrom('html_url')] public string|null $htmlUrl, #[MapFrom('created_at')] public string|null $createdAt, #[MapFrom('updated_at')] public string|null $updatedAt,) diff --git a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfigurationForRepository.php b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfigurationForRepository.php index ca46f12d4be..8df42f6ccdc 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfigurationForRepository.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityConfigurationForRepository.php @@ -169,6 +169,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "enforcement": { "enum": [ "enforced", @@ -232,6 +241,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", "html_url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityDefaultConfigurations.php b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityDefaultConfigurations.php index dcc2c1737ee..8f8036ae9b1 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityDefaultConfigurations.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/CodeSecurityDefaultConfigurations.php @@ -164,6 +164,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "enforcement": { "enum": [ "enforced", @@ -226,6 +235,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", "html_url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHubEnterprise-3.15/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php b/clients/GitHubEnterprise-3.15/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php index e0a98efed31..4192a878c47 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php @@ -166,6 +166,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "enforcement": { "enum": [ "enforced", @@ -228,6 +237,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", "html_url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php b/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php index e64b1e83662..bbfc377b8af 100644 --- a/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php +++ b/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php @@ -4,6 +4,7 @@ namespace ApiClients\Client\GitHubEnterprise\Schema; +use ApiClients\Client\GitHubEnterprise\Schema; use EventSauce\ObjectHydrator\MapFrom; final readonly class RepositoryRuleParamsRequiredReviewerConfiguration @@ -12,8 +13,7 @@ "title": "RequiredReviewerConfiguration", "required": [ "file_patterns", - "minimum_approvals", - "reviewer_id" + "minimum_approvals" ], "type": "object", "properties": { @@ -28,9 +28,27 @@ "type": "integer", "description": "Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional." }, - "reviewer_id": { - "type": "string", - "description": "Node ID of the team which must review changes to matching files." + "reviewer": { + "title": "Reviewer", + "required": [ + "id", + "type" + ], + "type": "object", + "properties": { + "id": { + "type": "integer", + "description": "ID of the reviewer which must review changes to matching files." + }, + "type": { + "enum": [ + "Team" + ], + "type": "string", + "description": "The type of the reviewer" + } + }, + "description": "A required reviewing team" } }, "description": "A reviewing team, and file patterns describing which files they must approve changes to." @@ -43,18 +61,20 @@ "generated" ], "minimum_approvals": 17, - "reviewer_id": "generated" + "reviewer": { + "id": 2, + "type": "Team" + } }'; /** * filePatterns: Array of file patterns. Pull requests which change matching files must be approved by the specified team. File patterns use the same syntax as `.gitignore` files. * minimumApprovals: Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional. - * reviewerId: Node ID of the team which must review changes to matching files. + * reviewer: A required reviewing team */ public function __construct(#[MapFrom('file_patterns')] public array $filePatterns, #[MapFrom('minimum_approvals')] - public int $minimumApprovals, #[MapFrom('reviewer_id')] - public string $reviewerId,) + public int $minimumApprovals, public Schema\RepositoryRuleParamsReviewer|null $reviewer,) { } } diff --git a/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsReviewer.php b/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsReviewer.php new file mode 100644 index 00000000000..12beb393608 --- /dev/null +++ b/clients/GitHubEnterprise-3.15/src/Schema/RepositoryRuleParamsReviewer.php @@ -0,0 +1,45 @@ +', $client->call('STREAM /repos/{owner}/{repo}/zipball/{ref}')); assertType('', $client->call('POST /repos/{template_owner}/{template_repo}/generate')); assertType('Observable|WithoutBody', $client->call('GET /repositories')); -assertType('Schema\\ScimEnterpriseGroupList|\\ApiClients\\Tools\\OpenApiClient\\Utils\\Response\\WithoutBody', $client->call('GET /scim/v2/enterprises/{enterprise}/Groups')); +assertType('', $client->call('GET /scim/v2/enterprises/{enterprise}/Groups')); assertType('', $client->call('POST /scim/v2/enterprises/{enterprise}/Groups')); assertType('', $client->call('GET /scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}')); assertType('', $client->call('PUT /scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}')); assertType('', $client->call('DELETE /scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}')); assertType('', $client->call('PATCH /scim/v2/enterprises/{enterprise}/Groups/{scim_group_id}')); -assertType('Schema\\ScimEnterpriseUserList|\\ApiClients\\Tools\\OpenApiClient\\Utils\\Response\\WithoutBody', $client->call('GET /scim/v2/enterprises/{enterprise}/Users')); +assertType('', $client->call('GET /scim/v2/enterprises/{enterprise}/Users')); assertType('', $client->call('POST /scim/v2/enterprises/{enterprise}/Users')); assertType('', $client->call('GET /scim/v2/enterprises/{enterprise}/Users/{scim_user_id}')); assertType('', $client->call('PUT /scim/v2/enterprises/{enterprise}/Users/{scim_user_id}')); diff --git a/etc/specs/GitHubEnterprise-3.15/current.spec.yaml b/etc/specs/GitHubEnterprise-3.15/current.spec.yaml index e989d860a38..d5db6f6b012 100644 --- a/etc/specs/GitHubEnterprise-3.15/current.spec.yaml +++ b/etc/specs/GitHubEnterprise-3.15/current.spec.yaml @@ -8461,7 +8461,7 @@ paths: description: |- Gets information about an organization. - When the value of `two_factor_requirement_enabled` is `true`, the organization requires all members, billing managers, and outside collaborators to enable [two-factor authentication](https://docs.github.com/enterprise-server@3.15/articles/securing-your-account-with-two-factor-authentication-2fa/). + When the value of `two_factor_requirement_enabled` is `true`, the organization requires all members, billing managers, outside collaborators, guest collaborators, repository collaborators, or everyone with access to any repository within the organization to enable [two-factor authentication](https://docs.github.com/enterprise-server@3.15/articles/securing-your-account-with-two-factor-authentication-2fa/). To see the full details about an organization, the authenticated user must be an organization owner. @@ -11486,6 +11486,14 @@ paths: - disabled - not_set default: disabled + secret_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of secret scanning delegated + alert dismissal + enum: + - enabled + - disabled + - not_set private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -11797,6 +11805,14 @@ paths: - enabled - disabled - not_set + secret_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of secret scanning delegated + alert dismissal + enum: + - enabled + - disabled + - not_set private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -74815,6 +74831,13 @@ components: - enabled - disabled - not_set + secret_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of secret scanning delegated alert dismissal + enum: + - enabled + - disabled + - not_set enforcement: type: string description: The enforcement status for a security configuration @@ -77289,6 +77312,22 @@ components: type: string enum: - required_signatures + repository-rule-params-reviewer: + title: Reviewer + description: A required reviewing team + type: object + properties: + id: + type: integer + description: ID of the reviewer which must review changes to matching files. + type: + type: string + description: The type of the reviewer + enum: + - Team + required: + - id + - type repository-rule-params-required-reviewer-configuration: title: RequiredReviewerConfiguration description: A reviewing team, and file patterns describing which files they @@ -77307,13 +77346,11 @@ components: description: Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional. - reviewer_id: - type: string - description: Node ID of the team which must review changes to matching files. + reviewer: + "$ref": "#/components/schemas/repository-rule-params-reviewer" required: - file_patterns - minimum_approvals - - reviewer_id repository-rule-pull-request: title: pull_request description: Require all commits be made to a non-target branch and submitted @@ -205729,6 +205766,7 @@ components: secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled + secret_scanning_delegated_alert_dismissal: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 html_url: https://github.com/organizations/octo-org/settings/security_products/configurations/edit/1325