diff --git a/clients/GitHub/etc/openapi-client-generator.state b/clients/GitHub/etc/openapi-client-generator.state index c4ed449e0c8..7221ea0454f 100644 --- a/clients/GitHub/etc/openapi-client-generator.state +++ b/clients/GitHub/etc/openapi-client-generator.state @@ -1,5 +1,5 @@ { - "specHash": "28a997033a88fffc4459106785ce7992", + "specHash": "7d381dcec5cc31f738fdd8a803bade45", "generatedFiles": { "files": [ { @@ -164,7 +164,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/DependabotAlertWithRepository.php", - "hash": "d0a3d8c1e4a1d1125ae948de2e2151f6" + "hash": "19d57a147f10856ebbc7323077fbee66" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/SecretScanningAlertState.php", @@ -1008,7 +1008,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/DependabotAlert.php", - "hash": "481f5e2e831cc7f376dc4af48bdc8ebf" + "hash": "c82842939f39de0120e89e2c7052047e" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/DependabotSecret.php", @@ -1660,31 +1660,31 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertAutoDismissed.php", - "hash": "2fbd1c6ba4f9549cf824b7062494070f" + "hash": "75de4654385dc9c0d8112a7935ccf945" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertAutoReopened.php", - "hash": "cdadd53d4c272e8d1080285a7cbad1af" + "hash": "c6018be89ae9d0232bf9faf4358af068" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertCreated.php", - "hash": "63e8121d36942160adfd0470ff82981a" + "hash": "296a8e3a5061f4c7d83fd4236d937a6f" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertDismissed.php", - "hash": "1962366c1fa3f8ebeba18a2bbc18235f" + "hash": "bb281cdda1baebcf33d5da0377dd2062" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertFixed.php", - "hash": "eaf410f2f794b2611a5d886af066b67d" + "hash": "283d168eef2c593961d73dbc43c1dc28" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertReintroduced.php", - "hash": "0ca2ff1f41d7eeadeb813bdf160354a6" + "hash": "068fccc8955bd540eb6bf87ce7d68fb8" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDependabotAlertReopened.php", - "hash": "2a3f4ca36fb746a6c193241418529043" + "hash": "9494826b04298ccba370841e38ac280a" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/WebhookDeployKeyCreated.php", @@ -2568,7 +2568,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/DependabotAlertWithRepository\/Dependency.php", - "hash": "94a8a63ec89c4db6314c917bfc7d0764" + "hash": "57fddd0525280a643b23a28a622b1f5d" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Issue\/Labels\/One.php", @@ -5512,7 +5512,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Meta.php", - "hash": "630a23f7ecb27ee3bb5e4c88741ad824" + "hash": "a8fadfb42bcf3fccda0029ce0998b2a3" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Apps.php", @@ -5620,7 +5620,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/DependencyGraph.php", - "hash": "656b7e27c0cde91ed76b8b2213d8f170" + "hash": "8d5ee75ad1579f7a6399f58316194408" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Git.php", @@ -5636,7 +5636,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Search.php", - "hash": "ee12f241f0b090c001e174e2d18f66d6" + "hash": "790a68916ca9937184ccf543b96b06a5" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Operation\/Users.php", @@ -5678,13 +5678,9 @@ "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/MinimalRepository\/Permissions.php", "hash": "493ab0cb6a9ab4209505dbb63073b14c" }, - { - "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet2BF61F22\/TietD40E495C\/TietD2DCD6B6\/Tiet9D8D9B32.php", - "hash": "9844c6bdb614a6ef1f9fe186ba21e350" - }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/DependabotAlert\/Dependency.php", - "hash": "444d7db42759ed2c96aafbc2209815b8" + "hash": "d62b5259fbdd9c9a8be33bdae27b67be" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet0B6D5155\/Tiet9712C7F9\/Tiet6BF72693\/Tiet5B5B145C.php", @@ -26120,7 +26116,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/Dependabot\/Alerts\/AlertNumber.php", - "hash": "e996ec8cc3a491b3332a767fdd015a25" + "hash": "fa51e9afe2cca4a13f8949fa45c4900a" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/Dependabot\/Secrets.php", @@ -27952,7 +27948,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/WebHook\/DependabotAlert.php", - "hash": "a8ba2098566aadc32304061858b218cb" + "hash": "55972a4da987e6aa672c97404819979c" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/WebHook\/DeployKey.php", @@ -29520,11 +29516,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfiguration.php", - "hash": "f20de205cb27afd4ec5c60c5bef9a13a" + "hash": "6fa3b70a5c361f2d09768be1e9693405" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityDefaultConfigurations.php", - "hash": "a8538fd1091c2facce49e5808667f267" + "hash": "9bffc9d5169b7a695e3ce54ec561150f" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationRepositories.php", @@ -29556,11 +29552,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/CreateConfiguration\/Request\/ApplicationJson.php", - "hash": "ab81f1f2f0a4cd063a865d5e8024e950" + "hash": "5646c3c49125e0700fb8ab5f45517a95" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/UpdateConfiguration\/Request\/ApplicationJson.php", - "hash": "26b79c831829a41b4068d372b5f999dd" + "hash": "86d93c19861040f3b84a300be6b95efb" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/AttachConfiguration\/Request\/ApplicationJson.php", @@ -29572,7 +29568,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefault\/Response\/ApplicationJson\/Ok.php", - "hash": "a68c5a593a6af7da20441dfab93d8602" + "hash": "c277cbc66eb5e5df8e027a77f19288f3" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Router\/Get\/CodeSecurity.php", @@ -29600,7 +29596,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations.php", - "hash": "2b0dca37e7b529b0ea1dbac39cb91ab0" + "hash": "1ad07cf2f1fc8d8d898aeb88fb2244f4" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/Defaults.php", @@ -29608,7 +29604,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId.php", - "hash": "85d762553783a0e8174f01e646bc9ac4" + "hash": "684c7d80d2d41314317efd973f4e3cf3" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Attach.php", @@ -29616,7 +29612,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Defaults.php", - "hash": "e609102ce982a3a393e89da8c9608470" + "hash": "7ad6f510a395406ceaa7b16597dd80da" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Repositories.php", @@ -29988,11 +29984,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationForRepository.php", - "hash": "d49be93753db098a0bd04f5fe933108a" + "hash": "7bbb0892e03ce1785c4bb5c855e0cc78" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/CodeSecurityConfiguration.php", - "hash": "fe07972644d1b2b924a556aaf9475fc6" + "hash": "173415bcf1ad1d60f5bb918f0d3d7dea" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/RepositoryRuleViolationError.php", @@ -31216,7 +31212,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/CreateConfigurationForEnterprise\/Request\/ApplicationJson.php", - "hash": "b1da6d3375663273038d8ab3afff1868" + "hash": "2ce47ed76f47e5c39f4a632b9ae26a44" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet8DAAD835\/Tiet93FE8D1C\/TietAC26D50C\/Tiet27D4E07F.php", @@ -31228,7 +31224,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/UpdateEnterpriseConfiguration\/Request\/ApplicationJson.php", - "hash": "b166d86639b7f00fce90cb021c139787" + "hash": "d1ba7993ed6a7065d3d738b98b22fcda" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/AttachEnterpriseConfiguration\/Request\/ApplicationJson.php", @@ -31244,19 +31240,19 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefault\/Response\/ApplicationJson\/Ok\/Application\/Json.php", - "hash": "9afab84283d0311dbd8645af4c542d61" + "hash": "3715801ec5cadace2a829bf2438ca24a" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefaultForEnterprise\/Response\/ApplicationJson\/Ok.php", - "hash": "fd0434a860b3500136b9ec3b13b3a05e" + "hash": "2c845679a250e6c8e1533f52a57b281a" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations.php", - "hash": "e4527ab701e3a7bdbeab6819095aa96a" + "hash": "d300ae241efce5f0a84d4e638cc170f6" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId.php", - "hash": "18435302cee443a5cde1dbcaf349d560" + "hash": "137bccf756f40f129b04974c90020868" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId\/Attach.php", @@ -31264,7 +31260,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId\/Defaults.php", - "hash": "28b7549941db88d35205e0f56e19bba7" + "hash": "d702bcb56f0af36dfe9deb42a6b6232a" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId\/Repositories.php", @@ -31927,8 +31923,12 @@ "hash": "1772ce79c7845de3518510cadfd50aa0" }, { - "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet93141EDA\/Tiet7E1CE92E\/Tiet73282F1D\/Tiet55BAEBBF.php", - "hash": "dc4909fcebbe22d0b43187e33ce68def" + "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet1DA73592\/TietBB556EE9\/Tiet519FED8E\/TietFC41A28A.php", + "hash": "d73b11aad11657d2057377f077ab071f" + }, + { + "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet754DB2AE\/TietE5139940\/TietE72CE13C\/TietD3BE351E.php", + "hash": "274ed1345c9ce3ce86361dcf9dee238e" } ] }, diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php index 7ecb52aa270..ac96bfdb135 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php @@ -273,6 +273,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -878,6 +889,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php index 35a4180722c..e73db54ca1b 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php @@ -210,6 +210,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -838,6 +849,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php index 4aa25dc7e47..fb173aa3039 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php @@ -260,6 +260,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -828,6 +839,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php index 78b1c38b465..36ececdee7a 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php @@ -271,6 +271,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -790,6 +801,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php index e4408a4befa..47b0ca5df27 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php @@ -210,6 +210,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -838,6 +849,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php index 1170b0e9f24..6541da93618 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php @@ -260,6 +260,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -828,6 +839,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php index 27787c972f0..77a29da0be0 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php @@ -259,6 +259,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_codeScanningDefaultSetupOptions: + $value = $payload['code_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['codeScanningDelegatedAlertDismissal'] = null; + goto after_codeScanningDelegatedAlertDismissal; + } + + $properties['codeScanningDelegatedAlertDismissal'] = $value; + + after_codeScanningDelegatedAlertDismissal: + $value = $payload['secret_scanning'] ?? null; if ($value === null) { @@ -827,6 +838,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema $codeScanningDefaultSetupOptions = $this->serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema⚡️CodeSecurityConfiguration⚡️CodeScanningDefaultSetupOptions($codeScanningDefaultSetupOptions); after_codeScanningDefaultSetupOptions: $result['code_scanning_default_setup_options'] = $codeScanningDefaultSetupOptions; + $codeScanningDelegatedAlertDismissal = $object->codeScanningDelegatedAlertDismissal; + + if ($codeScanningDelegatedAlertDismissal === null) { + goto after_codeScanningDelegatedAlertDismissal; + } + + after_codeScanningDelegatedAlertDismissal: $result['code_scanning_delegated_alert_dismissal'] = $codeScanningDelegatedAlertDismissal; + $secretScanning = $object->secretScanning; if ($secretScanning === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/Dependabot/Alerts/AlertNumber.php b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/Dependabot/Alerts/AlertNumber.php index 792e3424558..6bee3d82d78 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/Dependabot/Alerts/AlertNumber.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/Dependabot/Alerts/AlertNumber.php @@ -339,6 +339,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Depe $properties['scope'] = $value; after_scope: + + $value = $payload['relationship'] ?? null; + + if ($value === null) { + $properties['relationship'] = null; + goto after_relationship; + } + + $properties['relationship'] = $value; + + after_relationship: } catch (Throwable $exception) { throw UnableToHydrateObject::dueToError('ApiClients\Client\GitHub\Schema\DependabotAlert\Dependency', $exception, stack: $this->hydrationStack); } @@ -1626,6 +1637,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_scope: $result['scope'] = $scope; + $relationship = $object->relationship; + + if ($relationship === null) { + goto after_relationship; + } + + after_relationship: $result['relationship'] = $relationship; + return $result; } diff --git a/clients/GitHub/src/Internal/Hydrator/WebHook/DependabotAlert.php b/clients/GitHub/src/Internal/Hydrator/WebHook/DependabotAlert.php index e2cfb3109df..01495dba59c 100644 --- a/clients/GitHub/src/Internal/Hydrator/WebHook/DependabotAlert.php +++ b/clients/GitHub/src/Internal/Hydrator/WebHook/DependabotAlert.php @@ -515,6 +515,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Depe $properties['scope'] = $value; after_scope: + + $value = $payload['relationship'] ?? null; + + if ($value === null) { + $properties['relationship'] = null; + goto after_relationship; + } + + $properties['relationship'] = $value; + + after_relationship: } catch (Throwable $exception) { throw UnableToHydrateObject::dueToError('ApiClients\Client\GitHub\Schema\DependabotAlert\Dependency', $exception, stack: $this->hydrationStack); } @@ -5523,6 +5534,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_scope: $result['scope'] = $scope; + $relationship = $object->relationship; + + if ($relationship === null) { + goto after_relationship; + } + + after_relationship: $result['relationship'] = $relationship; + return $result; } diff --git a/clients/GitHub/src/Schema/AliasAbstract/Tiet2BF61F22/TietD40E495C/TietD2DCD6B6/Tiet9D8D9B32.php b/clients/GitHub/src/Schema/AliasAbstract/Tiet1DA73592/TietBB556EE9/Tiet519FED8E/TietFC41A28A.php similarity index 69% rename from clients/GitHub/src/Schema/AliasAbstract/Tiet2BF61F22/TietD40E495C/TietD2DCD6B6/Tiet9D8D9B32.php rename to clients/GitHub/src/Schema/AliasAbstract/Tiet1DA73592/TietBB556EE9/Tiet519FED8E/TietFC41A28A.php index 63cefd8c681..dc115a3f1b4 100644 --- a/clients/GitHub/src/Schema/AliasAbstract/Tiet2BF61F22/TietD40E495C/TietD2DCD6B6/Tiet9D8D9B32.php +++ b/clients/GitHub/src/Schema/AliasAbstract/Tiet1DA73592/TietBB556EE9/Tiet519FED8E/TietFC41A28A.php @@ -2,12 +2,12 @@ declare(strict_types=1); -namespace ApiClients\Client\GitHub\Schema\AliasAbstract\Tiet2BF61F22\TietD40E495C\TietD2DCD6B6; +namespace ApiClients\Client\GitHub\Schema\AliasAbstract\Tiet1DA73592\TietBB556EE9\Tiet519FED8E; use ApiClients\Client\GitHub\Schema; use EventSauce\ObjectHydrator\MapFrom; -abstract readonly class Tiet9D8D9B32 +abstract readonly class TietFC41A28A { public const SCHEMA_JSON = '{ "type": "object", @@ -51,6 +51,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -64,16 +78,21 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }'; /** * package: Details for the vulnerable package. * manifestPath: The full path to the dependency manifest file, relative to the root of the repository. * scope: The execution scope of the vulnerable dependency. + * relationship: The vulnerable dependency's relationship to your project. + + > [!NOTE] + > We are rolling out support for dependency relationship across ecosystems. This value will be "unknown" for all dependencies in unsupported ecosystems. */ public function __construct(public Schema\DependabotAlertPackage|null $package, #[MapFrom('manifest_path')] - public string|null $manifestPath, public string|null $scope,) + public string|null $manifestPath, public string|null $scope, public string|null $relationship,) { } } diff --git a/clients/GitHub/src/Schema/AliasAbstract/Tiet93141EDA/Tiet7E1CE92E/Tiet73282F1D/Tiet55BAEBBF.php b/clients/GitHub/src/Schema/AliasAbstract/Tiet754DB2AE/TietE5139940/TietE72CE13C/TietD3BE351E.php similarity index 95% rename from clients/GitHub/src/Schema/AliasAbstract/Tiet93141EDA/Tiet7E1CE92E/Tiet73282F1D/Tiet55BAEBBF.php rename to clients/GitHub/src/Schema/AliasAbstract/Tiet754DB2AE/TietE5139940/TietE72CE13C/TietD3BE351E.php index ef72a7474a6..9a1626ad137 100644 --- a/clients/GitHub/src/Schema/AliasAbstract/Tiet93141EDA/Tiet7E1CE92E/Tiet73282F1D/Tiet55BAEBBF.php +++ b/clients/GitHub/src/Schema/AliasAbstract/Tiet754DB2AE/TietE5139940/TietE72CE13C/TietD3BE351E.php @@ -2,12 +2,12 @@ declare(strict_types=1); -namespace ApiClients\Client\GitHub\Schema\AliasAbstract\Tiet93141EDA\Tiet7E1CE92E\Tiet73282F1D; +namespace ApiClients\Client\GitHub\Schema\AliasAbstract\Tiet754DB2AE\TietE5139940\TietE72CE13C; use ApiClients\Client\GitHub\Schema; use EventSauce\ObjectHydrator\MapFrom; -abstract readonly class Tiet55BAEBBF +abstract readonly class TietD3BE351E { public const SCHEMA_JSON = '{ "type": "object", @@ -138,6 +138,15 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal" + }, "secret_scanning": { "enum": [ "enabled", @@ -294,6 +303,7 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_delegated_bypass": "not_set", diff --git a/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php index 2d62759aeb8..0033e5a3b1b 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php @@ -120,6 +120,16 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal", + "default": "not_set" + }, "secret_scanning": { "enum": [ "enabled", @@ -260,6 +270,7 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_delegated_bypass": "not_set", @@ -294,6 +305,7 @@ * dependabotSecurityUpdates: The enablement status of Dependabot security updates * codeScanningDefaultSetup: The enablement status of code scanning default setup * codeScanningDefaultSetupOptions: Feature options for code scanning default setup + * codeScanningDelegatedAlertDismissal: The enablement status of code scanning delegated alert dismissal * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningDelegatedBypass: The enablement status of secret scanning delegated bypass @@ -313,7 +325,8 @@ public function __construct(public string $name, public string $description, #[M public string|null $dependabotAlerts, #[MapFrom('dependabot_security_updates')] public string|null $dependabotSecurityUpdates, #[MapFrom('code_scanning_default_setup')] public string|null $codeScanningDefaultSetup, #[MapFrom('code_scanning_default_setup_options')] - public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('secret_scanning')] + public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('code_scanning_delegated_alert_dismissal')] + public string|null $codeScanningDelegatedAlertDismissal, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_delegated_bypass')] public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] diff --git a/clients/GitHub/src/Schema/CodeSecurity/CreateConfigurationForEnterprise/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/CreateConfigurationForEnterprise/Request/ApplicationJson.php index cbd68fa4ef7..8337917166d 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/CreateConfigurationForEnterprise/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/CreateConfigurationForEnterprise/Request/ApplicationJson.php @@ -120,6 +120,16 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal", + "default": "disabled" + }, "secret_scanning": { "enum": [ "enabled", @@ -170,6 +180,16 @@ "description": "The enablement status of Copilot secret scanning", "default": "disabled" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal", + "default": "disabled" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -210,11 +230,13 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_generic_secrets": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -230,11 +252,13 @@ * dependabotSecurityUpdates: The enablement status of Dependabot security updates * codeScanningDefaultSetup: The enablement status of code scanning default setup * codeScanningDefaultSetupOptions: Feature options for code scanning default setup + * codeScanningDelegatedAlertDismissal: The enablement status of code scanning delegated alert dismissal * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non provider patterns * secretScanningGenericSecrets: The enablement status of Copilot secret scanning + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -246,12 +270,14 @@ public function __construct(public string $name, public string $description, #[M public string|null $dependabotAlerts, #[MapFrom('dependabot_security_updates')] public string|null $dependabotSecurityUpdates, #[MapFrom('code_scanning_default_setup')] public string|null $codeScanningDefaultSetup, #[MapFrom('code_scanning_default_setup_options')] - public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('secret_scanning')] + public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('code_scanning_delegated_alert_dismissal')] + public string|null $codeScanningDelegatedAlertDismissal, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_generic_secrets')] - public string|null $secretScanningGenericSecrets, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningGenericSecrets, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php index ad7d5ec8bee..a61f2acddd7 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php @@ -109,6 +109,16 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal", + "default": "disabled" + }, "secret_scanning": { "enum": [ "enabled", @@ -241,6 +251,7 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_delegated_bypass": "not_set", @@ -275,6 +286,7 @@ * dependabotSecurityUpdates: The enablement status of Dependabot security updates * codeScanningDefaultSetup: The enablement status of code scanning default setup * codeScanningDefaultSetupOptions: Feature options for code scanning default setup + * codeScanningDelegatedAlertDismissal: The enablement status of code scanning delegated alert dismissal * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningDelegatedBypass: The enablement status of secret scanning delegated bypass @@ -294,7 +306,8 @@ public function __construct(public string|null $name, public string|null $descri public string|null $dependabotAlerts, #[MapFrom('dependabot_security_updates')] public string|null $dependabotSecurityUpdates, #[MapFrom('code_scanning_default_setup')] public string|null $codeScanningDefaultSetup, #[MapFrom('code_scanning_default_setup_options')] - public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('secret_scanning')] + public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('code_scanning_delegated_alert_dismissal')] + public string|null $codeScanningDelegatedAlertDismissal, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_delegated_bypass')] public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] diff --git a/clients/GitHub/src/Schema/CodeSecurity/UpdateEnterpriseConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/UpdateEnterpriseConfiguration/Request/ApplicationJson.php index de040cc6e9c..1faaacb8cd5 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/UpdateEnterpriseConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/UpdateEnterpriseConfiguration/Request/ApplicationJson.php @@ -109,6 +109,16 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal", + "default": "disabled" + }, "secret_scanning": { "enum": [ "enabled", @@ -155,6 +165,16 @@ "description": "The enablement status of Copilot secret scanning", "default": "disabled" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal", + "default": "disabled" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -193,11 +213,13 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", "secret_scanning_generic_secrets": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -213,11 +235,13 @@ * dependabotSecurityUpdates: The enablement status of Dependabot security updates * codeScanningDefaultSetup: The enablement status of code scanning default setup * codeScanningDefaultSetupOptions: Feature options for code scanning default setup + * codeScanningDelegatedAlertDismissal: The enablement status of code scanning delegated alert dismissal * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns * secretScanningGenericSecrets: The enablement status of Copilot secret scanning + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -229,12 +253,14 @@ public function __construct(public string|null $name, public string|null $descri public string|null $dependabotAlerts, #[MapFrom('dependabot_security_updates')] public string|null $dependabotSecurityUpdates, #[MapFrom('code_scanning_default_setup')] public string|null $codeScanningDefaultSetup, #[MapFrom('code_scanning_default_setup_options')] - public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('secret_scanning')] + public Schema\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('code_scanning_delegated_alert_dismissal')] + public string|null $codeScanningDelegatedAlertDismissal, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_generic_secrets')] - public string|null $secretScanningGenericSecrets, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningGenericSecrets, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHub/src/Schema/CodeSecurityConfiguration.php b/clients/GitHub/src/Schema/CodeSecurityConfiguration.php index 852d8e42f28..98a98aeefc2 100644 --- a/clients/GitHub/src/Schema/CodeSecurityConfiguration.php +++ b/clients/GitHub/src/Schema/CodeSecurityConfiguration.php @@ -125,6 +125,15 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal" + }, "secret_scanning": { "enum": [ "enabled", @@ -277,6 +286,7 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_delegated_bypass": "not_set", @@ -317,6 +327,7 @@ * dependabotSecurityUpdates: The enablement status of Dependabot security updates * codeScanningDefaultSetup: The enablement status of code scanning default setup * codeScanningDefaultSetupOptions: Feature options for code scanning default setup + * codeScanningDelegatedAlertDismissal: The enablement status of code scanning delegated alert dismissal * secretScanning: The enablement status of secret scanning * secretScanningPushProtection: The enablement status of secret scanning push protection * secretScanningDelegatedBypass: The enablement status of secret scanning delegated bypass @@ -339,7 +350,8 @@ public function __construct(public int|null $id, public string|null $name, #[Map public string|null $dependabotAlerts, #[MapFrom('dependabot_security_updates')] public string|null $dependabotSecurityUpdates, #[MapFrom('code_scanning_default_setup')] public string|null $codeScanningDefaultSetup, #[MapFrom('code_scanning_default_setup_options')] - public Schema\CodeSecurityConfiguration\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('secret_scanning')] + public Schema\CodeSecurityConfiguration\CodeScanningDefaultSetupOptions|null $codeScanningDefaultSetupOptions, #[MapFrom('code_scanning_delegated_alert_dismissal')] + public string|null $codeScanningDelegatedAlertDismissal, #[MapFrom('secret_scanning')] public string|null $secretScanning, #[MapFrom('secret_scanning_push_protection')] public string|null $secretScanningPushProtection, #[MapFrom('secret_scanning_delegated_bypass')] public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] diff --git a/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php b/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php index 325bdd85e17..2d7f95ebd08 100644 --- a/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php +++ b/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php @@ -141,6 +141,15 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal" + }, "secret_scanning": { "enum": [ "enabled", @@ -298,6 +307,7 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_delegated_bypass": "not_set", diff --git a/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php b/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php index d2e7d39429a..4b9082705b8 100644 --- a/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php +++ b/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php @@ -136,6 +136,15 @@ }, "description": "Feature options for code scanning default setup" }, + "code_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of code scanning delegated alert dismissal" + }, "secret_scanning": { "enum": [ "enabled", @@ -292,6 +301,7 @@ "runner_type": "standard", "runner_label": "generated" }, + "code_scanning_delegated_alert_dismissal": "enabled", "secret_scanning": "enabled", "secret_scanning_push_protection": "enabled", "secret_scanning_delegated_bypass": "not_set", diff --git a/clients/GitHub/src/Schema/DependabotAlert.php b/clients/GitHub/src/Schema/DependabotAlert.php index e1dda64f89a..fe930281ee0 100644 --- a/clients/GitHub/src/Schema/DependabotAlert.php +++ b/clients/GitHub/src/Schema/DependabotAlert.php @@ -86,6 +86,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -774,7 +788,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/DependabotAlert/Dependency.php b/clients/GitHub/src/Schema/DependabotAlert/Dependency.php index 1691e4372ee..2f9841378cd 100644 --- a/clients/GitHub/src/Schema/DependabotAlert/Dependency.php +++ b/clients/GitHub/src/Schema/DependabotAlert/Dependency.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Dependency extends Schema\AliasAbstract\Tiet2BF61F22\TietD40E495C\TietD2DCD6B6\Tiet9D8D9B32 +final readonly class Dependency extends Schema\AliasAbstract\Tiet1DA73592\TietBB556EE9\Tiet519FED8E\TietFC41A28A { } diff --git a/clients/GitHub/src/Schema/DependabotAlertWithRepository.php b/clients/GitHub/src/Schema/DependabotAlertWithRepository.php index eea7036a6ed..a02b60a08cc 100644 --- a/clients/GitHub/src/Schema/DependabotAlertWithRepository.php +++ b/clients/GitHub/src/Schema/DependabotAlertWithRepository.php @@ -87,6 +87,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -1326,7 +1340,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/DependabotAlertWithRepository/Dependency.php b/clients/GitHub/src/Schema/DependabotAlertWithRepository/Dependency.php index b71d37fe07b..a2c318b0c4e 100644 --- a/clients/GitHub/src/Schema/DependabotAlertWithRepository/Dependency.php +++ b/clients/GitHub/src/Schema/DependabotAlertWithRepository/Dependency.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Dependency extends Schema\AliasAbstract\Tiet2BF61F22\TietD40E495C\TietD2DCD6B6\Tiet9D8D9B32 +final readonly class Dependency extends Schema\AliasAbstract\Tiet1DA73592\TietBB556EE9\Tiet519FED8E\TietFC41A28A { } diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php index 806c891dfdb..dc214b39d58 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Ok extends Schema\AliasAbstract\Tiet93141EDA\Tiet7E1CE92E\Tiet73282F1D\Tiet55BAEBBF +final readonly class Ok extends Schema\AliasAbstract\Tiet754DB2AE\TietE5139940\TietE72CE13C\TietD3BE351E { } diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php index 83d774b3cce..a504eb5b430 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Json extends Schema\AliasAbstract\Tiet93141EDA\Tiet7E1CE92E\Tiet73282F1D\Tiet55BAEBBF +final readonly class Json extends Schema\AliasAbstract\Tiet754DB2AE\TietE5139940\TietE72CE13C\TietD3BE351E { } diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php index 0c6440ba14d..8380eeff235 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Ok extends Schema\AliasAbstract\Tiet93141EDA\Tiet7E1CE92E\Tiet73282F1D\Tiet55BAEBBF +final readonly class Ok extends Schema\AliasAbstract\Tiet754DB2AE\TietE5139940\TietE72CE13C\TietD3BE351E { } diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertAutoDismissed.php b/clients/GitHub/src/Schema/WebhookDependabotAlertAutoDismissed.php index 16792ffabd7..43629004573 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertAutoDismissed.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertAutoDismissed.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertAutoReopened.php b/clients/GitHub/src/Schema/WebhookDependabotAlertAutoReopened.php index 37435e71be3..f35977b2432 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertAutoReopened.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertAutoReopened.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertCreated.php b/clients/GitHub/src/Schema/WebhookDependabotAlertCreated.php index b862c6e12dd..1ec7f68bc82 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertCreated.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertCreated.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertDismissed.php b/clients/GitHub/src/Schema/WebhookDependabotAlertDismissed.php index be1f8a38fb6..2a16718d75f 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertDismissed.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertDismissed.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertFixed.php b/clients/GitHub/src/Schema/WebhookDependabotAlertFixed.php index 6e28419a83b..11e641d52ac 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertFixed.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertFixed.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertReintroduced.php b/clients/GitHub/src/Schema/WebhookDependabotAlertReintroduced.php index 70480a20369..18fdd82c7d3 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertReintroduced.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertReintroduced.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/clients/GitHub/src/Schema/WebhookDependabotAlertReopened.php b/clients/GitHub/src/Schema/WebhookDependabotAlertReopened.php index a0cee9333f0..f3130762026 100644 --- a/clients/GitHub/src/Schema/WebhookDependabotAlertReopened.php +++ b/clients/GitHub/src/Schema/WebhookDependabotAlertReopened.php @@ -101,6 +101,20 @@ ], "description": "The execution scope of the vulnerable dependency.", "readOnly": true + }, + "relationship": { + "enum": [ + "unknown", + "direct", + "transitive", + null + ], + "type": [ + "string", + "null" + ], + "description": "The vulnerable dependency\'s relationship to your project.\\n\\n> [!NOTE]\\n> We are rolling out support for dependency relationship across ecosystems. This value will be \\"unknown\\" for all dependencies in unsupported ecosystems.\\n", + "readOnly": true } }, "description": "Details for the vulnerable dependency.", @@ -2664,7 +2678,8 @@ "name": "generated" }, "manifest_path": "generated", - "scope": "development" + "scope": "development", + "relationship": "transitive" }, "security_advisory": { "ghsa_id": "generated", diff --git a/etc/specs/GitHub/current.spec.yaml b/etc/specs/GitHub/current.spec.yaml index ef868ebd1b0..360155e734c 100644 --- a/etc/specs/GitHub/current.spec.yaml +++ b/etc/specs/GitHub/current.spec.yaml @@ -1573,6 +1573,15 @@ paths: default: disabled code_scanning_default_setup_options: "$ref": "#/components/schemas/code-scanning-default-setup-options" + code_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of code scanning delegated alert + dismissal + enum: + - enabled + - disabled + - not_set + default: disabled secret_scanning: type: string description: The enablement status of secret scanning @@ -1614,6 +1623,15 @@ paths: - disabled - not_set default: disabled + secret_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of secret scanning delegated + alert dismissal + enum: + - enabled + - disabled + - not_set + default: disabled private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -1819,6 +1837,15 @@ paths: - not_set code_scanning_default_setup_options: "$ref": "#/components/schemas/code-scanning-default-setup-options" + code_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of code scanning delegated alert + dismissal + enum: + - enabled + - disabled + - not_set + default: disabled secret_scanning: type: string description: The enablement status of secret scanning @@ -1856,6 +1883,15 @@ paths: - disabled - not_set default: disabled + secret_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of secret scanning delegated + alert dismissal + enum: + - enabled + - disabled + - not_set + default: disabled private_vulnerability_reporting: type: string description: The enablement status of private vulnerability reporting @@ -7935,6 +7971,15 @@ paths: default: disabled code_scanning_default_setup_options: "$ref": "#/components/schemas/code-scanning-default-setup-options" + code_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of code scanning delegated alert + dismissal + enum: + - enabled + - disabled + - not_set + default: not_set secret_scanning: type: string description: The enablement status of secret scanning @@ -8276,6 +8321,15 @@ paths: - not_set code_scanning_default_setup_options: "$ref": "#/components/schemas/code-scanning-default-setup-options" + code_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of code scanning delegated alert + dismissal + enum: + - enabled + - disabled + - not_set + default: disabled secret_scanning: type: string description: The enablement status of secret scanning @@ -71050,6 +71104,13 @@ components: - 'null' description: The label of the runner to use for code scanning when runner_type is 'labeled'. + code_scanning_delegated_alert_dismissal: + type: string + description: The enablement status of code scanning delegated alert dismissal + enum: + - enabled + - disabled + - not_set secret_scanning: type: string description: The enablement status of secret scanning @@ -71824,6 +71885,21 @@ components: - development - runtime - + relationship: + type: + - string + - 'null' + description: | + The vulnerable dependency's relationship to your project. + + > [!NOTE] + > We are rolling out support for dependency relationship across ecosystems. This value will be "unknown" for all dependencies in unsupported ecosystems. + readOnly: true + enum: + - unknown + - direct + - transitive + - security_advisory: "$ref": "#/components/schemas/dependabot-alert-security-advisory" security_vulnerability: @@ -87187,6 +87263,21 @@ components: - development - runtime - + relationship: + type: + - string + - 'null' + description: | + The vulnerable dependency's relationship to your project. + + > [!NOTE] + > We are rolling out support for dependency relationship across ecosystems. This value will be "unknown" for all dependencies in unsupported ecosystems. + readOnly: true + enum: + - unknown + - direct + - transitive + - security_advisory: "$ref": "#/components/schemas/dependabot-alert-security-advisory" security_vulnerability: @@ -205122,12 +205213,14 @@ components: dependabot_alerts: enabled dependabot_security_updates: not_set code_scanning_default_setup: disabled + code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled + secret_scanning_delegated_alert_dismissal: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/enterprises/octo-enterprise/code-security/configurations/1325 @@ -205214,12 +205307,14 @@ components: code_scanning_default_setup_options: runner_type: not_set runner_label: + code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled + secret_scanning_delegated_alert_dismissal: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -208487,6 +208582,7 @@ components: dependabot_alerts: enabled dependabot_security_updates: not_set code_scanning_default_setup: enabled + code_scanning_delagated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_delegated_bypass: enabled @@ -208517,6 +208613,7 @@ components: dependabot_alerts: enabled dependabot_security_updates: enabled code_scanning_default_setup: enabled + code_scanning_delagated_alert_dismissal: enabled secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_delegated_bypass: disabled @@ -208546,12 +208643,14 @@ components: code_scanning_default_setup_options: runner_type: not_set runner_label: + code_scanning_delegated_alert_dismissal: disabled secret_scanning: disabled secret_scanning_push_protection: disabled secret_scanning_delegated_bypass: disabled secret_scanning_validity_checks: disabled secret_scanning_non_provider_patterns: disabled secret_scanning_generic_secrets: disabled + secret_scanning_delegated_alert_dismissal: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -216388,6 +216487,7 @@ components: dependabot_alerts: enabled dependabot_security_updates: not_set code_scanning_default_setup: disabled + code_scanning_delegated_alert_dismissal: disabled secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_delegated_bypass: disabled