From 5301a34641fa8a12a5a6ed43a567fc5d8726a7f5 Mon Sep 17 00:00:00 2001 From: WyriHaximus <147145+WyriHaximus@users.noreply.github.com> Date: Wed, 26 Feb 2025 19:50:19 +0000 Subject: [PATCH] [GitHub] Update to 1.1.4-2c0c305301b4db15047c06c5d15a3675 from 1.1.4-95c17fdaedbd73d404bbf04c1d953250 Detected Schema changes: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit ``` ├─┬Paths │ ├─┬/orgs/{org} │ │ └─┬GET │ │ └──[🔀] description (4383:20) │ ├─┬/orgs/{org}/code-security/configurations │ │ ├─┬GET │ │ │ └─┬Responses │ │ │ └─┬200 │ │ │ └─┬application/json │ │ │ └─┬default │ │ │ └──[🔀] value (208429:7) │ │ └─┬POST │ │ └─┬Requestbody │ │ └─┬application/json │ │ └─┬Schema │ │ └──[➖] properties (7980:17)❌ │ ├─┬/orgs/{org}/code-security/configurations/{configuration_id} │ │ └─┬PATCH │ │ └─┬Requestbody │ │ └─┬application/json │ │ └─┬Schema │ │ └──[➖] properties (8308:17)❌ │ ├─┬/repos/{owner}/{repo}/code-security-configuration │ │ └─┬GET │ │ └─┬Responses │ │ └─┬200 │ │ └─┬application/json │ │ └─┬default │ │ └──[🔀] value (216326:9) │ └─┬/repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix/commits │ └─┬POST │ └──[🔀] description (25952:20) └─┬Components ├──[➖] schemas (79091:7)❌ ├─┬code-security-configuration │ └──[➖] properties (71044:9)❌ └─┬repository-rule-params-required-reviewer-configuration ├──[➕] required (79091:9)❌ ├──[➕] properties (79085:9) └──[➖] properties (79124:9)❌ ``` | Document Element | Total Changes | Breaking Changes | |------------------|---------------|------------------| | paths | 6 | 2 | | components | 5 | 4 | Date: 02/26/25 | Commit: Original: etc/specs/GitHub/current.spec.yaml, Modified: etc/specs/GitHub/previous.spec.yaml, - ❌ **BREAKING Changes**: _6_ out of _11_ - **Modifications**: _4_ - **Removals**: _5_ - **Additions**: _2_ - **Breaking Removals**: _5_ - **Breaking Additions**: _1_ ERROR: breaking changes discovered --- .../GitHub/etc/openapi-client-generator.state | 46 ++++++++-------- .../CodeSecurity/Configurations.php | 19 +++++++ .../Configurations/ConfigurationId.php | 19 +++++++ .../ConfigurationId/Defaults.php | 19 +++++++ .../Orgs/Org/CodeSecurity/Configurations.php | 19 +++++++ .../Configurations/ConfigurationId.php | 19 +++++++ .../ConfigurationId/Defaults.php | 19 +++++++ .../Owner/Repo/CodeSecurityConfiguration.php | 19 +++++++ .../Tiet7006072F/TietBCEFF0FF.php} | 14 ++++- .../Request/ApplicationJson.php | 14 ++++- .../Request/ApplicationJson.php | 14 ++++- .../src/Schema/CodeSecurityConfiguration.php | 14 ++++- ...CodeSecurityConfigurationForRepository.php | 10 ++++ .../CodeSecurityDefaultConfigurations.php | 10 ++++ .../Response/ApplicationJson/Ok.php | 2 +- .../ApplicationJson/Ok/Application/Json.php | 2 +- .../Response/ApplicationJson/Ok.php | 2 +- ...uleParamsRequiredReviewerConfiguration.php | 38 ++++++++++---- .../Schema/RepositoryRuleParamsReviewer.php | 45 ++++++++++++++++ etc/specs/GitHub/current.spec.yaml | 52 ++++++++++++++++--- 20 files changed, 352 insertions(+), 44 deletions(-) rename clients/GitHub/src/Schema/AliasAbstract/{Tiet07CEC6F7/Tiet1DE9A5A0/Tiet17BD6D01/Tiet0890CA07.php => Tiet40F01C12/Tiet17FC06A8/Tiet7006072F/TietBCEFF0FF.php} (95%) create mode 100644 clients/GitHub/src/Schema/RepositoryRuleParamsReviewer.php diff --git a/clients/GitHub/etc/openapi-client-generator.state b/clients/GitHub/etc/openapi-client-generator.state index 1bb81d59fdf..22ec4853917 100644 --- a/clients/GitHub/etc/openapi-client-generator.state +++ b/clients/GitHub/etc/openapi-client-generator.state @@ -1,5 +1,5 @@ { - "specHash": "95c17fdaedbd73d404bbf04c1d953250", + "specHash": "2c0c305301b4db15047c06c5d15a3675", "generatedFiles": { "files": [ { @@ -29524,11 +29524,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfiguration.php", - "hash": "b209f9beffe93fe386d862737a20e208" + "hash": "c2d7df5b63124f758ef8b4e5bbae796b" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityDefaultConfigurations.php", - "hash": "36d1be537f4518f64d877b8e04d34ed4" + "hash": "42aedf705d635bc3ed4190126560acf8" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationRepositories.php", @@ -29560,11 +29560,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/CreateConfiguration\/Request\/ApplicationJson.php", - "hash": "6702f78493d195557f877ac3e0c507b8" + "hash": "66c4ce8528c0658a515d1db85e3bc290" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/UpdateConfiguration\/Request\/ApplicationJson.php", - "hash": "bcd4c1473af1625f6b107fbf0a31198d" + "hash": "dac2e4eadfdb903db83a6db5bcc1f095" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/AttachConfiguration\/Request\/ApplicationJson.php", @@ -29576,7 +29576,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefault\/Response\/ApplicationJson\/Ok.php", - "hash": "401bb15ba9ecd26315266f556e9fd6f5" + "hash": "f8c5ece8313267d6ebf21bd23dd2546b" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Router\/Get\/CodeSecurity.php", @@ -29604,7 +29604,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations.php", - "hash": "423933ad34ce803942cf62a1b3fa1c52" + "hash": "9d815af5894e6b5d01a850196c8f704e" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/Defaults.php", @@ -29612,7 +29612,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId.php", - "hash": "d0372d20b92ef6065ce9ad91a58a2362" + "hash": "b86a079dc2a8ba221ea85ba771d9565d" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Attach.php", @@ -29620,7 +29620,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Defaults.php", - "hash": "4df9ef3ec9ef33967d9153af91551004" + "hash": "446a2e38fb3a7192b5d9b3443e7858a0" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Orgs\/Org\/CodeSecurity\/Configurations\/ConfigurationId\/Repositories.php", @@ -30036,11 +30036,11 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurityConfigurationForRepository.php", - "hash": "2070ab70b26bbd22f0534f995fe3f621" + "hash": "861d3ee5e793e16cfe846eeeaeaf6e41" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Repos\/Owner\/Repo\/CodeSecurityConfiguration.php", - "hash": "ea01c4d7d7db0f85baffa452aaa134e4" + "hash": "b19bb0e162885cf3a8ca3f47b7180aa3" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/RepositoryRuleViolationError.php", @@ -30820,7 +30820,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/RepositoryRuleParamsRequiredReviewerConfiguration.php", - "hash": "b85aa69ed2efcbdcf2b1154a6cdfa482" + "hash": "ddac39ebf9da97cbedf26404d5ae6168" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/DependencyGraphSpdxSbom\/Sbom\/Relationships.php", @@ -31290,25 +31290,21 @@ "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/CodeSecurity\/SetConfigurationAsDefaultForEnterprise\/Request\/ApplicationJson.php", "hash": "fa57b56a227cece217c1c82933904702" }, - { - "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet07CEC6F7\/Tiet1DE9A5A0\/Tiet17BD6D01\/Tiet0890CA07.php", - "hash": "c5474fa02271fe9318b0eae417dde533" - }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefault\/Response\/ApplicationJson\/Ok\/Application\/Json.php", - "hash": "503551f5cadafa2a8d3375943eeb8c66" + "hash": "392b5df3c2b7445b7b56f8d7add9a2c8" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/Operations\/CodeSecurity\/SetConfigurationAsDefaultForEnterprise\/Response\/ApplicationJson\/Ok.php", - "hash": "d0e101f3581f02a87190f173cddf5a5f" + "hash": "1f448e72147a1d33e222c07ca9d87632" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations.php", - "hash": "1a34b82a550d63a467510b388a4dc137" + "hash": "f186e3f04f3831511ac4717754724f4d" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId.php", - "hash": "6a3ff5ac2d044e0339d84ec9464b5cea" + "hash": "2957d581b731d30fc98a3eae5e2055d4" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId\/Attach.php", @@ -31316,7 +31312,7 @@ }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId\/Defaults.php", - "hash": "cd2dc356709f00761b6259f0fb0a88da" + "hash": "fec56e03af6b3ee791f7b55692b1115b" }, { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurity\/Configurations\/ConfigurationId\/Repositories.php", @@ -31945,6 +31941,14 @@ { "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/TietCF22D054\/Tiet02EB2DC0\/Tiet6BB5072C\/Tiet3B86314A.php", "hash": "779373dbfefbae34d8f946010c1d6e8e" + }, + { + "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/RepositoryRuleParamsReviewer.php", + "hash": "d26fb6e1bc875eeb8810fd6fa765a7dc" + }, + { + "name": ".\/clients\/GitHub\/etc\/..\/\/src\/\/Schema\/AliasAbstract\/Tiet40F01C12\/Tiet17FC06A8\/Tiet7006072F\/TietBCEFF0FF.php", + "hash": "878b1a9a463add3bc23de88ce1edb49e" } ] }, diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php index 040f7f06ef4..7c1e30292d9 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations.php @@ -348,6 +348,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -905,6 +916,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php index cc6e7391990..d45b8eb074b 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId.php @@ -285,6 +285,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -865,6 +876,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php index 7e86bffc964..940b383344b 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Enterprises/Enterprise/CodeSecurity/Configurations/ConfigurationId/Defaults.php @@ -335,6 +335,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -855,6 +866,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php index f6e8a7aca66..4bdbc408828 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations.php @@ -346,6 +346,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -817,6 +828,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php index 4e622a990a5..6db9d2ac3a2 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId.php @@ -285,6 +285,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -865,6 +876,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php index f604774bd54..02d1887b6dd 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Orgs/Org/CodeSecurity/Configurations/ConfigurationId/Defaults.php @@ -335,6 +335,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -855,6 +866,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php index 987bca1a5d8..50821079fc8 100644 --- a/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php +++ b/clients/GitHub/src/Internal/Hydrator/Operation/Repos/Owner/Repo/CodeSecurityConfiguration.php @@ -334,6 +334,17 @@ private function hydrateApiClients⚡️Client⚡️GitHub⚡️Schema⚡️Code after_secretScanningNonProviderPatterns: + $value = $payload['secret_scanning_delegated_alert_dismissal'] ?? null; + + if ($value === null) { + $properties['secretScanningDelegatedAlertDismissal'] = null; + goto after_secretScanningDelegatedAlertDismissal; + } + + $properties['secretScanningDelegatedAlertDismissal'] = $value; + + after_secretScanningDelegatedAlertDismissal: + $value = $payload['private_vulnerability_reporting'] ?? null; if ($value === null) { @@ -854,6 +865,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHub⚡️Schema after_secretScanningNonProviderPatterns: $result['secret_scanning_non_provider_patterns'] = $secretScanningNonProviderPatterns; + $secretScanningDelegatedAlertDismissal = $object->secretScanningDelegatedAlertDismissal; + + if ($secretScanningDelegatedAlertDismissal === null) { + goto after_secretScanningDelegatedAlertDismissal; + } + + after_secretScanningDelegatedAlertDismissal: $result['secret_scanning_delegated_alert_dismissal'] = $secretScanningDelegatedAlertDismissal; + $privateVulnerabilityReporting = $object->privateVulnerabilityReporting; if ($privateVulnerabilityReporting === null) { diff --git a/clients/GitHub/src/Schema/AliasAbstract/Tiet07CEC6F7/Tiet1DE9A5A0/Tiet17BD6D01/Tiet0890CA07.php b/clients/GitHub/src/Schema/AliasAbstract/Tiet40F01C12/Tiet17FC06A8/Tiet7006072F/TietBCEFF0FF.php similarity index 95% rename from clients/GitHub/src/Schema/AliasAbstract/Tiet07CEC6F7/Tiet1DE9A5A0/Tiet17BD6D01/Tiet0890CA07.php rename to clients/GitHub/src/Schema/AliasAbstract/Tiet40F01C12/Tiet17FC06A8/Tiet7006072F/TietBCEFF0FF.php index 90598e28b99..4ba9c024148 100644 --- a/clients/GitHub/src/Schema/AliasAbstract/Tiet07CEC6F7/Tiet1DE9A5A0/Tiet17BD6D01/Tiet0890CA07.php +++ b/clients/GitHub/src/Schema/AliasAbstract/Tiet40F01C12/Tiet17FC06A8/Tiet7006072F/TietBCEFF0FF.php @@ -2,12 +2,12 @@ declare(strict_types=1); -namespace ApiClients\Client\GitHub\Schema\AliasAbstract\Tiet07CEC6F7\Tiet1DE9A5A0\Tiet17BD6D01; +namespace ApiClients\Client\GitHub\Schema\AliasAbstract\Tiet40F01C12\Tiet17FC06A8\Tiet7006072F; use ApiClients\Client\GitHub\Schema; use EventSauce\ObjectHydrator\MapFrom; -abstract readonly class Tiet0890CA07 +abstract readonly class TietBCEFF0FF { public const SCHEMA_JSON = '{ "type": "object", @@ -214,6 +214,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -293,6 +302,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php index 37eccfcdd08..cec4fce2dc7 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/CreateConfiguration/Request/ApplicationJson.php @@ -201,6 +201,15 @@ "description": "The enablement status of secret scanning non provider patterns", "default": "disabled" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -258,6 +267,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -279,6 +289,7 @@ * secretScanningDelegatedBypassOptions: Feature options for secret scanning delegated bypass * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non provider patterns + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -296,7 +307,8 @@ public function __construct(public string $name, public string $description, #[M public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] public Schema\CodeSecurity\CreateConfiguration\Request\ApplicationJson\SecretScanningDelegatedBypassOptions|null $secretScanningDelegatedBypassOptions, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] - public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php b/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php index 2c5b24b6e3e..566fd4e478c 100644 --- a/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php +++ b/clients/GitHub/src/Schema/CodeSecurity/UpdateConfiguration/Request/ApplicationJson.php @@ -185,6 +185,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -240,6 +249,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced" }'; @@ -261,6 +271,7 @@ * secretScanningDelegatedBypassOptions: Feature options for secret scanning delegated bypass * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration */ @@ -278,7 +289,8 @@ public function __construct(public string|null $name, public string|null $descri public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] public Schema\CodeSecurity\UpdateConfiguration\Request\ApplicationJson\SecretScanningDelegatedBypassOptions|null $secretScanningDelegatedBypassOptions, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] - public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement,) { } diff --git a/clients/GitHub/src/Schema/CodeSecurityConfiguration.php b/clients/GitHub/src/Schema/CodeSecurityConfiguration.php index dd7ae7582dd..35d57eb0026 100644 --- a/clients/GitHub/src/Schema/CodeSecurityConfiguration.php +++ b/clients/GitHub/src/Schema/CodeSecurityConfiguration.php @@ -201,6 +201,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -276,6 +285,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", @@ -303,6 +313,7 @@ * secretScanningDelegatedBypassOptions: Feature options for secret scanning delegated bypass * secretScanningValidityChecks: The enablement status of secret scanning validity checks * secretScanningNonProviderPatterns: The enablement status of secret scanning non-provider patterns + * secretScanningDelegatedAlertDismissal: The enablement status of secret scanning delegated alert dismissal * privateVulnerabilityReporting: The enablement status of private vulnerability reporting * enforcement: The enforcement status for a security configuration * url: The URL of the configuration @@ -323,7 +334,8 @@ public function __construct(public int|null $id, public string|null $name, #[Map public string|null $secretScanningDelegatedBypass, #[MapFrom('secret_scanning_delegated_bypass_options')] public Schema\CodeSecurityConfiguration\SecretScanningDelegatedBypassOptions|null $secretScanningDelegatedBypassOptions, #[MapFrom('secret_scanning_validity_checks')] public string|null $secretScanningValidityChecks, #[MapFrom('secret_scanning_non_provider_patterns')] - public string|null $secretScanningNonProviderPatterns, #[MapFrom('private_vulnerability_reporting')] + public string|null $secretScanningNonProviderPatterns, #[MapFrom('secret_scanning_delegated_alert_dismissal')] + public string|null $secretScanningDelegatedAlertDismissal, #[MapFrom('private_vulnerability_reporting')] public string|null $privateVulnerabilityReporting, public string|null $enforcement, public string|null $url, #[MapFrom('html_url')] public string|null $htmlUrl, #[MapFrom('created_at')] public string|null $createdAt, #[MapFrom('updated_at')] diff --git a/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php b/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php index a99b62a27b3..3ebc42691db 100644 --- a/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php +++ b/clients/GitHub/src/Schema/CodeSecurityConfigurationForRepository.php @@ -217,6 +217,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -297,6 +306,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php b/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php index 18767391eac..c3fa94f8bc6 100644 --- a/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php +++ b/clients/GitHub/src/Schema/CodeSecurityDefaultConfigurations.php @@ -212,6 +212,15 @@ "type": "string", "description": "The enablement status of secret scanning non-provider patterns" }, + "secret_scanning_delegated_alert_dismissal": { + "enum": [ + "enabled", + "disabled", + "not_set" + ], + "type": "string", + "description": "The enablement status of secret scanning delegated alert dismissal" + }, "private_vulnerability_reporting": { "enum": [ "enabled", @@ -291,6 +300,7 @@ }, "secret_scanning_validity_checks": "enabled", "secret_scanning_non_provider_patterns": "enabled", + "secret_scanning_delegated_alert_dismissal": "enabled", "private_vulnerability_reporting": "enabled", "enforcement": "enforced", "url": "https:\\/\\/example.com\\/", diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php index e7a02298a1b..63e766a55b3 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Ok extends Schema\AliasAbstract\Tiet07CEC6F7\Tiet1DE9A5A0\Tiet17BD6D01\Tiet0890CA07 +final readonly class Ok extends Schema\AliasAbstract\Tiet40F01C12\Tiet17FC06A8\Tiet7006072F\TietBCEFF0FF { } diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php index 85cc437c9f8..b16737e56f6 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefault/Response/ApplicationJson/Ok/Application/Json.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Json extends Schema\AliasAbstract\Tiet07CEC6F7\Tiet1DE9A5A0\Tiet17BD6D01\Tiet0890CA07 +final readonly class Json extends Schema\AliasAbstract\Tiet40F01C12\Tiet17FC06A8\Tiet7006072F\TietBCEFF0FF { } diff --git a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php index da4a16207d1..0ee292576ae 100644 --- a/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php +++ b/clients/GitHub/src/Schema/Operations/CodeSecurity/SetConfigurationAsDefaultForEnterprise/Response/ApplicationJson/Ok.php @@ -6,6 +6,6 @@ use ApiClients\Client\GitHub\Schema; -final readonly class Ok extends Schema\AliasAbstract\Tiet07CEC6F7\Tiet1DE9A5A0\Tiet17BD6D01\Tiet0890CA07 +final readonly class Ok extends Schema\AliasAbstract\Tiet40F01C12\Tiet17FC06A8\Tiet7006072F\TietBCEFF0FF { } diff --git a/clients/GitHub/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php b/clients/GitHub/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php index 3b27ab93a36..1303079fbe9 100644 --- a/clients/GitHub/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php +++ b/clients/GitHub/src/Schema/RepositoryRuleParamsRequiredReviewerConfiguration.php @@ -4,6 +4,7 @@ namespace ApiClients\Client\GitHub\Schema; +use ApiClients\Client\GitHub\Schema; use EventSauce\ObjectHydrator\MapFrom; final readonly class RepositoryRuleParamsRequiredReviewerConfiguration @@ -12,8 +13,7 @@ "title": "RequiredReviewerConfiguration", "required": [ "file_patterns", - "minimum_approvals", - "reviewer_id" + "minimum_approvals" ], "type": "object", "properties": { @@ -28,9 +28,27 @@ "type": "integer", "description": "Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional." }, - "reviewer_id": { - "type": "string", - "description": "Node ID of the team which must review changes to matching files." + "reviewer": { + "title": "Reviewer", + "required": [ + "id", + "type" + ], + "type": "object", + "properties": { + "id": { + "type": "integer", + "description": "ID of the reviewer which must review changes to matching files." + }, + "type": { + "enum": [ + "Team" + ], + "type": "string", + "description": "The type of the reviewer" + } + }, + "description": "A required reviewing team" } }, "description": "A reviewing team, and file patterns describing which files they must approve changes to." @@ -43,18 +61,20 @@ "generated" ], "minimum_approvals": 17, - "reviewer_id": "generated" + "reviewer": { + "id": 2, + "type": "Team" + } }'; /** * filePatterns: Array of file patterns. Pull requests which change matching files must be approved by the specified team. File patterns use the same syntax as `.gitignore` files. * minimumApprovals: Minimum number of approvals required from the specified team. If set to zero, the team will be added to the pull request but approval is optional. - * reviewerId: Node ID of the team which must review changes to matching files. + * reviewer: A required reviewing team */ public function __construct(#[MapFrom('file_patterns')] public array $filePatterns, #[MapFrom('minimum_approvals')] - public int $minimumApprovals, #[MapFrom('reviewer_id')] - public string $reviewerId,) + public int $minimumApprovals, public Schema\RepositoryRuleParamsReviewer|null $reviewer,) { } } diff --git a/clients/GitHub/src/Schema/RepositoryRuleParamsReviewer.php b/clients/GitHub/src/Schema/RepositoryRuleParamsReviewer.php new file mode 100644 index 00000000000..42f9b30688a --- /dev/null +++ b/clients/GitHub/src/Schema/RepositoryRuleParamsReviewer.php @@ -0,0 +1,45 @@ +