diff --git a/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs
index e689eb484..31fa03966 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs
@@ -38,6 +38,12 @@ public sealed partial class BranchRestrictionPolicyApp
[global::System.Text.Json.Serialization.JsonPropertyName("name")]
public string? Name { get; set; }
+ ///
+ ///
+ ///
+ [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
+ public string? ClientId { get; set; }
+
///
///
///
diff --git a/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs b/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs
index 00ac05c4b..f818f9894 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs
@@ -30,6 +30,12 @@ public sealed partial class Integration
[global::System.Text.Json.Serialization.JsonRequired]
public required string NodeId { get; set; }
+ ///
+ /// Example: "Iv1.25b5d1e65ffc4022"
+ ///
+ [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
+ public string? ClientId { get; set; }
+
///
/// A GitHub user.
///
@@ -102,12 +108,6 @@ public sealed partial class Integration
[global::System.Text.Json.Serialization.JsonPropertyName("installations_count")]
public int InstallationsCount { get; set; }
- ///
- /// Example: "Iv1.25b5d1e65ffc4022"
- ///
- [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
- public string? ClientId { get; set; }
-
///
/// Example: "1d4b2097ac622ba702d19de498f005747a8b21d3"
///
diff --git a/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs b/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs
index f03dfac81..15f4266b6 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs
@@ -30,6 +30,12 @@ public sealed partial class NullableIntegration
[global::System.Text.Json.Serialization.JsonRequired]
public required string NodeId { get; set; }
+ ///
+ /// Example: "Iv1.25b5d1e65ffc4022"
+ ///
+ [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
+ public string? ClientId { get; set; }
+
///
/// A GitHub user.
///
@@ -102,12 +108,6 @@ public sealed partial class NullableIntegration
[global::System.Text.Json.Serialization.JsonPropertyName("installations_count")]
public int InstallationsCount { get; set; }
- ///
- /// Example: "Iv1.25b5d1e65ffc4022"
- ///
- [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
- public string? ClientId { get; set; }
-
///
/// Example: "1d4b2097ac622ba702d19de498f005747a8b21d3"
///
diff --git a/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs b/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs
index 922ae69a0..8191d164d 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs
@@ -78,7 +78,7 @@ public sealed partial class OrganizationSecretScanningAlert
///
/// User-friendly name for the detected secret, matching the `secret_type`.
- /// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
+ /// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")]
public string? SecretTypeDisplayName { get; set; }
diff --git a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs
index 325b9eac4..bb1954aca 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs
@@ -31,7 +31,7 @@ public sealed partial class ReposUpdateRequestSecurityAndAnalysis
public global::GitHub.ReposUpdateRequestSecurityAndAnalysisSecretScanningPushProtection? SecretScanningPushProtection { get; set; }
///
- /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
+ /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_scanning_non_provider_patterns")]
public global::GitHub.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns? SecretScanningNonProviderPatterns { get; set; }
diff --git a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs
index 8cf24caf8..5030cffad 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs
@@ -4,7 +4,7 @@
namespace GitHub
{
///
- /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
+ /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
///
public sealed partial class ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns
{
diff --git a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs
index 0e69bf6a4..6f284a91a 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs
@@ -84,7 +84,7 @@ public sealed partial class SecretScanningAlert
///
/// User-friendly name for the detected secret, matching the `secret_type`.
- /// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
+ /// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")]
public string? SecretTypeDisplayName { get; set; }
diff --git a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs
index 980441f48..93c82004f 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs
@@ -77,7 +77,7 @@ public sealed partial class SecretScanningAlertWebhook
///
/// User-friendly name for the detected secret, matching the `secret_type`.
- /// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
+ /// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")]
public string? SecretTypeDisplayName { get; set; }
diff --git a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs
index 8e91d92cd..21c59cfbc 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs
@@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteCompletedCheckSuiteApp
[global::System.Text.Json.Serialization.JsonRequired]
public required int? Id { get; set; }
+ ///
+ /// The client ID of the GitHub app
+ ///
+ [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
+ public string? ClientId { get; set; }
+
///
/// The name of the GitHub app
///
diff --git a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs
index 937065062..0bd2c8090 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs
@@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteRequestedCheckSuiteApp
[global::System.Text.Json.Serialization.JsonRequired]
public required int? Id { get; set; }
+ ///
+ /// Client ID of the GitHub app
+ ///
+ [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
+ public string? ClientId { get; set; }
+
///
/// The name of the GitHub app
///
diff --git a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs
index a3a894372..12f565f0e 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs
@@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteRerequestedCheckSuiteApp
[global::System.Text.Json.Serialization.JsonRequired]
public required int? Id { get; set; }
+ ///
+ /// The Client ID for the GitHub app
+ ///
+ [global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
+ public string? ClientId { get; set; }
+
///
/// The name of the GitHub app
///
diff --git a/src/libs/GitHub/Generated/JsonSerializerContext.g.cs b/src/libs/GitHub/Generated/JsonSerializerContext.g.cs
index 3172a1489..118a9752d 100644
--- a/src/libs/GitHub/Generated/JsonSerializerContext.g.cs
+++ b/src/libs/GitHub/Generated/JsonSerializerContext.g.cs
@@ -6,6 +6,9 @@
namespace GitHub
{
+ ///
+ ///
+ ///
[global::System.Text.Json.Serialization.JsonSourceGenerationOptions(
DefaultIgnoreCondition = global::System.Text.Json.Serialization.JsonIgnoreCondition.WhenWritingNull,
Converters = new global::System.Type[]
@@ -5554,7 +5557,7 @@ namespace GitHub
})]
[global::System.Text.Json.Serialization.JsonSerializable(typeof(global::GitHub.JsonSerializerContextTypes))]
- internal sealed partial class SourceGenerationContext : global::System.Text.Json.Serialization.JsonSerializerContext
+ public sealed partial class SourceGenerationContext : global::System.Text.Json.Serialization.JsonSerializerContext
{
}
}
\ No newline at end of file
diff --git a/src/libs/GitHub/openapi.yaml b/src/libs/GitHub/openapi.yaml
index ac3be6f60..66870148b 100644
--- a/src/libs/GitHub/openapi.yaml
+++ b/src/libs/GitHub/openapi.yaml
@@ -16143,7 +16143,7 @@ paths:
type: object
description: Use the `status` property to enable or disable
secret scanning non-provider patterns for this repository.
- For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
+ For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
properties:
status:
type: string
@@ -50088,6 +50088,9 @@ x-webhooks:
For activity relating to deployment creation, use the `deployment` event.
To subscribe to this event, a GitHub App must have at least read-level access for the "Deployments" repository permission.
+
+ > [!NOTE]
+ > A webhook event is not fired for deployment statuses with an `inactive` state.
description: A new deployment status was created.
operationId: deployment-status/created
externalDocs:
@@ -64433,6 +64436,9 @@ components:
node_id:
type: string
example: MDExOkludGVncmF0aW9uMQ==
+ client_id:
+ type: string
+ example: '"Iv1.25b5d1e65ffc4022"'
owner:
"$ref": "#/components/schemas/nullable-simple-user"
name:
@@ -64490,9 +64496,6 @@ components:
description: The number of installations associated with the GitHub app
example: 5
type: integer
- client_id:
- type: string
- example: '"Iv1.25b5d1e65ffc4022"'
client_secret:
type: string
example: '"1d4b2097ac622ba702d19de498f005747a8b21d3"'
@@ -67562,7 +67565,7 @@ components:
type: string
description: |-
User-friendly name for the detected secret, matching the `secret_type`.
- For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
+ For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
secret:
type: string
description: The secret that was detected.
@@ -67724,6 +67727,9 @@ components:
node_id:
type: string
example: MDExOkludGVncmF0aW9uMQ==
+ client_id:
+ type: string
+ example: '"Iv1.25b5d1e65ffc4022"'
owner:
"$ref": "#/components/schemas/nullable-simple-user"
name:
@@ -67781,9 +67787,6 @@ components:
description: The number of installations associated with the GitHub app
example: 5
type: integer
- client_id:
- type: string
- example: '"Iv1.25b5d1e65ffc4022"'
client_secret:
type: string
example: '"1d4b2097ac622ba702d19de498f005747a8b21d3"'
@@ -77608,6 +77611,8 @@ components:
example: false
name:
type: string
+ client_id:
+ type: string
description:
type: string
external_url:
@@ -86402,7 +86407,7 @@ components:
type: string
description: |-
User-friendly name for the detected secret, matching the `secret_type`.
- For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
+ For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
secret:
type: string
description: The secret that was detected.
@@ -98952,7 +98957,7 @@ components:
type: string
description: |-
User-friendly name for the detected secret, matching the `secret_type`.
- For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
+ For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
validity:
type: string
description: The token status as of the latest validity check.
@@ -99930,6 +99935,10 @@ components:
description: Unique identifier of the GitHub app
type: integer
nullable: true
+ client_id:
+ description: The client ID of the GitHub app
+ type: string
+ nullable: true
name:
description: The name of the GitHub app
type: string
@@ -100529,6 +100538,10 @@ components:
description: Unique identifier of the GitHub app
type: integer
nullable: true
+ client_id:
+ description: Client ID of the GitHub app
+ type: string
+ nullable: true
name:
description: The name of the GitHub app
type: string
@@ -101121,6 +101134,10 @@ components:
description: Unique identifier of the GitHub app
type: integer
nullable: true
+ client_id:
+ description: The Client ID for the GitHub app
+ type: string
+ nullable: true
name:
description: The name of the GitHub app
type: string
@@ -192847,6 +192864,7 @@ components:
value:
id: 1
slug: octoapp
+ client_id: Iv1.ab1112223334445c
node_id: MDExOkludGVncmF0aW9uMQ==
owner:
login: octocat
@@ -199278,6 +199296,7 @@ components:
repositories_url: https://api.github.com/installation/repositories
html_url: https://github.com/organizations/github/settings/installations/1
app_id: 1
+ client_id: Iv1.ab1112223334445c
target_id: 1
target_type: Organization
permissions:
@@ -219420,7 +219439,7 @@ components:
in: query
description: |-
A comma-separated list of secret types to return. By default all secret types are returned.
- See "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)"
+ See "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)"
for a complete list of secret types.
required: false
schema: