diff --git a/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs index e689eb484..31fa03966 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.BranchRestrictionPolicyApp.g.cs @@ -38,6 +38,12 @@ public sealed partial class BranchRestrictionPolicyApp [global::System.Text.Json.Serialization.JsonPropertyName("name")] public string? Name { get; set; } + /// + /// + /// + [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] + public string? ClientId { get; set; } + /// /// /// diff --git a/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs b/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs index 00ac05c4b..f818f9894 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs @@ -30,6 +30,12 @@ public sealed partial class Integration [global::System.Text.Json.Serialization.JsonRequired] public required string NodeId { get; set; } + /// + /// Example: "Iv1.25b5d1e65ffc4022" + /// + [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] + public string? ClientId { get; set; } + /// /// A GitHub user. /// @@ -102,12 +108,6 @@ public sealed partial class Integration [global::System.Text.Json.Serialization.JsonPropertyName("installations_count")] public int InstallationsCount { get; set; } - /// - /// Example: "Iv1.25b5d1e65ffc4022" - /// - [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] - public string? ClientId { get; set; } - /// /// Example: "1d4b2097ac622ba702d19de498f005747a8b21d3" /// diff --git a/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs b/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs index f03dfac81..15f4266b6 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs @@ -30,6 +30,12 @@ public sealed partial class NullableIntegration [global::System.Text.Json.Serialization.JsonRequired] public required string NodeId { get; set; } + /// + /// Example: "Iv1.25b5d1e65ffc4022" + /// + [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] + public string? ClientId { get; set; } + /// /// A GitHub user. /// @@ -102,12 +108,6 @@ public sealed partial class NullableIntegration [global::System.Text.Json.Serialization.JsonPropertyName("installations_count")] public int InstallationsCount { get; set; } - /// - /// Example: "Iv1.25b5d1e65ffc4022" - /// - [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] - public string? ClientId { get; set; } - /// /// Example: "1d4b2097ac622ba702d19de498f005747a8b21d3" /// diff --git a/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs b/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs index 922ae69a0..8191d164d 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.OrganizationSecretScanningAlert.g.cs @@ -78,7 +78,7 @@ public sealed partial class OrganizationSecretScanningAlert /// /// User-friendly name for the detected secret, matching the `secret_type`.
- /// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)." + /// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." ///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")] public string? SecretTypeDisplayName { get; set; } diff --git a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs index 325b9eac4..bb1954aca 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysis.g.cs @@ -31,7 +31,7 @@ public sealed partial class ReposUpdateRequestSecurityAndAnalysis public global::GitHub.ReposUpdateRequestSecurityAndAnalysisSecretScanningPushProtection? SecretScanningPushProtection { get; set; } /// - /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)." + /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." /// [global::System.Text.Json.Serialization.JsonPropertyName("secret_scanning_non_provider_patterns")] public global::GitHub.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns? SecretScanningNonProviderPatterns { get; set; } diff --git a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs index 8cf24caf8..5030cffad 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns.g.cs @@ -4,7 +4,7 @@ namespace GitHub { /// - /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)." + /// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." /// public sealed partial class ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns { diff --git a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs index 0e69bf6a4..6f284a91a 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlert.g.cs @@ -84,7 +84,7 @@ public sealed partial class SecretScanningAlert /// /// User-friendly name for the detected secret, matching the `secret_type`.
- /// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)." + /// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." ///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")] public string? SecretTypeDisplayName { get; set; } diff --git a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs index 980441f48..93c82004f 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.SecretScanningAlertWebhook.g.cs @@ -77,7 +77,7 @@ public sealed partial class SecretScanningAlertWebhook /// /// User-friendly name for the detected secret, matching the `secret_type`.
- /// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)." + /// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." ///
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")] public string? SecretTypeDisplayName { get; set; } diff --git a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs index 8e91d92cd..21c59cfbc 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteCompletedCheckSuiteApp.g.cs @@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteCompletedCheckSuiteApp [global::System.Text.Json.Serialization.JsonRequired] public required int? Id { get; set; } + /// + /// The client ID of the GitHub app + /// + [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] + public string? ClientId { get; set; } + /// /// The name of the GitHub app /// diff --git a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs index 937065062..0bd2c8090 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRequestedCheckSuiteApp.g.cs @@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteRequestedCheckSuiteApp [global::System.Text.Json.Serialization.JsonRequired] public required int? Id { get; set; } + /// + /// Client ID of the GitHub app + /// + [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] + public string? ClientId { get; set; } + /// /// The name of the GitHub app /// diff --git a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs index a3a894372..12f565f0e 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.WebhookCheckSuiteRerequestedCheckSuiteApp.g.cs @@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteRerequestedCheckSuiteApp [global::System.Text.Json.Serialization.JsonRequired] public required int? Id { get; set; } + /// + /// The Client ID for the GitHub app + /// + [global::System.Text.Json.Serialization.JsonPropertyName("client_id")] + public string? ClientId { get; set; } + /// /// The name of the GitHub app /// diff --git a/src/libs/GitHub/Generated/JsonSerializerContext.g.cs b/src/libs/GitHub/Generated/JsonSerializerContext.g.cs index 3172a1489..118a9752d 100644 --- a/src/libs/GitHub/Generated/JsonSerializerContext.g.cs +++ b/src/libs/GitHub/Generated/JsonSerializerContext.g.cs @@ -6,6 +6,9 @@ namespace GitHub { + /// + /// + /// [global::System.Text.Json.Serialization.JsonSourceGenerationOptions( DefaultIgnoreCondition = global::System.Text.Json.Serialization.JsonIgnoreCondition.WhenWritingNull, Converters = new global::System.Type[] @@ -5554,7 +5557,7 @@ namespace GitHub })] [global::System.Text.Json.Serialization.JsonSerializable(typeof(global::GitHub.JsonSerializerContextTypes))] - internal sealed partial class SourceGenerationContext : global::System.Text.Json.Serialization.JsonSerializerContext + public sealed partial class SourceGenerationContext : global::System.Text.Json.Serialization.JsonSerializerContext { } } \ No newline at end of file diff --git a/src/libs/GitHub/openapi.yaml b/src/libs/GitHub/openapi.yaml index ac3be6f60..66870148b 100644 --- a/src/libs/GitHub/openapi.yaml +++ b/src/libs/GitHub/openapi.yaml @@ -16143,7 +16143,7 @@ paths: type: object description: Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. - For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)." + For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." properties: status: type: string @@ -50088,6 +50088,9 @@ x-webhooks: For activity relating to deployment creation, use the `deployment` event. To subscribe to this event, a GitHub App must have at least read-level access for the "Deployments" repository permission. + + > [!NOTE] + > A webhook event is not fired for deployment statuses with an `inactive` state. description: A new deployment status was created. operationId: deployment-status/created externalDocs: @@ -64433,6 +64436,9 @@ components: node_id: type: string example: MDExOkludGVncmF0aW9uMQ== + client_id: + type: string + example: '"Iv1.25b5d1e65ffc4022"' owner: "$ref": "#/components/schemas/nullable-simple-user" name: @@ -64490,9 +64496,6 @@ components: description: The number of installations associated with the GitHub app example: 5 type: integer - client_id: - type: string - example: '"Iv1.25b5d1e65ffc4022"' client_secret: type: string example: '"1d4b2097ac622ba702d19de498f005747a8b21d3"' @@ -67562,7 +67565,7 @@ components: type: string description: |- User-friendly name for the detected secret, matching the `secret_type`. - For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)." + For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." secret: type: string description: The secret that was detected. @@ -67724,6 +67727,9 @@ components: node_id: type: string example: MDExOkludGVncmF0aW9uMQ== + client_id: + type: string + example: '"Iv1.25b5d1e65ffc4022"' owner: "$ref": "#/components/schemas/nullable-simple-user" name: @@ -67781,9 +67787,6 @@ components: description: The number of installations associated with the GitHub app example: 5 type: integer - client_id: - type: string - example: '"Iv1.25b5d1e65ffc4022"' client_secret: type: string example: '"1d4b2097ac622ba702d19de498f005747a8b21d3"' @@ -77608,6 +77611,8 @@ components: example: false name: type: string + client_id: + type: string description: type: string external_url: @@ -86402,7 +86407,7 @@ components: type: string description: |- User-friendly name for the detected secret, matching the `secret_type`. - For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)." + For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." secret: type: string description: The secret that was detected. @@ -98952,7 +98957,7 @@ components: type: string description: |- User-friendly name for the detected secret, matching the `secret_type`. - For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)." + For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)." validity: type: string description: The token status as of the latest validity check. @@ -99930,6 +99935,10 @@ components: description: Unique identifier of the GitHub app type: integer nullable: true + client_id: + description: The client ID of the GitHub app + type: string + nullable: true name: description: The name of the GitHub app type: string @@ -100529,6 +100538,10 @@ components: description: Unique identifier of the GitHub app type: integer nullable: true + client_id: + description: Client ID of the GitHub app + type: string + nullable: true name: description: The name of the GitHub app type: string @@ -101121,6 +101134,10 @@ components: description: Unique identifier of the GitHub app type: integer nullable: true + client_id: + description: The Client ID for the GitHub app + type: string + nullable: true name: description: The name of the GitHub app type: string @@ -192847,6 +192864,7 @@ components: value: id: 1 slug: octoapp + client_id: Iv1.ab1112223334445c node_id: MDExOkludGVncmF0aW9uMQ== owner: login: octocat @@ -199278,6 +199296,7 @@ components: repositories_url: https://api.github.com/installation/repositories html_url: https://github.com/organizations/github/settings/installations/1 app_id: 1 + client_id: Iv1.ab1112223334445c target_id: 1 target_type: Organization permissions: @@ -219420,7 +219439,7 @@ components: in: query description: |- A comma-separated list of secret types to return. By default all secret types are returned. - See "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)" + See "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)" for a complete list of secret types. required: false schema: