Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,12 @@ public sealed partial class BranchRestrictionPolicyApp
[global::System.Text.Json.Serialization.JsonPropertyName("name")]
public string? Name { get; set; }

/// <summary>
///
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
///
/// </summary>
Expand Down
12 changes: 6 additions & 6 deletions src/libs/GitHub/Generated/GitHub.Models.Integration.g.cs
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,12 @@ public sealed partial class Integration
[global::System.Text.Json.Serialization.JsonRequired]
public required string NodeId { get; set; }

/// <summary>
/// Example: "Iv1.25b5d1e65ffc4022"
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// A GitHub user.
/// </summary>
Expand Down Expand Up @@ -102,12 +108,6 @@ public sealed partial class Integration
[global::System.Text.Json.Serialization.JsonPropertyName("installations_count")]
public int InstallationsCount { get; set; }

/// <summary>
/// Example: "Iv1.25b5d1e65ffc4022"
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// Example: "1d4b2097ac622ba702d19de498f005747a8b21d3"
/// </summary>
Expand Down
12 changes: 6 additions & 6 deletions src/libs/GitHub/Generated/GitHub.Models.NullableIntegration.g.cs
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,12 @@ public sealed partial class NullableIntegration
[global::System.Text.Json.Serialization.JsonRequired]
public required string NodeId { get; set; }

/// <summary>
/// Example: "Iv1.25b5d1e65ffc4022"
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// A GitHub user.
/// </summary>
Expand Down Expand Up @@ -102,12 +108,6 @@ public sealed partial class NullableIntegration
[global::System.Text.Json.Serialization.JsonPropertyName("installations_count")]
public int InstallationsCount { get; set; }

/// <summary>
/// Example: "Iv1.25b5d1e65ffc4022"
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// Example: "1d4b2097ac622ba702d19de498f005747a8b21d3"
/// </summary>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ public sealed partial class OrganizationSecretScanningAlert

/// <summary>
/// User-friendly name for the detected secret, matching the `secret_type`.<br/>
/// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
/// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")]
public string? SecretTypeDisplayName { get; set; }
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ public sealed partial class ReposUpdateRequestSecurityAndAnalysis
public global::GitHub.ReposUpdateRequestSecurityAndAnalysisSecretScanningPushProtection? SecretScanningPushProtection { get; set; }

/// <summary>
/// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
/// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("secret_scanning_non_provider_patterns")]
public global::GitHub.ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns? SecretScanningNonProviderPatterns { get; set; }
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
namespace GitHub
{
/// <summary>
/// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
/// Use the `status` property to enable or disable secret scanning non-provider patterns for this repository. For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
/// </summary>
public sealed partial class ReposUpdateRequestSecurityAndAnalysisSecretScanningNonProviderPatterns
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ public sealed partial class SecretScanningAlert

/// <summary>
/// User-friendly name for the detected secret, matching the `secret_type`.<br/>
/// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
/// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")]
public string? SecretTypeDisplayName { get; set; }
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ public sealed partial class SecretScanningAlertWebhook

/// <summary>
/// User-friendly name for the detected secret, matching the `secret_type`.<br/>
/// For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
/// For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("secret_type_display_name")]
public string? SecretTypeDisplayName { get; set; }
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteCompletedCheckSuiteApp
[global::System.Text.Json.Serialization.JsonRequired]
public required int? Id { get; set; }

/// <summary>
/// The client ID of the GitHub app
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// The name of the GitHub app
/// </summary>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteRequestedCheckSuiteApp
[global::System.Text.Json.Serialization.JsonRequired]
public required int? Id { get; set; }

/// <summary>
/// Client ID of the GitHub app
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// The name of the GitHub app
/// </summary>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,12 @@ public sealed partial class WebhookCheckSuiteRerequestedCheckSuiteApp
[global::System.Text.Json.Serialization.JsonRequired]
public required int? Id { get; set; }

/// <summary>
/// The Client ID for the GitHub app
/// </summary>
[global::System.Text.Json.Serialization.JsonPropertyName("client_id")]
public string? ClientId { get; set; }

/// <summary>
/// The name of the GitHub app
/// </summary>
Expand Down
5 changes: 4 additions & 1 deletion src/libs/GitHub/Generated/JsonSerializerContext.g.cs
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@

namespace GitHub
{
/// <summary>
///
/// </summary>
[global::System.Text.Json.Serialization.JsonSourceGenerationOptions(
DefaultIgnoreCondition = global::System.Text.Json.Serialization.JsonIgnoreCondition.WhenWritingNull,
Converters = new global::System.Type[]
Expand Down Expand Up @@ -5554,7 +5557,7 @@ namespace GitHub
})]

[global::System.Text.Json.Serialization.JsonSerializable(typeof(global::GitHub.JsonSerializerContextTypes))]
internal sealed partial class SourceGenerationContext : global::System.Text.Json.Serialization.JsonSerializerContext
public sealed partial class SourceGenerationContext : global::System.Text.Json.Serialization.JsonSerializerContext
{
}
}
41 changes: 30 additions & 11 deletions src/libs/GitHub/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16143,7 +16143,7 @@ paths:
type: object
description: Use the `status` property to enable or disable
secret scanning non-provider patterns for this repository.
For more information, see "[Secret scanning supported secrets](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
For more information, see "[Supported secret scanning patterns](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
properties:
status:
type: string
Expand Down Expand Up @@ -50088,6 +50088,9 @@ x-webhooks:
For activity relating to deployment creation, use the `deployment` event.

To subscribe to this event, a GitHub App must have at least read-level access for the "Deployments" repository permission.

> [!NOTE]
> A webhook event is not fired for deployment statuses with an `inactive` state.
description: A new deployment status was created.
operationId: deployment-status/created
externalDocs:
Expand Down Expand Up @@ -64433,6 +64436,9 @@ components:
node_id:
type: string
example: MDExOkludGVncmF0aW9uMQ==
client_id:
type: string
example: '"Iv1.25b5d1e65ffc4022"'
owner:
"$ref": "#/components/schemas/nullable-simple-user"
name:
Expand Down Expand Up @@ -64490,9 +64496,6 @@ components:
description: The number of installations associated with the GitHub app
example: 5
type: integer
client_id:
type: string
example: '"Iv1.25b5d1e65ffc4022"'
client_secret:
type: string
example: '"1d4b2097ac622ba702d19de498f005747a8b21d3"'
Expand Down Expand Up @@ -67562,7 +67565,7 @@ components:
type: string
description: |-
User-friendly name for the detected secret, matching the `secret_type`.
For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
secret:
type: string
description: The secret that was detected.
Expand Down Expand Up @@ -67724,6 +67727,9 @@ components:
node_id:
type: string
example: MDExOkludGVncmF0aW9uMQ==
client_id:
type: string
example: '"Iv1.25b5d1e65ffc4022"'
owner:
"$ref": "#/components/schemas/nullable-simple-user"
name:
Expand Down Expand Up @@ -67781,9 +67787,6 @@ components:
description: The number of installations associated with the GitHub app
example: 5
type: integer
client_id:
type: string
example: '"Iv1.25b5d1e65ffc4022"'
client_secret:
type: string
example: '"1d4b2097ac622ba702d19de498f005747a8b21d3"'
Expand Down Expand Up @@ -77608,6 +77611,8 @@ components:
example: false
name:
type: string
client_id:
type: string
description:
type: string
external_url:
Expand Down Expand Up @@ -86402,7 +86407,7 @@ components:
type: string
description: |-
User-friendly name for the detected secret, matching the `secret_type`.
For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
secret:
type: string
description: The secret that was detected.
Expand Down Expand Up @@ -98952,7 +98957,7 @@ components:
type: string
description: |-
User-friendly name for the detected secret, matching the `secret_type`.
For a list of built-in patterns, see "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)."
For a list of built-in patterns, see "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."
validity:
type: string
description: The token status as of the latest validity check.
Expand Down Expand Up @@ -99930,6 +99935,10 @@ components:
description: Unique identifier of the GitHub app
type: integer
nullable: true
client_id:
description: The client ID of the GitHub app
type: string
nullable: true
name:
description: The name of the GitHub app
type: string
Expand Down Expand Up @@ -100529,6 +100538,10 @@ components:
description: Unique identifier of the GitHub app
type: integer
nullable: true
client_id:
description: Client ID of the GitHub app
type: string
nullable: true
name:
description: The name of the GitHub app
type: string
Expand Down Expand Up @@ -101121,6 +101134,10 @@ components:
description: Unique identifier of the GitHub app
type: integer
nullable: true
client_id:
description: The Client ID for the GitHub app
type: string
nullable: true
name:
description: The name of the GitHub app
type: string
Expand Down Expand Up @@ -192847,6 +192864,7 @@ components:
value:
id: 1
slug: octoapp
client_id: Iv1.ab1112223334445c
node_id: MDExOkludGVncmF0aW9uMQ==
owner:
login: octocat
Expand Down Expand Up @@ -199278,6 +199296,7 @@ components:
repositories_url: https://api.github.com/installation/repositories
html_url: https://github.com/organizations/github/settings/installations/1
app_id: 1
client_id: Iv1.ab1112223334445c
target_id: 1
target_type: Organization
permissions:
Expand Down Expand Up @@ -219420,7 +219439,7 @@ components:
in: query
description: |-
A comma-separated list of secret types to return. By default all secret types are returned.
See "[Secret scanning patterns](https://docs.github.com/code-security/secret-scanning/secret-scanning-patterns#supported-secrets-for-advanced-security)"
See "[Supported secret scanning patterns](https://docs.github.com/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)"
for a complete list of secret types.
required: false
schema:
Expand Down