diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs index df75ced4..d62a7ed4 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs @@ -70,7 +70,7 @@ public sealed partial class RuleSuite2 public global::GitHub.RuleSuiteResult2? Result { get; set; } /// - /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. + /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. Null if no rules with `evaluate` enforcement status were run. /// [global::System.Text.Json.Serialization.JsonPropertyName("evaluation_result")] [global::System.Text.Json.Serialization.JsonConverter(typeof(global::OpenApiGenerator.JsonConverters.RuleSuiteEvaluationResult2JsonConverter))] diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs index b538abad..bafee813 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs @@ -16,6 +16,10 @@ public enum RuleSuiteEvaluationResult /// /// Fail, + /// + /// + /// + Bypass, } /// @@ -32,6 +36,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult value) { RuleSuiteEvaluationResult.Pass => "pass", RuleSuiteEvaluationResult.Fail => "fail", + RuleSuiteEvaluationResult.Bypass => "bypass", _ => throw new global::System.ArgumentOutOfRangeException(nameof(value), value, null), }; } @@ -44,6 +49,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult value) { "pass" => RuleSuiteEvaluationResult.Pass, "fail" => RuleSuiteEvaluationResult.Fail, + "bypass" => RuleSuiteEvaluationResult.Bypass, _ => null, }; } diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs index cb88e0f9..4ddd47a8 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs @@ -4,7 +4,7 @@ namespace GitHub { /// - /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. + /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. Null if no rules with `evaluate` enforcement status were run. /// public enum RuleSuiteEvaluationResult2 { @@ -16,6 +16,10 @@ public enum RuleSuiteEvaluationResult2 /// /// Fail, + /// + /// + /// + Bypass, } /// @@ -32,6 +36,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult2 value) { RuleSuiteEvaluationResult2.Pass => "pass", RuleSuiteEvaluationResult2.Fail => "fail", + RuleSuiteEvaluationResult2.Bypass => "bypass", _ => throw new global::System.ArgumentOutOfRangeException(nameof(value), value, null), }; } @@ -44,6 +49,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult2 value) { "pass" => RuleSuiteEvaluationResult2.Pass, "fail" => RuleSuiteEvaluationResult2.Fail, + "bypass" => RuleSuiteEvaluationResult2.Bypass, _ => null, }; } diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs index cadf363e..92851837 100644 --- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs +++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs @@ -35,7 +35,7 @@ public sealed partial class RuleSuiteRuleEvaluation public string? RuleType { get; set; } /// - /// Any associated details with the rule evaluation. + /// The detailed failure message for the rule. Null if the rule passed. /// [global::System.Text.Json.Serialization.JsonPropertyName("details")] public string? Details { get; set; } diff --git a/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs b/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs index 1d0d5732..ba52a194 100644 --- a/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs +++ b/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs @@ -28,7 +28,7 @@ partial void ProcessOrgsEnableOrDisableSecurityProductOnAllOrgReposResponse( /// > **Deprecation notice:** The ability to enable or disable a security feature for all eligible repositories in an organization is deprecated. Please use [code security configurations](https://docs.github.com/rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-07-22-deprecation-of-api-endpoint-to-enable-or-disable-a-security-feature-for-an-organization/).
/// Enables or disables the specified security feature for all eligible repositories in an organization. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
/// The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint.
- /// OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint. + /// OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint. ///
/// /// @@ -96,7 +96,7 @@ partial void ProcessOrgsEnableOrDisableSecurityProductOnAllOrgReposResponse( /// > **Deprecation notice:** The ability to enable or disable a security feature for all eligible repositories in an organization is deprecated. Please use [code security configurations](https://docs.github.com/rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-07-22-deprecation-of-api-endpoint-to-enable-or-disable-a-security-feature-for-an-organization/).
/// Enables or disables the specified security feature for all eligible repositories in an organization. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
/// The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint.
- /// OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint. + /// OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint. /// /// /// diff --git a/src/libs/GitHub/openapi.yaml b/src/libs/GitHub/openapi.yaml index 9f284a5b..3ba85e97 100644 --- a/src/libs/GitHub/openapi.yaml +++ b/src/libs/GitHub/openapi.yaml @@ -14929,7 +14929,7 @@ paths: The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint. - OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint. + OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint. tags: - orgs operationId: orgs/enable-or-disable-security-product-on-all-org-repos @@ -74806,6 +74806,7 @@ components: enum: - pass - fail + - bypass description: The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. @@ -74854,12 +74855,15 @@ components: enforcement status. evaluation_result: type: string + nullable: true enum: - pass - fail + - bypass description: The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would - pass or fail if all rules in the rule suite were `active`. + pass or fail if all rules in the rule suite were `active`. Null if no + rules with `evaluate` enforcement status were run. rule_evaluations: type: array description: Details on the evaluated rules. @@ -74898,7 +74902,9 @@ components: description: The type of rule. details: type: string - description: Any associated details with the rule evaluation. + nullable: true + description: The detailed failure message for the rule. Null if the + rule passed. repository-advisory-vulnerability: description: A product affected by the vulnerability detailed in a repository security advisory. @@ -198979,6 +198985,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_validity_checks: enabled + secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/17 @@ -199001,6 +199008,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: enabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1326 @@ -199024,6 +199032,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -199049,6 +199058,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: enabled secret_scanning_validity_checks: enabled + secret_scanning_non_provider_patterns: enabled private_vulnerability_reporting: enabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -199096,6 +199106,7 @@ components: secret_scanning: disabled secret_scanning_push_protection: disabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325 @@ -206554,6 +206565,7 @@ components: secret_scanning: enabled secret_scanning_push_protection: disabled secret_scanning_validity_checks: disabled + secret_scanning_non_provider_patterns: disabled private_vulnerability_reporting: disabled enforcement: enforced url: https://api.github.com/orgs/octo-org/code-security/configurations/1325