diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs
index df75ced4..d62a7ed4 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuite2.g.cs
@@ -70,7 +70,7 @@ public sealed partial class RuleSuite2
public global::GitHub.RuleSuiteResult2? Result { get; set; }
///
- /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`.
+ /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. Null if no rules with `evaluate` enforcement status were run.
///
[global::System.Text.Json.Serialization.JsonPropertyName("evaluation_result")]
[global::System.Text.Json.Serialization.JsonConverter(typeof(global::OpenApiGenerator.JsonConverters.RuleSuiteEvaluationResult2JsonConverter))]
diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs
index b538abad..bafee813 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult.g.cs
@@ -16,6 +16,10 @@ public enum RuleSuiteEvaluationResult
///
///
Fail,
+ ///
+ ///
+ ///
+ Bypass,
}
///
@@ -32,6 +36,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult value)
{
RuleSuiteEvaluationResult.Pass => "pass",
RuleSuiteEvaluationResult.Fail => "fail",
+ RuleSuiteEvaluationResult.Bypass => "bypass",
_ => throw new global::System.ArgumentOutOfRangeException(nameof(value), value, null),
};
}
@@ -44,6 +49,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult value)
{
"pass" => RuleSuiteEvaluationResult.Pass,
"fail" => RuleSuiteEvaluationResult.Fail,
+ "bypass" => RuleSuiteEvaluationResult.Bypass,
_ => null,
};
}
diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs
index cb88e0f9..4ddd47a8 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteEvaluationResult2.g.cs
@@ -4,7 +4,7 @@
namespace GitHub
{
///
- /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`.
+ /// The result of the rule evaluations for rules with the `active` and `evaluate` enforcement statuses, demonstrating whether rules would pass or fail if all rules in the rule suite were `active`. Null if no rules with `evaluate` enforcement status were run.
///
public enum RuleSuiteEvaluationResult2
{
@@ -16,6 +16,10 @@ public enum RuleSuiteEvaluationResult2
///
///
Fail,
+ ///
+ ///
+ ///
+ Bypass,
}
///
@@ -32,6 +36,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult2 value)
{
RuleSuiteEvaluationResult2.Pass => "pass",
RuleSuiteEvaluationResult2.Fail => "fail",
+ RuleSuiteEvaluationResult2.Bypass => "bypass",
_ => throw new global::System.ArgumentOutOfRangeException(nameof(value), value, null),
};
}
@@ -44,6 +49,7 @@ public static string ToValueString(this RuleSuiteEvaluationResult2 value)
{
"pass" => RuleSuiteEvaluationResult2.Pass,
"fail" => RuleSuiteEvaluationResult2.Fail,
+ "bypass" => RuleSuiteEvaluationResult2.Bypass,
_ => null,
};
}
diff --git a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs
index cadf363e..92851837 100644
--- a/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.Models.RuleSuiteRuleEvaluation.g.cs
@@ -35,7 +35,7 @@ public sealed partial class RuleSuiteRuleEvaluation
public string? RuleType { get; set; }
///
- /// Any associated details with the rule evaluation.
+ /// The detailed failure message for the rule. Null if the rule passed.
///
[global::System.Text.Json.Serialization.JsonPropertyName("details")]
public string? Details { get; set; }
diff --git a/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs b/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs
index 1d0d5732..ba52a194 100644
--- a/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs
+++ b/src/libs/GitHub/Generated/GitHub.OrgsClient.OrgsEnableOrDisableSecurityProductOnAllOrgRepos.g.cs
@@ -28,7 +28,7 @@ partial void ProcessOrgsEnableOrDisableSecurityProductOnAllOrgReposResponse(
/// > **Deprecation notice:** The ability to enable or disable a security feature for all eligible repositories in an organization is deprecated. Please use [code security configurations](https://docs.github.com/rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-07-22-deprecation-of-api-endpoint-to-enable-or-disable-a-security-feature-for-an-organization/).
/// Enables or disables the specified security feature for all eligible repositories in an organization. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
/// The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint.
- /// OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint.
+ /// OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint.
///
///
///
@@ -96,7 +96,7 @@ partial void ProcessOrgsEnableOrDisableSecurityProductOnAllOrgReposResponse(
/// > **Deprecation notice:** The ability to enable or disable a security feature for all eligible repositories in an organization is deprecated. Please use [code security configurations](https://docs.github.com/rest/code-security/configurations) instead. For more information, see the [changelog](https://github.blog/changelog/2024-07-22-deprecation-of-api-endpoint-to-enable-or-disable-a-security-feature-for-an-organization/).
/// Enables or disables the specified security feature for all eligible repositories in an organization. For more information, see "[Managing security managers in your organization](https://docs.github.com/organizations/managing-peoples-access-to-your-organization-with-roles/managing-security-managers-in-your-organization)."
/// The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint.
- /// OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint.
+ /// OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint.
///
///
///
diff --git a/src/libs/GitHub/openapi.yaml b/src/libs/GitHub/openapi.yaml
index 9f284a5b..3ba85e97 100644
--- a/src/libs/GitHub/openapi.yaml
+++ b/src/libs/GitHub/openapi.yaml
@@ -14929,7 +14929,7 @@ paths:
The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint.
- OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint.
+ OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint.
tags:
- orgs
operationId: orgs/enable-or-disable-security-product-on-all-org-repos
@@ -74806,6 +74806,7 @@ components:
enum:
- pass
- fail
+ - bypass
description: The result of the rule evaluations for rules with the `active`
and `evaluate` enforcement statuses, demonstrating whether rules would
pass or fail if all rules in the rule suite were `active`.
@@ -74854,12 +74855,15 @@ components:
enforcement status.
evaluation_result:
type: string
+ nullable: true
enum:
- pass
- fail
+ - bypass
description: The result of the rule evaluations for rules with the `active`
and `evaluate` enforcement statuses, demonstrating whether rules would
- pass or fail if all rules in the rule suite were `active`.
+ pass or fail if all rules in the rule suite were `active`. Null if no
+ rules with `evaluate` enforcement status were run.
rule_evaluations:
type: array
description: Details on the evaluated rules.
@@ -74898,7 +74902,9 @@ components:
description: The type of rule.
details:
type: string
- description: Any associated details with the rule evaluation.
+ nullable: true
+ description: The detailed failure message for the rule. Null if the
+ rule passed.
repository-advisory-vulnerability:
description: A product affected by the vulnerability detailed in a repository
security advisory.
@@ -198979,6 +198985,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: enabled
secret_scanning_validity_checks: enabled
+ secret_scanning_non_provider_patterns: enabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/17
@@ -199001,6 +199008,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: enabled
secret_scanning_validity_checks: disabled
+ secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1326
@@ -199024,6 +199032,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: disabled
secret_scanning_validity_checks: disabled
+ secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
@@ -199049,6 +199058,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: enabled
secret_scanning_validity_checks: enabled
+ secret_scanning_non_provider_patterns: enabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
@@ -199096,6 +199106,7 @@ components:
secret_scanning: disabled
secret_scanning_push_protection: disabled
secret_scanning_validity_checks: disabled
+ secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
@@ -206554,6 +206565,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: disabled
secret_scanning_validity_checks: disabled
+ secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325