Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"specHash": "95df4267202b432fe4f72cf542eb28c8",
"specHash": "bb053ea7f78df19d2e4d4872d9eed9c7",
"generatedFiles": {
"files": [
{
Expand Down Expand Up @@ -312,7 +312,7 @@
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/EnterpriseSecurityAnalysisSettings.php",
"hash": "fa55f13a444ba977099d0bfd3158c1d8"
"hash": "a75152065f60b36da8b303139762d15e"
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/GetConsumedLicenses.php",
Expand Down Expand Up @@ -572,7 +572,7 @@
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroup.php",
"hash": "cebbab02e23621517b4aca34ba476df4"
"hash": "0512e75d753ee10ea8578ea10188a2dd"
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroups.php",
Expand Down Expand Up @@ -2876,7 +2876,7 @@
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroup\/Members.php",
"hash": "9bd3d378bed94d8f19e46429ae1ecc83"
"hash": "48eee34ca95087dab3972109c20c3379"
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/ExternalGroups\/Groups.php",
Expand Down Expand Up @@ -4672,7 +4672,7 @@
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/SecretScanning\/PatchSecurityAnalysisSettingsForEnterprise\/Request\/ApplicationJson.php",
"hash": "78aed89e2889f054803c520c35e36e4e"
"hash": "a521f4f54420aeb0e2cf46ac934cbcae"
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Schema\/Gists\/Create\/Request\/ApplicationJson.php",
Expand Down Expand Up @@ -27008,7 +27008,7 @@
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/CodeSecurityAndAnalysis.php",
"hash": "0e44529ca73fa31f83b0647c27e0a9d6"
"hash": "537d8a3eaa539ad3acb231fe2e853fbc"
},
{
"name": ".\/clients\/GitHubEnterpriseCloud\/etc\/..\/\/src\/\/Internal\/Hydrator\/Operation\/Enterprises\/Enterprise\/Dependabot\/Alerts.php",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,17 @@ private function hydrateApiClients⚡️Client⚡️GitHubEnterpriseCloud⚡️S

after_secretScanningPushProtectionCustomLink:

$value = $payload['secret_scanning_non_provider_patterns_enabled_for_new_repositories'] ?? null;

if ($value === null) {
$properties['secretScanningNonProviderPatternsEnabledForNewRepositories'] = null;
goto after_secretScanningNonProviderPatternsEnabledForNewRepositories;
}

$properties['secretScanningNonProviderPatternsEnabledForNewRepositories'] = $value;

after_secretScanningNonProviderPatternsEnabledForNewRepositories:

$value = $payload['secret_scanning_validity_checks_enabled'] ?? null;

if ($value === null) {
Expand Down Expand Up @@ -332,6 +343,14 @@ private function serializeObjectApiClients⚡️Client⚡️GitHubEnterpriseClou

after_secretScanningPushProtectionCustomLink: $result['secret_scanning_push_protection_custom_link'] = $secretScanningPushProtectionCustomLink;

$secretScanningNonProviderPatternsEnabledForNewRepositories = $object->secretScanningNonProviderPatternsEnabledForNewRepositories;

if ($secretScanningNonProviderPatternsEnabledForNewRepositories === null) {
goto after_secretScanningNonProviderPatternsEnabledForNewRepositories;
}

after_secretScanningNonProviderPatternsEnabledForNewRepositories: $result['secret_scanning_non_provider_patterns_enabled_for_new_repositories'] = $secretScanningNonProviderPatternsEnabledForNewRepositories;

$secretScanningValidityChecksEnabled = $object->secretScanningValidityChecksEnabled;

if ($secretScanningValidityChecksEnabled === null) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,13 @@
"https:\\/\\/github.com\\/test-org\\/test-repo\\/blob\\/main\\/README.md"
]
},
"secret_scanning_non_provider_patterns_enabled_for_new_repositories": {
"type": "boolean",
"description": "Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise.",
"examples": [
false
]
},
"secret_scanning_validity_checks_enabled": {
"type": "boolean",
"description": "Whether secret scanning automatic validity checks on supported partner tokens is enabled for all repositories under this enterprise.",
Expand All @@ -81,6 +88,7 @@
"secret_scanning_enabled_for_new_repositories": false,
"secret_scanning_push_protection_enabled_for_new_repositories": false,
"secret_scanning_push_protection_custom_link": "https:\\/\\/github.com\\/test-org\\/test-repo\\/blob\\/main\\/README.md",
"secret_scanning_non_provider_patterns_enabled_for_new_repositories": false,
"secret_scanning_validity_checks_enabled": false
}';

Expand All @@ -95,6 +103,7 @@
* secretScanningPushProtectionEnabledForNewRepositories: Whether secret scanning push protection is automatically enabled for new repositories and repositories
transferred to this enterprise.
* secretScanningPushProtectionCustomLink: An optional URL string to display to contributors who are blocked from pushing a secret.
* secretScanningNonProviderPatternsEnabledForNewRepositories: Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise.
* secretScanningValidityChecksEnabled: Whether secret scanning automatic validity checks on supported partner tokens is enabled for all repositories under this enterprise.
*/
public function __construct(#[MapFrom('advanced_security_enabled_for_new_repositories')]
Expand All @@ -103,7 +112,8 @@ public function __construct(#[MapFrom('advanced_security_enabled_for_new_reposit
public bool $dependabotAlertsEnabledForNewRepositories, #[MapFrom('secret_scanning_enabled_for_new_repositories')]
public bool $secretScanningEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_enabled_for_new_repositories')]
public bool $secretScanningPushProtectionEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_custom_link')]
public string|null $secretScanningPushProtectionCustomLink, #[MapFrom('secret_scanning_validity_checks_enabled')]
public string|null $secretScanningPushProtectionCustomLink, #[MapFrom('secret_scanning_non_provider_patterns_enabled_for_new_repositories')]
public bool|null $secretScanningNonProviderPatternsEnabledForNewRepositories, #[MapFrom('secret_scanning_validity_checks_enabled')]
public bool|null $secretScanningValidityChecksEnabled,)
{
}
Expand Down
6 changes: 2 additions & 4 deletions clients/GitHubEnterpriseCloud/src/Schema/ExternalGroup.php
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,7 @@
"required": [
"member_id",
"member_login",
"member_name",
"member_email"
],
"type": "object",
Expand All @@ -101,10 +102,7 @@
]
},
"member_name": {
"type": [
"string",
"null"
],
"type": "string",
"description": "The user display name\\/profile name",
"examples": [
"Mona Lisa"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@
"required": [
"member_id",
"member_login",
"member_name",
"member_email"
],
"type": "object",
Expand All @@ -31,10 +32,7 @@
]
},
"member_name": {
"type": [
"string",
"null"
],
"type": "string",
"description": "The user display name\\/profile name",
"examples": [
"Mona Lisa"
Expand Down Expand Up @@ -67,7 +65,7 @@
public function __construct(#[MapFrom('member_id')]
public int $memberId, #[MapFrom('member_login')]
public string $memberLogin, #[MapFrom('member_name')]
public string|null $memberName, #[MapFrom('member_email')]
public string $memberName, #[MapFrom('member_email')]
public string $memberEmail,)
{
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,13 @@
"null"
],
"description": "The URL that will be displayed to contributors who are blocked from pushing a secret. For more information, see \\"[Protecting pushes with secret scanning](https:\\/\\/docs.github.com\\/enterprise-cloud@latest\\/\\/code-security\\/secret-scanning\\/protecting-pushes-with-secret-scanning).\\"\\nTo disable this functionality, set this field to `null`."
},
"secret_scanning_non_provider_patterns_enabled_for_new_repositories": {
"type": [
"boolean",
"null"
],
"description": "Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise."
}
}
}';
Expand All @@ -48,7 +55,8 @@
"dependabot_alerts_enabled_for_new_repositories": false,
"secret_scanning_enabled_for_new_repositories": false,
"secret_scanning_push_protection_enabled_for_new_repositories": false,
"secret_scanning_push_protection_custom_link": "generated"
"secret_scanning_push_protection_custom_link": "generated",
"secret_scanning_non_provider_patterns_enabled_for_new_repositories": false
}';

/**
Expand All @@ -59,14 +67,16 @@
* secretScanningPushProtectionEnabledForNewRepositories: Whether secret scanning push protection is automatically enabled for new repositories. For more information, see "[Protecting pushes with secret scanning](https://docs.github.com/enterprise-cloud@latest//code-security/secret-scanning/protecting-pushes-with-secret-scanning)."
* secretScanningPushProtectionCustomLink: The URL that will be displayed to contributors who are blocked from pushing a secret. For more information, see "[Protecting pushes with secret scanning](https://docs.github.com/enterprise-cloud@latest//code-security/secret-scanning/protecting-pushes-with-secret-scanning)."
To disable this functionality, set this field to `null`.
* secretScanningNonProviderPatternsEnabledForNewRepositories: Whether secret scanning of non-provider patterns is enabled for new repositories under this enterprise.
*/
public function __construct(#[MapFrom('advanced_security_enabled_for_new_repositories')]
public bool|null $advancedSecurityEnabledForNewRepositories, #[MapFrom('advanced_security_enabled_new_user_namespace_repos')]
public bool|null $advancedSecurityEnabledNewUserNamespaceRepos, #[MapFrom('dependabot_alerts_enabled_for_new_repositories')]
public bool|null $dependabotAlertsEnabledForNewRepositories, #[MapFrom('secret_scanning_enabled_for_new_repositories')]
public bool|null $secretScanningEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_enabled_for_new_repositories')]
public bool|null $secretScanningPushProtectionEnabledForNewRepositories, #[MapFrom('secret_scanning_push_protection_custom_link')]
public string|null $secretScanningPushProtectionCustomLink,)
public string|null $secretScanningPushProtectionCustomLink, #[MapFrom('secret_scanning_non_provider_patterns_enabled_for_new_repositories')]
public bool|null $secretScanningNonProviderPatternsEnabledForNewRepositories,)
{
}
}
28 changes: 24 additions & 4 deletions etc/specs/GitHubEnterpriseCloud/current.spec.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3170,6 +3170,12 @@ paths:
description: |-
The URL that will be displayed to contributors who are blocked from pushing a secret. For more information, see "[Protecting pushes with secret scanning](https://docs.github.com/enterprise-cloud@latest//code-security/secret-scanning/protecting-pushes-with-secret-scanning)."
To disable this functionality, set this field to `null`.
secret_scanning_non_provider_patterns_enabled_for_new_repositories:
type:
- boolean
- 'null'
description: Whether secret scanning of non-provider patterns is
enabled for new repositories under this enterprise.
examples:
default:
value:
Expand All @@ -3179,6 +3185,7 @@ paths:
secret_scanning_enabled_for_new_repositories: true
secret_scanning_push_protection_enabled_for_new_repositories: true
secret_scanning_push_protection_custom_link: https://github.com/test-org/test-repo/blob/main/README.md
secret_scanning_non_provider_patterns_enabled_for_new_repositories: true
responses:
'204':
description: Action started
Expand Down Expand Up @@ -19000,7 +19007,7 @@ paths:

The authenticated user must be an organization owner or be member of a team with the security manager role to use this endpoint.

OAuth app tokens and personal access tokens (classic) need the `write:org` scope to use this endpoint.
OAuth app tokens and personal access tokens (classic) need the `admin:org`, `write:org`, or `repo` scopes to use this endpoint.
tags:
- orgs
operationId: orgs/enable-or-disable-security-product-on-all-org-repos
Expand Down Expand Up @@ -74810,6 +74817,12 @@ components:
from pushing a secret.
examples:
- https://github.com/test-org/test-repo/blob/main/README.md
secret_scanning_non_provider_patterns_enabled_for_new_repositories:
type: boolean
description: Whether secret scanning of non-provider patterns is enabled
for new repositories under this enterprise.
examples:
- false
secret_scanning_validity_checks_enabled:
type: boolean
description: Whether secret scanning automatic validity checks on supported
Expand Down Expand Up @@ -79717,6 +79730,7 @@ components:
required:
- member_id
- member_login
- member_name
- member_email
properties:
member_id:
Expand All @@ -79731,9 +79745,7 @@ components:
- mona-lisa_eocsaxrs
member_name:
description: The user display name/profile name
type:
- string
- 'null'
type: string
examples:
- Mona Lisa
member_email:
Expand Down Expand Up @@ -208502,6 +208514,7 @@ components:
secret_scanning_enabled_for_new_repositories: true
secret_scanning_push_protection_enabled_for_new_repositories: true
secret_scanning_push_protection_custom_link: https://github.com/test-org/test-repo/blob/main/README.md
secret_scanning_non_provider_patterns_enabled_for_new_repositories: true
secret_scanning_validity_checks_enabled: true
get-consumed-licenses:
value:
Expand Down Expand Up @@ -211533,6 +211546,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: enabled
secret_scanning_validity_checks: enabled
secret_scanning_non_provider_patterns: enabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/17
Expand All @@ -211555,6 +211569,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: enabled
secret_scanning_validity_checks: disabled
secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1326
Expand All @@ -211578,6 +211593,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: disabled
secret_scanning_validity_checks: disabled
secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
Expand All @@ -211603,6 +211619,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: enabled
secret_scanning_validity_checks: enabled
secret_scanning_non_provider_patterns: enabled
private_vulnerability_reporting: enabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
Expand Down Expand Up @@ -211650,6 +211667,7 @@ components:
secret_scanning: disabled
secret_scanning_push_protection: disabled
secret_scanning_validity_checks: disabled
secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
Expand Down Expand Up @@ -219238,6 +219256,7 @@ components:
secret_scanning: enabled
secret_scanning_push_protection: disabled
secret_scanning_validity_checks: disabled
secret_scanning_non_provider_patterns: disabled
private_vulnerability_reporting: disabled
enforcement: enforced
url: https://api.github.com/orgs/octo-org/code-security/configurations/1325
Expand Down Expand Up @@ -232954,6 +232973,7 @@ components:
- dependabot_alerts
- secret_scanning
- secret_scanning_push_protection
- secret_scanning_non_provider_patterns
enterprise-security-product-enablement:
name: enablement
in: path
Expand Down
Loading