Skip to content

Commit

Permalink
GHES 3.12: Changes in generated code (#116)
Browse files Browse the repository at this point in the history
* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code

* New updates to generated code
  • Loading branch information
octokitbot authored Dec 19, 2024
1 parent ee360c0 commit 353d5af
Show file tree
Hide file tree
Showing 43 changed files with 445 additions and 129 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ public Access_tokensRequestBuilder(string rawUrl, IRequestAdapter requestAdapter
{
}
/// <summary>
/// Creates an installation access token that enables a GitHub App to make authenticated API requests for the app&apos;s installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of `401 - Unauthorized`, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.Optionally, you can use the `repositories` or `repository_ids` body parameters to specify individual repositories that the installation access token can access. If you don&apos;t use `repositories` or `repository_ids` to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.Optionally, use the `permissions` body parameter to specify the permissions that the installation access token should have. If `permissions` is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.When using the repository or permission parameters to reduce the access of the token, the complexity of the token is increased due to both the number of permissions in the request and the number of repositories the token will have access to. If the complexity is too large, the token will fail to be issued. If this occurs, the error message will indicate the maximum number of repositories that should be requested. For the average application requesting 8 permissions, this limit is around 5000 repositories. With fewer permissions requested, more repositories are supported.You must use a [JWT](https://docs.github.com/[email protected]/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app) to access this endpoint.
/// Creates an installation access token that enables a GitHub App to make authenticated API requests for the app&apos;s installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of `401 - Unauthorized`, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.Optionally, you can use the `repositories` or `repository_ids` body parameters to specify individual repositories that the installation access token can access. If you don&apos;t use `repositories` or `repository_ids` to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.Optionally, use the `permissions` body parameter to specify the permissions that the installation access token should have. If `permissions` is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.You must use a [JWT](https://docs.github.com/[email protected]/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app) to access this endpoint.
/// API method documentation <see href="https://docs.github.com/[email protected]/rest/apps/apps#create-an-installation-access-token-for-an-app" />
/// </summary>
/// <returns>A <see cref="global::GitHub.Models.InstallationToken"/></returns>
Expand Down Expand Up @@ -66,7 +66,7 @@ public Access_tokensRequestBuilder(string rawUrl, IRequestAdapter requestAdapter
return await RequestAdapter.SendAsync<global::GitHub.Models.InstallationToken>(requestInfo, global::GitHub.Models.InstallationToken.CreateFromDiscriminatorValue, errorMapping, cancellationToken).ConfigureAwait(false);
}
/// <summary>
/// Creates an installation access token that enables a GitHub App to make authenticated API requests for the app&apos;s installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of `401 - Unauthorized`, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.Optionally, you can use the `repositories` or `repository_ids` body parameters to specify individual repositories that the installation access token can access. If you don&apos;t use `repositories` or `repository_ids` to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.Optionally, use the `permissions` body parameter to specify the permissions that the installation access token should have. If `permissions` is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.When using the repository or permission parameters to reduce the access of the token, the complexity of the token is increased due to both the number of permissions in the request and the number of repositories the token will have access to. If the complexity is too large, the token will fail to be issued. If this occurs, the error message will indicate the maximum number of repositories that should be requested. For the average application requesting 8 permissions, this limit is around 5000 repositories. With fewer permissions requested, more repositories are supported.You must use a [JWT](https://docs.github.com/[email protected]/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app) to access this endpoint.
/// Creates an installation access token that enables a GitHub App to make authenticated API requests for the app&apos;s installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of `401 - Unauthorized`, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access.Optionally, you can use the `repositories` or `repository_ids` body parameters to specify individual repositories that the installation access token can access. If you don&apos;t use `repositories` or `repository_ids` to grant access to specific repositories, the installation access token will have access to all repositories that the installation was granted access to. The installation access token cannot be granted access to repositories that the installation was not granted access to. Up to 500 repositories can be listed in this manner.Optionally, use the `permissions` body parameter to specify the permissions that the installation access token should have. If `permissions` is not specified, the installation access token will have all of the permissions that were granted to the app. The installation access token cannot be granted permissions that the app was not granted.You must use a [JWT](https://docs.github.com/[email protected]/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-a-github-app) to access this endpoint.
/// </summary>
/// <returns>A <see cref="RequestInformation"/></returns>
/// <param name="body">The request body</param>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ public partial class AlertsRequestBuilderGetQueryParameters
[QueryParameter("resolution")]
public string Resolution { get; set; }
#endif
/// <summary>A comma-separated list of secret types to return. By default all secret types are returned.See &quot;[Supported secret scanning patterns](https://docs.github.com/[email protected]/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)&quot;for a complete list of secret types.</summary>
/// <summary>A comma-separated list of secret types to return. By default all secret types are returned. See &quot;[Supported secret scanning patterns](https://docs.github.com/[email protected]/enterprise-cloud@latest/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)&quot; for a complete list of secret types.</summary>
#if NETSTANDARD2_1_OR_GREATER || NETCOREAPP3_1_OR_GREATER
#nullable enable
[QueryParameter("secret_type")]
Expand Down
6 changes: 3 additions & 3 deletions src/GitHub/Manage/V1/Config/Init/InitRequestBuilder.cs
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@ public InitRequestBuilder(string rawUrl, IRequestAdapter requestAdapter) : base(
{
}
/// <summary>
/// When you boot a GitHub instance for the first time, you can use this endpoint to upload a license.Note that you afterwards need to `POST` to [`/manage/v1/config/apply`](https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#start-configuration-apply-process) to start the actual configuration process.This endpoint also sets the root site administrator password which is used to authenticate with the GHES Manage API and the Management Console.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// API method documentation <see href="https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#initialize-instance-configuration-with-license-upload" />
/// When you boot and set up a GitHub instance for the first time, you can use this endpoint to upload a license and set the initial root site administrator password.&gt; [!IMPORTANT]&gt; To start the configuration process and apply the license, you need to `POST` to [`/manage/v1/config/apply`](https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#start-configuration-apply-process)The root site administrator password provided when calling this endpoint is used to authenticate for all other endpoints in the GHES Manage API and the Management Console UI.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// API method documentation <see href="https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#initialize-instance-configuration-with-license-and-password" />
/// </summary>
/// <param name="body">The request body</param>
/// <param name="cancellationToken">Cancellation token to use when cancelling requests</param>
Expand All @@ -54,7 +54,7 @@ public async Task PostAsync(global::GitHub.Models.GhesConfigInitRequest body, Ac
await RequestAdapter.SendNoContentAsync(requestInfo, default, cancellationToken).ConfigureAwait(false);
}
/// <summary>
/// When you boot a GitHub instance for the first time, you can use this endpoint to upload a license.Note that you afterwards need to `POST` to [`/manage/v1/config/apply`](https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#start-configuration-apply-process) to start the actual configuration process.This endpoint also sets the root site administrator password which is used to authenticate with the GHES Manage API and the Management Console.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// When you boot and set up a GitHub instance for the first time, you can use this endpoint to upload a license and set the initial root site administrator password.&gt; [!IMPORTANT]&gt; To start the configuration process and apply the license, you need to `POST` to [`/manage/v1/config/apply`](https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#start-configuration-apply-process)The root site administrator password provided when calling this endpoint is used to authenticate for all other endpoints in the GHES Manage API and the Management Console UI.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// </summary>
/// <returns>A <see cref="RequestInformation"/></returns>
/// <param name="body">The request body</param>
Expand Down
4 changes: 2 additions & 2 deletions src/GitHub/Manage/V1/Config/License/LicenseRequestBuilder.cs
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ public LicenseRequestBuilder(string rawUrl, IRequestAdapter requestAdapter) : ba
return await RequestAdapter.SendAsync<global::GitHub.Models.GhesLicenseInfo>(requestInfo, global::GitHub.Models.GhesLicenseInfo.CreateFromDiscriminatorValue, default, cancellationToken).ConfigureAwait(false);
}
/// <summary>
/// Uploads an enterprise license. This operation does not automatically activate the license.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// Uploads a new enterprise license. In order to apply it right away, use the `apply` query parameter.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// API method documentation <see href="https://docs.github.com/[email protected]/rest/enterprise-admin/manage-ghes#upload-an-enterprise-license" />
/// </summary>
/// <returns>A List&lt;global::GitHub.Models.GhesLicenseUpload&gt;</returns>
Expand Down Expand Up @@ -100,7 +100,7 @@ public RequestInformation ToGetRequestInformation(Action<RequestConfiguration<De
return requestInfo;
}
/// <summary>
/// Uploads an enterprise license. This operation does not automatically activate the license.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// Uploads a new enterprise license. In order to apply it right away, use the `apply` query parameter.&gt; [!NOTE]&gt; The request body for this operation must be submitted as `multipart/form-data` data. You can can reference the license file by prefixing the filename with the `@` symbol using `curl`. For more information, see the [`curl` documentation](https://curl.se/docs/manpage.html#-F).
/// </summary>
/// <returns>A <see cref="RequestInformation"/></returns>
/// <param name="body">Binary request body</param>
Expand Down
10 changes: 10 additions & 0 deletions src/GitHub/Models/ApiOverview_domains.cs
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,14 @@ public partial class ApiOverview_domains : IAdditionalDataHolder, IParsable
#nullable restore
#else
public List<string> Actions { get; set; }
#endif
/// <summary>The actions_inbound property</summary>
#if NETSTANDARD2_1_OR_GREATER || NETCOREAPP3_1_OR_GREATER
#nullable enable
public global::GitHub.Models.ApiOverview_domains_actions_inbound? ActionsInbound { get; set; }
#nullable restore
#else
public global::GitHub.Models.ApiOverview_domains_actions_inbound ActionsInbound { get; set; }
#endif
/// <summary>Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well.</summary>
public IDictionary<string, object> AdditionalData { get; set; }
Expand Down Expand Up @@ -88,6 +96,7 @@ public virtual IDictionary<string, Action<IParseNode>> GetFieldDeserializers()
return new Dictionary<string, Action<IParseNode>>
{
{ "actions", n => { Actions = n.GetCollectionOfPrimitiveValues<string>()?.AsList(); } },
{ "actions_inbound", n => { ActionsInbound = n.GetObjectValue<global::GitHub.Models.ApiOverview_domains_actions_inbound>(global::GitHub.Models.ApiOverview_domains_actions_inbound.CreateFromDiscriminatorValue); } },
{ "artifact_attestations", n => { ArtifactAttestations = n.GetObjectValue<global::GitHub.Models.ApiOverview_domains_artifact_attestations>(global::GitHub.Models.ApiOverview_domains_artifact_attestations.CreateFromDiscriminatorValue); } },
{ "codespaces", n => { Codespaces = n.GetCollectionOfPrimitiveValues<string>()?.AsList(); } },
{ "copilot", n => { Copilot = n.GetCollectionOfPrimitiveValues<string>()?.AsList(); } },
Expand All @@ -103,6 +112,7 @@ public virtual void Serialize(ISerializationWriter writer)
{
_ = writer ?? throw new ArgumentNullException(nameof(writer));
writer.WriteCollectionOfPrimitiveValues<string>("actions", Actions);
writer.WriteObjectValue<global::GitHub.Models.ApiOverview_domains_actions_inbound>("actions_inbound", ActionsInbound);
writer.WriteObjectValue<global::GitHub.Models.ApiOverview_domains_artifact_attestations>("artifact_attestations", ArtifactAttestations);
writer.WriteCollectionOfPrimitiveValues<string>("codespaces", Codespaces);
writer.WriteCollectionOfPrimitiveValues<string>("copilot", Copilot);
Expand Down
Loading

0 comments on commit 353d5af

Please sign in to comment.