Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FEAT: Added/Updated [PrivateVulnerabilityReportingGetResponse, RequestInformation] | Updated Kiota version #50

Merged
merged 1 commit into from Mar 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
@@ -0,0 +1,47 @@
// <auto-generated/>
using Microsoft.Kiota.Abstractions.Serialization;
using System.Collections.Generic;
using System.IO;
using System.Linq;
using System;
namespace GitHub.Repos.Item.Item.PrivateVulnerabilityReporting {
public class PrivateVulnerabilityReportingGetResponse : IAdditionalDataHolder, IParsable {
/// <summary>Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well.</summary>
public IDictionary<string, object> AdditionalData { get; set; }
/// <summary>Whether or not private vulnerability reporting is enabled for the repository.</summary>
public bool? Enabled { get; set; }
/// <summary>
/// Instantiates a new <see cref="PrivateVulnerabilityReportingGetResponse"/> and sets the default values.
/// </summary>
public PrivateVulnerabilityReportingGetResponse() {
AdditionalData = new Dictionary<string, object>();
}
/// <summary>
/// Creates a new instance of the appropriate class based on discriminator value
/// </summary>
/// <returns>A <see cref="PrivateVulnerabilityReportingGetResponse"/></returns>
/// <param name="parseNode">The parse node to use to read the discriminator value and create the object</param>
public static PrivateVulnerabilityReportingGetResponse CreateFromDiscriminatorValue(IParseNode parseNode) {
_ = parseNode ?? throw new ArgumentNullException(nameof(parseNode));
return new PrivateVulnerabilityReportingGetResponse();
}
/// <summary>
/// The deserialization information for the current model
/// </summary>
/// <returns>A IDictionary&lt;string, Action&lt;IParseNode&gt;&gt;</returns>
public virtual IDictionary<string, Action<IParseNode>> GetFieldDeserializers() {
return new Dictionary<string, Action<IParseNode>> {
{"enabled", n => { Enabled = n.GetBoolValue(); } },
};
}
/// <summary>
/// Serializes information the current object
/// </summary>
/// <param name="writer">Serialization writer to use to serialize this model</param>
public virtual void Serialize(ISerializationWriter writer) {
_ = writer ?? throw new ArgumentNullException(nameof(writer));
writer.WriteBoolValue("enabled", Enabled);
writer.WriteAdditionalData(AdditionalData);
}
}
}
Expand Up @@ -48,6 +48,27 @@ public class PrivateVulnerabilityReportingRequestBuilder : BaseRequestBuilder {
await RequestAdapter.SendNoContentAsync(requestInfo, errorMapping, cancellationToken).ConfigureAwait(false);
}
/// <summary>
/// Returns a boolean indicating whether or not private vulnerability reporting is enabled for the repository. For more information, see &quot;[Evaluating the security settings of a repository](https://docs.github.com/code-security/security-advisories/working-with-repository-security-advisories/evaluating-the-security-settings-of-a-repository)&quot;.
/// API method documentation <see href="https://docs.github.com/rest/repos/repos#check-if-private-vulnerability-reporting-is-enabled-for-a-repository" />
/// </summary>
/// <returns>A <see cref="PrivateVulnerabilityReportingGetResponse"/></returns>
/// <param name="cancellationToken">Cancellation token to use when cancelling requests</param>
/// <param name="requestConfiguration">Configuration for the request such as headers, query parameters, and middleware options.</param>
/// <exception cref="BasicError">When receiving a 422 status code</exception>
#if NETSTANDARD2_1_OR_GREATER || NETCOREAPP3_1_OR_GREATER
#nullable enable
public async Task<PrivateVulnerabilityReportingGetResponse?> GetAsync(Action<RequestConfiguration<DefaultQueryParameters>>? requestConfiguration = default, CancellationToken cancellationToken = default) {
#nullable restore
#else
public async Task<PrivateVulnerabilityReportingGetResponse> GetAsync(Action<RequestConfiguration<DefaultQueryParameters>> requestConfiguration = default, CancellationToken cancellationToken = default) {
#endif
var requestInfo = ToGetRequestInformation(requestConfiguration);
var errorMapping = new Dictionary<string, ParsableFactory<IParsable>> {
{"422", BasicError.CreateFromDiscriminatorValue},
};
return await RequestAdapter.SendAsync<PrivateVulnerabilityReportingGetResponse>(requestInfo, PrivateVulnerabilityReportingGetResponse.CreateFromDiscriminatorValue, errorMapping, cancellationToken).ConfigureAwait(false);
}
/// <summary>
/// Enables private vulnerability reporting for a repository. The authenticated user must have admin access to the repository. For more information, see &quot;[Privately reporting a security vulnerability](https://docs.github.com/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability).&quot;
/// API method documentation <see href="https://docs.github.com/rest/repos/repos#enable-private-vulnerability-reporting-for-a-repository" />
/// </summary>
Expand Down Expand Up @@ -85,6 +106,23 @@ public class PrivateVulnerabilityReportingRequestBuilder : BaseRequestBuilder {
return requestInfo;
}
/// <summary>
/// Returns a boolean indicating whether or not private vulnerability reporting is enabled for the repository. For more information, see &quot;[Evaluating the security settings of a repository](https://docs.github.com/code-security/security-advisories/working-with-repository-security-advisories/evaluating-the-security-settings-of-a-repository)&quot;.
/// </summary>
/// <returns>A <see cref="RequestInformation"/></returns>
/// <param name="requestConfiguration">Configuration for the request such as headers, query parameters, and middleware options.</param>
#if NETSTANDARD2_1_OR_GREATER || NETCOREAPP3_1_OR_GREATER
#nullable enable
public RequestInformation ToGetRequestInformation(Action<RequestConfiguration<DefaultQueryParameters>>? requestConfiguration = default) {
#nullable restore
#else
public RequestInformation ToGetRequestInformation(Action<RequestConfiguration<DefaultQueryParameters>> requestConfiguration = default) {
#endif
var requestInfo = new RequestInformation(Method.GET, UrlTemplate, PathParameters);
requestInfo.Configure(requestConfiguration);
requestInfo.Headers.TryAdd("Accept", "application/json");
return requestInfo;
}
/// <summary>
/// Enables private vulnerability reporting for a repository. The authenticated user must have admin access to the repository. For more information, see &quot;[Privately reporting a security vulnerability](https://docs.github.com/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability).&quot;
/// </summary>
/// <returns>A <see cref="RequestInformation"/></returns>
Expand Down
4 changes: 2 additions & 2 deletions src/GitHub/kiota-lock.json
@@ -1,8 +1,8 @@
{
"descriptionHash": "728430A700C1A6B37AA3A767B0FDF1A6C56A311E37615AFFFF2E17557A73D3F2F98242BE97554E6D7667A9E748060FC914162082ADE8B04924A1DB371FC1F8B9",
"descriptionHash": "DE060A6CF9EFEE14358028B28C66A421969687F96C8EBF96933E452D3043303AB97B244EA2E3B9800382F90BBFF2A8EBB158D61A852738284C655FD2A387E3C8",
"descriptionLocation": "../../../source-generator/schemas/downloaded.json",
"lockFileVersion": "1.0.0",
"kiotaVersion": "1.12.0-preview.202403040006",
"kiotaVersion": "1.12.0",
"clientClassName": "GitHubClient",
"clientNamespaceName": "GitHub",
"language": "CSharp",
Expand Down