Skip to content

Commit 96b8665

Browse files
Commit via running ake Sources/code-security
1 parent c45ed8f commit 96b8665

File tree

1 file changed

+58
-0
lines changed

1 file changed

+58
-0
lines changed

Sources/code-security/Types.swift

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1150,6 +1150,18 @@ public enum Components {
11501150
///
11511151
/// - Remark: Generated from `#/components/schemas/code-security-configuration/secret_scanning_validity_checks`.
11521152
public var secret_scanning_validity_checks: Components.Schemas.code_hyphen_security_hyphen_configuration.secret_scanning_validity_checksPayload?
1153+
/// The enablement status of secret scanning non-provider patterns
1154+
///
1155+
/// - Remark: Generated from `#/components/schemas/code-security-configuration/secret_scanning_non_provider_patterns`.
1156+
@frozen public enum secret_scanning_non_provider_patternsPayload: String, Codable, Hashable, Sendable {
1157+
case enabled = "enabled"
1158+
case disabled = "disabled"
1159+
case not_set = "not_set"
1160+
}
1161+
/// The enablement status of secret scanning non-provider patterns
1162+
///
1163+
/// - Remark: Generated from `#/components/schemas/code-security-configuration/secret_scanning_non_provider_patterns`.
1164+
public var secret_scanning_non_provider_patterns: Components.Schemas.code_hyphen_security_hyphen_configuration.secret_scanning_non_provider_patternsPayload?
11531165
/// The enablement status of private vulnerability reporting
11541166
///
11551167
/// - Remark: Generated from `#/components/schemas/code-security-configuration/private_vulnerability_reporting`.
@@ -1202,6 +1214,7 @@ public enum Components {
12021214
/// - secret_scanning: The enablement status of secret scanning
12031215
/// - secret_scanning_push_protection: The enablement status of secret scanning push protection
12041216
/// - secret_scanning_validity_checks: The enablement status of secret scanning validity checks
1217+
/// - secret_scanning_non_provider_patterns: The enablement status of secret scanning non-provider patterns
12051218
/// - private_vulnerability_reporting: The enablement status of private vulnerability reporting
12061219
/// - enforcement: The enforcement status for a security configuration
12071220
/// - url: The URL of the configuration
@@ -1223,6 +1236,7 @@ public enum Components {
12231236
secret_scanning: Components.Schemas.code_hyphen_security_hyphen_configuration.secret_scanningPayload? = nil,
12241237
secret_scanning_push_protection: Components.Schemas.code_hyphen_security_hyphen_configuration.secret_scanning_push_protectionPayload? = nil,
12251238
secret_scanning_validity_checks: Components.Schemas.code_hyphen_security_hyphen_configuration.secret_scanning_validity_checksPayload? = nil,
1239+
secret_scanning_non_provider_patterns: Components.Schemas.code_hyphen_security_hyphen_configuration.secret_scanning_non_provider_patternsPayload? = nil,
12261240
private_vulnerability_reporting: Components.Schemas.code_hyphen_security_hyphen_configuration.private_vulnerability_reportingPayload? = nil,
12271241
enforcement: Components.Schemas.code_hyphen_security_hyphen_configuration.enforcementPayload? = nil,
12281242
url: Swift.String? = nil,
@@ -1244,6 +1258,7 @@ public enum Components {
12441258
self.secret_scanning = secret_scanning
12451259
self.secret_scanning_push_protection = secret_scanning_push_protection
12461260
self.secret_scanning_validity_checks = secret_scanning_validity_checks
1261+
self.secret_scanning_non_provider_patterns = secret_scanning_non_provider_patterns
12471262
self.private_vulnerability_reporting = private_vulnerability_reporting
12481263
self.enforcement = enforcement
12491264
self.url = url
@@ -1266,6 +1281,7 @@ public enum Components {
12661281
case secret_scanning
12671282
case secret_scanning_push_protection
12681283
case secret_scanning_validity_checks
1284+
case secret_scanning_non_provider_patterns
12691285
case private_vulnerability_reporting
12701286
case enforcement
12711287
case url
@@ -2004,6 +2020,18 @@ public enum Operations {
20042020
///
20052021
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/POST/requestBody/json/secret_scanning_validity_checks`.
20062022
public var secret_scanning_validity_checks: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_validity_checksPayload?
2023+
/// The enablement status of secret scanning non provider patterns
2024+
///
2025+
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/POST/requestBody/json/secret_scanning_non_provider_patterns`.
2026+
@frozen public enum secret_scanning_non_provider_patternsPayload: String, Codable, Hashable, Sendable {
2027+
case enabled = "enabled"
2028+
case disabled = "disabled"
2029+
case not_set = "not_set"
2030+
}
2031+
/// The enablement status of secret scanning non provider patterns
2032+
///
2033+
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/POST/requestBody/json/secret_scanning_non_provider_patterns`.
2034+
public var secret_scanning_non_provider_patterns: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_non_provider_patternsPayload?
20072035
/// The enablement status of private vulnerability reporting
20082036
///
20092037
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/POST/requestBody/json/private_vulnerability_reporting`.
@@ -2042,6 +2070,7 @@ public enum Operations {
20422070
/// - secret_scanning: The enablement status of secret scanning
20432071
/// - secret_scanning_push_protection: The enablement status of secret scanning push protection
20442072
/// - secret_scanning_validity_checks: The enablement status of secret scanning validity checks
2073+
/// - secret_scanning_non_provider_patterns: The enablement status of secret scanning non provider patterns
20452074
/// - private_vulnerability_reporting: The enablement status of private vulnerability reporting
20462075
/// - enforcement: The enforcement status for a security configuration
20472076
public init(
@@ -2057,6 +2086,7 @@ public enum Operations {
20572086
secret_scanning: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanningPayload? = nil,
20582087
secret_scanning_push_protection: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_push_protectionPayload? = nil,
20592088
secret_scanning_validity_checks: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_validity_checksPayload? = nil,
2089+
secret_scanning_non_provider_patterns: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_non_provider_patternsPayload? = nil,
20602090
private_vulnerability_reporting: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.private_vulnerability_reportingPayload? = nil,
20612091
enforcement: Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.enforcementPayload? = nil
20622092
) {
@@ -2072,6 +2102,7 @@ public enum Operations {
20722102
self.secret_scanning = secret_scanning
20732103
self.secret_scanning_push_protection = secret_scanning_push_protection
20742104
self.secret_scanning_validity_checks = secret_scanning_validity_checks
2105+
self.secret_scanning_non_provider_patterns = secret_scanning_non_provider_patterns
20752106
self.private_vulnerability_reporting = private_vulnerability_reporting
20762107
self.enforcement = enforcement
20772108
}
@@ -2088,6 +2119,7 @@ public enum Operations {
20882119
case secret_scanning
20892120
case secret_scanning_push_protection
20902121
case secret_scanning_validity_checks
2122+
case secret_scanning_non_provider_patterns
20912123
case private_vulnerability_reporting
20922124
case enforcement
20932125
}
@@ -2141,6 +2173,10 @@ public enum Operations {
21412173
Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_validity_checksPayload.self,
21422174
forKey: .secret_scanning_validity_checks
21432175
)
2176+
secret_scanning_non_provider_patterns = try container.decodeIfPresent(
2177+
Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_non_provider_patternsPayload.self,
2178+
forKey: .secret_scanning_non_provider_patterns
2179+
)
21442180
private_vulnerability_reporting = try container.decodeIfPresent(
21452181
Operations.code_hyphen_security_sol_create_hyphen_configuration.Input.Body.jsonPayload.private_vulnerability_reportingPayload.self,
21462182
forKey: .private_vulnerability_reporting
@@ -2162,6 +2198,7 @@ public enum Operations {
21622198
"secret_scanning",
21632199
"secret_scanning_push_protection",
21642200
"secret_scanning_validity_checks",
2201+
"secret_scanning_non_provider_patterns",
21652202
"private_vulnerability_reporting",
21662203
"enforcement"
21672204
])
@@ -3123,6 +3160,18 @@ public enum Operations {
31233160
///
31243161
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/{configuration_id}/PATCH/requestBody/json/secret_scanning_validity_checks`.
31253162
public var secret_scanning_validity_checks: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_validity_checksPayload?
3163+
/// The enablement status of secret scanning non-provider patterns
3164+
///
3165+
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/{configuration_id}/PATCH/requestBody/json/secret_scanning_non_provider_patterns`.
3166+
@frozen public enum secret_scanning_non_provider_patternsPayload: String, Codable, Hashable, Sendable {
3167+
case enabled = "enabled"
3168+
case disabled = "disabled"
3169+
case not_set = "not_set"
3170+
}
3171+
/// The enablement status of secret scanning non-provider patterns
3172+
///
3173+
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/{configuration_id}/PATCH/requestBody/json/secret_scanning_non_provider_patterns`.
3174+
public var secret_scanning_non_provider_patterns: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_non_provider_patternsPayload?
31263175
/// The enablement status of private vulnerability reporting
31273176
///
31283177
/// - Remark: Generated from `#/paths/orgs/{org}/code-security/configurations/{configuration_id}/PATCH/requestBody/json/private_vulnerability_reporting`.
@@ -3161,6 +3210,7 @@ public enum Operations {
31613210
/// - secret_scanning: The enablement status of secret scanning
31623211
/// - secret_scanning_push_protection: The enablement status of secret scanning push protection
31633212
/// - secret_scanning_validity_checks: The enablement status of secret scanning validity checks
3213+
/// - secret_scanning_non_provider_patterns: The enablement status of secret scanning non-provider patterns
31643214
/// - private_vulnerability_reporting: The enablement status of private vulnerability reporting
31653215
/// - enforcement: The enforcement status for a security configuration
31663216
public init(
@@ -3176,6 +3226,7 @@ public enum Operations {
31763226
secret_scanning: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanningPayload? = nil,
31773227
secret_scanning_push_protection: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_push_protectionPayload? = nil,
31783228
secret_scanning_validity_checks: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_validity_checksPayload? = nil,
3229+
secret_scanning_non_provider_patterns: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_non_provider_patternsPayload? = nil,
31793230
private_vulnerability_reporting: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.private_vulnerability_reportingPayload? = nil,
31803231
enforcement: Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.enforcementPayload? = nil
31813232
) {
@@ -3191,6 +3242,7 @@ public enum Operations {
31913242
self.secret_scanning = secret_scanning
31923243
self.secret_scanning_push_protection = secret_scanning_push_protection
31933244
self.secret_scanning_validity_checks = secret_scanning_validity_checks
3245+
self.secret_scanning_non_provider_patterns = secret_scanning_non_provider_patterns
31943246
self.private_vulnerability_reporting = private_vulnerability_reporting
31953247
self.enforcement = enforcement
31963248
}
@@ -3207,6 +3259,7 @@ public enum Operations {
32073259
case secret_scanning
32083260
case secret_scanning_push_protection
32093261
case secret_scanning_validity_checks
3262+
case secret_scanning_non_provider_patterns
32103263
case private_vulnerability_reporting
32113264
case enforcement
32123265
}
@@ -3260,6 +3313,10 @@ public enum Operations {
32603313
Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_validity_checksPayload.self,
32613314
forKey: .secret_scanning_validity_checks
32623315
)
3316+
secret_scanning_non_provider_patterns = try container.decodeIfPresent(
3317+
Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.secret_scanning_non_provider_patternsPayload.self,
3318+
forKey: .secret_scanning_non_provider_patterns
3319+
)
32633320
private_vulnerability_reporting = try container.decodeIfPresent(
32643321
Operations.code_hyphen_security_sol_update_hyphen_configuration.Input.Body.jsonPayload.private_vulnerability_reportingPayload.self,
32653322
forKey: .private_vulnerability_reporting
@@ -3281,6 +3338,7 @@ public enum Operations {
32813338
"secret_scanning",
32823339
"secret_scanning_push_protection",
32833340
"secret_scanning_validity_checks",
3341+
"secret_scanning_non_provider_patterns",
32843342
"private_vulnerability_reporting",
32853343
"enforcement"
32863344
])

0 commit comments

Comments
 (0)