octokit / go-sdk

A generated Go SDK from GitHub's OpenAPI specification. Built on Kiota.
MIT License
56 stars 7 forks source link

maint: Updates Kiota from v1.11.0 to v1.11.1 #38

Closed octokitbot closed 5 months ago

octokitbot commented 5 months ago

"The latest OpenAPI spec resulted in changes to the generated code. Please review, set an applicable commit message, merge, and tag a release as appropriate."

what-the-diff[bot] commented 5 months ago

PR Summary

nickfloyd commented 5 months ago

+// Delete deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens." -// Delete deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.

+// Put creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens." -// Put creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.

+// ToDeleteRequestInformation deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens." -// ToDeleteRequestInformation deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.

+// ToPutRequestInformation creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens." -// ToPutRequestInformation creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.

+// ItemItemEnvironmentsItemDeployment_protection_rulesAppsRequestBuilderGetQueryParameters gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app". -// ItemItemEnvironmentsItemDeployment_protection_rulesAppsRequestBuilderGetQueryParameters gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".

+// Get gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app". -// Get gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".

+// ToGetRequestInformation gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app". -// ToGetRequestInformation gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".

+// Get gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint. -// Get gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint.

+// ToGetRequestInformation gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint. -// ToGetRequestInformation gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint.

+// Get gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}. -// Get gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}.

+// ToGetRequestInformation gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}. -// ToGetRequestInformation gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}.

Added lines: 131 Removed lines: 13