Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

maint: Updates Kiota from v1.11.0 to v1.11.1 #38

Merged
merged 3 commits into from
Feb 13, 2024
Merged

Conversation

octokitbot
Copy link
Collaborator

"The latest OpenAPI spec resulted in changes to the generated code. Please review, set an applicable commit message, merge, and tag a release as appropriate."

Copy link

what-the-diff bot commented Feb 6, 2024

PR Summary

  • Upgrade to Kiota Version
    This PR contains an update to our codebase's 'Kiota' version. The 'kiotaVersion' property in the 'kiota-lock.json' file has been updated from '1.11.0' to '1.11.1'. This upgrade enhances system reliability and addresses any issues found in the previous version. It should keep our application running smoothly and efficiently.

@nickfloyd nickfloyd changed the title Changes in generated code maint: Updates Kiota from v1.11.0 to v1.11.1 Feb 13, 2024
@nickfloyd
Copy link
Collaborator

  • "kiotaVersion": "1.11.1",
  • "kiotaVersion": "1.11.0",

+// Delete deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens."
-// Delete deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.

+// Put creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens."
-// Put creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.

+// ToDeleteRequestInformation deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens."
-// ToDeleteRequestInformation deletes a development environment secret in a repository using the secret name. You must authenticate using an access token with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secrets repository permission to use this endpoint.

+// ToPutRequestInformation creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.This endpoint does not support fine-grained personal access tokens. For more information about personal access tokens, see "Managing your personal access tokens."
-// ToPutRequestInformation creates or updates a repository development environment secret with an encrypted value. Encrypt your secret usingLibSodium. For more information, see "Encrypting secrets for the REST API."You must authenticate using an accesstoken with the repo scope to use this endpoint. GitHub Apps must have write access to the codespaces_secretsrepository permission to use this endpoint.

+// ItemItemEnvironmentsItemDeployment_protection_rulesAppsRequestBuilderGetQueryParameters gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".
-// ItemItemEnvironmentsItemDeployment_protection_rulesAppsRequestBuilderGetQueryParameters gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".

+// Get gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".
-// Get gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".

+// ToGetRequestInformation gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".
-// ToGetRequestInformation gets all custom deployment protection rule integrations that are available for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint.For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see "GET an app".

+// Get gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint.
-// Get gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint.

+// ToGetRequestInformation gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint.
-// ToGetRequestInformation gets all custom deployment protection rules that are enabled for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see the documentation for the GET /apps/{app_slug} endpoint.

+// Get gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}.
-// Get gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}.

+// ToGetRequestInformation gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}.
-// ToGetRequestInformation gets an enabled custom deployment protection rule for an environment. Anyone with read access to the repository can use this endpoint. If the repository is private and you want to use a personal access token (classic), you must use an access token with the repo scope. GitHub Apps and fine-grained personal access tokens must have the actions:read permission to use this endpoint. For more information about environments, see "Using environments for deployment."For more information about the app that is providing this custom deployment rule, see GET /apps/{app_slug}.

Added lines: 131
Removed lines: 13

@nickfloyd nickfloyd merged commit d6e2e46 into main Feb 13, 2024
4 checks passed
@nickfloyd nickfloyd deleted the generated-code-update branch February 13, 2024 21:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

2 participants