Skip to content
Closed
Changes from all commits
Commits
Show all changes
41 commits
Select commit Hold shift + click to select a range
7294f18
secret_scanning.go: API fix by switching arugments from url to json
jentfoo Aug 14, 2023
4812e1c
Apply PR feedback to make SecretScanningAlertListOptions params optional
jentfoo Aug 14, 2023
475c99b
`go generate` output
jentfoo Aug 14, 2023
7c1d2a6
Add support for projects_v2 and projects_v2_item webhook events (#2868)
nikpivkin Aug 14, 2023
79cc154
Defer closing body before checking HTTP status code (#2870)
nikpivkin Aug 15, 2023
7b8873f
Add GetAutomatedSecurityFixes to report status (#2842)
grahamhar Aug 15, 2023
7cd81b2
Adding missing field important to find branch in fork from same owner…
r-aramizu Aug 15, 2023
66aa5ed
Add WorkflowRun and Workflow to DeploymentEvent (#2755)
soniachikh Aug 15, 2023
58177f6
Replace deprectated crypto/ssh/terminal module in examples (#2876)
obrientimothya Aug 16, 2023
897401f
Update workflow to use Go 1.21 and 1.20 (#2878)
gmlewis Aug 16, 2023
91bcd50
Add TriggeringActor to WorkflowRun (#2879)
gmlewis Aug 16, 2023
e524454
Add WebhookTypes and EventForType methods (#2865)
evankanderson Aug 16, 2023
7f48e67
Add support for fetching SBOMs (#2869)
vandanrohatgi Aug 16, 2023
7e6f052
Add SubmoduleGitURL to RepositoryContent (#2880)
gmlewis Aug 16, 2023
5486d22
Bump version of go-github to v54.0.0 (#2881)
gmlewis Aug 16, 2023
3717e0f
Bump go-github from v53 to v54 in /scrape (#2882)
gmlewis Aug 16, 2023
a6617f0
Add support for enable/disable private vulnerability reporting on rep…
vandanrohatgi Aug 20, 2023
224f6c8
Add support for organization, repository webhook configuration (#2885)
mnafees Aug 21, 2023
156670d
Return json.Unmarshal error when importing issues deferred (#2892)
nikpivkin Aug 22, 2023
94747d6
Remove dependency on "golang.org/x/oauth2" (#2895)
WillAbides Aug 27, 2023
a7ba867
Add support for dependabot_alert webhook event (#2888)
nikpivkin Aug 29, 2023
6105943
Add missing fields to SecurityAdvisoryEvent and rename others (#2889)
nikpivkin Aug 29, 2023
c5d95fe
Fix merge issue from field renaming (#2906)
gmlewis Aug 29, 2023
6ea29e6
Add missing CodeScanning endpoints (#2900)
jporzucek Aug 30, 2023
e47dbf0
Update package constructors (#2904)
WillAbides Aug 31, 2023
9514f39
Fix serialization of repository_names conditions object (#2910)
ysoldak Sep 4, 2023
77b87e4
Bump actions/checkout from 3 to 4 (#2912)
dependabot[bot] Sep 4, 2023
218af09
Bump version of go-github to v55.0.0 (#2914)
gmlewis Sep 5, 2023
7589911
Bump go-github from v54 to v55 in /scrape (#2915)
gmlewis Sep 5, 2023
dde920a
Add enterprise runner group operations (#2891)
gabriel-samfira Sep 6, 2023
1d84f43
Add GenerateEnterpriseJITConfig (#2890)
gabriel-samfira Sep 6, 2023
70f3172
Fix linting (#2903)
WillAbides Sep 8, 2023
73da247
Handle encoding value of "none" (#2924)
GusPrice Sep 18, 2023
d9b988b
Correct NewEnterpriseClient deprecation message (#2923)
oschwald Sep 18, 2023
199cb72
Fix golangci-lint timeout failures (#2931)
gmlewis Sep 18, 2023
0927a95
Bump golang.org/x/net from 0.14.0 to 0.15.0 in /scrape (#2925)
dependabot[bot] Sep 18, 2023
aa431d9
Remove ListServiceHooks (#2917)
WillAbides Sep 18, 2023
c8a58d7
Add missing secret scanning alert fields (#2930)
vandanrohatgi Sep 18, 2023
6008296
Revert changes to SecretScanningAlertListOptions
gmlewis Sep 19, 2023
d05991b
Merge branch 'master' into jentfoo-secret_scaning_api
gmlewis Sep 19, 2023
1118e21
Remove duplicate line
gmlewis Sep 19, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions github/secret_scanning.go
Original file line number Diff line number Diff line change
Expand Up @@ -82,14 +82,14 @@ type SecretScanningAlertListOptions struct {
type SecretScanningAlertUpdateOptions struct {
// Required. Sets the state of the secret scanning alert. Can be either open or resolved.
// You must provide resolution when you set the state to resolved.
State *string `url:"state,omitempty"`
State *string `json:"state,omitempty"`

// A comma-separated list of secret types to return. By default all secret types are returned.
SecretType *string `url:"secret_type,omitempty"`
SecretType *string `json:"secret_type,omitempty"`

// Required when the state is resolved. The reason for resolving the alert. Can be one of false_positive,
// wont_fix, revoked, or used_in_tests.
Resolution *string `url:"resolution,omitempty"`
Resolution *string `json:"resolution,omitempty"`
}

// Lists secret scanning alerts for eligible repositories in an enterprise, from newest to oldest.
Expand Down