octokit/rest.js
Usage
Import the Octokit constructor based on your platform.
Browsers
@octokit/rest
directly from cdn.skypack.dev
<script type="module">
import { Octokit } from "https://cdn.skypack.dev/@octokit/rest";
</script>
Node
npm install @octokit/rest
const { Octokit } = require("@octokit/rest");
// or: import { Octokit } from "@octokit/rest";
const { Octokit } = require("@octokit/rest");
Now instantiate your octokit API. All options are optional, but authentication is strongly encouraged.
const octokit = new Octokit({
You can set auth
to a personal access token string.
Learn more about authentication.
auth: "secret123",
Setting a user agent is required. It defaults to octokit/rest.js v1.2.3
where v1.2.3
is the current version of @octokit/rest
, but you should set it to something that identifies your app or script.
userAgent: 'myApp v1.2.3',
API Previews can be enabled globally by setting the previews
option. They can be set per-request as well.
Learn more about API Previews.
previews: ['jean-grey', 'symmetra'],
A default time zone can be enabled by setting the timeZone
option.
timeZone: 'Europe/Amsterdam',
Learn more about using time zones with the GitHub API.
In order to use Octokit with GitHub Enterprise, set the baseUrl
option.
baseUrl: 'https://api.github.com',
For custom logging, pass an object with debug
, info
, warn
and error
methods as the log
option.
Learn more about logging and debugging.
log: {
debug: () => {},
info: () => {},
warn: console.warn,
error: console.error
},
Custom request options can be passed as request.*
options. See @octokit/request
options. The same options can be passed to each endpoint request method.
request: {
agent: undefined,
fetch: undefined,
timeout: 0
}
})
Most of GitHub’s REST API endpoints have matching methods. All endpoint methods are asynchronous, in order to use await
in the code examples, we wrap them into an anonymous async function.
(async () => {
For example to retrieve a pull request, use octokit.rest.pulls.get()
. We recommend to use the search above to find the endpoint method you are looking for
const { data: pullRequest } = await octokit.rest.pulls.get({
owner: "octokit",
repo: "rest.js",
pull_number: 123,
});
Some API endpoints support alternative response formats, see Media types. For example, to request the above pull request in a diff format, pass the mediaType.format
option.
Learn more about request formats.
const { data: diff } = await octokit.rest.pulls.get({
owner: "octokit",
repo: "rest.js",
pull_number: 123,
mediaType: {
format: "diff",
},
});
For the API endpoints that do not have a matching method, such as the root endpoint or legacy endpoints, you can send custom requests.
Learn more about custom requests.
const { data: root } = await octokit.request("GET /");
You can also register custom endpoint methods, which is particularly useful if you participate in a private beta.
Learn more about custom endpoint methods.
await octokit.registerEndpoints({
misc: {
getRoot: {
method: "GET",
url: "/",
},
},
});
Some endpoints return a list which has to be paginated in order to retrieve the complete data set.
Learn more about pagination.
octokit.paginate(octokit.rest.issues.listForRepo, {
owner: 'octokit',
repo: 'rest.js'
})
.then(issues => {
// issues is an array of all issue objects
})
})
You can add more functionality with plugins. We recommend the retry and throttling plugins.
Learn more about throttling, automatic retries and building your own Plugins.
import { retry } from "@octokit/plugin-retry";
import { throttling } from "@octokit/plugin-throttling";
const MyOctokit = Octokit.plugin(retry, throttling);
Octokit.plugin()
returns a new constructor. The same options can be passed to the constructor. The options are passed on to all plugin functions as the 2nd argument.
const myOctokit = new MyOctokit({
auth: "secret123",
throttle: {
onRateLimit: (retryAfter, options) => {
myOctokit.log.warn(
`Request quota exhausted for request ${options.method} ${options.url}`
);
if (options.request.retryCount === 0) {
// only retries once
myOctokit.log.info(`Retrying after ${retryAfter} seconds!`);
return true;
}
},
onAbuseLimit: (retryAfter, options) => {
// does not retry, only logs a warning
myOctokit.log.warn(
`Abuse detected for request ${options.method} ${options.url}`
);
},
},
retry: {
doNotRetry: ["429"],
},
});
Authentication
Authentication is optional for some REST API endpoints accessing public data, but is required for GraphQL queries. Using authentication also increases your API rate limit.
GitHub supports different authentication strategies:
- Personal access token (create). This is the default authentication strategy. Set the
options.auth
option to the token innew Octokit(options)
. Learn more about the built-in@octokit/auth-token
authentication strategy. - OAuth Apps: authenticate using user access token created by an OAuth app, to which you granted selected permissions, or as the OAuth App itself (OAuth using
client_id
andclient_secret
). Learn more about the optional@octokit/auth-oauth-app
authentication strategy - GitHub Apps: authenticate using an installation access token or as GitHub App itself. Learn more about the optional
@octokit/auth-app
authentication strategy. - GitHub Actions: authenticate using the
GITHUB_TOKEN
secret which is provided to GitHub Actions Workflows. Learn more about the optional@octokit/auth-action
authentication strategy.
Learn more about all official and community authentication strategies.
By default, @octokit/rest
authenticates using the token authentication strategy. Pass in a token using options.auth
. It can be a personal access token, an OAuth token, an installation access token or a JSON Web Token for GitHub App authentication. The Authorization
request header will be set according to the type of token.
const { Octokit } = require("@octokit/rest");
const octokit = new Octokit({
auth: "mypersonalaccesstoken123",
});
// sends request with `Authorization: token mypersonalaccesstoken123` header
const { data } = await octokit.request("/user");
To use a different authentication strategy, set options.authStrategy
.
Here is an example for GitHub App authentication
const { Octokit } = require("@octokit/rest");
const { createAppAuth } = require("@octokit/auth-app");
const appOctokit = new Octokit({
authStrategy: createAppAuth,
auth: {
appId: 123,
privateKey: process.env.PRIVATE_KEY,
// optional: this will make appOctokit authenticate as app (JWT)
// or installation (access token), depending on the request URL
installationId: 123,
},
});
const { data } = await appOctokit.request("/app");
The .auth()
method returned by the current authentication strategy can be accessed at octokit.auth()
. Example
const { token } = await appOctokit.auth({
type: "installation",
// defaults to `options.auth.installationId` set in the constructor
installationId: 123,
});
Previews
To enable any of GitHub’s API Previews,
pass the previews
option to the GitHub constructor
const octokit = new Octokit({
previews: ["mercy-preview"],
});
Previews can also be enabled for a single request by passing the mediaType.preview
option
const {
data: { topics },
} = await octokit.rest.repos.get({
owner: "octokit",
repo: "rest.js",
mediaType: {
previews: ["symmetra"],
},
});
Request formats & aborts
Some API endpoints support alternative response formats, see Media types.
For example, to request a pull request as diff format, set the mediaType.format
option
const { data: prDiff } = await octokit.rest.pulls.get({
owner: "octokit",
repo: "rest.js",
pull_number: 1278,
mediaType: {
format: "diff",
},
});
The AbortController interface can be used to abort one or more requests as and when desired. When the request is initiated, an AbortSignal instance can be passed as an option inside the request's options object. For usage in Node, the abort-controller
package can be used.
const controller = new AbortController();
const { data: prDiff } = await octokit.rest.pulls.get({
owner: "octokit",
repo: "rest.js",
pull_number: 1278,
request: {
signal: controller.signal,
},
});
Use controller.abort()
to abort the request when desired.
Custom requests
To send custom requests you can use the lower-level octokit.request()
method
octokit.request("GET /");
The baseUrl
, headers and other defaults are already set. For more information on the octokit.request()
API see octokit/request.js
All the endpoint methods such as octokit.rest.repos.get()
are aliases of octokit.request()
with pre-bound default options. So you can use the @octokit/request
API to get the default options or get generic request option to use with your preferred request library.
const defaultOptions = octokit.rest.repos.get.endpoint.DEFAULTS;
const requestOptions = octokit.rest.repos.get.endpoint({
owner: "octokit",
repo: "rest.js",
});
Note that authentication is not applied when retrieving request options from the *.endpoint
APIs.
Pagination
All endpoint methods starting with .list*
do not return all results at once but instead return the first 30 items by default, see also GitHub’s REST API pagination documentation.
To automatically receive all results across all pages, you can use the octokit.paginate()
method:
octokit
.paginate("GET /repos/{owner}/{repo}/issues", {
owner: "octokit",
repo: "rest.js",
})
.then((issues) => {
// issues is an array of all issue objects. It is not wrapped in a { data, headers, status, url } object
// like results from `octokit.request()` or any of the endpoint methods such as `octokit.rest.issues.listForRepo()`
});
octokit.paginate()
accepts the same options as octokit.request()
. You can optionally pass an additional function to map the results from each response. The map must return a new value, usually an array with mapped data.
Note: the map function is called with the { data, headers, status, url }
response object. The data
property is guaranteed to be an array of the result items, even for list endpoints that respond with an object instead of an array, such as the search endpoints.
octokit
.paginate(
"GET /repos/{owner}/{repo}/issues",
{ owner: "octokit", repo: "rest.js" },
(response) => response.data.map((issue) => issue.title)
)
.then((issueTitles) => {
// issueTitles is now an array with the titles only
});
To stop paginating early, you can call the done()
function passed as 2nd argument to the response map function. Note that you still have to return the value you want to map the response to, otherwise the last response will be mapped to undefined.
octokit.paginate("GET /organizations", (response, done) => {
if (response.data.find((issues) => issue.body.includes("something"))) {
done();
}
return response.data;
});
To paginate responses for one of the registered endpoint methods such as octokit.rest.issues.listForRepo()
you can pass the method directly as first argument to octokit.paginate
:
octokit
.paginate(octokit.rest.issues.listForRepo, {
owner: "octokit",
repo: "rest.js",
})
.then((issues) => {
// issues is an array of all issue objects
});
If your runtime environment supports async iterators (such as most modern browsers and Node 10+), you can iterate through each response
for await (const response of octokit.paginate.iterator(
octokit.rest.issues.listForRepo,
{
owner: "octokit",
repo: "rest.js",
}
)) {
// do whatever you want with each response, break out of the loop, etc.
}
octokit.paginate.iterator()
accepts the same options as octokit.paginate()
.
Hooks
You can customize Octokit’s request lifecycle with hooks. Available methods are
octokit.hook.before("request", async (options) => {
validate(options);
});
octokit.hook.after("request", async (response, options) => {
console.log(`${options.method} ${options.url}: ${response.status}`);
});
octokit.hook.error("request", async (error, options) => {
if (error.status === 304) {
return findInCache(error.headers.etag);
}
throw error;
});
octokit.hook.wrap("request", async (request, options) => {
// add logic before, after, catch errors or replace the request altogether
return request(options);
});
See before-after-hook for more details on the 4 methods.
Custom endpoint methods
Note: octokit.registerEndpoints()
has been deprecated.
Instead of
await octokit.registerEndpoints({
misc: {
getRoot: {
method: "GET",
url: "/",
},
},
});
do
Object.assign(octokit.misc, {
getRoot: octokit.request.defaults({
method: "GET",
url: "/",
}),
});
If you use octokit.registerEndpoints()
in a plugin, return an object instead:
function myPlugin(octokit, options) {
return {
misc: {
octokit.request.defaults({ method: "GET", url: "/" })
}
}
}
You can register custom endpoint methods such as octokit.rest.repos.get()
using the octokit.registerEndpoints(routes)
method
octokit.registerEndpoints({
foo: {
bar: {
method: "PATCH",
url: "/repos/{owner}/{repo}/foo",
headers: {
accept: "application/vnd.github.foo-bar-preview+json",
},
params: {
owner: {
required: true,
type: "string",
},
repo: {
required: true,
type: "string",
},
baz: {
required: true,
type: "string",
enum: ["qux", "quux", "quuz"],
},
},
},
},
});
octokit.foo.bar({
owner: "octokit",
repo: "rest.js",
baz: "quz",
});
This is useful when you participate in private beta features and prefer the convenience of methods for the new endpoints instead of using octokit.request()
.
Plugins
You can customize and extend Octokit’s functionality using plugins
// index.js
const Octokit = require("@octokit/rest");
const MyOctokit = Octokit.plugin(
require("./lib/my-plugin"),
require("octokit-plugin-example")
);
// lib/my-plugin.js
module.exports = (octokit, options = { greeting: "Hello" }) => {
// hook into the request lifecycle
octokit.hook.wrap("request", async (request, options) => {
const time = Date.now();
const response = await request(options);
octokit.log.info(
`${options.method} ${options.url} – ${response.status} in ${
Date.now() - time
}ms`
);
return response;
});
// add a custom method: octokit.helloWorld()
return {
helloWorld: () => console.log(`${options.greeting}, world!`),
};
};
.plugin
accepts a function or an array of functions.
We recommend using Octokit’s log methods to help users of your plugin with debugging.
You can add new methods to the octokit
instance passed as the first argument to
the plugin function. The 2nd argument is the options object passed to the
constructor when instantiating the octokit
client.
const octokit = new MyOctokit({ greeting: "Hola" });
octokit.helloWorld();
// Hola, world!
Throttling
When you send too many requests in too little time you will likely hit errors due to rate and/or abuse limits.
In order to automatically throttle requests as recommended in GitHub’s best practices for integrators, we recommend you install the @octokit/plugin-throttling
plugin.
The throttle.onAbuseLimit
and throttle.onRateLimit
options are required.
Return true
from these functions to automatically retry the request after retryAfter
seconds. Return false
or undefined
to skip retry and throw the error. For rate limit errors, retryAfter
defaults to seconds until X-RateLimit-Reset
. For abuse errors, retryAfter
defaults to the retry-after
header but is a minimum of five seconds.
const { Octokit } = require("@octokit/rest");
const { throttling } = require("@octokit/plugin-throttling");
const MyOctokit = Octokit.plugin(throttling);
const octokit = new MyOctokit({
auth: "token " + process.env.TOKEN,
throttle: {
onRateLimit: (retryAfter, options) => {
octokit.log.warn(
`Request quota exhausted for request ${options.method} ${options.url}`
);
// Retry twice after hitting a rate limit error, then give up
if (options.request.retryCount <= 2) {
console.log(`Retrying after ${retryAfter} seconds!`);
return true;
}
},
onAbuseLimit: (retryAfter, options) => {
// does not retry, only logs a warning
octokit.log.warn(
`Abuse detected for request ${options.method} ${options.url}`
);
},
},
});
Automatic retries
Many common request errors can be easily remediated by retrying the request. We recommend installing the @octokit/plugin-retry
plugin for Automatic retries in these cases
const { Octokit } = require("@octokit/rest");
const { retry } = require("@octokit/plugin-retry");
const MyOctokit = Octokit.plugin(retry);
const octokit = new MyOctokit();
// all requests sent with the `octokit` instance are now retried up to 3 times for recoverable errors.
Logging
Octokit
has 4 built-in log methods
octokit.log.debug(message[, additionalInfo])
octokit.log.info(message[, additionalInfo])
octokit.log.warn(message[, additionalInfo])
octokit.log.error(message[, additionalInfo])
They can be configured using the log
client option. By default, octokit.log.debug()
and octokit.log.info()
are no-ops, while the other two call console.warn()
and console.error()
respectively.
This is useful if you build reusable plugins.
Debug
The simplest way to receive debug information is to set the log
client option to console
.
const octokit = require("@octokit/rest")({
log: console,
});
octokit.request("/");
This will log
request { method: 'GET',
baseUrl: 'https://api.github.com',
headers:
{ accept: 'application/vnd.github.v3+json',
'user-agent':
'octokit.js/0.0.0-development Node.js/10.15.0 (macOS Mojave; x64)' },
request: {},
url: '/' }
GET / - 200 in 514ms
If you like to support a configurable log level, we recommend using the console-log-level module
const octokit = require("@octokit/rest")({
log: require("console-log-level")({ level: "info" }),
});
octokit.request("/");
This will only log
GET / - 200 in 514ms
Actions
Add selected repository to an organization secret
Adds a repository to an organization secret when the visibility
for repository access is set to selected
. The visibility is set when you Create or update an organization secret. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.addSelectedRepoToOrgSecret({
org,
secret_name,
repository_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
repository_id | yes |
See also: GitHub Developer Guide documentation.
Cancel a workflow run
Cancels a workflow run using its id
. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint.
octokit.rest.actions.cancelWorkflowRun({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Create or update an environment secret
Creates or updates an environment secret with an encrypted value. Encrypt your secret using
LibSodium. You must authenticate using an access
token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use
this endpoint.
Example encrypting a secret using Node.js
Encrypt your secret using the tweetsodium library.
const sodium = require('tweetsodium');
const key = "base64-encoded-public-key";
const value = "plain-text-secret";
// Convert the message and key to Uint8Array's (Buffer implements that interface)
const messageBytes = Buffer.from(value);
const keyBytes = Buffer.from(key, 'base64');
// Encrypt using LibSodium.
const encryptedBytes = sodium.seal(messageBytes, keyBytes);
// Base64 the encrypted secret
const encrypted = Buffer.from(encryptedBytes).toString('base64');
console.log(encrypted);
Example encrypting a secret using Python
Encrypt your secret using pynacl with Python 3.
from base64 import b64encode
from nacl import encoding, public
def encrypt(public_key: str, secret_value: str) -> str:
"""Encrypt a Unicode string using the public key."""
public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
sealed_box = public.SealedBox(public_key)
encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
return b64encode(encrypted).decode("utf-8")
Example encrypting a secret using C
Encrypt your secret using the Sodium.Core package.
var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
Example encrypting a secret using Ruby
Encrypt your secret using the rbnacl gem.
require "rbnacl"
require "base64"
key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
public_key = RbNaCl::PublicKey.new(key)
box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
encrypted_secret = box.encrypt("my_secret")
# Print the base64 encoded secret
puts Base64.strict_encode64(encrypted_secret)
octokit.rest.actions.createOrUpdateEnvironmentSecret({
repository_id,
environment_name,
secret_name,
});
Parameters
name | required | description |
---|---|---|
repository_id | yes | |
environment_name | yes |
The name of the environment |
secret_name | yes |
secret_name parameter |
encrypted_value | no |
Value for your secret, encrypted with LibSodium using the public key retrieved from the Get an environment public key endpoint. |
key_id | no |
ID of the key you used to encrypt the secret. |
See also: GitHub Developer Guide documentation.
Create or update an organization secret
Creates or updates an organization secret with an encrypted value. Encrypt your secret using
LibSodium. You must authenticate using an access
token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to
use this endpoint.
Example encrypting a secret using Node.js
Encrypt your secret using the tweetsodium library.
const sodium = require('tweetsodium');
const key = "base64-encoded-public-key";
const value = "plain-text-secret";
// Convert the message and key to Uint8Array's (Buffer implements that interface)
const messageBytes = Buffer.from(value);
const keyBytes = Buffer.from(key, 'base64');
// Encrypt using LibSodium.
const encryptedBytes = sodium.seal(messageBytes, keyBytes);
// Base64 the encrypted secret
const encrypted = Buffer.from(encryptedBytes).toString('base64');
console.log(encrypted);
Example encrypting a secret using Python
Encrypt your secret using pynacl with Python 3.
from base64 import b64encode
from nacl import encoding, public
def encrypt(public_key: str, secret_value: str) -> str:
"""Encrypt a Unicode string using the public key."""
public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
sealed_box = public.SealedBox(public_key)
encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
return b64encode(encrypted).decode("utf-8")
Example encrypting a secret using C
Encrypt your secret using the Sodium.Core package.
var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
Example encrypting a secret using Ruby
Encrypt your secret using the rbnacl gem.
require "rbnacl"
require "base64"
key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
public_key = RbNaCl::PublicKey.new(key)
box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
encrypted_secret = box.encrypt("my_secret")
# Print the base64 encoded secret
puts Base64.strict_encode64(encrypted_secret)
octokit.rest.actions.createOrUpdateOrgSecret({
org,
secret_name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
encrypted_value | no |
Value for your secret, encrypted with LibSodium using the public key retrieved from the Get an organization public key endpoint. |
key_id | no |
ID of the key you used to encrypt the secret. |
visibility | no |
Configures the access that repositories have to the organization secret. Can be one of: |
selected_repository_ids | no |
An array of repository ids that can access the organization secret. You can only provide a list of repository ids when the |
See also: GitHub Developer Guide documentation.
Create or update a repository secret
Creates or updates a repository secret with an encrypted value. Encrypt your secret using
LibSodium. You must authenticate using an access
token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use
this endpoint.
Example encrypting a secret using Node.js
Encrypt your secret using the tweetsodium library.
const sodium = require('tweetsodium');
const key = "base64-encoded-public-key";
const value = "plain-text-secret";
// Convert the message and key to Uint8Array's (Buffer implements that interface)
const messageBytes = Buffer.from(value);
const keyBytes = Buffer.from(key, 'base64');
// Encrypt using LibSodium.
const encryptedBytes = sodium.seal(messageBytes, keyBytes);
// Base64 the encrypted secret
const encrypted = Buffer.from(encryptedBytes).toString('base64');
console.log(encrypted);
Example encrypting a secret using Python
Encrypt your secret using pynacl with Python 3.
from base64 import b64encode
from nacl import encoding, public
def encrypt(public_key: str, secret_value: str) -> str:
"""Encrypt a Unicode string using the public key."""
public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
sealed_box = public.SealedBox(public_key)
encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
return b64encode(encrypted).decode("utf-8")
Example encrypting a secret using C
Encrypt your secret using the Sodium.Core package.
var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
Example encrypting a secret using Ruby
Encrypt your secret using the rbnacl gem.
require "rbnacl"
require "base64"
key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
public_key = RbNaCl::PublicKey.new(key)
box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
encrypted_secret = box.encrypt("my_secret")
# Print the base64 encoded secret
puts Base64.strict_encode64(encrypted_secret)
octokit.rest.actions.createOrUpdateRepoSecret({
owner,
repo,
secret_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
secret_name | yes |
secret_name parameter |
encrypted_value | no |
Value for your secret, encrypted with LibSodium using the public key retrieved from the Get a repository public key endpoint. |
key_id | no |
ID of the key you used to encrypt the secret. |
See also: GitHub Developer Guide documentation.
Create a registration token for an organization
Returns a token that you can pass to the config
script. The token expires after one hour.
You must authenticate using an access token with the admin:org
scope to use this endpoint.
Example using registration token
Configure your self-hosted runner, replacing TOKEN
with the registration token provided by this endpoint.
./config.sh --url https://github.com/octo-org --token TOKEN
octokit.rest.actions.createRegistrationTokenForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Create a registration token for a repository
Returns a token that you can pass to the config
script. The token expires after one hour. You must authenticate
using an access token with the repo
scope to use this endpoint.
Example using registration token
Configure your self-hosted runner, replacing TOKEN
with the registration token provided by this endpoint.
./config.sh --url https://github.com/octo-org/octo-repo-artifacts --token TOKEN
octokit.rest.actions.createRegistrationTokenForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Create a remove token for an organization
Returns a token that you can pass to the config
script to remove a self-hosted runner from an organization. The token expires after one hour.
You must authenticate using an access token with the admin:org
scope to use this endpoint.
Example using remove token
To remove your self-hosted runner from an organization, replace TOKEN
with the remove token provided by this
endpoint.
./config.sh remove --token TOKEN
octokit.rest.actions.createRemoveTokenForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Create a remove token for a repository
Returns a token that you can pass to remove a self-hosted runner from a repository. The token expires after one hour.
You must authenticate using an access token with the repo
scope to use this endpoint.
Example using remove token
To remove your self-hosted runner from a repository, replace TOKEN with the remove token provided by this endpoint.
./config.sh remove --token TOKEN
octokit.rest.actions.createRemoveTokenForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Create a workflow dispatch event
You can use this endpoint to manually trigger a GitHub Actions workflow run. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
.
You must configure your GitHub Actions workflow to run when the workflow_dispatch
webhook event occurs. The inputs
are configured in the workflow file. For more information about how to configure the workflow_dispatch
event in the workflow file, see "Events that trigger workflows."
You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint. For more information, see "Creating a personal access token for the command line."
octokit.rest.actions.createWorkflowDispatch({
owner,
repo,
workflow_id,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
workflow_id | yes |
The ID of the workflow. You can also pass the workflow file name as a string. |
ref | yes |
The git reference for the workflow. The reference can be a branch or tag name. |
inputs | no |
Input keys and values configured in the workflow file. The maximum number of properties is 10. Any default properties configured in the workflow file will be used when |
inputs.* | no |
See also: GitHub Developer Guide documentation.
Delete an artifact
Deletes an artifact for a workflow run. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint.
octokit.rest.actions.deleteArtifact({
owner,
repo,
artifact_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
artifact_id | yes |
artifact_id parameter |
See also: GitHub Developer Guide documentation.
Delete an environment secret
Deletes a secret in an environment using the secret name. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.deleteEnvironmentSecret({
repository_id,
environment_name,
secret_name,
});
Parameters
name | required | description |
---|---|---|
repository_id | yes | |
environment_name | yes |
The name of the environment |
secret_name | yes |
secret_name parameter |
See also: GitHub Developer Guide documentation.
Delete an organization secret
Deletes a secret in an organization using the secret name. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.deleteOrgSecret({
org,
secret_name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
See also: GitHub Developer Guide documentation.
Delete a repository secret
Deletes a secret in a repository using the secret name. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.deleteRepoSecret({
owner,
repo,
secret_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
secret_name | yes |
secret_name parameter |
See also: GitHub Developer Guide documentation.
Delete a self-hosted runner from an organization
Forces the removal of a self-hosted runner from an organization. You can use this endpoint to completely remove the runner when the machine you were using no longer exists.
You must authenticate using an access token with the admin:org
scope to use this endpoint.
octokit.rest.actions.deleteSelfHostedRunnerFromOrg({
org,
runner_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
runner_id | yes |
Unique identifier of the self-hosted runner. |
See also: GitHub Developer Guide documentation.
Delete a self-hosted runner from a repository
Forces the removal of a self-hosted runner from a repository. You can use this endpoint to completely remove the runner when the machine you were using no longer exists.
You must authenticate using an access token with the repo
scope to use this endpoint.
octokit.rest.actions.deleteSelfHostedRunnerFromRepo({
owner,
repo,
runner_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
runner_id | yes |
Unique identifier of the self-hosted runner. |
See also: GitHub Developer Guide documentation.
Delete a workflow run
Delete a specific workflow run. Anyone with write access to the repository can use this endpoint. If the repository is
private you must use an access token with the repo
scope. GitHub Apps must have the actions:write
permission to use
this endpoint.
octokit.rest.actions.deleteWorkflowRun({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Delete workflow run logs
Deletes all logs for a workflow run. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint.
octokit.rest.actions.deleteWorkflowRunLogs({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Disable a selected repository for GitHub Actions in an organization
Removes a repository from the list of selected repositories that are enabled for GitHub Actions in an organization. To use this endpoint, the organization permission policy for enabled_repositories
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an organization."
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.disableSelectedRepositoryGithubActionsOrganization({
org,
repository_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
repository_id | yes |
See also: GitHub Developer Guide documentation.
Disable a workflow
Disables a workflow and sets the state
of the workflow to disabled_manually
. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
.
You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint.
octokit.rest.actions.disableWorkflow({
owner,
repo,
workflow_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
workflow_id | yes |
The ID of the workflow. You can also pass the workflow file name as a string. |
See also: GitHub Developer Guide documentation.
Download an artifact
Gets a redirect URL to download an archive for a repository. This URL expires after 1 minute. Look for Location:
in
the response header to find the URL for the download. The :archive_format
must be zip
. Anyone with read access to
the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope.
GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.downloadArtifact({
owner,
repo,
artifact_id,
archive_format,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
artifact_id | yes |
artifact_id parameter |
archive_format | yes |
See also: GitHub Developer Guide documentation.
Download job logs for a workflow run
Gets a redirect URL to download a plain text file of logs for a workflow job. This link expires after 1 minute. Look
for Location:
in the response header to find the URL for the download. Anyone with read access to the repository can
use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must
have the actions:read
permission to use this endpoint.
octokit.rest.actions.downloadJobLogsForWorkflowRun({
owner,
repo,
job_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
job_id | yes |
job_id parameter |
See also: GitHub Developer Guide documentation.
Download workflow run logs
Gets a redirect URL to download an archive of log files for a workflow run. This link expires after 1 minute. Look for
Location:
in the response header to find the URL for the download. Anyone with read access to the repository can use
this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have
the actions:read
permission to use this endpoint.
octokit.rest.actions.downloadWorkflowRunLogs({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Enable a selected repository for GitHub Actions in an organization
Adds a repository to the list of selected repositories that are enabled for GitHub Actions in an organization. To use this endpoint, the organization permission policy for enabled_repositories
must be must be configured to selected
. For more information, see "Set GitHub Actions permissions for an organization."
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.enableSelectedRepositoryGithubActionsOrganization({
org,
repository_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
repository_id | yes |
See also: GitHub Developer Guide documentation.
Enable a workflow
Enables a workflow and sets the state
of the workflow to active
. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
.
You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint.
octokit.rest.actions.enableWorkflow({
owner,
repo,
workflow_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
workflow_id | yes |
The ID of the workflow. You can also pass the workflow file name as a string. |
See also: GitHub Developer Guide documentation.
Get allowed actions for an organization
Gets the selected actions that are allowed in an organization. To use this endpoint, the organization permission policy for allowed_actions
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an organization.""
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.getAllowedActionsOrganization({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get allowed actions for a repository
Gets the settings for selected actions that are allowed in a repository. To use this endpoint, the repository policy for allowed_actions
must be configured to selected
. For more information, see "Set GitHub Actions permissions for a repository."
You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the administration
repository permission to use this API.
octokit.rest.actions.getAllowedActionsRepository({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get an artifact
Gets a specific artifact for a workflow run. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getArtifact({
owner,
repo,
artifact_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
artifact_id | yes |
artifact_id parameter |
See also: GitHub Developer Guide documentation.
Get an environment public key
Get the public key for an environment, which you need to encrypt environment secrets. You need to encrypt a secret before you can create or update secrets. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.getEnvironmentPublicKey({
repository_id,
environment_name,
});
Parameters
name | required | description |
---|---|---|
repository_id | yes | |
environment_name | yes |
The name of the environment |
See also: GitHub Developer Guide documentation.
Get an environment secret
Gets a single environment secret without revealing its encrypted value. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.getEnvironmentSecret({
repository_id,
environment_name,
secret_name,
});
Parameters
name | required | description |
---|---|---|
repository_id | yes | |
environment_name | yes |
The name of the environment |
secret_name | yes |
secret_name parameter |
See also: GitHub Developer Guide documentation.
Get GitHub Actions permissions for an organization
Gets the GitHub Actions permissions policy for repositories and allowed actions in an organization.
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.getGithubActionsPermissionsOrganization({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get GitHub Actions permissions for a repository
Gets the GitHub Actions permissions policy for a repository, including whether GitHub Actions is enabled and the actions allowed to run in the repository.
You must authenticate using an access token with the repo
scope to use this
endpoint. GitHub Apps must have the administration
repository permission to use this API.
octokit.rest.actions.getGithubActionsPermissionsRepository({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a job for a workflow run
Gets a specific job in a workflow run. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getJobForWorkflowRun({
owner,
repo,
job_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
job_id | yes |
job_id parameter |
See also: GitHub Developer Guide documentation.
Get an organization public key
Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.getOrgPublicKey({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get an organization secret
Gets a single organization secret without revealing its encrypted value. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.getOrgSecret({
org,
secret_name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
See also: GitHub Developer Guide documentation.
Get pending deployments for a workflow run
Get all deployment environments for a workflow run that are waiting for protection rules to pass.
Anyone with read access to the repository can use this endpoint. If the repository is private, you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getPendingDeploymentsForRun({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Get GitHub Actions permissions for a repository
Deprecated: This method has been renamed to actions.getGithubActionsPermissionsRepository
Gets the GitHub Actions permissions policy for a repository, including whether GitHub Actions is enabled and the actions allowed to run in the repository.
You must authenticate using an access token with the repo
scope to use this
endpoint. GitHub Apps must have the administration
repository permission to use this API.
octokit.rest.actions.getRepoPermissions({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a repository public key
Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.getRepoPublicKey({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a repository secret
Gets a single repository secret without revealing its encrypted value. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.getRepoSecret({
owner,
repo,
secret_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
secret_name | yes |
secret_name parameter |
See also: GitHub Developer Guide documentation.
Get the review history for a workflow run
Anyone with read access to the repository can use this endpoint. If the repository is private, you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getReviewsForRun({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Get a self-hosted runner for an organization
Gets a specific self-hosted runner configured in an organization.
You must authenticate using an access token with the admin:org
scope to use this endpoint.
octokit.rest.actions.getSelfHostedRunnerForOrg({
org,
runner_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
runner_id | yes |
Unique identifier of the self-hosted runner. |
See also: GitHub Developer Guide documentation.
Get a self-hosted runner for a repository
Gets a specific self-hosted runner configured in a repository.
You must authenticate using an access token with the repo
scope to use this
endpoint.
octokit.rest.actions.getSelfHostedRunnerForRepo({
owner,
repo,
runner_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
runner_id | yes |
Unique identifier of the self-hosted runner. |
See also: GitHub Developer Guide documentation.
Get a workflow
Gets a specific workflow. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getWorkflow({
owner,
repo,
workflow_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
workflow_id | yes |
The ID of the workflow. You can also pass the workflow file name as a string. |
See also: GitHub Developer Guide documentation.
Get a workflow run
Gets a specific workflow run. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getWorkflowRun({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Get workflow run usage
Gets the number of billable minutes and total run time for a specific workflow run. Billable minutes only apply to workflows in private repositories that use GitHub-hosted runners. Usage is listed for each GitHub-hosted runner operating system in milliseconds. Any job re-runs are also included in the usage. The usage does not include the multiplier for macOS and Windows runners and is not rounded up to the nearest whole minute. For more information, see "Managing billing for GitHub Actions".
Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getWorkflowRunUsage({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Get workflow usage
Gets the number of billable minutes used by a specific workflow during the current billing cycle. Billable minutes only apply to workflows in private repositories that use GitHub-hosted runners. Usage is listed for each GitHub-hosted runner operating system in milliseconds. Any job re-runs are also included in the usage. The usage does not include the multiplier for macOS and Windows runners and is not rounded up to the nearest whole minute. For more information, see "Managing billing for GitHub Actions".
You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.getWorkflowUsage({
owner,
repo,
workflow_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
workflow_id | yes |
The ID of the workflow. You can also pass the workflow file name as a string. |
See also: GitHub Developer Guide documentation.
List artifacts for a repository
Lists all artifacts for a repository. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.listArtifactsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List environment secrets
Lists all secrets available in an environment without revealing their encrypted values. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.listEnvironmentSecrets({
repository_id,
environment_name,
});
Parameters
name | required | description |
---|---|---|
repository_id | yes | |
environment_name | yes |
The name of the environment |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List jobs for a workflow run
Lists jobs for a workflow run. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint. You can use parameters to narrow the list of results. For more information about using parameters, see Parameters.
octokit.rest.actions.listJobsForWorkflowRun({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
filter | no |
Filters jobs by their |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization secrets
Lists all secrets available in an organization without revealing their encrypted values. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.listOrgSecrets({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository secrets
Lists all secrets available in a repository without revealing their encrypted values. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the secrets
repository permission to use this endpoint.
octokit.rest.actions.listRepoSecrets({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository workflows
Lists the workflows in a repository. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.listRepoWorkflows({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List runner applications for an organization
Lists binaries for the runner application that you can download and run.
You must authenticate using an access token with the admin:org
scope to use this endpoint.
octokit.rest.actions.listRunnerApplicationsForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
List runner applications for a repository
Lists binaries for the runner application that you can download and run.
You must authenticate using an access token with the repo
scope to use this endpoint.
octokit.rest.actions.listRunnerApplicationsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
List selected repositories for an organization secret
Lists all repositories that have been selected when the visibility
for repository access to a secret is set to selected
. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.listSelectedReposForOrgSecret({
org,
secret_name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
See also: GitHub Developer Guide documentation.
List selected repositories enabled for GitHub Actions in an organization
Lists the selected repositories that are enabled for GitHub Actions in an organization. To use this endpoint, the organization permission policy for enabled_repositories
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an organization."
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.listSelectedRepositoriesEnabledGithubActionsOrganization({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List self-hosted runners for an organization
Lists all self-hosted runners configured in an organization.
You must authenticate using an access token with the admin:org
scope to use this endpoint.
octokit.rest.actions.listSelfHostedRunnersForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List self-hosted runners for a repository
Lists all self-hosted runners configured in a repository. You must authenticate using an access token with the repo
scope to use this endpoint.
octokit.rest.actions.listSelfHostedRunnersForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List workflow run artifacts
Lists artifacts for a workflow run. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.listWorkflowRunArtifacts({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List workflow runs
List all workflow runs for a workflow. You can replace workflow_id
with the workflow file name. For example, you could use main.yaml
. You can use parameters to narrow the list of results. For more information about using parameters, see Parameters.
Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope.
octokit.rest.actions.listWorkflowRuns({
owner,
repo,
workflow_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
workflow_id | yes |
The ID of the workflow. You can also pass the workflow file name as a string. |
actor | no |
Returns someone's workflow runs. Use the login for the user who created the |
branch | no |
Returns workflow runs associated with a branch. Use the name of the branch of the |
event | no |
Returns workflow run triggered by the event you specify. For example, |
status | no |
Returns workflow runs with the check run |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List workflow runs for a repository
Lists all workflow runs for a repository. You can use parameters to narrow the list of results. For more information about using parameters, see Parameters.
Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.actions.listWorkflowRunsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
actor | no |
Returns someone's workflow runs. Use the login for the user who created the |
branch | no |
Returns workflow runs associated with a branch. Use the name of the branch of the |
event | no |
Returns workflow run triggered by the event you specify. For example, |
status | no |
Returns workflow runs with the check run |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Re-run a workflow
Re-runs your workflow run using its id
. You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the actions:write
permission to use this endpoint.
octokit.rest.actions.reRunWorkflow({
owner,
repo,
run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
See also: GitHub Developer Guide documentation.
Remove selected repository from an organization secret
Removes a repository from an organization secret when the visibility
for repository access is set to selected
. The visibility is set when you Create or update an organization secret. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.removeSelectedRepoFromOrgSecret({
org,
secret_name,
repository_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
repository_id | yes |
See also: GitHub Developer Guide documentation.
Review pending deployments for a workflow run
Approve or reject pending deployments that are waiting on approval by a required reviewer.
Anyone with read access to the repository contents and deployments can use this endpoint.
octokit.rest.actions.reviewPendingDeploymentsForRun({
owner,
repo,
run_id,
environment_ids,
state,
comment,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
run_id | yes |
The id of the workflow run |
environment_ids | yes |
The list of environment ids to approve or reject |
state | yes |
Whether to approve or reject deployment to the specified environments. Must be one of: |
comment | yes |
A comment to accompany the deployment review |
See also: GitHub Developer Guide documentation.
Set allowed actions for an organization
Sets the actions that are allowed in an organization. To use this endpoint, the organization permission policy for allowed_actions
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an organization."
If the organization belongs to an enterprise that has selected
actions set at the enterprise level, then you cannot override any of the enterprise's allowed actions settings.
To use the patterns_allowed
setting for private repositories, the organization must belong to an enterprise. If the organization does not belong to an enterprise, then the patterns_allowed
setting only applies to public repositories in the organization.
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.setAllowedActionsOrganization({
org,
github_owned_allowed,
verified_allowed,
patterns_allowed,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
github_owned_allowed | yes |
Whether GitHub-owned actions are allowed. For example, this includes the actions in the |
verified_allowed | yes |
Whether actions in GitHub Marketplace from verified creators are allowed. Set to |
patterns_allowed | yes |
Specifies a list of string-matching patterns to allow specific action(s). Wildcards, tags, and SHAs are allowed. For example, |
See also: GitHub Developer Guide documentation.
Set allowed actions for a repository
Sets the actions that are allowed in a repository. To use this endpoint, the repository permission policy for allowed_actions
must be configured to selected
. For more information, see "Set GitHub Actions permissions for a repository."
If the repository belongs to an organization or enterprise that has selected
actions set at the organization or enterprise levels, then you cannot override any of the allowed actions settings.
To use the patterns_allowed
setting for private repositories, the repository must belong to an enterprise. If the repository does not belong to an enterprise, then the patterns_allowed
setting only applies to public repositories.
You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the administration
repository permission to use this API.
octokit.rest.actions.setAllowedActionsRepository({
owner,
repo,
github_owned_allowed,
verified_allowed,
patterns_allowed,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
github_owned_allowed | yes |
Whether GitHub-owned actions are allowed. For example, this includes the actions in the |
verified_allowed | yes |
Whether actions in GitHub Marketplace from verified creators are allowed. Set to |
patterns_allowed | yes |
Specifies a list of string-matching patterns to allow specific action(s). Wildcards, tags, and SHAs are allowed. For example, |
See also: GitHub Developer Guide documentation.
Set GitHub Actions permissions for an organization
Sets the GitHub Actions permissions policy for repositories and allowed actions in an organization.
If the organization belongs to an enterprise that has set restrictive permissions at the enterprise level, such as allowed_actions
to selected
actions, then you cannot override them for the organization.
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.setGithubActionsPermissionsOrganization({
org,
enabled_repositories,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
enabled_repositories | yes |
The policy that controls the repositories in the organization that are allowed to run GitHub Actions. Can be one of: |
allowed_actions | no |
The permissions policy that controls the actions that are allowed to run. Can be one of: |
See also: GitHub Developer Guide documentation.
Set GitHub Actions permissions for a repository
Sets the GitHub Actions permissions policy for enabling GitHub Actions and allowed actions in the repository.
If the repository belongs to an organization or enterprise that has set restrictive permissions at the organization or enterprise levels, such as allowed_actions
to selected
actions, then you cannot override them for the repository.
You must authenticate using an access token with the repo
scope to use this endpoint. GitHub Apps must have the administration
repository permission to use this API.
octokit.rest.actions.setGithubActionsPermissionsRepository({
owner,
repo,
enabled,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
enabled | yes |
Whether GitHub Actions is enabled on the repository. |
allowed_actions | no |
The permissions policy that controls the actions that are allowed to run. Can be one of: |
See also: GitHub Developer Guide documentation.
Set selected repositories for an organization secret
Replaces all repositories for an organization secret when the visibility
for repository access is set to selected
. The visibility is set when you Create or update an organization secret. You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the secrets
organization permission to use this endpoint.
octokit.rest.actions.setSelectedReposForOrgSecret({
org,
secret_name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
secret_name | yes |
secret_name parameter |
selected_repository_ids | no |
An array of repository ids that can access the organization secret. You can only provide a list of repository ids when the |
See also: GitHub Developer Guide documentation.
Set selected repositories enabled for GitHub Actions in an organization
Replaces the list of selected repositories that are enabled for GitHub Actions in an organization. To use this endpoint, the organization permission policy for enabled_repositories
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an organization."
You must authenticate using an access token with the admin:org
scope to use this endpoint. GitHub Apps must have the administration
organization permission to use this API.
octokit.rest.actions.setSelectedRepositoriesEnabledGithubActionsOrganization({
org,
selected_repository_ids,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
selected_repository_ids | yes |
List of repository IDs to enable for GitHub Actions. |
See also: GitHub Developer Guide documentation.
Activity
Check if a repository is starred by the authenticated user
octokit.rest.activity.checkRepoIsStarredByAuthenticatedUser({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Delete a repository subscription
This endpoint should only be used to stop watching a repository. To control whether or not you wish to receive notifications from a repository, set the repository's subscription manually.
octokit.rest.activity.deleteRepoSubscription({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Delete a thread subscription
Mutes all future notifications for a conversation until you comment on the thread or get an @mention. If you are watching the repository of the thread, you will still receive notifications. To ignore future notifications for a repository you are watching, use the Set a thread subscription endpoint and set ignore
to true
.
octokit.rest.activity.deleteThreadSubscription({
thread_id,
});
Parameters
name | required | description |
---|---|---|
thread_id | yes |
thread_id parameter |
See also: GitHub Developer Guide documentation.
Get feeds
GitHub provides several timeline resources in Atom format. The Feeds API lists all the feeds available to the authenticated user:
- Timeline: The GitHub global public timeline
- User: The public timeline for any user, using URI template
- Current user public: The public timeline for the authenticated user
- Current user: The private timeline for the authenticated user
- Current user actor: The private timeline for activity created by the authenticated user
- Current user organizations: The private timeline for the organizations the authenticated user is a member of.
- Security advisories: A collection of public announcements that provide information about security-related vulnerabilities in software on GitHub.
Note: Private feeds are only returned when authenticating via Basic Auth since current feed URIs use the older, non revocable auth tokens.
octokit.rest.activity.getFeeds();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get a repository subscription
octokit.rest.activity.getRepoSubscription({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a thread
octokit.rest.activity.getThread({
thread_id,
});
Parameters
name | required | description |
---|---|---|
thread_id | yes |
thread_id parameter |
See also: GitHub Developer Guide documentation.
Get a thread subscription for the authenticated user
This checks to see if the current user is subscribed to a thread. You can also get a repository subscription.
Note that subscriptions are only generated if a user is participating in a conversation--for example, they've replied to the thread, were @mentioned, or manually subscribe to a thread.
octokit.rest.activity.getThreadSubscriptionForAuthenticatedUser({
thread_id,
});
Parameters
name | required | description |
---|---|---|
thread_id | yes |
thread_id parameter |
See also: GitHub Developer Guide documentation.
List events for the authenticated user
If you are authenticated as the given user, you will see your private events. Otherwise, you'll only see public events.
octokit.rest.activity.listEventsForAuthenticatedUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List notifications for the authenticated user
List all notifications for the current user, sorted by most recently updated.
octokit.rest.activity.listNotificationsForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
all | no |
If |
participating | no |
If |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
before | no |
Only show notifications updated before the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization events for the authenticated user
This is the user's organization dashboard. You must be authenticated as the user to view this.
octokit.rest.activity.listOrgEventsForAuthenticatedUser({
username,
org,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public events
We delay the public events feed by five minutes, which means the most recent event returned by the public events API actually occurred at least five minutes ago.
octokit.rest.activity.listPublicEvents();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public events for a network of repositories
octokit.rest.activity.listPublicEventsForRepoNetwork({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public events for a user
octokit.rest.activity.listPublicEventsForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public organization events
octokit.rest.activity.listPublicOrgEvents({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List events received by the authenticated user
These are events that you've received by watching repos and following users. If you are authenticated as the given user, you will see private events. Otherwise, you'll only see public events.
octokit.rest.activity.listReceivedEventsForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public events received by a user
octokit.rest.activity.listReceivedPublicEventsForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository events
octokit.rest.activity.listRepoEvents({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository notifications for the authenticated user
List all notifications for the current user.
octokit.rest.activity.listRepoNotificationsForAuthenticatedUser({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
all | no |
If |
participating | no |
If |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
before | no |
Only show notifications updated before the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories starred by the authenticated user
Lists repositories the authenticated user has starred.
You can also find out when stars were created by passing the following custom media type via the Accept
header:
octokit.rest.activity.listReposStarredByAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
sort | no |
One of |
direction | no |
One of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories starred by a user
Lists repositories a user has starred.
You can also find out when stars were created by passing the following custom media type via the Accept
header:
octokit.rest.activity.listReposStarredByUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
sort | no |
One of |
direction | no |
One of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories watched by a user
Lists repositories a user is watching.
octokit.rest.activity.listReposWatchedByUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List stargazers
Lists the people that have starred the repository.
You can also find out when stars were created by passing the following custom media type via the Accept
header:
octokit.rest.activity.listStargazersForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories watched by the authenticated user
Lists repositories the authenticated user is watching.
octokit.rest.activity.listWatchedReposForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List watchers
Lists the people watching the specified repository.
octokit.rest.activity.listWatchersForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Mark notifications as read
Marks all notifications as "read" removes it from the default view on GitHub. If the number of notifications is too large to complete in one request, you will receive a 202 Accepted
status and GitHub will run an asynchronous process to mark notifications as "read." To check whether any "unread" notifications remain, you can use the List notifications for the authenticated user endpoint and pass the query parameter all=false
.
octokit.rest.activity.markNotificationsAsRead();
Parameters
name | required | description |
---|---|---|
last_read_at | no |
Describes the last point that notifications were checked. |
read | no |
Whether the notification has been read. |
See also: GitHub Developer Guide documentation.
Mark repository notifications as read
Marks all notifications in a repository as "read" removes them from the default view on GitHub. If the number of notifications is too large to complete in one request, you will receive a 202 Accepted
status and GitHub will run an asynchronous process to mark notifications as "read." To check whether any "unread" notifications remain, you can use the List repository notifications for the authenticated user endpoint and pass the query parameter all=false
.
octokit.rest.activity.markRepoNotificationsAsRead({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
last_read_at | no |
Describes the last point that notifications were checked. Anything updated since this time will not be marked as read. If you omit this parameter, all notifications are marked as read. This is a timestamp in ISO 8601 format: |
See also: GitHub Developer Guide documentation.
Mark a thread as read
octokit.rest.activity.markThreadAsRead({
thread_id,
});
Parameters
name | required | description |
---|---|---|
thread_id | yes |
thread_id parameter |
See also: GitHub Developer Guide documentation.
Set a repository subscription
If you would like to watch a repository, set subscribed
to true
. If you would like to ignore notifications made within a repository, set ignored
to true
. If you would like to stop watching a repository, delete the repository's subscription completely.
octokit.rest.activity.setRepoSubscription({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
subscribed | no |
Determines if notifications should be received from this repository. |
ignored | no |
Determines if all notifications should be blocked from this repository. |
See also: GitHub Developer Guide documentation.
Set a thread subscription
If you are watching a repository, you receive notifications for all threads by default. Use this endpoint to ignore future notifications for threads until you comment on the thread or get an @mention.
You can also use this endpoint to subscribe to threads that you are currently not receiving notifications for or to subscribed to threads that you have previously ignored.
Unsubscribing from a conversation in a repository that you are not watching is functionally equivalent to the Delete a thread subscription endpoint.
octokit.rest.activity.setThreadSubscription({
thread_id,
});
Parameters
name | required | description |
---|---|---|
thread_id | yes |
thread_id parameter |
ignored | no |
Whether to block all notifications from a thread. |
See also: GitHub Developer Guide documentation.
Star a repository for the authenticated user
Note that you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
octokit.rest.activity.starRepoForAuthenticatedUser({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Unstar a repository for the authenticated user
octokit.rest.activity.unstarRepoForAuthenticatedUser({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Apps
Add a repository to an app installation
Add a single repository to an installation. The authenticated user must have admin access to the repository.
You must use a personal access token (which you can create via the command line or Basic Authentication) to access this endpoint.
octokit.rest.apps.addRepoToInstallation({
installation_id,
repository_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
repository_id | yes |
See also: GitHub Developer Guide documentation.
Check a token
OAuth applications can use a special API method for checking OAuth token validity without exceeding the normal rate limits for failed login attempts. Authentication works differently with this particular endpoint. You must use Basic Authentication to use this endpoint, where the username is the OAuth application client_id
and the password is its client_secret
. Invalid tokens will return 404 NOT FOUND
.
octokit.rest.apps.checkToken({
client_id,
access_token,
});
Parameters
name | required | description |
---|---|---|
client_id | yes |
The client ID of your GitHub app. |
access_token | yes |
The access_token of the OAuth application. |
See also: GitHub Developer Guide documentation.
Create a content attachment
Creates an attachment under a content reference URL in the body or comment of an issue or pull request. Use the id
of the content reference from the content_reference
event to create an attachment.
The app must create a content attachment within six hours of the content reference URL being posted. See "Using content attachments" for details about content attachments.
You must use an installation access token to access this endpoint.
octokit.rest.apps.createContentAttachment({
content_reference_id,
title,
body,
});
Parameters
name | required | description |
---|---|---|
content_reference_id | yes | |
title | yes |
The title of the attachment |
body | yes |
The body of the attachment |
See also: GitHub Developer Guide documentation.
Create a GitHub App from a manifest
Use this endpoint to complete the handshake necessary when implementing the GitHub App Manifest flow. When you create a GitHub App with the manifest flow, you receive a temporary code
used to retrieve the GitHub App's id
, pem
(private key), and webhook_secret
.
octokit.rest.apps.createFromManifest({
code,
});
Parameters
name | required | description |
---|---|---|
code | yes |
See also: GitHub Developer Guide documentation.
Create an installation access token for an app
Creates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of 401 - Unauthorized
, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access. To restrict the access to specific repositories, you can provide the repository_ids
when creating the token. When you omit repository_ids
, the response does not contain the repositories
key.
You must use a JWT to access this endpoint.
octokit.rest.apps.createInstallationAccessToken({
installation_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
repositories | no |
List of repository names that the token should have access to |
repository_ids | no |
List of repository IDs that the token should have access to |
permissions | no |
The permissions granted to the user-to-server access token. |
permissions.actions | no |
The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: |
permissions.administration | no |
The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: |
permissions.checks | no |
The level of permission to grant the access token for checks on code. Can be one of: |
permissions.content_references | no |
The level of permission to grant the access token for notification of content references and creation content attachments. Can be one of: |
permissions.contents | no |
The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: |
permissions.deployments | no |
The level of permission to grant the access token for deployments and deployment statuses. Can be one of: |
permissions.environments | no |
The level of permission to grant the access token for managing repository environments. Can be one of: |
permissions.issues | no |
The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: |
permissions.metadata | no |
The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: |
permissions.packages | no |
The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: |
permissions.pages | no |
The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: |
permissions.pull_requests | no |
The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: |
permissions.repository_hooks | no |
The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: |
permissions.repository_projects | no |
The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: |
permissions.secret_scanning_alerts | no |
The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: |
permissions.secrets | no |
The level of permission to grant the access token to manage repository secrets. Can be one of: |
permissions.security_events | no |
The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: |
permissions.single_file | no |
The level of permission to grant the access token to manage just a single file. Can be one of: |
permissions.statuses | no |
The level of permission to grant the access token for commit statuses. Can be one of: |
permissions.vulnerability_alerts | no |
The level of permission to grant the access token to retrieve Dependabot alerts. Can be one of: |
permissions.workflows | no |
The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: |
permissions.members | no |
The level of permission to grant the access token for organization teams and members. Can be one of: |
permissions.organization_administration | no |
The level of permission to grant the access token to manage access to an organization. Can be one of: |
permissions.organization_hooks | no |
The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: |
permissions.organization_plan | no |
The level of permission to grant the access token for viewing an organization's plan. Can be one of: |
permissions.organization_projects | no |
The level of permission to grant the access token to manage organization projects, columns, and cards. Can be one of: |
permissions.organization_secrets | no |
The level of permission to grant the access token to manage organization secrets. Can be one of: |
permissions.organization_self_hosted_runners | no |
The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: |
permissions.organization_user_blocking | no |
The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: |
permissions.team_discussions | no |
The level of permission to grant the access token to manage team discussions and related comments. Can be one of: |
See also: GitHub Developer Guide documentation.
Delete an app authorization
OAuth application owners can revoke a grant for their OAuth application and a specific user. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id
and client_secret
as the username and password. You must also provide a valid OAuth access_token
as an input parameter and the grant for the token's owner will be deleted.
Deleting an OAuth application's grant will also delete all OAuth tokens associated with the application for the user. Once deleted, the application will have no access to the user's account and will no longer be listed on the application authorizations settings screen within GitHub.
octokit.rest.apps.deleteAuthorization({
client_id,
});
Parameters
name | required | description |
---|---|---|
client_id | yes |
The client ID of your GitHub app. |
access_token | no |
The OAuth access token used to authenticate to the GitHub API. |
See also: GitHub Developer Guide documentation.
Delete an installation for the authenticated app
Uninstalls a GitHub App on a user, organization, or business account. If you prefer to temporarily suspend an app's access to your account's resources, then we recommend the "Suspend an app installation" endpoint.
You must use a JWT to access this endpoint.
octokit.rest.apps.deleteInstallation({
installation_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
See also: GitHub Developer Guide documentation.
Delete an app token
OAuth application owners can revoke a single token for an OAuth application. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id
and client_secret
as the username and password.
octokit.rest.apps.deleteToken({
client_id,
access_token,
});
Parameters
name | required | description |
---|---|---|
client_id | yes |
The client ID of your GitHub app. |
access_token | yes |
The OAuth access token used to authenticate to the GitHub API. |
See also: GitHub Developer Guide documentation.
Get the authenticated app
Returns the GitHub App associated with the authentication credentials used. To see how many app installations are associated with this GitHub App, see the installations_count
in the response. For more details about your app's installations, see the "List installations for the authenticated app" endpoint.
You must use a JWT to access this endpoint.
octokit.rest.apps.getAuthenticated();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get an app
Note: The :app_slug
is just the URL-friendly name of your GitHub App. You can find this on the settings page for your GitHub App (e.g., https://github.com/settings/apps/:app_slug
).
If the GitHub App you specify is public, you can access this endpoint without authenticating. If the GitHub App you specify is private, you must authenticate with a personal access token or an installation access token to access this endpoint.
octokit.rest.apps.getBySlug({
app_slug,
});
Parameters
name | required | description |
---|---|---|
app_slug | yes |
See also: GitHub Developer Guide documentation.
Get an installation for the authenticated app
Enables an authenticated GitHub App to find an installation's information using the installation id. The installation's account type (target_type
) will be either an organization or a user account, depending which account the repository belongs to.
You must use a JWT to access this endpoint.
octokit.rest.apps.getInstallation({
installation_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
See also: GitHub Developer Guide documentation.
Get an organization installation for the authenticated app
Enables an authenticated GitHub App to find the organization's installation information.
You must use a JWT to access this endpoint.
octokit.rest.apps.getOrgInstallation({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get a repository installation for the authenticated app
Enables an authenticated GitHub App to find the repository's installation information. The installation's account type will be either an organization or a user account, depending which account the repository belongs to.
You must use a JWT to access this endpoint.
octokit.rest.apps.getRepoInstallation({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a subscription plan for an account
Shows whether the user or organization account actively subscribes to a plan listed by the authenticated GitHub App. When someone submits a plan change that won't be processed until the end of their billing cycle, you will also see the upcoming pending change.
GitHub Apps must use a JWT to access this endpoint. OAuth Apps must use basic authentication with their client ID and client secret to access this endpoint.
octokit.rest.apps.getSubscriptionPlanForAccount({
account_id,
});
Parameters
name | required | description |
---|---|---|
account_id | yes |
account_id parameter |
See also: GitHub Developer Guide documentation.
Get a subscription plan for an account (stubbed)
Shows whether the user or organization account actively subscribes to a plan listed by the authenticated GitHub App. When someone submits a plan change that won't be processed until the end of their billing cycle, you will also see the upcoming pending change.
GitHub Apps must use a JWT to access this endpoint. OAuth Apps must use basic authentication with their client ID and client secret to access this endpoint.
octokit.rest.apps.getSubscriptionPlanForAccountStubbed({
account_id,
});
Parameters
name | required | description |
---|---|---|
account_id | yes |
account_id parameter |
See also: GitHub Developer Guide documentation.
Get a user installation for the authenticated app
Enables an authenticated GitHub App to find the user’s installation information.
You must use a JWT to access this endpoint.
octokit.rest.apps.getUserInstallation({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Get a webhook configuration for an app
Returns the webhook configuration for a GitHub App. For more information about configuring a webhook for your app, see "Creating a GitHub App."
You must use a JWT to access this endpoint.
octokit.rest.apps.getWebhookConfigForApp();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
List accounts for a plan
Returns user and organization accounts associated with the specified plan, including free plans. For per-seat pricing, you see the list of accounts that have purchased the plan, including the number of seats purchased. When someone submits a plan change that won't be processed until the end of their billing cycle, you will also see the upcoming pending change.
GitHub Apps must use a JWT to access this endpoint. OAuth Apps must use basic authentication with their client ID and client secret to access this endpoint.
octokit.rest.apps.listAccountsForPlan({
plan_id,
});
Parameters
name | required | description |
---|---|---|
plan_id | yes |
plan_id parameter |
sort | no |
One of |
direction | no |
To return the oldest accounts first, set to |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List accounts for a plan (stubbed)
Returns repository and organization accounts associated with the specified plan, including free plans. For per-seat pricing, you see the list of accounts that have purchased the plan, including the number of seats purchased. When someone submits a plan change that won't be processed until the end of their billing cycle, you will also see the upcoming pending change.
GitHub Apps must use a JWT to access this endpoint. OAuth Apps must use basic authentication with their client ID and client secret to access this endpoint.
octokit.rest.apps.listAccountsForPlanStubbed({
plan_id,
});
Parameters
name | required | description |
---|---|---|
plan_id | yes |
plan_id parameter |
sort | no |
One of |
direction | no |
To return the oldest accounts first, set to |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories accessible to the user access token
List repositories that the authenticated user has explicit permission (:read
, :write
, or :admin
) to access for an installation.
The authenticated user has explicit permission to access repositories they own, repositories where they are a collaborator, and repositories that they can access through an organization membership.
You must use a user-to-server OAuth access token, created for a user who has authorized your GitHub App, to access this endpoint.
The access the user has to each repository is included in the hash under the permissions
key.
octokit.rest.apps.listInstallationReposForAuthenticatedUser({
installation_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List installations for the authenticated app
You must use a JWT to access this endpoint.
The permissions the installation has are included under the permissions
key.
octokit.rest.apps.listInstallations();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
outdated | no |
See also: GitHub Developer Guide documentation.
List app installations accessible to the user access token
Lists installations of your GitHub App that the authenticated user has explicit permission (:read
, :write
, or :admin
) to access.
You must use a user-to-server OAuth access token, created for a user who has authorized your GitHub App, to access this endpoint.
The authenticated user has explicit permission to access repositories they own, repositories where they are a collaborator, and repositories that they can access through an organization membership.
You can find the permissions for the installation under the permissions
key.
octokit.rest.apps.listInstallationsForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List plans
Lists all plans that are part of your GitHub Marketplace listing.
GitHub Apps must use a JWT to access this endpoint. OAuth Apps must use basic authentication with their client ID and client secret to access this endpoint.
octokit.rest.apps.listPlans();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List plans (stubbed)
Lists all plans that are part of your GitHub Marketplace listing.
GitHub Apps must use a JWT to access this endpoint. OAuth Apps must use basic authentication with their client ID and client secret to access this endpoint.
octokit.rest.apps.listPlansStubbed();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories accessible to the app installation
List repositories that an app installation can access.
You must use an installation access token to access this endpoint.
octokit.rest.apps.listReposAccessibleToInstallation();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List subscriptions for the authenticated user
Lists the active subscriptions for the authenticated user. You must use a user-to-server OAuth access token, created for a user who has authorized your GitHub App, to access this endpoint. . OAuth Apps must authenticate using an OAuth token.
octokit.rest.apps.listSubscriptionsForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List subscriptions for the authenticated user (stubbed)
Lists the active subscriptions for the authenticated user. You must use a user-to-server OAuth access token, created for a user who has authorized your GitHub App, to access this endpoint. . OAuth Apps must authenticate using an OAuth token.
octokit.rest.apps.listSubscriptionsForAuthenticatedUserStubbed();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Remove a repository from an app installation
Remove a single repository from an installation. The authenticated user must have admin access to the repository.
You must use a personal access token (which you can create via the command line or Basic Authentication) to access this endpoint.
octokit.rest.apps.removeRepoFromInstallation({
installation_id,
repository_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
repository_id | yes |
See also: GitHub Developer Guide documentation.
Reset a token
OAuth applications can use this API method to reset a valid OAuth token without end-user involvement. Applications must save the "token" property in the response because changes take effect immediately. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id
and client_secret
as the username and password. Invalid tokens will return 404 NOT FOUND
.
octokit.rest.apps.resetToken({
client_id,
access_token,
});
Parameters
name | required | description |
---|---|---|
client_id | yes |
The client ID of your GitHub app. |
access_token | yes |
The access_token of the OAuth application. |
See also: GitHub Developer Guide documentation.
Revoke an installation access token
Revokes the installation token you're using to authenticate as an installation and access this endpoint.
Once an installation token is revoked, the token is invalidated and cannot be used. Other endpoints that require the revoked installation token must have a new installation token to work. You can create a new token using the "Create an installation access token for an app" endpoint.
You must use an installation access token to access this endpoint.
octokit.rest.apps.revokeInstallationAccessToken();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Create a scoped access token
Exchanges a non-repository scoped user-to-server OAuth access token for a repository scoped user-to-server OAuth access token. You can specify which repositories the token can access and which permissions are granted to the token. You must use Basic Authentication when accessing this endpoint, using the OAuth application's client_id
and client_secret
as the username and password. Invalid tokens will return 404 NOT FOUND
.
octokit.rest.apps.scopeToken({
client_id,
access_token,
});
Parameters
name | required | description |
---|---|---|
client_id | yes |
The client ID of your GitHub app. |
access_token | yes |
Required. The OAuth access token used to authenticate to the GitHub API. |
target | no |
The name of the user or organization to scope the user-to-server access token to. Required unless |
target_id | no |
The ID of the user or organization to scope the user-to-server access token to. Required unless |
repositories | no |
The list of repository names to scope the user-to-server access token to. |
repository_ids | no |
The list of repository IDs to scope the user-to-server access token to. |
permissions | no |
The permissions granted to the user-to-server access token. |
permissions.actions | no |
The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: |
permissions.administration | no |
The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: |
permissions.checks | no |
The level of permission to grant the access token for checks on code. Can be one of: |
permissions.content_references | no |
The level of permission to grant the access token for notification of content references and creation content attachments. Can be one of: |
permissions.contents | no |
The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: |
permissions.deployments | no |
The level of permission to grant the access token for deployments and deployment statuses. Can be one of: |
permissions.environments | no |
The level of permission to grant the access token for managing repository environments. Can be one of: |
permissions.issues | no |
The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: |
permissions.metadata | no |
The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: |
permissions.packages | no |
The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: |
permissions.pages | no |
The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: |
permissions.pull_requests | no |
The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: |
permissions.repository_hooks | no |
The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: |
permissions.repository_projects | no |
The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: |
permissions.secret_scanning_alerts | no |
The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: |
permissions.secrets | no |
The level of permission to grant the access token to manage repository secrets. Can be one of: |
permissions.security_events | no |
The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: |
permissions.single_file | no |
The level of permission to grant the access token to manage just a single file. Can be one of: |
permissions.statuses | no |
The level of permission to grant the access token for commit statuses. Can be one of: |
permissions.vulnerability_alerts | no |
The level of permission to grant the access token to retrieve Dependabot alerts. Can be one of: |
permissions.workflows | no |
The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: |
permissions.members | no |
The level of permission to grant the access token for organization teams and members. Can be one of: |
permissions.organization_administration | no |
The level of permission to grant the access token to manage access to an organization. Can be one of: |
permissions.organization_hooks | no |
The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: |
permissions.organization_plan | no |
The level of permission to grant the access token for viewing an organization's plan. Can be one of: |
permissions.organization_projects | no |
The level of permission to grant the access token to manage organization projects, columns, and cards. Can be one of: |
permissions.organization_secrets | no |
The level of permission to grant the access token to manage organization secrets. Can be one of: |
permissions.organization_self_hosted_runners | no |
The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: |
permissions.organization_user_blocking | no |
The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: |
permissions.team_discussions | no |
The level of permission to grant the access token to manage team discussions and related comments. Can be one of: |
See also: GitHub Developer Guide documentation.
Suspend an app installation
Suspends a GitHub App on a user, organization, or business account, which blocks the app from accessing the account's resources. When a GitHub App is suspended, the app's access to the GitHub API or webhook events is blocked for that account.
You must use a JWT to access this endpoint.
octokit.rest.apps.suspendInstallation({
installation_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
See also: GitHub Developer Guide documentation.
Unsuspend an app installation
Removes a GitHub App installation suspension.
You must use a JWT to access this endpoint.
octokit.rest.apps.unsuspendInstallation({
installation_id,
});
Parameters
name | required | description |
---|---|---|
installation_id | yes |
installation_id parameter |
See also: GitHub Developer Guide documentation.
Update a webhook configuration for an app
Updates the webhook configuration for a GitHub App. For more information about configuring a webhook for your app, see "Creating a GitHub App."
You must use a JWT to access this endpoint.
octokit.rest.apps.updateWebhookConfigForApp();
Parameters
name | required | description |
---|---|---|
url | no |
The URL to which the payloads will be delivered. |
content_type | no |
The media type used to serialize the payloads. Supported values include |
secret | no |
If provided, the |
insecure_ssl | no |
Determines whether the SSL certificate of the host for |
See also: GitHub Developer Guide documentation.
Billing
Get GitHub Actions billing for an organization
Gets the summary of the free and paid GitHub Actions minutes used.
Paid minutes only apply to workflows in private repositories that use GitHub-hosted runners. Minutes used is listed for each GitHub-hosted runner operating system. Any job re-runs are also included in the usage. The usage returned includes any minute multipliers for macOS and Windows runners, and is rounded up to the nearest whole minute. For more information, see "Managing billing for GitHub Actions".
Access tokens must have the repo
or admin:org
scope.
octokit.rest.billing.getGithubActionsBillingOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get GitHub Actions billing for a user
Gets the summary of the free and paid GitHub Actions minutes used.
Paid minutes only apply to workflows in private repositories that use GitHub-hosted runners. Minutes used is listed for each GitHub-hosted runner operating system. Any job re-runs are also included in the usage. The usage returned includes any minute multipliers for macOS and Windows runners, and is rounded up to the nearest whole minute. For more information, see "Managing billing for GitHub Actions".
Access tokens must have the user
scope.
octokit.rest.billing.getGithubActionsBillingUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Get GitHub Packages billing for an organization
Gets the free and paid storage usued for GitHub Packages in gigabytes.
Paid minutes only apply to packages stored for private repositories. For more information, see "Managing billing for GitHub Packages."
Access tokens must have the repo
or admin:org
scope.
octokit.rest.billing.getGithubPackagesBillingOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get GitHub Packages billing for a user
Gets the free and paid storage used for GitHub Packages in gigabytes.
Paid minutes only apply to packages stored for private repositories. For more information, see "Managing billing for GitHub Packages."
Access tokens must have the user
scope.
octokit.rest.billing.getGithubPackagesBillingUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Get shared storage billing for an organization
Gets the estimated paid and estimated total storage used for GitHub Actions and Github Packages.
Paid minutes only apply to packages stored for private repositories. For more information, see "Managing billing for GitHub Packages."
Access tokens must have the repo
or admin:org
scope.
octokit.rest.billing.getSharedStorageBillingOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get shared storage billing for a user
Gets the estimated paid and estimated total storage used for GitHub Actions and Github Packages.
Paid minutes only apply to packages stored for private repositories. For more information, see "Managing billing for GitHub Packages."
Access tokens must have the user
scope.
octokit.rest.billing.getSharedStorageBillingUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Checks
Create a check run
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
Creates a new check run for a specific commit in a repository. Your GitHub App must have the checks:write
permission to create check runs.
In a check suite, GitHub limits the number of check runs with the same name to 1000. Once these check runs exceed 1000, GitHub will start to automatically delete older check runs.
octokit.rest.checks.create({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
status | no | |
* | no |
See also: GitHub Developer Guide documentation.
Create a check suite
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array and a null
value for head_branch
.
By default, check suites are automatically created when you create a check run. You only need to use this endpoint for manually creating check suites when you've disabled automatic creation using "Update repository preferences for check suites". Your GitHub App must have the checks:write
permission to create check suites.
octokit.rest.checks.createSuite({
owner,
repo,
head_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
head_sha | yes |
The sha of the head commit. |
See also: GitHub Developer Guide documentation.
Get a check run
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
Gets a single check run using its id
. GitHub Apps must have the checks:read
permission on a private repository or pull access to a public repository to get check runs. OAuth Apps and authenticated users must have the repo
scope to get check runs in a private repository.
octokit.rest.checks.get({
owner,
repo,
check_run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
check_run_id | yes |
checkrunid parameter |
See also: GitHub Developer Guide documentation.
Get a check suite
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array and a null
value for head_branch
.
Gets a single check suite using its id
. GitHub Apps must have the checks:read
permission on a private repository or pull access to a public repository to get check suites. OAuth Apps and authenticated users must have the repo
scope to get check suites in a private repository.
octokit.rest.checks.getSuite({
owner,
repo,
check_suite_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
check_suite_id | yes |
checksuiteid parameter |
See also: GitHub Developer Guide documentation.
List check run annotations
Lists annotations for a check run using the annotation id
. GitHub Apps must have the checks:read
permission on a private repository or pull access to a public repository to get annotations for a check run. OAuth Apps and authenticated users must have the repo
scope to get annotations for a check run in a private repository.
octokit.rest.checks.listAnnotations({
owner,
repo,
check_run_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
check_run_id | yes |
checkrunid parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List check runs for a Git reference
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
Lists check runs for a commit ref. The ref
can be a SHA, branch name, or a tag name. GitHub Apps must have the checks:read
permission on a private repository or pull access to a public repository to get check runs. OAuth Apps and authenticated users must have the repo
scope to get check runs in a private repository.
octokit.rest.checks.listForRef({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
check_name | no |
Returns check runs with the specified |
status | no |
Returns check runs with the specified |
filter | no |
Filters check runs by their |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
app_id | no |
See also: GitHub Developer Guide documentation.
List check runs in a check suite
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
Lists check runs for a check suite using its id
. GitHub Apps must have the checks:read
permission on a private repository or pull access to a public repository to get check runs. OAuth Apps and authenticated users must have the repo
scope to get check runs in a private repository.
octokit.rest.checks.listForSuite({
owner,
repo,
check_suite_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
check_suite_id | yes |
checksuiteid parameter |
check_name | no |
Returns check runs with the specified |
status | no |
Returns check runs with the specified |
filter | no |
Filters check runs by their |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List check suites for a Git reference
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array and a null
value for head_branch
.
Lists check suites for a commit ref
. The ref
can be a SHA, branch name, or a tag name. GitHub Apps must have the checks:read
permission on a private repository or pull access to a public repository to list check suites. OAuth Apps and authenticated users must have the repo
scope to get check suites in a private repository.
octokit.rest.checks.listSuitesForRef({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
app_id | no |
Filters check suites by GitHub App |
check_name | no |
Returns check runs with the specified |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Rerequest a check suite
Triggers GitHub to rerequest an existing check suite, without pushing new code to a repository. This endpoint will trigger the check_suite
webhook event with the action rerequested
. When a check suite is rerequested
, its status
is reset to queued
and the conclusion
is cleared.
To rerequest a check suite, your GitHub App must have the checks:read
permission on a private repository or pull access to a public repository.
octokit.rest.checks.rerequestSuite({
owner,
repo,
check_suite_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
check_suite_id | yes |
checksuiteid parameter |
See also: GitHub Developer Guide documentation.
Update repository preferences for check suites
Changes the default automatic flow when creating check suites. By default, a check suite is automatically created each time code is pushed to a repository. When you disable the automatic creation of check suites, you can manually Create a check suite. You must have admin permissions in the repository to set preferences for check suites.
octokit.rest.checks.setSuitesPreferences({
owner,
repo,
auto_trigger_checks[].app_id,
auto_trigger_checks[].setting
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
auto_trigger_checks | no |
Enables or disables automatic creation of CheckSuite events upon pushes to the repository. Enabled by default. See the |
auto_trigger_checks[].app_id | yes |
The |
auto_trigger_checks[].setting | yes |
Set to |
See also: GitHub Developer Guide documentation.
Update a check run
Note: The Checks API only looks for pushes in the repository where the check suite or check run were created. Pushes to a branch in a forked repository are not detected and return an empty pull_requests
array.
Updates a check run for a specific commit in a repository. Your GitHub App must have the checks:write
permission to edit check runs.
octokit.rest.checks.update({
owner,
repo,
check_run_id,
output.summary,
output.annotations[].path,
output.annotations[].start_line,
output.annotations[].end_line,
output.annotations[].annotation_level,
output.annotations[].message,
output.images[].alt,
output.images[].image_url,
actions[].label,
actions[].description,
actions[].identifier
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
check_run_id | yes |
checkrunid parameter |
name | no |
The name of the check. For example, "code-coverage". |
details_url | no |
The URL of the integrator's site that has the full details of the check. |
external_id | no |
A reference for the run on the integrator's system. |
started_at | no |
This is a timestamp in ISO 8601 format: |
status | no |
The current status. Can be one of |
conclusion | no |
Required if you provide |
completed_at | no |
The time the check completed. This is a timestamp in ISO 8601 format: |
output | no |
Check runs can accept a variety of data in the |
output.title | no |
Required. |
output.summary | yes |
Can contain Markdown. |
output.text | no |
Can contain Markdown. |
output.annotations | no |
Adds information from your analysis to specific lines of code. Annotations are visible in GitHub's pull request UI. Annotations are visible in GitHub's pull request UI. The Checks API limits the number of annotations to a maximum of 50 per API request. To create more than 50 annotations, you have to make multiple requests to the Update a check run endpoint. Each time you update the check run, annotations are appended to the list of annotations that already exist for the check run. For details about annotations in the UI, see "About status checks". See the |
output.annotations[].path | yes |
The path of the file to add an annotation to. For example, |
output.annotations[].start_line | yes |
The start line of the annotation. |
output.annotations[].end_line | yes |
The end line of the annotation. |
output.annotations[].start_column | no |
The start column of the annotation. Annotations only support |
output.annotations[].end_column | no |
The end column of the annotation. Annotations only support |
output.annotations[].annotation_level | yes |
The level of the annotation. Can be one of |
output.annotations[].message | yes |
A short description of the feedback for these lines of code. The maximum size is 64 KB. |
output.annotations[].title | no |
The title that represents the annotation. The maximum size is 255 characters. |
output.annotations[].raw_details | no |
Details about this annotation. The maximum size is 64 KB. |
output.images | no |
Adds images to the output displayed in the GitHub pull request UI. See the |
output.images[].alt | yes |
The alternative text for the image. |
output.images[].image_url | yes |
The full URL of the image. |
output.images[].caption | no |
A short image description. |
actions | no |
Possible further actions the integrator can perform, which a user may trigger. Each action includes a |
actions[].label | yes |
The text to be displayed on a button in the web UI. The maximum size is 20 characters. |
actions[].description | yes |
A short explanation of what this action would do. The maximum size is 40 characters. |
actions[].identifier | yes |
A reference for the action on the integrator's system. The maximum size is 20 characters. |
See also: GitHub Developer Guide documentation.
Code-Scanning
Delete a code scanning analysis from a repository
Deletes a specified code scanning analysis from a repository. For
private repositories, you must use an access token with the repo
scope. For public repositories,
you must use an access token with public_repo
and repo:security_events
scopes.
GitHub Apps must have the security_events
write permission to use this endpoint.
You can delete one analysis at a time. To delete a series of analyses, start with the most recent analysis and work backwards. Conceptually, the process is similar to the undo function in a text editor.
When you list the analyses for a repository, one or more will be identified as deletable in the response:
"deletable": true
An analysis is deletable when it's the most recent in a set of analyses. Typically, a repository will have multiple sets of analyses for each enabled code scanning tool, where a set is determined by a unique combination of analysis values:
ref
tool
analysis_key
environment
If you attempt to delete an analysis that is not the most recent in a set, you'll get a 400 response with the message:
Analysis specified is not deletable.
The response from a successful DELETE
operation provides you with
two alternative URLs for deleting the next analysis in the set
(see the example default response below).
Use the next_analysis_url
URL if you want to avoid accidentally deleting the final analysis
in the set. This is a useful option if you want to preserve at least one analysis
for the specified tool in your repository.
Use the confirm_delete_url
URL if you are content to remove all analyses for a tool.
When you delete the last analysis in a set the value of next_analysis_url
and confirm_delete_url
in the 200 response is null
.
As an example of the deletion process, let's imagine that you added a workflow that configured a particular code scanning tool to analyze the code in a repository. This tool has added 15 analyses: 10 on the default branch, and another 5 on a topic branch. You therefore have two separate sets of analyses for this tool. You've now decided that you want to remove all of the analyses for the tool. To do this you must make 15 separate deletion requests. To start, you must find the deletable analysis for one of the sets, step through deleting the analyses in that set, and then repeat the process for the second set. The procedure therefore consists of a nested loop:
Outer loop:
- List the analyses for the repository, filtered by tool.
-
Parse this list to find a deletable analysis. If found:
Inner loop:
- Delete the identified analysis.
- Parse the response for the value of
next_analysis_url
and, if found, use this in the next iteration.
The above process assumes that you want to remove all trace of the tool's analyses from the GitHub user interface, for the specified repository, and it therefore uses the next_analysis_url
value. Alternatively, you could use the confirm_delete_url
value, which would leave the last analysis in each set undeleted to avoid removing a tool's analysis entirely.
octokit.rest.codeScanning.deleteAnalysis({
owner,
repo,
analysis_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
analysis_id | yes |
The ID of the analysis, as returned from the |
confirm_delete | no |
Allow deletion if the specified analysis is the last in a set. If you attempt to delete the final analysis in a set without setting this parameter to |
See also: GitHub Developer Guide documentation.
Get a code scanning alert
Gets a single code scanning alert. You must use an access token with the security_events
scope to use this endpoint. GitHub Apps must have the security_events
read permission to use this endpoint.
Deprecation notice:
The instances field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The same information can now be retrieved via a GET request to the URL specified by instances_url
.
octokit.rest.codeScanning.getAlert({
owner,
repo,
alert_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
alert_number | yes |
The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the |
alert_id | no |
The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the |
See also: GitHub Developer Guide documentation.
Get a code scanning analysis for a repository
Gets a specified code scanning analysis for a repository.
You must use an access token with the security_events
scope to use this endpoint.
GitHub Apps must have the security_events
read permission to use this endpoint.
The default JSON response contains fields that describe the analysis. This includes the Git reference and commit SHA to which the analysis relates, the datetime of the analysis, the name of the code scanning tool, and the number of alerts.
The rules_count
field in the default response give the number of rules
that were run in the analysis.
For very old analyses this data is not available,
and 0
is returned in this field.
If you use the Accept header application/sarif+json
,
the response contains the analysis data that was uploaded.
This is formatted as
SARIF version 2.1.0.
For an example response, see "Custom media type for code scanning."
Deprecation notice:
The tool_name
field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the tool
field.
octokit.rest.codeScanning.getAnalysis({
owner,
repo,
analysis_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
analysis_id | yes |
The ID of the analysis, as returned from the |
See also: GitHub Developer Guide documentation.
Get information about a SARIF upload
Gets information about a SARIF upload, including the status and the URL of the analysis that was uploaded so that you can retrieve details of the analysis. For more information, see "Get a code scanning analysis for a repository." You must use an access token with the security_events
scope to use this endpoint. GitHub Apps must have the security_events
read permission to use this endpoint.
octokit.rest.codeScanning.getSarif({
owner,
repo,
sarif_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sarif_id | yes |
The SARIF ID obtained after uploading. |
See also: GitHub Developer Guide documentation.
List code scanning alerts for a repository
Lists all open code scanning alerts for the default branch (usually main
or master
). You must use an access token with the security_events
scope to use
this endpoint. GitHub Apps must have the security_events
read permission to use
this endpoint.
The response includes a most_recent_instance
object.
This provides details of the most recent instance of this alert
for the default branch or for the specified Git reference
(if you used ref
in the request).
octokit.rest.codeScanning.listAlertsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tool_name | no |
The name of a code scanning tool. Only results by this tool will be listed. You can specify the tool by using either |
tool_guid | no |
The GUID of a code scanning tool. Only results by this tool will be listed. Note that some code scanning tools may not include a GUID in their analysis data. You can specify the tool by using either |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
ref | no |
The Git reference for the results you want to list. The |
state | no |
Set to |
See also: GitHub Developer Guide documentation.
List instances of a code scanning alert
Lists all instances of the specified code scanning alert. You must use an access token with the security_events
scope to use this endpoint. GitHub Apps must have the security_events
read permission to use this endpoint.
octokit.rest.codeScanning.listAlertsInstances({
owner,
repo,
alert_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
alert_number | yes |
The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
ref | no |
The Git reference for the results you want to list. The |
See also: GitHub Developer Guide documentation.
List code scanning analyses for a repository
Lists the details of all code scanning analyses for a repository,
starting with the most recent.
The response is paginated and you can use the page
and per_page
parameters
to list the analyses you're interested in.
By default 30 analyses are listed per page.
The rules_count
field in the response give the number of rules
that were run in the analysis.
For very old analyses this data is not available,
and 0
is returned in this field.
You must use an access token with the security_events
scope to use this endpoint.
GitHub Apps must have the security_events
read permission to use this endpoint.
Deprecation notice:
The tool_name
field is deprecated and will, in future, not be included in the response for this endpoint. The example response reflects this change. The tool name can now be found inside the tool
field.
octokit.rest.codeScanning.listRecentAnalyses({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tool_name | no |
The name of a code scanning tool. Only results by this tool will be listed. You can specify the tool by using either |
tool_guid | no |
The GUID of a code scanning tool. Only results by this tool will be listed. Note that some code scanning tools may not include a GUID in their analysis data. You can specify the tool by using either |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
ref | no |
The Git reference for the analyses you want to list. The |
sarif_id | no |
Filter analyses belonging to the same SARIF upload. |
See also: GitHub Developer Guide documentation.
Update a code scanning alert
Updates the status of a single code scanning alert. You must use an access token with the security_events
scope to use this endpoint. GitHub Apps must have the security_events
write permission to use this endpoint.
octokit.rest.codeScanning.updateAlert({
owner,
repo,
alert_number,
state,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
alert_number | yes |
The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the |
state | yes |
Sets the state of the code scanning alert. Can be one of |
dismissed_reason | no |
Required when the state is dismissed. The reason for dismissing or closing the alert. Can be one of: |
See also: GitHub Developer Guide documentation.
Upload an analysis as SARIF data
Uploads SARIF data containing the results of a code scanning analysis to make the results available in a repository. You must use an access token with the security_events
scope to use this endpoint. GitHub Apps must have the security_events
write permission to use this endpoint.
There are two places where you can upload code scanning results.
- If you upload to a pull request, for example
--ref refs/pull/42/merge
or--ref refs/pull/42/head
, then the results appear as alerts in a pull request check. For more information, see "Triaging code scanning alerts in pull requests." - If you upload to a branch, for example
--ref refs/heads/my-branch
, then the results appear in the Security tab for your repository. For more information, see "Managing code scanning alerts for your repository."
You must compress the SARIF-formatted analysis data that you want to upload, using gzip
, and then encode it as a Base64 format string. For example:
gzip -c analysis-data.sarif | base64
SARIF upload supports a maximum of 1000 results per analysis run. Any results over this limit are ignored. Typically, but not necessarily, a SARIF file contains a single run of a single tool. If a code scanning tool generates too many results, you should update the analysis configuration to run only the most important rules or queries.
The 202 Accepted
, response includes an id
value.
You can use this ID to check the status of the upload by using this for the /sarifs/{sarif_id}
endpoint.
For more information, see "Get information about a SARIF upload."
octokit.rest.codeScanning.uploadSarif({
owner,
repo,
commit_sha,
ref,
sarif,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
commit_sha | yes |
The SHA of the commit to which the analysis you are uploading relates. |
ref | yes |
The full Git reference, formatted as |
sarif | yes |
A Base64 string representing the SARIF file to upload. You must first compress your SARIF file using |
checkout_uri | no |
The base directory used in the analysis, as it appears in the SARIF file. This property is used to convert file paths from absolute to relative, so that alerts can be mapped to their correct location in the repository. |
started_at | no |
The time that the analysis run began. This is a timestamp in ISO 8601 format: |
tool_name | no |
The name of the tool used to generate the code scanning analysis. If this parameter is not used, the tool name defaults to "API". If the uploaded SARIF contains a tool GUID, this will be available for filtering using the |
See also: GitHub Developer Guide documentation.
Codes-of-Conduct
Get all codes of conduct
octokit.rest.codesOfConduct.getAllCodesOfConduct();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get a code of conduct
octokit.rest.codesOfConduct.getConductCode({
key,
});
Parameters
name | required | description |
---|---|---|
key | yes |
See also: GitHub Developer Guide documentation.
Get the code of conduct for a repository
Returns the contents of the repository's code of conduct file, if one is detected.
A code of conduct is detected if there is a file named CODE_OF_CONDUCT
in the root directory of the repository. GitHub detects which code of conduct it is using fuzzy matching.
octokit.rest.codesOfConduct.getForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Emojis
Get emojis
Lists all the emojis available to use on GitHub.
octokit.rest.emojis.get();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Enterprise-Admin
Disable a selected organization for GitHub Actions in an enterprise
Removes an organization from the list of selected organizations that are enabled for GitHub Actions in an enterprise. To use this endpoint, the enterprise permission policy for enabled_organizations
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an enterprise."
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.disableSelectedOrganizationGithubActionsEnterprise(
{
enterprise,
org_id,
}
);
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
org_id | yes |
Unique identifier of an organization. |
See also: GitHub Developer Guide documentation.
Enable a selected organization for GitHub Actions in an enterprise
Adds an organization to the list of selected organizations that are enabled for GitHub Actions in an enterprise. To use this endpoint, the enterprise permission policy for enabled_organizations
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an enterprise."
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.enableSelectedOrganizationGithubActionsEnterprise({
enterprise,
org_id,
});
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
org_id | yes |
Unique identifier of an organization. |
See also: GitHub Developer Guide documentation.
Get allowed actions for an enterprise
Gets the selected actions that are allowed in an enterprise. To use this endpoint, the enterprise permission policy for allowed_actions
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an enterprise."
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.getAllowedActionsEnterprise({
enterprise,
});
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
See also: GitHub Developer Guide documentation.
Get GitHub Actions permissions for an enterprise
Gets the GitHub Actions permissions policy for organizations and allowed actions in an enterprise.
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.getGithubActionsPermissionsEnterprise({
enterprise,
});
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
See also: GitHub Developer Guide documentation.
List selected organizations enabled for GitHub Actions in an enterprise
Lists the organizations that are selected to have GitHub Actions enabled in an enterprise. To use this endpoint, the enterprise permission policy for enabled_organizations
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an enterprise."
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.listSelectedOrganizationsEnabledGithubActionsEnterprise(
{
enterprise,
}
);
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Set allowed actions for an enterprise
Sets the actions that are allowed in an enterprise. To use this endpoint, the enterprise permission policy for allowed_actions
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an enterprise."
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.setAllowedActionsEnterprise({
enterprise,
github_owned_allowed,
verified_allowed,
patterns_allowed,
});
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
github_owned_allowed | yes |
Whether GitHub-owned actions are allowed. For example, this includes the actions in the |
verified_allowed | yes |
Whether actions in GitHub Marketplace from verified creators are allowed. Set to |
patterns_allowed | yes |
Specifies a list of string-matching patterns to allow specific action(s). Wildcards, tags, and SHAs are allowed. For example, |
See also: GitHub Developer Guide documentation.
Set GitHub Actions permissions for an enterprise
Sets the GitHub Actions permissions policy for organizations and allowed actions in an enterprise.
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.setGithubActionsPermissionsEnterprise({
enterprise,
enabled_organizations,
});
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
enabled_organizations | yes |
The policy that controls the organizations in the enterprise that are allowed to run GitHub Actions. Can be one of: |
allowed_actions | no |
The permissions policy that controls the actions that are allowed to run. Can be one of: |
See also: GitHub Developer Guide documentation.
Set selected organizations enabled for GitHub Actions in an enterprise
Replaces the list of selected organizations that are enabled for GitHub Actions in an enterprise. To use this endpoint, the enterprise permission policy for enabled_organizations
must be configured to selected
. For more information, see "Set GitHub Actions permissions for an enterprise."
You must authenticate using an access token with the admin:enterprise
scope to use this endpoint.
octokit.rest.enterpriseAdmin.setSelectedOrganizationsEnabledGithubActionsEnterprise(
{
enterprise,
selected_organization_ids,
}
);
Parameters
name | required | description |
---|---|---|
enterprise | yes |
The slug version of the enterprise name. You can also substitute this value with the enterprise id. |
selected_organization_ids | yes |
List of organization IDs to enable for GitHub Actions. |
See also: GitHub Developer Guide documentation.
Gists
Check if a gist is starred
octokit.rest.gists.checkIsStarred({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
See also: GitHub Developer Guide documentation.
Create a gist
Allows you to add a new gist with one or more files.
Note: Don't name your files "gistfile" with a numerical suffix. This is the format of the automatic naming scheme that Gist uses internally.
octokit.rest.gists.create({
files,
files.*.content
})
Parameters
name | required | description |
---|---|---|
description | no |
Description of the gist |
files | yes |
Names and content for the files that make up the gist |
files.* | no | |
files.*.content | yes |
Content of the file |
public | no |
See also: GitHub Developer Guide documentation.
Create a gist comment
octokit.rest.gists.createComment({
gist_id,
body,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
body | yes |
The comment text. |
See also: GitHub Developer Guide documentation.
Delete a gist
octokit.rest.gists.delete({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
See also: GitHub Developer Guide documentation.
Delete a gist comment
octokit.rest.gists.deleteComment({
gist_id,
comment_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Fork a gist
Note: This was previously /gists/:gist_id/fork
.
octokit.rest.gists.fork({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
See also: GitHub Developer Guide documentation.
Get a gist
octokit.rest.gists.get({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
See also: GitHub Developer Guide documentation.
Get a gist comment
octokit.rest.gists.getComment({
gist_id,
comment_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Get a gist revision
octokit.rest.gists.getRevision({
gist_id,
sha,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
sha | yes |
See also: GitHub Developer Guide documentation.
List gists for the authenticated user
Lists the authenticated user's gists or if called anonymously, this endpoint returns all public gists:
octokit.rest.gists.list();
Parameters
name | required | description |
---|---|---|
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List gist comments
octokit.rest.gists.listComments({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List gist commits
octokit.rest.gists.listCommits({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List gists for a user
Lists public gists for the specified user:
octokit.rest.gists.listForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List gist forks
octokit.rest.gists.listForks({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public gists
List public gists sorted by most recently updated to least recently updated.
Note: With pagination, you can fetch up to 3000 gists. For example, you can fetch 100 pages with 30 gists per page or 30 pages with 100 gists per page.
octokit.rest.gists.listPublic();
Parameters
name | required | description |
---|---|---|
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List starred gists
List the authenticated user's starred gists:
octokit.rest.gists.listStarred();
Parameters
name | required | description |
---|---|---|
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Star a gist
Note that you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
octokit.rest.gists.star({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
See also: GitHub Developer Guide documentation.
Unstar a gist
octokit.rest.gists.unstar({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
See also: GitHub Developer Guide documentation.
Update a gist
Allows you to update or delete a gist file and rename gist files. Files from the previous version of the gist that aren't explicitly changed during an edit are unchanged.
octokit.rest.gists.update({
gist_id,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
description | no |
Description of the gist |
files | no |
Names of files to be updated |
files.* | no | |
files.*.content | no |
The new content of the file |
files.*.filename | no |
The new filename for the file |
See also: GitHub Developer Guide documentation.
Update a gist comment
octokit.rest.gists.updateComment({
gist_id,
comment_id,
body,
});
Parameters
name | required | description |
---|---|---|
gist_id | yes |
gist_id parameter |
comment_id | yes |
comment_id parameter |
body | yes |
The comment text. |
See also: GitHub Developer Guide documentation.
Git
Create a blob
octokit.rest.git.createBlob({
owner,
repo,
content,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
content | yes |
The new blob's content. |
encoding | no |
The encoding used for |
See also: GitHub Developer Guide documentation.
Create a commit
Creates a new Git commit object.
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.git.createCommit({
owner,
repo,
message,
tree,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
message | yes |
The commit message |
tree | yes |
The SHA of the tree object this commit points to |
parents | no |
The SHAs of the commits that were the parents of this commit. If omitted or empty, the commit will be written as a root commit. For a single parent, an array of one SHA should be provided; for a merge commit, an array of more than one should be provided. |
author | no |
Information about the author of the commit. By default, the |
author.name | no |
The name of the author (or committer) of the commit |
author.email | no |
The email of the author (or committer) of the commit |
author.date | no |
Indicates when this commit was authored (or committed). This is a timestamp in ISO 8601 format: |
committer | no |
Information about the person who is making the commit. By default, |
committer.name | no |
The name of the author (or committer) of the commit |
committer.email | no |
The email of the author (or committer) of the commit |
committer.date | no |
Indicates when this commit was authored (or committed). This is a timestamp in ISO 8601 format: |
signature | no |
The PGP signature of the commit. GitHub adds the signature to the |
See also: GitHub Developer Guide documentation.
Create a reference
Creates a reference for your repository. You are unable to create new references for empty repositories, even if the commit SHA-1 hash used exists. Empty repositories are repositories without branches.
octokit.rest.git.createRef({
owner,
repo,
ref,
sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
The name of the fully qualified reference (ie: |
sha | yes |
The SHA1 value for this reference. |
key | no |
See also: GitHub Developer Guide documentation.
Create a tag object
Note that creating a tag object does not create the reference that makes a tag in Git. If you want to create an annotated tag in Git, you have to do this call to create the tag object, and then create the refs/tags/[tag]
reference. If you want to create a lightweight tag, you only have to create the tag reference - this call would be unnecessary.
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.git.createTag({
owner,
repo,
tag,
message,
object,
type,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tag | yes |
The tag's name. This is typically a version (e.g., "v0.0.1"). |
message | yes |
The tag message. |
object | yes |
The SHA of the git object this is tagging. |
type | yes |
The type of the object we're tagging. Normally this is a |
tagger | no |
An object with information about the individual creating the tag. |
tagger.name | no |
The name of the author of the tag |
tagger.email | no |
The email of the author of the tag |
tagger.date | no |
When this object was tagged. This is a timestamp in ISO 8601 format: |
See also: GitHub Developer Guide documentation.
Create a tree
The tree creation API accepts nested entries. If you specify both a tree and a nested path modifying that tree, this endpoint will overwrite the contents of the tree with the new path contents, and create a new tree structure.
If you use this endpoint to add, delete, or modify the file contents in a tree, you will need to commit the tree and then update a branch to point to the commit. For more information see "Create a commit" and "Update a reference."
octokit.rest.git.createTree({
owner,
repo,
tree,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tree | yes |
Objects (of |
tree[].path | no |
The file referenced in the tree. |
tree[].mode | no |
The file mode; one of |
tree[].type | no |
Either |
tree[].sha | no |
The SHA1 checksum ID of the object in the tree. Also called Note: Use either |
tree[].content | no |
The content you want this file to have. GitHub will write this blob out and use that SHA for this entry. Use either this, or Note: Use either |
base_tree | no |
The SHA1 of an existing Git tree object which will be used as the base for the new tree. If provided, a new Git tree object will be created from entries in the Git tree object pointed to by |
See also: GitHub Developer Guide documentation.
Delete a reference
octokit.rest.git.deleteRef({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
See also: GitHub Developer Guide documentation.
Get a blob
The content
in the response will always be Base64 encoded.
Note: This API supports blobs up to 100 megabytes in size.
octokit.rest.git.getBlob({
owner,
repo,
file_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
file_sha | yes |
See also: GitHub Developer Guide documentation.
Get a commit
Gets a Git commit object.
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.git.getCommit({
owner,
repo,
commit_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
commit_sha | yes |
commit_sha parameter |
See also: GitHub Developer Guide documentation.
Get a reference
Returns a single reference from your Git database. The :ref
in the URL must be formatted as heads/<branch name>
for branches and tags/<tag name>
for tags. If the :ref
doesn't match an existing ref, a 404
is returned.
Note: You need to explicitly request a pull request to trigger a test merge commit, which checks the mergeability of pull requests. For more information, see "Checking mergeability of pull requests".
octokit.rest.git.getRef({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
See also: GitHub Developer Guide documentation.
Get a tag
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.git.getTag({
owner,
repo,
tag_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tag_sha | yes |
See also: GitHub Developer Guide documentation.
Get a tree
Returns a single tree using the SHA1 value for that tree.
If truncated
is true
in the response then the number of items in the tree
array exceeded our maximum limit. If you need to fetch more items, use the non-recursive method of fetching trees, and fetch one sub-tree at a time.
octokit.rest.git.getTree({
owner,
repo,
tree_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tree_sha | yes | |
recursive | no |
Setting this parameter to any value returns the objects or subtrees referenced by the tree specified in |
See also: GitHub Developer Guide documentation.
List matching references
Returns an array of references from your Git database that match the supplied name. The :ref
in the URL must be formatted as heads/<branch name>
for branches and tags/<tag name>
for tags. If the :ref
doesn't exist in the repository, but existing refs start with :ref
, they will be returned as an array.
When you use this endpoint without providing a :ref
, it will return an array of all the references from your Git database, including notes and stashes if they exist on the server. Anything in the namespace is returned, not just heads
and tags
.
Note: You need to explicitly request a pull request to trigger a test merge commit, which checks the mergeability of pull requests. For more information, see "Checking mergeability of pull requests".
If you request matching references for a branch named feature
but the branch feature
doesn't exist, the response can still include other matching head refs that start with the word feature
, such as featureA
and featureB
.
octokit.rest.git.listMatchingRefs({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Update a reference
octokit.rest.git.updateRef({
owner,
repo,
ref,
sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
sha | yes |
The SHA1 value to set this reference to |
force | no |
Indicates whether to force the update or to make sure the update is a fast-forward update. Leaving this out or setting it to |
See also: GitHub Developer Guide documentation.
Gitignore
Get all gitignore templates
List all templates available to pass as an option when creating a repository.
octokit.rest.gitignore.getAllTemplates();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get a gitignore template
The API also allows fetching the source of a single template. Use the raw media type to get the raw contents.
octokit.rest.gitignore.getTemplate({
name,
});
Parameters
name | required | description |
---|---|---|
name | yes |
See also: GitHub Developer Guide documentation.
Interactions
Get interaction restrictions for your public repositories
Shows which type of GitHub user can interact with your public repositories and when the restriction expires.
octokit.rest.interactions.getRestrictionsForAuthenticatedUser();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get interaction restrictions for an organization
Shows which type of GitHub user can interact with this organization and when the restriction expires. If there is no restrictions, you will see an empty response.
octokit.rest.interactions.getRestrictionsForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get interaction restrictions for a repository
Shows which type of GitHub user can interact with this repository and when the restriction expires. If there are no restrictions, you will see an empty response.
octokit.rest.interactions.getRestrictionsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get interaction restrictions for your public repositories
Deprecated: This method has been renamed to interactions.getRestrictionsForAuthenticatedUser
Shows which type of GitHub user can interact with your public repositories and when the restriction expires.
octokit.rest.interactions.getRestrictionsForYourPublicRepos();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Remove interaction restrictions from your public repositories
Removes any interaction restrictions from your public repositories.
octokit.rest.interactions.removeRestrictionsForAuthenticatedUser();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Remove interaction restrictions for an organization
Removes all interaction restrictions from public repositories in the given organization. You must be an organization owner to remove restrictions.
octokit.rest.interactions.removeRestrictionsForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Remove interaction restrictions for a repository
Removes all interaction restrictions from the given repository. You must have owner or admin access to remove restrictions. If the interaction limit is set for the user or organization that owns this repository, you will receive a 409 Conflict
response and will not be able to use this endpoint to change the interaction limit for a single repository.
octokit.rest.interactions.removeRestrictionsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Remove interaction restrictions from your public repositories
Deprecated: This method has been renamed to interactions.removeRestrictionsForAuthenticatedUser
Removes any interaction restrictions from your public repositories.
octokit.rest.interactions.removeRestrictionsForYourPublicRepos();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Set interaction restrictions for your public repositories
Temporarily restricts which type of GitHub user can interact with your public repositories. Setting the interaction limit at the user level will overwrite any interaction limits that are set for individual repositories owned by the user.
octokit.rest.interactions.setRestrictionsForAuthenticatedUser({
limit,
});
Parameters
name | required | description |
---|---|---|
limit | yes |
The type of GitHub user that can comment, open issues, or create pull requests while the interaction limit is in effect. Can be one of: |
expiry | no |
The duration of the interaction restriction. Can be one of: |
See also: GitHub Developer Guide documentation.
Set interaction restrictions for an organization
Temporarily restricts interactions to a certain type of GitHub user in any public repository in the given organization. You must be an organization owner to set these restrictions. Setting the interaction limit at the organization level will overwrite any interaction limits that are set for individual repositories owned by the organization.
octokit.rest.interactions.setRestrictionsForOrg({
org,
limit,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
limit | yes |
The type of GitHub user that can comment, open issues, or create pull requests while the interaction limit is in effect. Can be one of: |
expiry | no |
The duration of the interaction restriction. Can be one of: |
See also: GitHub Developer Guide documentation.
Set interaction restrictions for a repository
Temporarily restricts interactions to a certain type of GitHub user within the given repository. You must have owner or admin access to set these restrictions. If an interaction limit is set for the user or organization that owns this repository, you will receive a 409 Conflict
response and will not be able to use this endpoint to change the interaction limit for a single repository.
octokit.rest.interactions.setRestrictionsForRepo({
owner,
repo,
limit,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
limit | yes |
The type of GitHub user that can comment, open issues, or create pull requests while the interaction limit is in effect. Can be one of: |
expiry | no |
The duration of the interaction restriction. Can be one of: |
See also: GitHub Developer Guide documentation.
Set interaction restrictions for your public repositories
Deprecated: This method has been renamed to interactions.setRestrictionsForAuthenticatedUser
Temporarily restricts which type of GitHub user can interact with your public repositories. Setting the interaction limit at the user level will overwrite any interaction limits that are set for individual repositories owned by the user.
octokit.rest.interactions.setRestrictionsForYourPublicRepos({
limit,
});
Parameters
name | required | description |
---|---|---|
limit | yes |
The type of GitHub user that can comment, open issues, or create pull requests while the interaction limit is in effect. Can be one of: |
expiry | no |
The duration of the interaction restriction. Can be one of: |
See also: GitHub Developer Guide documentation.
Issues
Add assignees to an issue
Adds up to 10 assignees to an issue. Users already assigned to an issue are not replaced.
octokit.rest.issues.addAssignees({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
assignees | no |
Usernames of people to assign this issue to. NOTE: Only users with push access can add assignees to an issue. Assignees are silently ignored otherwise. |
See also: GitHub Developer Guide documentation.
Add labels to an issue
octokit.rest.issues.addLabels({
owner,
repo,
issue_number,
labels,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
labels | yes |
The name of the label to add to the issue. Must contain at least one label. Note: Alternatively, you can pass a single label as a |
See also: GitHub Developer Guide documentation.
Check if a user can be assigned
Checks if a user has permission to be assigned to an issue in this repository.
If the assignee
can be assigned to issues in the repository, a 204
header with no content is returned.
Otherwise a 404
status code is returned.
octokit.rest.issues.checkUserCanBeAssigned({
owner,
repo,
assignee,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
assignee | yes |
See also: GitHub Developer Guide documentation.
Create an issue
Any user with pull access to a repository can create an issue. If issues are disabled in the repository, the API returns a 410 Gone
status.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.issues.create({
owner,
repo,
title,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
title | yes |
The title of the issue. |
body | no |
The contents of the issue. |
assignee | no |
Login for the user that this issue should be assigned to. NOTE: Only users with push access can set the assignee for new issues. The assignee is silently dropped otherwise. This field is deprecated. |
milestone | no | |
labels | no |
Labels to associate with this issue. NOTE: Only users with push access can set labels for new issues. Labels are silently dropped otherwise. |
assignees | no |
Logins for Users to assign to this issue. NOTE: Only users with push access can set assignees for new issues. Assignees are silently dropped otherwise. |
See also: GitHub Developer Guide documentation.
Create an issue comment
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.issues.createComment({
owner,
repo,
issue_number,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
body | yes |
The contents of the comment. |
See also: GitHub Developer Guide documentation.
Create a label
octokit.rest.issues.createLabel({
owner,
repo,
name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | yes |
The name of the label. Emoji can be added to label names, using either native emoji or colon-style markup. For example, typing |
color | no |
The hexadecimal color code for the label, without the leading |
description | no |
A short description of the label. |
See also: GitHub Developer Guide documentation.
Create a milestone
octokit.rest.issues.createMilestone({
owner,
repo,
title,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
title | yes |
The title of the milestone. |
state | no |
The state of the milestone. Either |
description | no |
A description of the milestone. |
due_on | no |
The milestone due date. This is a timestamp in ISO 8601 format: |
See also: GitHub Developer Guide documentation.
Delete an issue comment
octokit.rest.issues.deleteComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Delete a label
octokit.rest.issues.deleteLabel({
owner,
repo,
name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | yes |
See also: GitHub Developer Guide documentation.
Delete a milestone
octokit.rest.issues.deleteMilestone({
owner,
repo,
milestone_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
milestone_number | yes |
milestone_number parameter |
See also: GitHub Developer Guide documentation.
Get an issue
The API returns a 301 Moved Permanently
status if the issue was
transferred to another repository. If
the issue was transferred to or deleted from a repository where the authenticated user lacks read access, the API
returns a 404 Not Found
status. If the issue was deleted from a repository where the authenticated user has read
access, the API returns a 410 Gone
status. To receive webhook events for transferred and deleted issues, subscribe
to the issues
webhook.
Note: GitHub's REST API v3 considers every pull request an issue, but not every issue is a pull request. For this
reason, "Issues" endpoints may return both issues and pull requests in the response. You can identify pull requests by
the pull_request
key. Be aware that the id
of a pull request returned from "Issues" endpoints will be an issue id. To find out the pull
request id, use the "List pull requests" endpoint.
octokit.rest.issues.get({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
See also: GitHub Developer Guide documentation.
Get an issue comment
octokit.rest.issues.getComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Get an issue event
octokit.rest.issues.getEvent({
owner,
repo,
event_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
event_id | yes |
See also: GitHub Developer Guide documentation.
Get a label
octokit.rest.issues.getLabel({
owner,
repo,
name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | yes |
See also: GitHub Developer Guide documentation.
Get a milestone
octokit.rest.issues.getMilestone({
owner,
repo,
milestone_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
milestone_number | yes |
milestone_number parameter |
See also: GitHub Developer Guide documentation.
List issues assigned to the authenticated user
List issues assigned to the authenticated user across all visible repositories including owned repositories, member
repositories, and organization repositories. You can use the filter
query parameter to fetch issues that are not
necessarily assigned to you.
Note: GitHub's REST API v3 considers every pull request an issue, but not every issue is a pull request. For this
reason, "Issues" endpoints may return both issues and pull requests in the response. You can identify pull requests by
the pull_request
key. Be aware that the id
of a pull request returned from "Issues" endpoints will be an issue id. To find out the pull
request id, use the "List pull requests" endpoint.
octokit.rest.issues.list();
Parameters
name | required | description |
---|---|---|
filter | no |
Indicates which sorts of issues to return. Can be one of: |
state | no |
Indicates the state of the issues to return. Can be either |
labels | no |
A list of comma separated label names. Example: |
sort | no |
What to sort results by. Can be either |
direction | no |
One of |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
collab | no | |
orgs | no | |
owned | no | |
pulls | no | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List assignees
Lists the available assignees for issues in a repository.
octokit.rest.issues.listAssignees({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List issue comments
Issue Comments are ordered by ascending ID.
octokit.rest.issues.listComments({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List issue comments for a repository
By default, Issue Comments are ordered by ascending ID.
octokit.rest.issues.listCommentsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sort | no |
One of |
direction | no |
Either |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List issue events
octokit.rest.issues.listEvents({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List issue events for a repository
octokit.rest.issues.listEventsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List timeline events for an issue
octokit.rest.issues.listEventsForTimeline({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List user account issues assigned to the authenticated user
List issues across owned and member repositories assigned to the authenticated user.
Note: GitHub's REST API v3 considers every pull request an issue, but not every issue is a pull request. For this
reason, "Issues" endpoints may return both issues and pull requests in the response. You can identify pull requests by
the pull_request
key. Be aware that the id
of a pull request returned from "Issues" endpoints will be an issue id. To find out the pull
request id, use the "List pull requests" endpoint.
octokit.rest.issues.listForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
filter | no |
Indicates which sorts of issues to return. Can be one of: |
state | no |
Indicates the state of the issues to return. Can be either |
labels | no |
A list of comma separated label names. Example: |
sort | no |
What to sort results by. Can be either |
direction | no |
One of |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization issues assigned to the authenticated user
List issues in an organization assigned to the authenticated user.
Note: GitHub's REST API v3 considers every pull request an issue, but not every issue is a pull request. For this
reason, "Issues" endpoints may return both issues and pull requests in the response. You can identify pull requests by
the pull_request
key. Be aware that the id
of a pull request returned from "Issues" endpoints will be an issue id. To find out the pull
request id, use the "List pull requests" endpoint.
octokit.rest.issues.listForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
filter | no |
Indicates which sorts of issues to return. Can be one of: |
state | no |
Indicates the state of the issues to return. Can be either |
labels | no |
A list of comma separated label names. Example: |
sort | no |
What to sort results by. Can be either |
direction | no |
One of |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository issues
List issues in a repository.
Note: GitHub's REST API v3 considers every pull request an issue, but not every issue is a pull request. For this
reason, "Issues" endpoints may return both issues and pull requests in the response. You can identify pull requests by
the pull_request
key. Be aware that the id
of a pull request returned from "Issues" endpoints will be an issue id. To find out the pull
request id, use the "List pull requests" endpoint.
octokit.rest.issues.listForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
milestone | no |
If an |
state | no |
Indicates the state of the issues to return. Can be either |
assignee | no |
Can be the name of a user. Pass in |
creator | no |
The user that created the issue. |
mentioned | no |
A user that's mentioned in the issue. |
labels | no |
A list of comma separated label names. Example: |
sort | no |
What to sort results by. Can be either |
direction | no |
One of |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List labels for issues in a milestone
octokit.rest.issues.listLabelsForMilestone({
owner,
repo,
milestone_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
milestone_number | yes |
milestone_number parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List labels for a repository
octokit.rest.issues.listLabelsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List labels for an issue
octokit.rest.issues.listLabelsOnIssue({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List milestones
octokit.rest.issues.listMilestones({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
state | no |
The state of the milestone. Either |
sort | no |
What to sort results by. Either |
direction | no |
The direction of the sort. Either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Lock an issue
Users with push access can lock an issue or pull request's conversation.
Note that, if you choose not to pass any parameters, you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
octokit.rest.issues.lock({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
lock_reason | no |
The reason for locking the issue or pull request conversation. Lock will fail if you don't use one of these reasons: |
See also: GitHub Developer Guide documentation.
Remove all labels from an issue
octokit.rest.issues.removeAllLabels({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
See also: GitHub Developer Guide documentation.
Remove assignees from an issue
Removes one or more assignees from an issue.
octokit.rest.issues.removeAssignees({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
assignees | no |
Usernames of assignees to remove from an issue. NOTE: Only users with push access can remove assignees from an issue. Assignees are silently ignored otherwise. |
See also: GitHub Developer Guide documentation.
Remove a label from an issue
Removes the specified label from the issue, and returns the remaining labels on the issue. This endpoint returns a 404 Not Found
status if the label does not exist.
octokit.rest.issues.removeLabel({
owner,
repo,
issue_number,
name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
name | yes |
See also: GitHub Developer Guide documentation.
Set labels for an issue
Removes any previous labels and sets the new labels for an issue.
octokit.rest.issues.setLabels({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
labels | no |
The names of the labels to add to the issue. You can pass an empty array to remove all labels. Note: Alternatively, you can pass a single label as a |
See also: GitHub Developer Guide documentation.
Unlock an issue
Users with push access can unlock an issue's conversation.
octokit.rest.issues.unlock({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
See also: GitHub Developer Guide documentation.
Update an issue
Issue owners and users with push access can edit an issue.
octokit.rest.issues.update({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
title | no |
The title of the issue. |
body | no |
The contents of the issue. |
assignee | no |
Login for the user that this issue should be assigned to. This field is deprecated. |
state | no |
State of the issue. Either |
milestone | no | |
labels | no |
Labels to associate with this issue. Pass one or more Labels to replace the set of Labels on this Issue. Send an empty array ( |
assignees | no |
Logins for Users to assign to this issue. Pass one or more user logins to replace the set of assignees on this Issue. Send an empty array ( |
See also: GitHub Developer Guide documentation.
Update an issue comment
octokit.rest.issues.updateComment({
owner,
repo,
comment_id,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
body | yes |
The contents of the comment. |
See also: GitHub Developer Guide documentation.
Update a label
octokit.rest.issues.updateLabel({
owner,
repo,
name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | yes | |
new_name | no |
The new name of the label. Emoji can be added to label names, using either native emoji or colon-style markup. For example, typing |
color | no |
The hexadecimal color code for the label, without the leading |
description | no |
A short description of the label. |
See also: GitHub Developer Guide documentation.
Update a milestone
octokit.rest.issues.updateMilestone({
owner,
repo,
milestone_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
milestone_number | yes |
milestone_number parameter |
title | no |
The title of the milestone. |
state | no |
The state of the milestone. Either |
description | no |
A description of the milestone. |
due_on | no |
The milestone due date. This is a timestamp in ISO 8601 format: |
See also: GitHub Developer Guide documentation.
Licenses
Get a license
octokit.rest.licenses.get({
license,
});
Parameters
name | required | description |
---|---|---|
license | yes |
See also: GitHub Developer Guide documentation.
Get all commonly used licenses
octokit.rest.licenses.getAllCommonlyUsed();
Parameters
name | required | description |
---|---|---|
featured | no | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Get the license for a repository
This method returns the contents of the repository's license file, if one is detected.
Similar to Get repository content, this method also supports custom media types for retrieving the raw license content or rendered license HTML.
octokit.rest.licenses.getForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Markdown
Render a Markdown document
octokit.rest.markdown.render({
text,
});
Parameters
name | required | description |
---|---|---|
text | yes |
The Markdown text to render in HTML. |
mode | no |
The rendering mode. |
context | no |
The repository context to use when creating references in |
See also: GitHub Developer Guide documentation.
Render a Markdown document in raw mode
You must send Markdown as plain text (using a Content-Type
header of text/plain
or text/x-markdown
) to this endpoint, rather than using JSON format. In raw mode, GitHub Flavored Markdown is not supported and Markdown will be rendered in plain format like a README.md file. Markdown content must be 400 KB or less.
octokit.rest.markdown.renderRaw({
data,
});
Parameters
name | required | description |
---|---|---|
data | yes |
raw markdown text |
See also: GitHub Developer Guide documentation.
Meta
Get GitHub meta information
Returns meta information about GitHub, including a list of GitHub's IP addresses. For more information, see "About GitHub's IP addresses."
Note: The IP addresses shown in the documentation's response are only example values. You must always query the API directly to get the latest list of IP addresses.
octokit.rest.meta.get();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get Octocat
Get the octocat as ASCII art
octokit.rest.meta.getOctocat();
Parameters
name | required | description |
---|---|---|
s | no |
The words to show in Octocat's speech bubble |
See also: GitHub Developer Guide documentation.
Get the Zen of GitHub
Get a random sentence from the Zen of GitHub
octokit.rest.meta.getZen();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
GitHub API Root
Get Hypermedia links to resources accessible in GitHub's REST API
octokit.rest.meta.root();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Migrations
Cancel an import
Stop an import for a repository.
octokit.rest.migrations.cancelImport({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Delete a user migration archive
Deletes a previous migration archive. Downloadable migration archives are automatically deleted after seven days. Migration metadata, which is returned in the List user migrations and Get a user migration status endpoints, will continue to be available even after an archive is deleted.
octokit.rest.migrations.deleteArchiveForAuthenticatedUser({
migration_id,
});
Parameters
name | required | description |
---|---|---|
migration_id | yes |
migration_id parameter |
See also: GitHub Developer Guide documentation.
Delete an organization migration archive
Deletes a previous migration archive. Migration archives are automatically deleted after seven days.
octokit.rest.migrations.deleteArchiveForOrg({
org,
migration_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
migration_id | yes |
migration_id parameter |
See also: GitHub Developer Guide documentation.
Download an organization migration archive
Fetches the URL to a migration archive.
octokit.rest.migrations.downloadArchiveForOrg({
org,
migration_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
migration_id | yes |
migration_id parameter |
See also: GitHub Developer Guide documentation.
Download a user migration archive
Fetches the URL to download the migration archive as a tar.gz
file. Depending on the resources your repository uses, the migration archive can contain JSON files with data for these objects:
- attachments
- bases
- commit_comments
- issue_comments
- issue_events
- issues
- milestones
- organizations
- projects
- protected_branches
- pullrequestreviews
- pull_requests
- releases
- repositories
- review_comments
- schema
- users
The archive will also contain an attachments
directory that includes all attachment files uploaded to GitHub.com and a repositories
directory that contains the repository's Git data.
octokit.rest.migrations.getArchiveForAuthenticatedUser({
migration_id,
});
Parameters
name | required | description |
---|---|---|
migration_id | yes |
migration_id parameter |
See also: GitHub Developer Guide documentation.
Get commit authors
Each type of source control system represents authors in a different way. For example, a Git commit author has a display name and an email address, but a Subversion commit author just has a username. The GitHub Importer will make the author information valid, but the author might not be correct. For example, it will change the bare Subversion username hubot
into something like hubot <hubot@12341234-abab-fefe-8787-fedcba987654>
.
This endpoint and the Map a commit author endpoint allow you to provide correct Git author information.
octokit.rest.migrations.getCommitAuthors({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
since | no |
A user ID. Only return users with an ID greater than this ID. |
See also: GitHub Developer Guide documentation.
Get an import status
View the progress of an import.
Import status
This section includes details about the possible values of the status
field of the Import Progress response.
An import that does not have errors will progress through these steps:
detecting
- the "detection" step of the import is in progress because the request did not include avcs
parameter. The import is identifying the type of source control present at the URL.importing
- the "raw" step of the import is in progress. This is where commit data is fetched from the original repository. The import progress response will includecommit_count
(the total number of raw commits that will be imported) andpercent
(0 - 100, the current progress through the import).mapping
- the "rewrite" step of the import is in progress. This is where SVN branches are converted to Git branches, and where author updates are applied. The import progress response does not include progress information.pushing
- the "push" step of the import is in progress. This is where the importer updates the repository on GitHub. The import progress response will includepush_percent
, which is the percent value reported bygit push
when it is "Writing objects".complete
- the import is complete, and the repository is ready on GitHub.
If there are problems, you will see one of these in the status
field:
auth_failed
- the import requires authentication in order to connect to the original repository. To update authentication for the import, please see the Update an import section.error
- the import encountered an error. The import progress response will include thefailed_step
and an error message. Contact GitHub Support or GitHub Premium Support for more information.detection_needs_auth
- the importer requires authentication for the originating repository to continue detection. To update authentication for the import, please see the Update an import section.detection_found_nothing
- the importer didn't recognize any source control at the URL. To resolve, Cancel the import and retry with the correct URL.detection_found_multiple
- the importer found several projects or repositories at the provided URL. When this is the case, the Import Progress response will also include aproject_choices
field with the possible project choices as values. To update project choice, please see the Update an import section.
The project_choices field
When multiple projects are found at the provided URL, the response hash will include a project_choices
field, the value of which is an array of hashes each representing a project choice. The exact key/value pairs of the project hashes will differ depending on the version control type.
Git LFS related fields
This section includes details about Git LFS related fields that may be present in the Import Progress response.
use_lfs
- describes whether the import has been opted in or out of using Git LFS. The value can beopt_in
,opt_out
, orundecided
if no action has been taken.has_large_files
- the boolean value describing whether files larger than 100MB were found during theimporting
step.large_files_size
- the total size in gigabytes of files larger than 100MB found in the originating repository.large_files_count
- the total number of files larger than 100MB found in the originating repository. To see a list of these files, make a "Get Large Files" request.
octokit.rest.migrations.getImportStatus({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get large files
List files larger than 100MB found during the import
octokit.rest.migrations.getLargeFiles({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a user migration status
Fetches a single user migration. The response includes the state
of the migration, which can be one of the following values:
pending
- the migration hasn't started yet.exporting
- the migration is in progress.exported
- the migration finished successfully.failed
- the migration failed.
Once the migration has been exported
you can download the migration archive.
octokit.rest.migrations.getStatusForAuthenticatedUser({
migration_id,
});
Parameters
name | required | description |
---|---|---|
migration_id | yes |
migration_id parameter |
exclude | no |
See also: GitHub Developer Guide documentation.
Get an organization migration status
Fetches the status of a migration.
The state
of a migration can be one of the following values:
pending
, which means the migration hasn't started yet.exporting
, which means the migration is in progress.exported
, which means the migration finished successfully.failed
, which means the migration failed.
octokit.rest.migrations.getStatusForOrg({
org,
migration_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
migration_id | yes |
migration_id parameter |
exclude | no |
Exclude attributes from the API response to improve performance |
See also: GitHub Developer Guide documentation.
List user migrations
Lists all migrations a user has started.
octokit.rest.migrations.listForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization migrations
Lists the most recent migrations.
octokit.rest.migrations.listForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
exclude | no |
Exclude attributes from the API response to improve performance |
See also: GitHub Developer Guide documentation.
List repositories in an organization migration
List all the repositories for this organization migration.
octokit.rest.migrations.listReposForOrg({
org,
migration_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
migration_id | yes |
migration_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories for a user migration
Lists all the repositories for this user migration.
octokit.rest.migrations.listReposForUser({
migration_id,
});
Parameters
name | required | description |
---|---|---|
migration_id | yes |
migration_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Map a commit author
Update an author's identity for the import. Your application can continue updating authors any time before you push new commits to the repository.
octokit.rest.migrations.mapCommitAuthor({
owner,
repo,
author_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
author_id | yes | |
no |
The new Git author email. | |
name | no |
The new Git author name. |
remote_id | no |
See also: GitHub Developer Guide documentation.
Update Git LFS preference
You can import repositories from Subversion, Mercurial, and TFS that include files larger than 100MB. This ability is powered by Git LFS. You can learn more about our LFS feature and working with large files on our help site.
octokit.rest.migrations.setLfsPreference({
owner,
repo,
use_lfs,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
use_lfs | yes |
Can be one of |
See also: GitHub Developer Guide documentation.
Start a user migration
Initiates the generation of a user migration archive.
octokit.rest.migrations.startForAuthenticatedUser({
repositories,
});
Parameters
name | required | description |
---|---|---|
lock_repositories | no |
Lock the repositories being migrated at the start of the migration |
exclude_attachments | no |
Do not include attachments in the migration |
exclude | no |
Exclude attributes from the API response to improve performance |
repositories | yes |
See also: GitHub Developer Guide documentation.
Start an organization migration
Initiates the generation of a migration archive.
octokit.rest.migrations.startForOrg({
org,
repositories,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
repositories | yes |
A list of arrays indicating which repositories should be migrated. |
lock_repositories | no |
Indicates whether repositories should be locked (to prevent manipulation) while migrating data. |
exclude_attachments | no |
Indicates whether attachments should be excluded from the migration (to reduce migration archive file size). |
exclude | no |
See also: GitHub Developer Guide documentation.
Start an import
Start a source import to a GitHub repository using GitHub Importer.
octokit.rest.migrations.startImport({
owner,
repo,
vcs_url,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
vcs_url | yes |
The URL of the originating repository. |
vcs | no |
The originating VCS type. Can be one of |
vcs_username | no |
If authentication is required, the username to provide to |
vcs_password | no |
If authentication is required, the password to provide to |
tfvc_project | no |
For a tfvc import, the name of the project that is being imported. |
See also: GitHub Developer Guide documentation.
Unlock a user repository
Unlocks a repository. You can lock repositories when you start a user migration. Once the migration is complete you can unlock each repository to begin using it again or delete the repository if you no longer need the source data. Returns a status of 404 Not Found
if the repository is not locked.
octokit.rest.migrations.unlockRepoForAuthenticatedUser({
migration_id,
repo_name,
});
Parameters
name | required | description |
---|---|---|
migration_id | yes |
migration_id parameter |
repo_name | yes |
repo_name parameter |
See also: GitHub Developer Guide documentation.
Unlock an organization repository
Unlocks a repository that was locked for migration. You should unlock each migrated repository and delete them when the migration is complete and you no longer need the source data.
octokit.rest.migrations.unlockRepoForOrg({
org,
migration_id,
repo_name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
migration_id | yes |
migration_id parameter |
repo_name | yes |
repo_name parameter |
See also: GitHub Developer Guide documentation.
Update an import
An import can be updated with credentials or a project choice by passing in the appropriate parameters in this API request. If no parameters are provided, the import will be restarted.
octokit.rest.migrations.updateImport({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
vcs_username | no |
The username to provide to the originating repository. |
vcs_password | no |
The password to provide to the originating repository. |
vcs | no | |
tfvc_project | no |
See also: GitHub Developer Guide documentation.
Orgs
Block a user from an organization
octokit.rest.orgs.blockUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Cancel an organization invitation
Cancel an organization invitation. In order to cancel an organization invitation, the authenticated user must be an organization owner.
This endpoint triggers notifications.
octokit.rest.orgs.cancelInvitation({
org,
invitation_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
invitation_id | yes |
invitation_id parameter |
See also: GitHub Developer Guide documentation.
Check if a user is blocked by an organization
octokit.rest.orgs.checkBlockedUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Check organization membership for a user
Check if a user is, publicly or privately, a member of the organization.
octokit.rest.orgs.checkMembershipForUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Check public organization membership for a user
octokit.rest.orgs.checkPublicMembershipForUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Convert an organization member to outside collaborator
When an organization member is converted to an outside collaborator, they'll only have access to the repositories that their current team membership allows. The user will no longer be a member of the organization. For more information, see "Converting an organization member to an outside collaborator".
octokit.rest.orgs.convertMemberToOutsideCollaborator({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Create an organization invitation
Invite people to an organization by using their GitHub user ID or their email address. In order to create invitations in an organization, the authenticated user must be an organization owner.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.orgs.createInvitation({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
invitee_id | no |
Required unless you provide |
no |
Required unless you provide | |
role | no |
Specify role for new member. Can be one of: |
team_ids | no |
Specify IDs for the teams you want to invite new members to. |
See also: GitHub Developer Guide documentation.
Create an organization webhook
Here's how you can create a hook that posts payloads in JSON format:
octokit.rest.orgs.createWebhook({
org,
name,
config,
config.url
})
Parameters
name | required | description |
---|---|---|
org | yes | |
name | yes |
Must be passed as "web". |
config | yes |
Key/value pairs to provide settings for this webhook. These are defined below. |
config.url | yes |
The URL to which the payloads will be delivered. |
config.content_type | no |
The media type used to serialize the payloads. Supported values include |
config.secret | no |
If provided, the |
config.insecure_ssl | no |
Determines whether the SSL certificate of the host for |
config.username | no | |
config.password | no | |
events | no |
Determines what events the hook is triggered for. |
active | no |
Determines if notifications are sent when the webhook is triggered. Set to |
See also: GitHub Developer Guide documentation.
Delete an organization webhook
octokit.rest.orgs.deleteWebhook({
org,
hook_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Get an organization
To see many of the organization response values, you need to be an authenticated organization owner with the admin:org
scope. When the value of two_factor_requirement_enabled
is true
, the organization requires all members, billing managers, and outside collaborators to enable two-factor authentication.
GitHub Apps with the Organization plan
permission can use this endpoint to retrieve information about an organization's GitHub plan. See "Authenticating with GitHub Apps" for details. For an example response, see 'Response with GitHub plan information' below."
octokit.rest.orgs.get({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get an organization membership for the authenticated user
octokit.rest.orgs.getMembershipForAuthenticatedUser({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
Get organization membership for a user
In order to get a user's membership with an organization, the authenticated user must be an organization member. The state
parameter in the response can be used to identify the user's membership status.
octokit.rest.orgs.getMembershipForUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Get an organization webhook
Returns a webhook configured in an organization. To get only the webhook config
properties, see "Get a webhook configuration for an organization."
octokit.rest.orgs.getWebhook({
org,
hook_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Get a webhook configuration for an organization
Returns the webhook configuration for an organization. To get more information about the webhook, including the active
state and events
, use "Get an organization webhook ."
Access tokens must have the admin:org_hook
scope, and GitHub Apps must have the organization_hooks:read
permission.
octokit.rest.orgs.getWebhookConfigForOrg({
org,
hook_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
List organizations
Lists all organizations, in the order that they were created on GitHub.
Note: Pagination is powered exclusively by the since
parameter. Use the Link header to get the URL for the next page of organizations.
octokit.rest.orgs.list();
Parameters
name | required | description |
---|---|---|
since | no |
An organization ID. Only return organizations with an ID greater than this ID. |
per_page | no |
Results per page (max 100). |
See also: GitHub Developer Guide documentation.
List app installations for an organization
Lists all GitHub Apps in an organization. The installation count includes all GitHub Apps installed on repositories in the organization. You must be an organization owner with admin:read
scope to use this endpoint.
octokit.rest.orgs.listAppInstallations({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List users blocked by an organization
List the users blocked by an organization.
octokit.rest.orgs.listBlockedUsers({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes |
See also: GitHub Developer Guide documentation.
List failed organization invitations
The return hash contains failed_at
and failed_reason
fields which represent the time at which the invitation failed and the reason for the failure.
octokit.rest.orgs.listFailedInvitations({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organizations for the authenticated user
List organizations for the authenticated user.
OAuth scope requirements
This only lists organizations that your authorization allows you to operate on in some way (e.g., you can list teams with read:org
scope, you can publicize your organization membership with user
scope, etc.). Therefore, this API requires at least user
or read:org
scope. OAuth requests with insufficient scope receive a 403 Forbidden
response.
octokit.rest.orgs.listForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organizations for a user
List public organization memberships for the specified user.
This method only lists public memberships, regardless of authentication. If you need to fetch all of the organization memberships (public and private) for the authenticated user, use the List organizations for the authenticated user API instead.
octokit.rest.orgs.listForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization invitation teams
List all teams associated with an invitation. In order to see invitations in an organization, the authenticated user must be an organization owner.
octokit.rest.orgs.listInvitationTeams({
org,
invitation_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
invitation_id | yes |
invitation_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization members
List all users who are members of an organization. If the authenticated user is also a member of this organization then both concealed and public members will be returned.
octokit.rest.orgs.listMembers({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
filter | no |
Filter members returned in the list. Can be one of: |
role | no |
Filter members returned by their role. Can be one of: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization memberships for the authenticated user
octokit.rest.orgs.listMembershipsForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
state | no |
Indicates the state of the memberships to return. Can be either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List outside collaborators for an organization
List all users who are outside collaborators of an organization.
octokit.rest.orgs.listOutsideCollaborators({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
filter | no |
Filter the list of outside collaborators. Can be one of: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List pending organization invitations
The return hash contains a role
field which refers to the Organization Invitation role and will be one of the following values: direct_member
, admin
, billing_manager
, hiring_manager
, or reinstate
. If the invitee is not a GitHub member, the login
field in the return hash will be null
.
octokit.rest.orgs.listPendingInvitations({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public organization members
Members of an organization can choose to have their membership publicized or not.
octokit.rest.orgs.listPublicMembers({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization webhooks
octokit.rest.orgs.listWebhooks({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Ping an organization webhook
This will trigger a ping event to be sent to the hook.
octokit.rest.orgs.pingWebhook({
org,
hook_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Remove an organization member
Removing a user from this list will remove them from all teams and they will no longer have any access to the organization's repositories.
octokit.rest.orgs.removeMember({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Remove organization membership for a user
In order to remove a user's membership with an organization, the authenticated user must be an organization owner.
If the specified user is an active member of the organization, this will remove them from the organization. If the specified user has been invited to the organization, this will cancel their invitation. The specified user will receive an email notification in both cases.
octokit.rest.orgs.removeMembershipForUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Remove outside collaborator from an organization
Removing a user from this list will remove them from all the organization's repositories.
octokit.rest.orgs.removeOutsideCollaborator({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Remove public organization membership for the authenticated user
octokit.rest.orgs.removePublicMembershipForAuthenticatedUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Set organization membership for a user
Only authenticated organization owners can add a member to the organization or update the member's role.
- If the authenticated user is adding a member to the organization, the invited user will receive an email inviting them to the organization. The user's membership status will be
pending
until they accept the invitation. - Authenticated users can update a user's membership by passing the
role
parameter. If the authenticated user changes a member's role toadmin
, the affected user will receive an email notifying them that they've been made an organization owner. If the authenticated user changes an owner's role tomember
, no email will be sent.
Rate limits
To prevent abuse, the authenticated user is limited to 50 organization invitations per 24 hour period. If the organization is more than one month old or on a paid plan, the limit is 500 invitations per 24 hour period.
octokit.rest.orgs.setMembershipForUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes | |
role | no |
The role to give the user in the organization. Can be one of: |
See also: GitHub Developer Guide documentation.
Set public organization membership for the authenticated user
The user can publicize their own membership. (A user cannot publicize the membership for another user.)
Note that you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
octokit.rest.orgs.setPublicMembershipForAuthenticatedUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Unblock a user from an organization
octokit.rest.orgs.unblockUser({
org,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Update an organization
Parameter Deprecation Notice: GitHub will replace and discontinue members_allowed_repository_creation_type
in favor of more granular permissions. The new input parameters are members_can_create_public_repositories
, members_can_create_private_repositories
for all organizations and members_can_create_internal_repositories
for organizations associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+. For more information, see the blog post.
Enables an authenticated organization owner with the admin:org
scope to update the organization's profile and member privileges.
octokit.rest.orgs.update({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
billing_email | no |
Billing email address. This address is not publicized. |
company | no |
The company name. |
no |
The publicly visible email address. | |
twitter_username | no |
The Twitter username of the company. |
location | no |
The location. |
name | no |
The shorthand name of the company. |
description | no |
The description of the company. |
has_organization_projects | no |
Toggles whether an organization can use organization projects. |
has_repository_projects | no |
Toggles whether repositories that belong to the organization can use repository projects. |
default_repository_permission | no |
Default permission level members have for organization repositories: |
members_can_create_repositories | no |
Toggles the ability of non-admin organization members to create repositories. Can be one of: |
members_can_create_internal_repositories | no |
Toggles whether organization members can create internal repositories, which are visible to all enterprise members. You can only allow members to create internal repositories if your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+. Can be one of: |
members_can_create_private_repositories | no |
Toggles whether organization members can create private repositories, which are visible to organization members with permission. Can be one of: |
members_can_create_public_repositories | no |
Toggles whether organization members can create public repositories, which are visible to anyone. Can be one of: |
members_allowed_repository_creation_type | no |
Specifies which types of repositories non-admin organization members can create. Can be one of: |
members_can_create_pages | no |
Toggles whether organization members can create GitHub Pages sites. Can be one of: |
members_can_create_public_pages | no |
Toggles whether organization members can create public GitHub Pages sites. Can be one of: |
members_can_create_private_pages | no |
Toggles whether organization members can create private GitHub Pages sites. Can be one of: |
blog | no |
See also: GitHub Developer Guide documentation.
Update an organization membership for the authenticated user
octokit.rest.orgs.updateMembershipForAuthenticatedUser({
org,
state,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
state | yes |
The state that the membership should be in. Only |
See also: GitHub Developer Guide documentation.
Update an organization webhook
Updates a webhook configured in an organization. When you update a webhook, the secret
will be overwritten. If you previously had a secret
set, you must provide the same secret
or set a new secret
or the secret will be removed. If you are only updating individual webhook config
properties, use "Update a webhook configuration for an organization."
octokit.rest.orgs.updateWebhook({
org,
hook_id,
config.url
})
Parameters
name | required | description |
---|---|---|
org | yes | |
hook_id | yes | |
config | no |
Key/value pairs to provide settings for this webhook. These are defined below. |
config.url | yes |
The URL to which the payloads will be delivered. |
config.content_type | no |
The media type used to serialize the payloads. Supported values include |
config.secret | no |
If provided, the |
config.insecure_ssl | no |
Determines whether the SSL certificate of the host for |
events | no |
Determines what events the hook is triggered for. |
active | no |
Determines if notifications are sent when the webhook is triggered. Set to |
name | no |
See also: GitHub Developer Guide documentation.
Update a webhook configuration for an organization
Updates the webhook configuration for an organization. To update more information about the webhook, including the active
state and events
, use "Update an organization webhook ."
Access tokens must have the admin:org_hook
scope, and GitHub Apps must have the organization_hooks:write
permission.
octokit.rest.orgs.updateWebhookConfigForOrg({
org,
hook_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
hook_id | yes | |
url | no |
The URL to which the payloads will be delivered. |
content_type | no |
The media type used to serialize the payloads. Supported values include |
secret | no |
If provided, the |
insecure_ssl | no |
Determines whether the SSL certificate of the host for |
See also: GitHub Developer Guide documentation.
Packages
Delete a package for the authenticated user
Deletes a package owned by the authenticated user. You cannot delete a public package if any version of the package has more than 25 downloads. In this scenario, contact GitHub support for further assistance.
To use this endpoint, you must authenticate using an access token with the packages:read
and packages:delete
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.deletePackageForAuthenticatedUser({
package_type,
package_name,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
See also: GitHub Developer Guide documentation.
Delete a package for an organization
Deletes an entire package in an organization. You cannot delete a public package if any version of the package has more than 25 downloads. In this scenario, contact GitHub support for further assistance.
To use this endpoint, you must have admin permissions in the organization and authenticate using an access token with the packages:read
scope. In addition:
- If
package_type
is notcontainer
, your token must also include therepo
scope. - If
package_type
iscontainer
, you must also have admin permissions to the container you want to delete.
octokit.rest.packages.deletePackageForOrg({
package_type,
package_name,
org,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes |
See also: GitHub Developer Guide documentation.
Delete a package version for the authenticated user
Deletes a specific package version for a package owned by the authenticated user. If the package is public and the package version has more than 25 downloads, you cannot delete the package version. In this scenario, contact GitHub support for further assistance.
To use this endpoint, you must have admin permissions in the organization and authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.deletePackageVersionForAuthenticatedUser({
package_type,
package_name,
package_version_id,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
package_version_id | yes |
Unique identifier of the package version. |
See also: GitHub Developer Guide documentation.
Delete package version for an organization
Deletes a specific package version in an organization. If the package is public and the package version has more than 25 downloads, you cannot delete the package version. In this scenario, contact GitHub support for further assistance.
To use this endpoint, you must have admin permissions in the organization and authenticate using an access token with the packages:read
scope. In addition:
- If
package_type
is notcontainer
, your token must also include therepo
scope. - If
package_type
iscontainer
, you must also have admin permissions to the container you want to delete.
octokit.rest.packages.deletePackageVersionForOrg({
package_type,
package_name,
org,
package_version_id,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes | |
package_version_id | yes |
Unique identifier of the package version. |
See also: GitHub Developer Guide documentation.
Get all package versions for a package owned by an organization
Deprecated: This method has been renamed to packages.getAllPackageVersionsForPackageOwnedByOrg
Returns all package versions for a package owned by an organization.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getAllPackageVersionsForAPackageOwnedByAnOrg({
package_type,
package_name,
org,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes | |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
state | no |
The state of the package, either active or deleted. |
See also: GitHub Developer Guide documentation.
Get all package versions for a package owned by the authenticated user
Deprecated: This method has been renamed to packages.getAllPackageVersionsForPackageOwnedByAuthenticatedUser
Returns all package versions for a package owned by the authenticated user.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getAllPackageVersionsForAPackageOwnedByTheAuthenticatedUser(
{
package_type,
package_name,
}
);
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
state | no |
The state of the package, either active or deleted. |
See also: GitHub Developer Guide documentation.
Get all package versions for a package owned by the authenticated user
Returns all package versions for a package owned by the authenticated user.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getAllPackageVersionsForPackageOwnedByAuthenticatedUser({
package_type,
package_name,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
state | no |
The state of the package, either active or deleted. |
See also: GitHub Developer Guide documentation.
Get all package versions for a package owned by an organization
Returns all package versions for a package owned by an organization.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getAllPackageVersionsForPackageOwnedByOrg({
package_type,
package_name,
org,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes | |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
state | no |
The state of the package, either active or deleted. |
See also: GitHub Developer Guide documentation.
Get all package versions for a package owned by a user
Returns all package versions for a public package owned by a specified user.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getAllPackageVersionsForPackageOwnedByUser({
package_type,
package_name,
username,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
username | yes |
See also: GitHub Developer Guide documentation.
Get a package for the authenticated user
Gets a specific package for a package owned by the authenticated user.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getPackageForAuthenticatedUser({
package_type,
package_name,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
See also: GitHub Developer Guide documentation.
Get a package for an organization
Gets a specific package in an organization.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getPackageForOrganization({
package_type,
package_name,
org,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes |
See also: GitHub Developer Guide documentation.
Get a package for a user
Gets a specific package metadata for a public package owned by a user.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getPackageForUser({
package_type,
package_name,
username,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
username | yes |
See also: GitHub Developer Guide documentation.
Get a package version for the authenticated user
Gets a specific package version for a package owned by the authenticated user.
To use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getPackageVersionForAuthenticatedUser({
package_type,
package_name,
package_version_id,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
package_version_id | yes |
Unique identifier of the package version. |
See also: GitHub Developer Guide documentation.
Get a package version for an organization
Gets a specific package version in an organization.
You must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getPackageVersionForOrganization({
package_type,
package_name,
org,
package_version_id,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes | |
package_version_id | yes |
Unique identifier of the package version. |
See also: GitHub Developer Guide documentation.
Get a package version for a user
Gets a specific package version for a public package owned by a specified user.
At this time, to use this endpoint, you must authenticate using an access token with the packages:read
scope.
If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.getPackageVersionForUser({
package_type,
package_name,
package_version_id,
username,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
package_version_id | yes |
Unique identifier of the package version. |
username | yes |
See also: GitHub Developer Guide documentation.
Restore a package for the authenticated user
Restores a package owned by the authenticated user.
You can restore a deleted package under the following conditions:
- The package was deleted within the last 30 days.
- The same package namespace and version is still available and not reused for a new package. If the same package namespace is not available, you will not be able to restore your package. In this scenario, to restore the deleted package, you must delete the new package that uses the deleted package's namespace first.
To use this endpoint, you must authenticate using an access token with the packages:read
and packages:write
scope. If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.restorePackageForAuthenticatedUser({
package_type,
package_name,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
token | no |
package token |
See also: GitHub Developer Guide documentation.
Restore a package for an organization
Restores an entire package in an organization.
You can restore a deleted package under the following conditions:
- The package was deleted within the last 30 days.
- The same package namespace and version is still available and not reused for a new package. If the same package namespace is not available, you will not be able to restore your package. In this scenario, to restore the deleted package, you must delete the new package that uses the deleted package's namespace first.
To use this endpoint, you must have admin permissions in the organization and authenticate using an access token with the packages:read
and packages:write
scope. In addition:
- If
package_type
is notcontainer
, your token must also include therepo
scope. - If
package_type
iscontainer
, you must also have admin permissions to the container that you want to restore.
octokit.rest.packages.restorePackageForOrg({
package_type,
package_name,
org,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes | |
token | no |
package token |
See also: GitHub Developer Guide documentation.
Restore a package version for the authenticated user
Restores a package version owned by the authenticated user.
You can restore a deleted package version under the following conditions:
- The package was deleted within the last 30 days.
- The same package namespace and version is still available and not reused for a new package. If the same package namespace is not available, you will not be able to restore your package. In this scenario, to restore the deleted package, you must delete the new package that uses the deleted package's namespace first.
To use this endpoint, you must authenticate using an access token with the packages:read
and packages:write
scope. If package_type
is not container
, your token must also include the repo
scope.
octokit.rest.packages.restorePackageVersionForAuthenticatedUser({
package_type,
package_name,
package_version_id,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
package_version_id | yes |
Unique identifier of the package version. |
See also: GitHub Developer Guide documentation.
Restore package version for an organization
Restores a specific package version in an organization.
You can restore a deleted package under the following conditions:
- The package was deleted within the last 30 days.
- The same package namespace and version is still available and not reused for a new package. If the same package namespace is not available, you will not be able to restore your package. In this scenario, to restore the deleted package, you must delete the new package that uses the deleted package's namespace first.
To use this endpoint, you must have admin permissions in the organization and authenticate using an access token with the packages:read
and packages:write
scope. In addition:
- If
package_type
is notcontainer
, your token must also include therepo
scope. - If
package_type
iscontainer
, you must also have admin permissions to the container that you want to restore.
octokit.rest.packages.restorePackageVersionForOrg({
package_type,
package_name,
org,
package_version_id,
});
Parameters
name | required | description |
---|---|---|
package_type | yes |
The type of supported package. Can be one of |
package_name | yes |
The name of the package. |
org | yes | |
package_version_id | yes |
Unique identifier of the package version. |
See also: GitHub Developer Guide documentation.
Projects
Add project collaborator
Adds a collaborator to an organization project and sets their permission level. You must be an organization owner or a project admin
to add a collaborator.
octokit.rest.projects.addCollaborator({
project_id,
username,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
username | yes | |
permission | no |
The permission to grant the collaborator. |
See also: GitHub Developer Guide documentation.
Create a project card
Note: GitHub's REST API v3 considers every pull request an issue, but not every issue is a pull request. For this reason, "Issues" endpoints may return both issues and pull requests in the response. You can identify pull requests by the pull_request
key.
Be aware that the id
of a pull request returned from "Issues" endpoints will be an issue id. To find out the pull request id, use the "List pull requests" endpoint.
octokit.rest.projects.createCard({
column_id,
note,
content_id,
content_type,
});
Parameters
name | required | description |
---|---|---|
column_id | yes |
column_id parameter |
note | yes |
The project card's note |
content_id | yes |
The unique identifier of the content associated with the card |
content_type | yes |
The piece of content associated with the card |
See also: GitHub Developer Guide documentation.
Create a project column
octokit.rest.projects.createColumn({
project_id,
name,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
name | yes |
Name of the project column |
See also: GitHub Developer Guide documentation.
Create a user project
octokit.rest.projects.createForAuthenticatedUser({
name,
});
Parameters
name | required | description |
---|---|---|
name | yes |
Name of the project |
body | no |
Body of the project |
See also: GitHub Developer Guide documentation.
Create an organization project
Creates an organization project board. Returns a 404 Not Found
status if projects are disabled in the organization. If you do not have sufficient privileges to perform this action, a 401 Unauthorized
or 410 Gone
status is returned.
octokit.rest.projects.createForOrg({
org,
name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
name | yes |
The name of the project. |
body | no |
The description of the project. |
See also: GitHub Developer Guide documentation.
Create a repository project
Creates a repository project board. Returns a 404 Not Found
status if projects are disabled in the repository. If you do not have sufficient privileges to perform this action, a 401 Unauthorized
or 410 Gone
status is returned.
octokit.rest.projects.createForRepo({
owner,
repo,
name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | yes |
The name of the project. |
body | no |
The description of the project. |
See also: GitHub Developer Guide documentation.
Delete a project
Deletes a project board. Returns a 404 Not Found
status if projects are disabled.
octokit.rest.projects.delete({
project_id,
});
Parameters
name | required | description |
---|---|---|
project_id | yes |
See also: GitHub Developer Guide documentation.
Delete a project card
octokit.rest.projects.deleteCard({
card_id,
});
Parameters
name | required | description |
---|---|---|
card_id | yes |
card_id parameter |
See also: GitHub Developer Guide documentation.
Delete a project column
octokit.rest.projects.deleteColumn({
column_id,
});
Parameters
name | required | description |
---|---|---|
column_id | yes |
column_id parameter |
See also: GitHub Developer Guide documentation.
Get a project
Gets a project by its id
. Returns a 404 Not Found
status if projects are disabled. If you do not have sufficient privileges to perform this action, a 401 Unauthorized
or 410 Gone
status is returned.
octokit.rest.projects.get({
project_id,
});
Parameters
name | required | description |
---|---|---|
project_id | yes |
See also: GitHub Developer Guide documentation.
Get a project card
octokit.rest.projects.getCard({
card_id,
});
Parameters
name | required | description |
---|---|---|
card_id | yes |
card_id parameter |
See also: GitHub Developer Guide documentation.
Get a project column
octokit.rest.projects.getColumn({
column_id,
});
Parameters
name | required | description |
---|---|---|
column_id | yes |
column_id parameter |
See also: GitHub Developer Guide documentation.
Get project permission for a user
Returns the collaborator's permission level for an organization project. Possible values for the permission
key: admin
, write
, read
, none
. You must be an organization owner or a project admin
to review a user's permission level.
octokit.rest.projects.getPermissionForUser({
project_id,
username,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
List project cards
octokit.rest.projects.listCards({
column_id,
});
Parameters
name | required | description |
---|---|---|
column_id | yes |
column_id parameter |
archived_state | no |
Filters the project cards that are returned by the card's state. Can be one of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List project collaborators
Lists the collaborators for an organization project. For a project, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners. You must be an organization owner or a project admin
to list collaborators.
octokit.rest.projects.listCollaborators({
project_id,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
affiliation | no |
Filters the collaborators by their affiliation. Can be one of: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List project columns
octokit.rest.projects.listColumns({
project_id,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List organization projects
Lists the projects in an organization. Returns a 404 Not Found
status if projects are disabled in the organization. If you do not have sufficient privileges to perform this action, a 401 Unauthorized
or 410 Gone
status is returned.
octokit.rest.projects.listForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
state | no |
Indicates the state of the projects to return. Can be either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository projects
Lists the projects in a repository. Returns a 404 Not Found
status if projects are disabled in the repository. If you do not have sufficient privileges to perform this action, a 401 Unauthorized
or 410 Gone
status is returned.
octokit.rest.projects.listForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
state | no |
Indicates the state of the projects to return. Can be either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List user projects
octokit.rest.projects.listForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
state | no |
Indicates the state of the projects to return. Can be either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Move a project card
octokit.rest.projects.moveCard({
card_id,
position,
});
Parameters
name | required | description |
---|---|---|
card_id | yes |
card_id parameter |
position | yes |
The position of the card in a column |
column_id | no |
The unique identifier of the column the card should be moved to |
See also: GitHub Developer Guide documentation.
Move a project column
octokit.rest.projects.moveColumn({
column_id,
position,
});
Parameters
name | required | description |
---|---|---|
column_id | yes |
column_id parameter |
position | yes |
The position of the column in a project |
See also: GitHub Developer Guide documentation.
Remove user as a collaborator
Removes a collaborator from an organization project. You must be an organization owner or a project admin
to remove a collaborator.
octokit.rest.projects.removeCollaborator({
project_id,
username,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Update a project
Updates a project board's information. Returns a 404 Not Found
status if projects are disabled. If you do not have sufficient privileges to perform this action, a 401 Unauthorized
or 410 Gone
status is returned.
octokit.rest.projects.update({
project_id,
});
Parameters
name | required | description |
---|---|---|
project_id | yes | |
name | no |
Name of the project |
body | no |
Body of the project |
state | no |
State of the project; either 'open' or 'closed' |
organization_permission | no |
The baseline permission that all organization members have on this project |
private | no |
Whether or not this project can be seen by everyone. |
See also: GitHub Developer Guide documentation.
Update an existing project card
octokit.rest.projects.updateCard({
card_id,
});
Parameters
name | required | description |
---|---|---|
card_id | yes |
card_id parameter |
note | no |
The project card's note |
archived | no |
Whether or not the card is archived |
See also: GitHub Developer Guide documentation.
Update an existing project column
octokit.rest.projects.updateColumn({
column_id,
name,
});
Parameters
name | required | description |
---|---|---|
column_id | yes |
column_id parameter |
name | yes |
Name of the project column |
See also: GitHub Developer Guide documentation.
Pulls
Check if a pull request has been merged
octokit.rest.pulls.checkIfMerged({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes |
See also: GitHub Developer Guide documentation.
Create a pull request
Draft pull requests are available in public repositories with GitHub Free and GitHub Free for organizations, GitHub Pro, and legacy per-repository billing plans, and in public and private repositories with GitHub Team and GitHub Enterprise Cloud. For more information, see GitHub's products in the GitHub Help documentation.
To open or update a pull request in a public repository, you must have write access to the head or the source branch. For organization-owned repositories, you must be a member of the organization that owns the repository to open or update a pull request.
You can create a new pull request.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.pulls.create({
owner,
repo,
head,
base,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
title | no |
The title of the new pull request. |
head | yes |
The name of the branch where your changes are implemented. For cross-repository pull requests in the same network, namespace |
base | yes |
The name of the branch you want the changes pulled into. This should be an existing branch on the current repository. You cannot submit a pull request to one repository that requests a merge to a base of another repository. |
body | no |
The contents of the pull request. |
maintainer_can_modify | no |
Indicates whether maintainers can modify the pull request. |
draft | no |
Indicates whether the pull request is a draft. See "Draft Pull Requests" in the GitHub Help documentation to learn more. |
issue | no |
See also: GitHub Developer Guide documentation.
Create a reply for a review comment
Creates a reply to a review comment for a pull request. For the comment_id
, provide the ID of the review comment you are replying to. This must be the ID of a top-level review comment, not a reply to that comment. Replies to replies are not supported.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.pulls.createReplyForReviewComment({
owner,
repo,
pull_number,
comment_id,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
comment_id | yes |
comment_id parameter |
body | yes |
The text of the review comment. |
See also: GitHub Developer Guide documentation.
Create a review for a pull request
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
Pull request reviews created in the PENDING
state do not include the submitted_at
property in the response.
Note: To comment on a specific line in a file, you need to first determine the position of that line in the diff. The GitHub REST API v3 offers the application/vnd.github.v3.diff
media type. To see a pull request diff, add this media type to the Accept
header of a call to the single pull request endpoint.
The position
value equals the number of lines down from the first "@@" hunk header in the file you want to add a comment. The line just below the "@@" line is position 1, the next line is position 2, and so on. The position in the diff continues to increase through lines of whitespace and additional hunks until the beginning of a new file.
octokit.rest.pulls.createReview({
owner,
repo,
pull_number,
comments[].path,
comments[].body
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
commit_id | no |
The SHA of the commit that needs a review. Not using the latest commit SHA may render your review comment outdated if a subsequent commit modifies the line you specify as the |
body | no |
Required when using |
event | no |
The review action you want to perform. The review actions include: |
comments | no |
Use the following table to specify the location, destination, and contents of the draft review comment. |
comments[].path | yes |
The relative path to the file that necessitates a review comment. |
comments[].position | no |
The position in the diff where you want to add a review comment. Note this value is not the same as the line number in the file. For help finding the position value, read the note below. |
comments[].body | yes |
Text of the review comment. |
comments[].line | no | |
comments[].side | no | |
comments[].start_line | no | |
comments[].start_side | no |
See also: GitHub Developer Guide documentation.
Create a review comment for a pull request
Creates a review comment in the pull request diff. To add a regular comment to a pull request timeline, see "Create an issue comment." We recommend creating a review comment using line
, side
, and optionally start_line
and start_side
if your comment applies to more than one line in the pull request diff.
You can still create a review comment using the position
parameter. When you use position
, the line
, side
, start_line
, and start_side
parameters are not required. For more information, see the comfort-fade
preview notice.
Note: The position value equals the number of lines down from the first "@@" hunk header in the file you want to add a comment. The line just below the "@@" line is position 1, the next line is position 2, and so on. The position in the diff continues to increase through lines of whitespace and additional hunks until the beginning of a new file.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.pulls.createReviewComment({
owner,
repo,
pull_number,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
body | yes |
The text of the review comment. |
commit_id | no |
The SHA of the commit needing a comment. Not using the latest commit SHA may render your comment outdated if a subsequent commit modifies the line you specify as the |
path | no |
The relative path to the file that necessitates a comment. |
position | no |
Required without |
side | no |
Required with |
line | no |
Required with |
start_line | no |
Required when using multi-line comments. To create multi-line comments, you must use the |
start_side | no |
Required when using multi-line comments. To create multi-line comments, you must use the |
in_reply_to | no |
See also: GitHub Developer Guide documentation.
Delete a pending review for a pull request
octokit.rest.pulls.deletePendingReview({
owner,
repo,
pull_number,
review_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
review_id | yes |
review_id parameter |
See also: GitHub Developer Guide documentation.
Delete a review comment for a pull request
Deletes a review comment.
octokit.rest.pulls.deleteReviewComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Dismiss a review for a pull request
Note: To dismiss a pull request review on a protected branch, you must be a repository administrator or be included in the list of people or teams who can dismiss pull request reviews.
octokit.rest.pulls.dismissReview({
owner,
repo,
pull_number,
review_id,
message,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
review_id | yes |
review_id parameter |
message | yes |
The message for the pull request review dismissal |
event | no |
See also: GitHub Developer Guide documentation.
Get a pull request
Draft pull requests are available in public repositories with GitHub Free and GitHub Free for organizations, GitHub Pro, and legacy per-repository billing plans, and in public and private repositories with GitHub Team and GitHub Enterprise Cloud. For more information, see GitHub's products in the GitHub Help documentation.
Lists details of a pull request by providing its number.
When you get, create, or edit a pull request, GitHub creates a merge commit to test whether the pull request can be automatically merged into the base branch. This test commit is not added to the base branch or the head branch. You can review the status of the test commit using the mergeable
key. For more information, see "Checking mergeability of pull requests".
The value of the mergeable
attribute can be true
, false
, or null
. If the value is null
, then GitHub has started a background job to compute the mergeability. After giving the job time to complete, resubmit the request. When the job finishes, you will see a non-null
value for the mergeable
attribute in the response. If mergeable
is true
, then merge_commit_sha
will be the SHA of the test merge commit.
The value of the merge_commit_sha
attribute changes depending on the state of the pull request. Before merging a pull request, the merge_commit_sha
attribute holds the SHA of the test merge commit. After merging a pull request, the merge_commit_sha
attribute changes depending on how you merged the pull request:
- If merged as a merge commit,
merge_commit_sha
represents the SHA of the merge commit. - If merged via a squash,
merge_commit_sha
represents the SHA of the squashed commit on the base branch. - If rebased,
merge_commit_sha
represents the commit that the base branch was updated to.
Pass the appropriate media type to fetch diff and patch formats.
octokit.rest.pulls.get({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes |
See also: GitHub Developer Guide documentation.
Get a review for a pull request
octokit.rest.pulls.getReview({
owner,
repo,
pull_number,
review_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
review_id | yes |
review_id parameter |
See also: GitHub Developer Guide documentation.
Get a review comment for a pull request
Provides details for a review comment.
octokit.rest.pulls.getReviewComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
List pull requests
Draft pull requests are available in public repositories with GitHub Free and GitHub Free for organizations, GitHub Pro, and legacy per-repository billing plans, and in public and private repositories with GitHub Team and GitHub Enterprise Cloud. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.pulls.list({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
state | no |
Either |
head | no |
Filter pulls by head user or head organization and branch name in the format of |
base | no |
Filter pulls by base branch name. Example: |
sort | no |
What to sort results by. Can be either |
direction | no |
The direction of the sort. Can be either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List comments for a pull request review
List comments for a specific pull request review.
octokit.rest.pulls.listCommentsForReview({
owner,
repo,
pull_number,
review_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
review_id | yes |
review_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List commits on a pull request
Lists a maximum of 250 commits for a pull request. To receive a complete commit list for pull requests with more than 250 commits, use the List commits endpoint.
octokit.rest.pulls.listCommits({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List pull requests files
Note: Responses include a maximum of 3000 files. The paginated response returns 30 files per page by default.
octokit.rest.pulls.listFiles({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List requested reviewers for a pull request
octokit.rest.pulls.listRequestedReviewers({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List review comments on a pull request
Lists all review comments for a pull request. By default, review comments are in ascending order by ID.
octokit.rest.pulls.listReviewComments({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
sort | no |
One of |
direction | no |
Can be either |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List review comments in a repository
Lists review comments for all pull requests in a repository. By default, review comments are in ascending order by ID.
octokit.rest.pulls.listReviewCommentsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sort | no | |
direction | no |
Can be either |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List reviews for a pull request
The list of reviews returns in chronological order.
octokit.rest.pulls.listReviews({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Merge a pull request
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.pulls.merge({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
commit_title | no |
Title for the automatic commit message. |
commit_message | no |
Extra detail to append to automatic commit message. |
sha | no |
SHA that pull request head must match to allow merge. |
merge_method | no |
Merge method to use. Possible values are |
See also: GitHub Developer Guide documentation.
Remove requested reviewers from a pull request
octokit.rest.pulls.removeRequestedReviewers({
owner,
repo,
pull_number,
reviewers,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
reviewers | yes |
An array of user |
team_reviewers | no |
An array of team |
See also: GitHub Developer Guide documentation.
Request reviewers for a pull request
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.pulls.requestReviewers({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
reviewers | no |
An array of user |
team_reviewers | no |
An array of team |
See also: GitHub Developer Guide documentation.
Submit a review for a pull request
octokit.rest.pulls.submitReview({
owner,
repo,
pull_number,
review_id,
event,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
review_id | yes |
review_id parameter |
body | no |
The body text of the pull request review |
event | yes |
The review action you want to perform. The review actions include: |
See also: GitHub Developer Guide documentation.
Update a pull request
Draft pull requests are available in public repositories with GitHub Free and GitHub Free for organizations, GitHub Pro, and legacy per-repository billing plans, and in public and private repositories with GitHub Team and GitHub Enterprise Cloud. For more information, see GitHub's products in the GitHub Help documentation.
To open or update a pull request in a public repository, you must have write access to the head or the source branch. For organization-owned repositories, you must be a member of the organization that owns the repository to open or update a pull request.
octokit.rest.pulls.update({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
title | no |
The title of the pull request. |
body | no |
The contents of the pull request. |
state | no |
State of this Pull Request. Either |
base | no |
The name of the branch you want your changes pulled into. This should be an existing branch on the current repository. You cannot update the base branch on a pull request to point to another repository. |
maintainer_can_modify | no |
Indicates whether maintainers can modify the pull request. |
See also: GitHub Developer Guide documentation.
Update a pull request branch
Updates the pull request branch with the latest upstream changes by merging HEAD from the base branch into the pull request branch.
octokit.rest.pulls.updateBranch({
owner,
repo,
pull_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
expected_head_sha | no |
The expected SHA of the pull request's HEAD ref. This is the most recent commit on the pull request's branch. If the expected SHA does not match the pull request's HEAD, you will receive a |
See also: GitHub Developer Guide documentation.
Update a review for a pull request
Update the review summary comment with new text.
octokit.rest.pulls.updateReview({
owner,
repo,
pull_number,
review_id,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
pull_number | yes | |
review_id | yes |
review_id parameter |
body | yes |
The body text of the pull request review. |
See also: GitHub Developer Guide documentation.
Update a review comment for a pull request
Enables you to edit a review comment.
octokit.rest.pulls.updateReviewComment({
owner,
repo,
comment_id,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
body | yes |
The text of the reply to the review comment. |
See also: GitHub Developer Guide documentation.
Rate-Limit
Get rate limit status for the authenticated user
Note: Accessing this endpoint does not count against your REST API rate limit.
Note: The rate
object is deprecated. If you're writing new API client code or updating existing code, you should use the core
object instead of the rate
object. The core
object contains the same information that is present in the rate
object.
octokit.rest.rateLimit.get();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Reactions
Create reaction for a commit comment
Create a reaction to a commit comment. A response with a Status: 200 OK
means that you already added the reaction type to this commit comment.
octokit.rest.reactions.createForCommitComment({
owner,
repo,
comment_id,
content,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
content | yes |
The reaction type to add to the commit comment. |
See also: GitHub Developer Guide documentation.
Create reaction for an issue
Create a reaction to an issue. A response with a Status: 200 OK
means that you already added the reaction type to this issue.
octokit.rest.reactions.createForIssue({
owner,
repo,
issue_number,
content,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
content | yes |
The reaction type to add to the issue. |
See also: GitHub Developer Guide documentation.
Create reaction for an issue comment
Create a reaction to an issue comment. A response with a Status: 200 OK
means that you already added the reaction type to this issue comment.
octokit.rest.reactions.createForIssueComment({
owner,
repo,
comment_id,
content,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
content | yes |
The reaction type to add to the issue comment. |
See also: GitHub Developer Guide documentation.
Create reaction for a pull request review comment
Create a reaction to a pull request review comment. A response with a Status: 200 OK
means that you already added the reaction type to this pull request review comment.
octokit.rest.reactions.createForPullRequestReviewComment({
owner,
repo,
comment_id,
content,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
content | yes |
The reaction type to add to the pull request review comment. |
See also: GitHub Developer Guide documentation.
Create reaction for a team discussion comment
Create a reaction to a team discussion comment. OAuth access tokens require the write:discussion
scope. A response with a Status: 200 OK
means that you already added the reaction type to this team discussion comment.
Note: You can also specify a team by org_id
and team_id
using the route POST /organizations/:org_id/team/:team_id/discussions/:discussion_number/comments/:comment_number/reactions
.
octokit.rest.reactions.createForTeamDiscussionCommentInOrg({
org,
team_slug,
discussion_number,
comment_number,
content,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
comment_number | yes | |
content | yes |
The reaction type to add to the team discussion comment. |
See also: GitHub Developer Guide documentation.
Create reaction for a team discussion
Create a reaction to a team discussion. OAuth access tokens require the write:discussion
scope. A response with a Status: 200 OK
means that you already added the reaction type to this team discussion.
Note: You can also specify a team by org_id
and team_id
using the route POST /organizations/:org_id/team/:team_id/discussions/:discussion_number/reactions
.
octokit.rest.reactions.createForTeamDiscussionInOrg({
org,
team_slug,
discussion_number,
content,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
content | yes |
The reaction type to add to the team discussion. |
See also: GitHub Developer Guide documentation.
Delete a commit comment reaction
Note: You can also specify a repository by repository_id
using the route DELETE /repositories/:repository_id/comments/:comment_id/reactions/:reaction_id
.
Delete a reaction to a commit comment.
octokit.rest.reactions.deleteForCommitComment({
owner,
repo,
comment_id,
reaction_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
reaction_id | yes |
See also: GitHub Developer Guide documentation.
Delete an issue reaction
Note: You can also specify a repository by repository_id
using the route DELETE /repositories/:repository_id/issues/:issue_number/reactions/:reaction_id
.
Delete a reaction to an issue.
octokit.rest.reactions.deleteForIssue({
owner,
repo,
issue_number,
reaction_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
reaction_id | yes |
See also: GitHub Developer Guide documentation.
Delete an issue comment reaction
Note: You can also specify a repository by repository_id
using the route DELETE delete /repositories/:repository_id/issues/comments/:comment_id/reactions/:reaction_id
.
Delete a reaction to an issue comment.
octokit.rest.reactions.deleteForIssueComment({
owner,
repo,
comment_id,
reaction_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
reaction_id | yes |
See also: GitHub Developer Guide documentation.
Delete a pull request comment reaction
Note: You can also specify a repository by repository_id
using the route DELETE /repositories/:repository_id/pulls/comments/:comment_id/reactions/:reaction_id.
Delete a reaction to a pull request review comment.
octokit.rest.reactions.deleteForPullRequestComment({
owner,
repo,
comment_id,
reaction_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
reaction_id | yes |
See also: GitHub Developer Guide documentation.
Delete team discussion reaction
Note: You can also specify a team or organization with team_id
and org_id
using the route DELETE /organizations/:org_id/team/:team_id/discussions/:discussion_number/reactions/:reaction_id
.
Delete a reaction to a team discussion. OAuth access tokens require the write:discussion
scope.
octokit.rest.reactions.deleteForTeamDiscussion({
org,
team_slug,
discussion_number,
reaction_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
reaction_id | yes |
See also: GitHub Developer Guide documentation.
Delete team discussion comment reaction
Note: You can also specify a team or organization with team_id
and org_id
using the route DELETE /organizations/:org_id/team/:team_id/discussions/:discussion_number/comments/:comment_number/reactions/:reaction_id
.
Delete a reaction to a team discussion comment. OAuth access tokens require the write:discussion
scope.
octokit.rest.reactions.deleteForTeamDiscussionComment({
org,
team_slug,
discussion_number,
comment_number,
reaction_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
comment_number | yes | |
reaction_id | yes |
See also: GitHub Developer Guide documentation.
Delete a reaction (Legacy)
This method is deprecated.
Deprecation Notice: This endpoint route is deprecated and will be removed from the Reactions API. We recommend migrating your existing code to use the new delete reactions endpoints. For more information, see this blog post.
OAuth access tokens require the write:discussion
scope, when deleting a team discussion or team discussion comment.
octokit.rest.reactions.deleteLegacy({
reaction_id,
});
Parameters
name | required | description |
---|---|---|
reaction_id | yes |
See also: GitHub Developer Guide documentation.
List reactions for a commit comment
List the reactions to a commit comment.
octokit.rest.reactions.listForCommitComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
content | no |
Returns a single reaction type. Omit this parameter to list all reactions to a commit comment. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List reactions for an issue
List the reactions to an issue.
octokit.rest.reactions.listForIssue({
owner,
repo,
issue_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
issue_number | yes |
issue_number parameter |
content | no |
Returns a single reaction type. Omit this parameter to list all reactions to an issue. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List reactions for an issue comment
List the reactions to an issue comment.
octokit.rest.reactions.listForIssueComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
content | no |
Returns a single reaction type. Omit this parameter to list all reactions to an issue comment. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List reactions for a pull request review comment
List the reactions to a pull request review comment.
octokit.rest.reactions.listForPullRequestReviewComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
content | no |
Returns a single reaction type. Omit this parameter to list all reactions to a pull request review comment. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List reactions for a team discussion comment
List the reactions to a team discussion comment. OAuth access tokens require the read:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/:org_id/team/:team_id/discussions/:discussion_number/comments/:comment_number/reactions
.
octokit.rest.reactions.listForTeamDiscussionCommentInOrg({
org,
team_slug,
discussion_number,
comment_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
comment_number | yes | |
content | no |
Returns a single reaction type. Omit this parameter to list all reactions to a team discussion comment. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List reactions for a team discussion
List the reactions to a team discussion. OAuth access tokens require the read:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/:org_id/team/:team_id/discussions/:discussion_number/reactions
.
octokit.rest.reactions.listForTeamDiscussionInOrg({
org,
team_slug,
discussion_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
content | no |
Returns a single reaction type. Omit this parameter to list all reactions to a team discussion. |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Repos
Accept a repository invitation
octokit.rest.repos.acceptInvitation({
invitation_id,
});
Parameters
name | required | description |
---|---|---|
invitation_id | yes |
invitation_id parameter |
See also: GitHub Developer Guide documentation.
Add app access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Grants the specified apps push access for this branch. Only installed GitHub Apps with write
access to the contents
permission can be added as authorized actors on a protected branch.
Type | Description |
---|---|
array |
The GitHub Apps that have push access to this branch. Use the app's slug . Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.addAppAccessRestrictions({
owner,
repo,
branch,
apps,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
apps | yes |
See also: GitHub Developer Guide documentation.
Add a repository collaborator
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
For more information the permission levels, see "Repository permission levels for an organization".
Note that, if you choose not to pass any parameters, you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
The invitee will receive a notification that they have been invited to the repository, which they must accept or decline. They may do this via the notifications page, the email they receive, or by using the repository invitations API endpoints.
Rate limits
To prevent abuse, you are limited to sending 50 invitations to a repository per 24 hour period. Note there is no limit if you are inviting organization members to an organization repository.
octokit.rest.repos.addCollaborator({
owner,
repo,
username,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
username | yes | |
permission | no |
The permission to grant the collaborator. Only valid on organization-owned repositories. Can be one of: |
permissions | no |
See also: GitHub Developer Guide documentation.
Add status check contexts
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.addStatusCheckContexts({
owner,
repo,
branch,
contexts,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
contexts | yes |
See also: GitHub Developer Guide documentation.
Add team access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Grants the specified teams push access for this branch. You can also give push access to child teams.
Type | Description |
---|---|
array |
The teams that can have push access. Use the team's slug . Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.addTeamAccessRestrictions({
owner,
repo,
branch,
teams,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
teams | yes |
See also: GitHub Developer Guide documentation.
Add user access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Grants the specified people push access for this branch.
Type | Description |
---|---|
array |
Usernames for people who can have push access. Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.addUserAccessRestrictions({
owner,
repo,
branch,
users,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
users | yes |
See also: GitHub Developer Guide documentation.
Check if a user is a repository collaborator
For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.
Team members will include the members of child teams.
octokit.rest.repos.checkCollaborator({
owner,
repo,
username,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Check if vulnerability alerts are enabled for a repository
Shows whether dependency alerts are enabled or disabled for a repository. The authenticated user must have admin access to the repository. For more information, see "About security alerts for vulnerable dependencies".
octokit.rest.repos.checkVulnerabilityAlerts({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Compare two commits
Both :base
and :head
must be branch names in :repo
. To compare branches across other repositories in the same network as :repo
, use the format <USERNAME>:branch
.
The response from the API is equivalent to running the git log base..head
command; however, commits are returned in chronological order. Pass the appropriate media type to fetch diff and patch formats.
The response also includes details on the files that were changed between the two commits. This includes the status of the change (for example, if a file was added, removed, modified, or renamed), and details of the change itself. For example, files with a renamed
status have a previous_filename
field showing the previous filename of the file, and files with a modified
status have a patch
field showing the changes made to the file.
Working with large comparisons
To process a response with a large number of commits, you can use (per_page
or page
) to paginate the results. When using paging, the list of changed files is only returned with page 1, but includes all changed files for the entire comparison. For more information on working with pagination, see "Traversing with pagination."
When calling this API without any paging parameters (per_page
or page
), the returned list is limited to 250 commits and the last commit in the list is the most recent of the entire comparison. When a paging parameter is specified, the first commit in the returned list of each page is the earliest.
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.repos.compareCommits({
owner,
repo,
base,
head,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
base | yes | |
head | yes | |
per_page | no |
Results per page. |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Create a commit comment
Create a comment for a commit using its :commit_sha
.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.repos.createCommitComment({
owner,
repo,
commit_sha,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
commit_sha | yes |
commit_sha parameter |
body | yes |
The contents of the comment. |
path | no |
Relative path of the file to comment on. |
position | no |
Line index in the diff to comment on. |
line | no |
Deprecated. Use position parameter instead. Line number in the file to comment on. |
See also: GitHub Developer Guide documentation.
Create commit signature protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
When authenticated with admin or owner permissions to the repository, you can use this endpoint to require signed commits on a branch. You must enable branch protection to require signed commits.
octokit.rest.repos.createCommitSignatureProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Create a commit status
Users with push access in a repository can create commit statuses for a given SHA.
Note: there is a limit of 1000 statuses per sha
and context
within a repository. Attempts to create more than 1000 statuses will result in a validation error.
octokit.rest.repos.createCommitStatus({
owner,
repo,
sha,
state,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sha | yes | |
state | yes |
The state of the status. Can be one of |
target_url | no |
The target URL to associate with this status. This URL will be linked from the GitHub UI to allow users to easily see the source of the status. |
description | no |
A short description of the status. |
context | no |
A string label to differentiate this status from the status of other systems. This field is case-insensitive. |
See also: GitHub Developer Guide documentation.
Create a deploy key
You can create a read-only deploy key.
octokit.rest.repos.createDeployKey({
owner,
repo,
key,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
title | no |
A name for the key. |
key | yes |
The contents of the key. |
read_only | no |
If Deploy keys with write access can perform the same actions as an organization member with admin access, or a collaborator on a personal repository. For more information, see "Repository permission levels for an organization" and "Permission levels for a user account repository." |
See also: GitHub Developer Guide documentation.
Create a deployment
Deployments offer a few configurable parameters with certain defaults.
The ref
parameter can be any named branch, tag, or SHA. At GitHub we often deploy branches and verify them
before we merge a pull request.
The environment
parameter allows deployments to be issued to different runtime environments. Teams often have
multiple environments for verifying their applications, such as production
, staging
, and qa
. This parameter
makes it easier to track which environments have requested deployments. The default environment is production
.
The auto_merge
parameter is used to ensure that the requested ref is not behind the repository's default branch. If
the ref is behind the default branch for the repository, we will attempt to merge it for you. If the merge succeeds,
the API will return a successful merge commit. If merge conflicts prevent the merge from succeeding, the API will
return a failure response.
By default, commit statuses for every submitted context must be in a success
state. The required_contexts
parameter allows you to specify a subset of contexts that must be success
, or to
specify contexts that have not yet been submitted. You are not required to use commit statuses to deploy. If you do
not require any contexts or create any commit statuses, the deployment will always succeed.
The payload
parameter is available for any extra information that a deployment system might need. It is a JSON text
field that will be passed on when a deployment event is dispatched.
The task
parameter is used by the deployment system to allow different execution paths. In the web world this might
be deploy:migrations
to run schema changes on the system. In the compiled world this could be a flag to compile an
application with debugging enabled.
Users with repo
or repo_deployment
scopes can create a deployment for a given ref.
Merged branch response
You will see this response when GitHub automatically merges the base branch into the topic branch instead of creating a deployment. This auto-merge happens when:
- Auto-merge option is enabled in the repository
- Topic branch does not include the latest changes on the base branch, which is
master
in the response example - There are no merge conflicts
If there are no new commits in the base branch, a new request to create a deployment should give a successful response.
Merge conflict response
This error happens when the auto_merge
option is enabled and when the default branch (in this case master
), can't
be merged into the branch that's being deployed (in this case topic-branch
), due to merge conflicts.
Failed commit status checks
This error happens when the required_contexts
parameter indicates that one or more contexts need to have a success
status for the commit to be deployed, but one or more of the required contexts do not have a state of success
.
octokit.rest.repos.createDeployment({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
The ref to deploy. This can be a branch, tag, or SHA. |
task | no |
Specifies a task to execute (e.g., |
auto_merge | no |
Attempts to automatically merge the default branch into the requested ref, if it's behind the default branch. |
required_contexts | no |
The status contexts to verify against commit status checks. If you omit this parameter, GitHub verifies all unique contexts before creating a deployment. To bypass checking entirely, pass an empty array. Defaults to all unique contexts. |
payload | no | |
environment | no |
Name for the target deployment environment (e.g., |
description | no |
Short description of the deployment. |
transient_environment | no |
Specifies if the given environment is specific to the deployment and will no longer exist at some point in the future. Default: |
production_environment | no |
Specifies if the given environment is one that end-users directly interact with. Default: |
created_at | no |
See also: GitHub Developer Guide documentation.
Create a deployment status
Users with push
access can create deployment statuses for a given deployment.
GitHub Apps require read & write
access to "Deployments" and read-only
access to "Repo contents" (for private repos). OAuth Apps require the repo_deployment
scope.
octokit.rest.repos.createDeploymentStatus({
owner,
repo,
deployment_id,
state,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
deployment_id | yes |
deployment_id parameter |
state | yes |
The state of the status. Can be one of |
target_url | no |
The target URL to associate with this status. This URL should contain output to keep the user updated while the task is running or serve as historical information for what happened in the deployment. Note: It's recommended to use the |
log_url | no |
The full URL of the deployment's output. This parameter replaces |
description | no |
A short description of the status. The maximum description length is 140 characters. |
environment | no |
Name for the target deployment environment, which can be changed when setting a deploy status. For example, |
environment_url | no |
Sets the URL for accessing your environment. Default: |
auto_inactive | no |
Adds a new |
See also: GitHub Developer Guide documentation.
Create a repository dispatch event
You can use this endpoint to trigger a webhook event called repository_dispatch
when you want activity that happens outside of GitHub to trigger a GitHub Actions workflow or GitHub App webhook. You must configure your GitHub Actions workflow or GitHub App to run when the repository_dispatch
event occurs. For an example repository_dispatch
webhook payload, see "RepositoryDispatchEvent."
The client_payload
parameter is available for any extra information that your workflow might need. This parameter is a JSON payload that will be passed on when the webhook event is dispatched. For example, the client_payload
can include a message that a user would like to send using a GitHub Actions workflow. Or the client_payload
can be used as a test to debug your workflow.
This endpoint requires write access to the repository by providing either:
- Personal access tokens with
repo
scope. For more information, see "Creating a personal access token for the command line" in the GitHub Help documentation. - GitHub Apps with both
metadata:read
andcontents:read&write
permissions.
This input example shows how you can use the client_payload
as a test to debug your workflow.
octokit.rest.repos.createDispatchEvent({
owner,
repo,
event_type,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
event_type | yes |
A custom webhook event name. |
client_payload | no |
JSON payload with extra information about the webhook event that your action or worklow may use. |
client_payload.* | no |
See also: GitHub Developer Guide documentation.
Create a repository for the authenticated user
Creates a new repository for the authenticated user.
OAuth scope requirements
When using OAuth, authorizations must include:
public_repo
scope orrepo
scope to create a public repository. Note: For GitHub AE, userepo
scope to create an internal repository.repo
scope to create a private repository.
octokit.rest.repos.createForAuthenticatedUser({
name,
});
Parameters
name | required | description |
---|---|---|
name | yes |
The name of the repository. |
description | no |
A short description of the repository. |
homepage | no |
A URL with more information about the repository. |
private | no |
Whether the repository is private. |
has_issues | no |
Whether issues are enabled. |
has_projects | no |
Whether projects are enabled. |
has_wiki | no |
Whether the wiki is enabled. |
team_id | no |
The id of the team that will be granted access to this repository. This is only valid when creating a repository in an organization. |
auto_init | no |
Whether the repository is initialized with a minimal README. |
gitignore_template | no |
The desired language or platform to apply to the .gitignore. |
license_template | no |
The license keyword of the open source license for this repository. |
allow_squash_merge | no |
Whether to allow squash merges for pull requests. |
allow_merge_commit | no |
Whether to allow merge commits for pull requests. |
allow_rebase_merge | no |
Whether to allow rebase merges for pull requests. |
delete_branch_on_merge | no |
Whether to delete head branches when pull requests are merged |
has_downloads | no |
Whether downloads are enabled. |
is_template | no |
Whether this repository acts as a template that can be used to generate new repositories. |
See also: GitHub Developer Guide documentation.
Create a fork
Create a fork for the authenticated user.
Note: Forking a Repository happens asynchronously. You may have to wait a short period of time before you can access the git objects. If this takes longer than 5 minutes, be sure to contact GitHub Support or GitHub Premium Support.
octokit.rest.repos.createFork({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
org | no |
legacy query parameter for specifying the org. |
organization | no |
Optional parameter to specify the organization name if forking into an organization. |
See also: GitHub Developer Guide documentation.
Create an organization repository
Creates a new repository in the specified organization. The authenticated user must be a member of the organization.
OAuth scope requirements
When using OAuth, authorizations must include:
public_repo
scope orrepo
scope to create a public repository. Note: For GitHub AE, userepo
scope to create an internal repository.repo
scope to create a private repository
octokit.rest.repos.createInOrg({
org,
name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
name | yes |
The name of the repository. |
description | no |
A short description of the repository. |
homepage | no |
A URL with more information about the repository. |
private | no |
Whether the repository is private. |
visibility | no |
Can be |
has_issues | no |
Either |
has_projects | no |
Either |
has_wiki | no |
Either |
is_template | no |
Either |
team_id | no |
The id of the team that will be granted access to this repository. This is only valid when creating a repository in an organization. |
auto_init | no |
Pass |
gitignore_template | no |
Desired language or platform .gitignore template to apply. Use the name of the template without the extension. For example, "Haskell". |
license_template | no |
Choose an open source license template that best suits your needs, and then use the license keyword as the |
allow_squash_merge | no |
Either |
allow_merge_commit | no |
Either |
allow_rebase_merge | no |
Either |
delete_branch_on_merge | no |
Either |
See also: GitHub Developer Guide documentation.
Create or update an environment
Create or update an environment with protection rules, such as required reviewers. For more information about environment protection rules, see "Environments."
Note: Although you can use this operation to specify that only branches that match specified name patterns can deploy to this environment, you must use the UI to set the name patterns. For more information, see "Environments."
Note: To create or update secrets for an environment, see "Secrets."
You must authenticate using an access token with the repo scope to use this endpoint.
octokit.rest.repos.createOrUpdateEnvironment({
owner,
repo,
environment_name,
deployment_branch_policy.protected_branches,
deployment_branch_policy.custom_branch_policies
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
environment_name | yes |
The name of the environment |
wait_timer | no |
The amount of time to delay a job after the job is initially triggered. The time (in minutes) must be an integer between 0 and 43,200 (30 days). |
reviewers | no |
The people or teams that may review jobs that reference the environment. You can list up to six users or teams as reviewers. The reviewers must have at least read access to the repository. Only one of the required reviewers needs to approve the job for it to proceed. |
reviewers[].type | no |
The type of reviewer. Must be one of: |
reviewers[].id | no |
The id of the user or team who can review the deployment |
deployment_branch_policy | no |
The type of deployment branch policy for this environment. To allow all branches to deploy, set to |
deployment_branch_policy.protected_branches | yes |
Whether only branches with branch protection rules can deploy to this environment. If |
deployment_branch_policy.custom_branch_policies | yes |
Whether only branches that match the specified name patterns can deploy to this environment. If |
See also: GitHub Developer Guide documentation.
Create or update file contents
Creates a new file or replaces an existing file in a repository.
octokit.rest.repos.createOrUpdateFileContents({
owner,
repo,
path,
message,
content,
committer.name,
committer.email,
author.name,
author.email
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
path | yes |
path parameter |
message | yes |
The commit message. |
content | yes |
The new file content, using Base64 encoding. |
sha | no |
Required if you are updating a file. The blob SHA of the file being replaced. |
branch | no |
The branch name. Default: the repository’s default branch (usually |
committer | no |
The person that committed the file. Default: the authenticated user. |
committer.name | yes |
The name of the author or committer of the commit. You'll receive a |
committer.email | yes |
The email of the author or committer of the commit. You'll receive a |
committer.date | no | |
author | no |
The author of the file. Default: The |
author.name | yes |
The name of the author or committer of the commit. You'll receive a |
author.email | yes |
The email of the author or committer of the commit. You'll receive a |
author.date | no |
See also: GitHub Developer Guide documentation.
Create a GitHub Pages site
Configures a GitHub Pages site. For more information, see "About GitHub Pages."
octokit.rest.repos.createPagesSite({
owner,
repo,
source,
source.branch
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
source | yes |
The source branch and directory used to publish your Pages site. |
source.branch | yes |
The repository branch used to publish your site's source files. |
source.path | no |
The repository directory that includes the source files for the Pages site. Allowed paths are |
See also: GitHub Developer Guide documentation.
Create a release
Users with push access to the repository can create a release.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
octokit.rest.repos.createRelease({
owner,
repo,
tag_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tag_name | yes |
The name of the tag. |
target_commitish | no |
Specifies the commitish value that determines where the Git tag is created from. Can be any branch or commit SHA. Unused if the Git tag already exists. Default: the repository's default branch (usually |
name | no |
The name of the release. |
body | no |
Text describing the contents of the tag. |
draft | no |
|
prerelease | no |
|
See also: GitHub Developer Guide documentation.
Create a repository using a template
Creates a new repository using a repository template. Use the template_owner
and template_repo
route parameters to specify the repository to use as the template. The authenticated user must own or be a member of an organization that owns the repository. To check if a repository is available to use as a template, get the repository's information using the Get a repository endpoint and check that the is_template
key is true
.
OAuth scope requirements
When using OAuth, authorizations must include:
public_repo
scope orrepo
scope to create a public repository. Note: For GitHub AE, userepo
scope to create an internal repository.repo
scope to create a private repository
octokit.rest.repos.createUsingTemplate({
template_owner,
template_repo,
name,
});
Parameters
name | required | description |
---|---|---|
template_owner | yes | |
template_repo | yes | |
owner | no |
The organization or person who will own the new repository. To create a new repository in an organization, the authenticated user must be a member of the specified organization. |
name | yes |
The name of the new repository. |
description | no |
A short description of the new repository. |
include_all_branches | no |
Set to |
private | no |
Either |
See also: GitHub Developer Guide documentation.
Create a repository webhook
Repositories can have multiple webhooks installed. Each webhook should have a unique config
. Multiple webhooks can
share the same config
as long as those webhooks do not have any events
that overlap.
octokit.rest.repos.createWebhook({
owner,
repo,
config,
config.url
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | no |
Use |
config | yes |
Key/value pairs to provide settings for this webhook. These are defined below. |
config.url | yes |
The URL to which the payloads will be delivered. |
config.content_type | no |
The media type used to serialize the payloads. Supported values include |
config.secret | no |
If provided, the |
config.insecure_ssl | no |
Determines whether the SSL certificate of the host for |
config.token | no | |
config.digest | no | |
events | no |
Determines what events the hook is triggered for. |
active | no |
Determines if notifications are sent when the webhook is triggered. Set to |
See also: GitHub Developer Guide documentation.
Decline a repository invitation
octokit.rest.repos.declineInvitation({
invitation_id,
});
Parameters
name | required | description |
---|---|---|
invitation_id | yes |
invitation_id parameter |
See also: GitHub Developer Guide documentation.
Delete a repository
Deleting a repository requires admin access. If OAuth is used, the delete_repo
scope is required.
If an organization owner has configured the organization to prevent members from deleting organization-owned
repositories, you will get a 403 Forbidden
response.
octokit.rest.repos.delete({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Delete access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Disables the ability to restrict who can push to this branch.
octokit.rest.repos.deleteAccessRestrictions({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Delete admin branch protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Removing admin enforcement requires admin or owner permissions to the repository and branch protection to be enabled.
octokit.rest.repos.deleteAdminBranchProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Delete an environment
You must authenticate using an access token with the repo scope to use this endpoint.
octokit.rest.repos.deleteAnEnvironment({
owner,
repo,
environment_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
environment_name | yes |
The name of the environment |
See also: GitHub Developer Guide documentation.
Delete branch protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.deleteBranchProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Delete a commit comment
octokit.rest.repos.deleteCommitComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Delete commit signature protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
When authenticated with admin or owner permissions to the repository, you can use this endpoint to disable required signed commits on a branch. You must enable branch protection to require signed commits.
octokit.rest.repos.deleteCommitSignatureProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Delete a deploy key
Deploy keys are immutable. If you need to update a key, remove the key and create a new one instead.
octokit.rest.repos.deleteDeployKey({
owner,
repo,
key_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
key_id | yes |
key_id parameter |
See also: GitHub Developer Guide documentation.
Delete a deployment
To ensure there can always be an active deployment, you can only delete an inactive deployment. Anyone with repo
or repo_deployment
scopes can delete an inactive deployment.
To set a deployment as inactive, you must:
- Create a new deployment that is active so that the system has a record of the current state, then delete the previously active deployment.
- Mark the active deployment as inactive by adding any non-successful deployment status.
For more information, see "Create a deployment" and "Create a deployment status."
octokit.rest.repos.deleteDeployment({
owner,
repo,
deployment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
deployment_id | yes |
deployment_id parameter |
See also: GitHub Developer Guide documentation.
Delete a file
Deletes a file in a repository.
You can provide an additional committer
parameter, which is an object containing information about the committer. Or, you can provide an author
parameter, which is an object containing information about the author.
The author
section is optional and is filled in with the committer
information if omitted. If the committer
information is omitted, the authenticated user's information is used.
You must provide values for both name
and email
, whether you choose to use author
or committer
. Otherwise, you'll receive a 422
status code.
octokit.rest.repos.deleteFile({
owner,
repo,
path,
message,
sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
path | yes |
path parameter |
message | yes |
The commit message. |
sha | yes |
The blob SHA of the file being replaced. |
branch | no |
The branch name. Default: the repository’s default branch (usually |
committer | no |
object containing information about the committer. |
committer.name | no |
The name of the author (or committer) of the commit |
committer.email | no |
The email of the author (or committer) of the commit |
author | no |
object containing information about the author. |
author.name | no |
The name of the author (or committer) of the commit |
author.email | no |
The email of the author (or committer) of the commit |
See also: GitHub Developer Guide documentation.
Delete a repository invitation
octokit.rest.repos.deleteInvitation({
owner,
repo,
invitation_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
invitation_id | yes |
invitation_id parameter |
See also: GitHub Developer Guide documentation.
Delete a GitHub Pages site
octokit.rest.repos.deletePagesSite({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Delete pull request review protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.deletePullRequestReviewProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Delete a release
Users with push access to the repository can delete a release.
octokit.rest.repos.deleteRelease({
owner,
repo,
release_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
release_id | yes |
release_id parameter |
See also: GitHub Developer Guide documentation.
Delete a release asset
octokit.rest.repos.deleteReleaseAsset({
owner,
repo,
asset_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
asset_id | yes |
asset_id parameter |
See also: GitHub Developer Guide documentation.
Delete a repository webhook
octokit.rest.repos.deleteWebhook({
owner,
repo,
hook_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Disable automated security fixes
Disables automated security fixes for a repository. The authenticated user must have admin access to the repository. For more information, see "Configuring automated security fixes".
octokit.rest.repos.disableAutomatedSecurityFixes({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Disable vulnerability alerts
Disables dependency alerts and the dependency graph for a repository. The authenticated user must have admin access to the repository. For more information, see "About security alerts for vulnerable dependencies".
octokit.rest.repos.disableVulnerabilityAlerts({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Download a repository archive (zip)
Deprecated: This method has been renamed to repos.downloadZipballArchive
Gets a redirect URL to download a zip archive for a repository. If you omit :ref
, the repository’s default branch (usually
master
) will be used. Please make sure your HTTP framework is configured to follow redirects or you will need to use
the Location
header to make a second GET
request.
Note: For private repositories, these links are temporary and expire after five minutes.
octokit.rest.repos.downloadArchive({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
See also: GitHub Developer Guide documentation.
Download a repository archive (tar)
Gets a redirect URL to download a tar archive for a repository. If you omit :ref
, the repository’s default branch (usually
master
) will be used. Please make sure your HTTP framework is configured to follow redirects or you will need to use
the Location
header to make a second GET
request.
Note: For private repositories, these links are temporary and expire after five minutes.
octokit.rest.repos.downloadTarballArchive({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
See also: GitHub Developer Guide documentation.
Download a repository archive (zip)
Gets a redirect URL to download a zip archive for a repository. If you omit :ref
, the repository’s default branch (usually
master
) will be used. Please make sure your HTTP framework is configured to follow redirects or you will need to use
the Location
header to make a second GET
request.
Note: For private repositories, these links are temporary and expire after five minutes.
octokit.rest.repos.downloadZipballArchive({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
See also: GitHub Developer Guide documentation.
Enable automated security fixes
Enables automated security fixes for a repository. The authenticated user must have admin access to the repository. For more information, see "Configuring automated security fixes".
octokit.rest.repos.enableAutomatedSecurityFixes({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Enable vulnerability alerts
Enables dependency alerts and the dependency graph for a repository. The authenticated user must have admin access to the repository. For more information, see "About security alerts for vulnerable dependencies".
octokit.rest.repos.enableVulnerabilityAlerts({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a repository
When you pass the scarlet-witch-preview
media type, requests to get a repository will also return the repository's code of conduct if it can be detected from the repository's code of conduct file.
The parent
and source
objects are present when the repository is a fork. parent
is the repository this repository was forked from, source
is the ultimate source for the network.
octokit.rest.repos.get({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Lists who has access to this protected branch.
Note: Users, apps, and teams restrictions
are only available for organization-owned repositories.
octokit.rest.repos.getAccessRestrictions({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get admin branch protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.getAdminBranchProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get all environments
Get all environments for a repository.
Anyone with read access to the repository can use this endpoint. If the repository is private, you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.repos.getAllEnvironments({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get all status check contexts
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.getAllStatusCheckContexts({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get all repository topics
octokit.rest.repos.getAllTopics({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
See also: GitHub Developer Guide documentation.
Get apps with access to the protected branch
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Lists the GitHub Apps that have push access to this branch. Only installed GitHub Apps with write
access to the contents
permission can be added as authorized actors on a protected branch.
octokit.rest.repos.getAppsWithAccessToProtectedBranch({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get a branch
octokit.rest.repos.getBranch({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get branch protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.getBranchProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get repository clones
Get the total number of clones and breakdown per day or week for the last 14 days. Timestamps are aligned to UTC midnight of the beginning of the day or week. Week begins on Monday.
octokit.rest.repos.getClones({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per | no |
Must be one of: |
See also: GitHub Developer Guide documentation.
Get the weekly commit activity
Returns a weekly aggregate of the number of additions and deletions pushed to a repository.
octokit.rest.repos.getCodeFrequencyStats({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get repository permissions for a user
Checks the repository permission of a collaborator. The possible repository permissions are admin
, write
, read
, and none
.
octokit.rest.repos.getCollaboratorPermissionLevel({
owner,
repo,
username,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Get the combined status for a specific reference
Users with pull access in a repository can access a combined view of commit statuses for a given ref. The ref can be a SHA, a branch name, or a tag name.
The most recent status for each context is returned, up to 100. This field paginates if there are over 100 contexts.
Additionally, a combined state
is returned. The state
is one of:
- failure if any of the contexts report as
error
orfailure
- pending if there are no statuses or a context is
pending
- success if the latest status for all contexts is
success
octokit.rest.repos.getCombinedStatusForRef({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Get a commit
Returns the contents of a single commit reference. You must have read
access for the repository to use this endpoint.
Note: If there are more than 300 files in the commit diff, the response will include pagination link headers for the remaining files, up to a limit of 3000 files. Each page contains the static commit information, and the only changes are to the file listing.
You can pass the appropriate media type to fetch diff
and patch
formats. Diffs with binary data will have no patch
property.
To return only the SHA-1 hash of the commit reference, you can provide the sha
custom media type in the Accept
header. You can use this endpoint to check if a remote reference's SHA-1 hash is the same as your local reference's SHA-1 hash by providing the local SHA-1 reference as the ETag.
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.repos.getCommit({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
ref | yes |
ref parameter |
See also: GitHub Developer Guide documentation.
Get the last year of commit activity
Returns the last year of commit activity grouped by week. The days
array is a group of commits per day, starting on Sunday
.
octokit.rest.repos.getCommitActivityStats({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a commit comment
octokit.rest.repos.getCommitComment({
owner,
repo,
comment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
See also: GitHub Developer Guide documentation.
Get commit signature protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
When authenticated with admin or owner permissions to the repository, you can use this endpoint to check whether a branch requires signed commits. An enabled status of true
indicates you must sign commits on this branch. For more information, see Signing commits with GPG in GitHub Help.
Note: You must enable branch protection to require signed commits.
octokit.rest.repos.getCommitSignatureProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get community profile metrics
This endpoint will return all community profile metrics, including an overall health score, repository description, the presence of documentation, detected code of conduct, detected license, and the presence of ISSUETEMPLATE, PULLREQUEST_TEMPLATE, README, and CONTRIBUTING files.
The health_percentage
score is defined as a percentage of how many of
these four documents are present: README, CONTRIBUTING, LICENSE, and
CODEOFCONDUCT. For example, if all four documents are present, then
the health_percentage
is 100
. If only one is present, then the
health_percentage
is 25
.
content_reports_enabled
is only returned for organization-owned repositories.
octokit.rest.repos.getCommunityProfileMetrics({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get repository content
Gets the contents of a file or directory in a repository. Specify the file path or directory in :path
. If you omit
:path
, you will receive the contents of the repository's root directory. See the description below regarding what the API response includes for directories.
Files and symlinks support a custom media type for retrieving the raw content or rendered HTML (when supported). All content types support a custom media type to ensure the content is returned in a consistent object format.
Note:
- To get a repository's contents recursively, you can recursively get the tree.
- This API has an upper limit of 1,000 files for a directory. If you need to retrieve more files, use the Git Trees API.
- This API supports files up to 1 megabyte in size.
If the content is a directory
The response will be an array of objects, one object for each item in the directory. When listing the contents of a directory, submodules have their "type" specified as "file". Logically, the value should be "submodule". This behavior exists in API v3 for backwards compatibility purposes. In the next major version of the API, the type will be returned as "submodule".
If the content is a symlink
If the requested :path
points to a symlink, and the symlink's target is a normal file in the repository, then the
API responds with the content of the file (in the format shown in the example. Otherwise, the API responds with an object
describing the symlink itself.
If the content is a submodule
The submodule_git_url
identifies the location of the submodule repository, and the sha
identifies a specific
commit within the submodule repository. Git uses the given URL when cloning the submodule repository, and checks out
the submodule at that specific commit.
If the submodule repository is not hosted on github.com, the Git URLs (git_url
and _links["git"]
) and the
github.com URLs (html_url
and _links["html"]
) will have null values.
octokit.rest.repos.getContent({
owner,
repo,
path,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
path | yes |
path parameter |
ref | no |
The name of the commit/branch/tag. Default: the repository’s default branch (usually |
See also: GitHub Developer Guide documentation.
Get all contributor commit activity
Returns the total
number of commits authored by the contributor. In addition, the response includes a Weekly Hash (weeks
array) with the following information:
w
- Start of the week, given as a Unix timestamp.a
- Number of additionsd
- Number of deletionsc
- Number of commits
octokit.rest.repos.getContributorsStats({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a deploy key
octokit.rest.repos.getDeployKey({
owner,
repo,
key_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
key_id | yes |
key_id parameter |
See also: GitHub Developer Guide documentation.
Get a deployment
octokit.rest.repos.getDeployment({
owner,
repo,
deployment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
deployment_id | yes |
deployment_id parameter |
See also: GitHub Developer Guide documentation.
Get a deployment status
Users with pull access can view a deployment status for a deployment:
octokit.rest.repos.getDeploymentStatus({
owner,
repo,
deployment_id,
status_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
deployment_id | yes |
deployment_id parameter |
status_id | yes |
See also: GitHub Developer Guide documentation.
Get an environment
Anyone with read access to the repository can use this endpoint. If the repository is private, you must use an access token with the repo
scope. GitHub Apps must have the actions:read
permission to use this endpoint.
octokit.rest.repos.getEnvironment({
owner,
repo,
environment_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
environment_name | yes |
The name of the environment |
See also: GitHub Developer Guide documentation.
Get latest Pages build
octokit.rest.repos.getLatestPagesBuild({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get the latest release
View the latest published full release for the repository.
The latest release is the most recent non-prerelease, non-draft release, sorted by the created_at
attribute. The created_at
attribute is the date of the commit used for the release, and not the date when the release was drafted or published.
octokit.rest.repos.getLatestRelease({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a GitHub Pages site
octokit.rest.repos.getPages({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get GitHub Pages build
octokit.rest.repos.getPagesBuild({
owner,
repo,
build_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
build_id | yes |
See also: GitHub Developer Guide documentation.
Get the weekly commit count
Returns the total commit counts for the owner
and total commit counts in all
. all
is everyone combined, including the owner
in the last 52 weeks. If you'd like to get the commit counts for non-owners, you can subtract owner
from all
.
The array order is oldest week (index 0) to most recent week.
octokit.rest.repos.getParticipationStats({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get pull request review protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.getPullRequestReviewProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get the hourly commit count for each day
Each array contains the day number, hour number, and number of commits:
0-6
: Sunday - Saturday0-23
: Hour of day- Number of commits
For example, [2, 14, 25]
indicates that there were 25 total commits, during the 2:00pm hour on Tuesdays. All times are based on the time zone of individual commits.
octokit.rest.repos.getPunchCardStats({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get a repository README
Gets the preferred README for a repository.
READMEs support custom media types for retrieving the raw content or rendered HTML.
octokit.rest.repos.getReadme({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | no |
The name of the commit/branch/tag. Default: the repository’s default branch (usually |
See also: GitHub Developer Guide documentation.
Get a repository README for a directory
Gets the README from a repository directory.
READMEs support custom media types for retrieving the raw content or rendered HTML.
octokit.rest.repos.getReadmeInDirectory({
owner,
repo,
dir,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
dir | yes |
The alternate path to look for a README file |
ref | no |
The name of the commit/branch/tag. Default: the repository’s default branch (usually |
See also: GitHub Developer Guide documentation.
Get a release
Note: This returns an upload_url
key corresponding to the endpoint for uploading release assets. This key is a hypermedia resource.
octokit.rest.repos.getRelease({
owner,
repo,
release_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
release_id | yes |
release_id parameter |
See also: GitHub Developer Guide documentation.
Get a release asset
To download the asset's binary content, set the Accept
header of the request to application/octet-stream
. The API will either redirect the client to the location, or stream it directly if possible. API clients should handle both a 200
or 302
response.
octokit.rest.repos.getReleaseAsset({
owner,
repo,
asset_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
asset_id | yes |
asset_id parameter |
See also: GitHub Developer Guide documentation.
Get a release by tag name
Get a published release with the specified tag.
octokit.rest.repos.getReleaseByTag({
owner,
repo,
tag,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
tag | yes |
tag parameter |
See also: GitHub Developer Guide documentation.
Get status checks protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.getStatusChecksProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get teams with access to the protected branch
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Lists the teams who have push access to this branch. The list includes child teams.
octokit.rest.repos.getTeamsWithAccessToProtectedBranch({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get top referral paths
Get the top 10 popular contents over the last 14 days.
octokit.rest.repos.getTopPaths({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get top referral sources
Get the top 10 referrers over the last 14 days.
octokit.rest.repos.getTopReferrers({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Get users with access to the protected branch
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Lists the people who have push access to this branch.
octokit.rest.repos.getUsersWithAccessToProtectedBranch({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Get page views
Get the total number of views and breakdown per day or week for the last 14 days. Timestamps are aligned to UTC midnight of the beginning of the day or week. Week begins on Monday.
octokit.rest.repos.getViews({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per | no |
Must be one of: |
See also: GitHub Developer Guide documentation.
Get a repository webhook
Returns a webhook configured in a repository. To get only the webhook config
properties, see "Get a webhook configuration for a repository."
octokit.rest.repos.getWebhook({
owner,
repo,
hook_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Get a webhook configuration for a repository
Returns the webhook configuration for a repository. To get more information about the webhook, including the active
state and events
, use "Get a repository webhook."
Access tokens must have the read:repo_hook
or repo
scope, and GitHub Apps must have the repository_hooks:read
permission.
octokit.rest.repos.getWebhookConfigForRepo({
owner,
repo,
hook_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
List branches
octokit.rest.repos.listBranches({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
protected | no |
Setting to |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List branches for HEAD commit
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Returns all branches where the given commit SHA is the HEAD, or latest commit for the branch.
octokit.rest.repos.listBranchesForHeadCommit({
owner,
repo,
commit_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
commit_sha | yes |
commit_sha parameter |
See also: GitHub Developer Guide documentation.
List repository collaborators
For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.
Team members will include the members of child teams.
octokit.rest.repos.listCollaborators({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
affiliation | no |
Filter collaborators returned by their affiliation. Can be one of: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List commit comments
Use the :commit_sha
to specify the commit that will have its comments listed.
octokit.rest.repos.listCommentsForCommit({
owner,
repo,
commit_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
commit_sha | yes |
commit_sha parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List commit comments for a repository
Commit Comments use these custom media types. You can read more about the use of media types in the API here.
Comments are ordered by ascending ID.
octokit.rest.repos.listCommitCommentsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List commit statuses for a reference
Users with pull access in a repository can view commit statuses for a given ref. The ref can be a SHA, a branch name, or a tag name. Statuses are returned in reverse chronological order. The first status in the list will be the latest one.
This resource is also available via a legacy route: GET /repos/:owner/:repo/statuses/:ref
.
octokit.rest.repos.listCommitStatusesForRef({
owner,
repo,
ref,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
ref | yes |
ref parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List commits
Signature verification object
The response will include a verification
object that describes the result of verifying the commit's signature. The following fields are included in the verification
object:
Name | Type | Description |
---|---|---|
verified |
boolean |
Indicates whether GitHub considers the signature in this commit to be verified. |
reason |
string |
The reason for verified value. Possible values and their meanings are enumerated in table below. |
signature |
string |
The signature that was extracted from the commit. |
payload |
string |
The value that was signed. |
These are the possible values for reason
in the verification
object:
Value | Description |
---|---|
expired_key |
The key that made the signature is expired. |
not_signing_key |
The "signing" flag is not among the usage flags in the GPG key that made the signature. |
gpgverify_error |
There was an error communicating with the signature verification service. |
gpgverify_unavailable |
The signature verification service is currently unavailable. |
unsigned |
The object does not include a signature. |
unknown_signature_type |
A non-PGP signature was found in the commit. |
no_user |
No user was associated with the committer email address in the commit. |
unverified_email |
The committer email address in the commit was associated with a user, but the email address is not verified on her/his account. |
bad_email |
The committer email address in the commit is not included in the identities of the PGP key that made the signature. |
unknown_key |
The key that made the signature has not been registered with any user's account. |
malformed_signature |
There was an error parsing the signature. |
invalid |
The signature could not be cryptographically verified using the key whose key-id was found in the signature. |
valid |
None of the above errors applied, so the signature is considered to be verified. |
octokit.rest.repos.listCommits({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sha | no |
SHA or branch to start listing commits from. Default: the repository’s default branch (usually |
path | no |
Only commits containing this file path will be returned. |
author | no |
GitHub login or email address by which to filter by commit author. |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
until | no |
Only commits before this date will be returned. This is a timestamp in ISO 8601 format: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
top | no |
legacy parameter for pagination. |
last_sha | no |
legacy parameter for pagination. |
See also: GitHub Developer Guide documentation.
List repository contributors
Lists contributors to the specified repository and sorts them by the number of commits per contributor in descending order. This endpoint may return information that is a few hours old because the GitHub REST API v3 caches contributor data to improve performance.
GitHub identifies contributors by author email address. This endpoint groups contribution counts by GitHub user, which includes all associated email addresses. To improve performance, only the first 500 author email addresses in the repository link to GitHub users. The rest will appear as anonymous contributors without associated GitHub user information.
octokit.rest.repos.listContributors({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
anon | no |
Set to |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List deploy keys
octokit.rest.repos.listDeployKeys({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List deployment statuses
Users with pull access can view deployment statuses for a deployment:
octokit.rest.repos.listDeploymentStatuses({
owner,
repo,
deployment_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
deployment_id | yes |
deployment_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List deployments
Simple filtering of deployments is available via query parameters:
octokit.rest.repos.listDeployments({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sha | no |
The SHA recorded at creation time. |
ref | no |
The name of the ref. This can be a branch, tag, or SHA. |
task | no |
The name of the task for the deployment (e.g., |
environment | no |
The name of the environment that was deployed to (e.g., |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories for the authenticated user
Lists repositories that the authenticated user has explicit permission (:read
, :write
, or :admin
) to access.
The authenticated user has explicit permission to access repositories they own, repositories where they are a collaborator, and repositories that they can access through an organization membership.
octokit.rest.repos.listForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
visibility | no |
Can be one of |
affiliation | no |
Comma-separated list of values. Can include: |
type | no |
Can be one of Will cause a |
sort | no |
Can be one of |
direction | no |
Can be one of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
since | no |
Only show notifications updated after the given time. This is a timestamp in ISO 8601 format: |
before | no |
Only show notifications updated before the given time. This is a timestamp in ISO 8601 format: |
See also: GitHub Developer Guide documentation.
List organization repositories
Lists repositories for the specified organization.
octokit.rest.repos.listForOrg({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
type | no |
Specifies the types of repositories you want returned. Can be one of |
sort | no |
Can be one of |
direction | no |
Can be one of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repositories for a user
Lists public repositories for the specified user. Note: For GitHub AE, this endpoint will list internal repositories for the specified user.
octokit.rest.repos.listForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
type | no |
Can be one of |
sort | no |
Can be one of |
direction | no |
Can be one of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List forks
octokit.rest.repos.listForks({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
sort | no |
The sort order. Can be either |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
org | no |
legacy query parameter for specifying the org. |
organization | no |
legacy query parameter for specifying the org. |
See also: GitHub Developer Guide documentation.
List repository invitations
When authenticating as a user with admin rights to a repository, this endpoint will list all currently open repository invitations.
octokit.rest.repos.listInvitations({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository invitations for the authenticated user
When authenticating as a user, this endpoint will list all currently open repository invitations for that user.
octokit.rest.repos.listInvitationsForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository languages
Lists languages for the specified repository. The value shown for each language is the number of bytes of code written in that language.
octokit.rest.repos.listLanguages({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
List GitHub Pages builds
octokit.rest.repos.listPagesBuilds({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public repositories
Lists all public repositories in the order that they were created.
Notes:
- For GitHub Enterprise Server and GitHub AE, this endpoint will only list repositories available to all users on the enterprise.
- Pagination is powered exclusively by the
since
parameter. Use the Link header to get the URL for the next page of repositories.
octokit.rest.repos.listPublic();
Parameters
name | required | description |
---|---|---|
since | no |
A repository ID. Only return repositories with an ID greater than this ID. |
See also: GitHub Developer Guide documentation.
List pull requests associated with a commit
Lists all pull requests containing the provided commit SHA, which can be from any point in the commit history. The results will include open and closed pull requests. Additional preview headers may be required to see certain details for associated pull requests, such as whether a pull request is in a draft state. For more information about previews that might affect this endpoint, see the List pull requests endpoint.
octokit.rest.repos.listPullRequestsAssociatedWithCommit({
owner,
repo,
commit_sha,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
commit_sha | yes |
commit_sha parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List release assets
octokit.rest.repos.listReleaseAssets({
owner,
repo,
release_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
release_id | yes |
release_id parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List releases
This returns a list of releases, which does not include regular Git tags that have not been associated with a release. To get a list of Git tags, use the Repository Tags API.
Information about published releases are available to everyone. Only users with push access will receive listings for draft releases.
octokit.rest.repos.listReleases({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository tags
octokit.rest.repos.listTags({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository teams
octokit.rest.repos.listTeams({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List repository webhooks
octokit.rest.repos.listWebhooks({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Merge a branch
octokit.rest.repos.merge({
owner,
repo,
base,
head,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
base | yes |
The name of the base branch that the head will be merged into. |
head | yes |
The head to merge. This can be a branch name or a commit SHA1. |
commit_message | no |
Commit message to use for the merge commit. If omitted, a default message will be used. |
See also: GitHub Developer Guide documentation.
Ping a repository webhook
This will trigger a ping event to be sent to the hook.
octokit.rest.repos.pingWebhook({
owner,
repo,
hook_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Remove app access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Removes the ability of an app to push to this branch. Only installed GitHub Apps with write
access to the contents
permission can be added as authorized actors on a protected branch.
Type | Description |
---|---|
array |
The GitHub Apps that have push access to this branch. Use the app's slug . Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.removeAppAccessRestrictions({
owner,
repo,
branch,
apps,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
apps | yes |
See also: GitHub Developer Guide documentation.
Remove a repository collaborator
octokit.rest.repos.removeCollaborator({
owner,
repo,
username,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
username | yes |
See also: GitHub Developer Guide documentation.
Remove status check contexts
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.removeStatusCheckContexts({
owner,
repo,
branch,
contexts,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
contexts | yes |
See also: GitHub Developer Guide documentation.
Remove status check protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.removeStatusCheckProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Remove team access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Removes the ability of a team to push to this branch. You can also remove push access for child teams.
Type | Description |
---|---|
array |
Teams that should no longer have push access. Use the team's slug . Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.removeTeamAccessRestrictions({
owner,
repo,
branch,
teams,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
teams | yes |
See also: GitHub Developer Guide documentation.
Remove user access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Removes the ability of a user to push to this branch.
Type | Description |
---|---|
array |
Usernames of the people who should no longer have push access. Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.removeUserAccessRestrictions({
owner,
repo,
branch,
users,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
users | yes |
See also: GitHub Developer Guide documentation.
Rename a branch
Renames a branch in a repository.
Note: Although the API responds immediately, the branch rename process might take some extra time to complete in the background. You won't be able to push to the old branch name while the rename process is in progress. For more information, see "Renaming a branch".
The permissions required to use this endpoint depends on whether you are renaming the default branch.
To rename a non-default branch:
- Users must have push access.
- GitHub Apps must have the
contents:write
repository permission.
To rename the default branch:
- Users must have admin or owner permissions.
- GitHub Apps must have the
administration:write
repository permission.
octokit.rest.repos.renameBranch({
owner,
repo,
branch,
new_name,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
new_name | yes |
The new name of the branch. |
See also: GitHub Developer Guide documentation.
Replace all repository topics
octokit.rest.repos.replaceAllTopics({
owner,
repo,
names,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
names | yes |
An array of topics to add to the repository. Pass one or more topics to replace the set of existing topics. Send an empty array ( |
See also: GitHub Developer Guide documentation.
Request a GitHub Pages build
You can request that your site be built from the latest revision on the default branch. This has the same effect as pushing a commit to your default branch, but does not require an additional commit. Manually triggering page builds can be helpful when diagnosing build warnings and failures.
Build requests are limited to one concurrent build per repository and one concurrent build per requester. If you request a build while another is still in progress, the second request will be queued until the first completes.
octokit.rest.repos.requestPagesBuild({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Set admin branch protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Adding admin enforcement requires admin or owner permissions to the repository and branch protection to be enabled.
octokit.rest.repos.setAdminBranchProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
See also: GitHub Developer Guide documentation.
Set app access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Replaces the list of apps that have push access to this branch. This removes all apps that previously had push access and grants push access to the new list of apps. Only installed GitHub Apps with write
access to the contents
permission can be added as authorized actors on a protected branch.
Type | Description |
---|---|
array |
The GitHub Apps that have push access to this branch. Use the app's slug . Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.setAppAccessRestrictions({
owner,
repo,
branch,
apps,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
apps | yes |
See also: GitHub Developer Guide documentation.
Set status check contexts
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
octokit.rest.repos.setStatusCheckContexts({
owner,
repo,
branch,
contexts,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
contexts | yes |
See also: GitHub Developer Guide documentation.
Set team access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Replaces the list of teams that have push access to this branch. This removes all teams that previously had push access and grants push access to the new list of teams. Team restrictions include child teams.
Type | Description |
---|---|
array |
The teams that can have push access. Use the team's slug . Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.setTeamAccessRestrictions({
owner,
repo,
branch,
teams,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
teams | yes |
See also: GitHub Developer Guide documentation.
Set user access restrictions
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Replaces the list of people that have push access to this branch. This removes all people that previously had push access and grants push access to the new list of people.
Type | Description |
---|---|
array |
Usernames for people who can have push access. Note: The list of users, apps, and teams in total is limited to 100 items. |
octokit.rest.repos.setUserAccessRestrictions({
owner,
repo,
branch,
users,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
users | yes |
See also: GitHub Developer Guide documentation.
Test the push repository webhook
This will trigger the hook with the latest push to the current repository if the hook is subscribed to push
events. If the hook is not subscribed to push
events, the server will respond with 204 but no test POST will be generated.
Note: Previously /repos/:owner/:repo/hooks/:hook_id/test
octokit.rest.repos.testPushWebhook({
owner,
repo,
hook_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes |
See also: GitHub Developer Guide documentation.
Transfer a repository
A transfer request will need to be accepted by the new owner when transferring a personal repository to another user. The response will contain the original owner
, and the transfer will continue asynchronously. For more details on the requirements to transfer personal and organization-owned repositories, see about repository transfers.
octokit.rest.repos.transfer({
owner,
repo,
new_owner,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
new_owner | yes |
The username or organization name the repository will be transferred to. |
team_ids | no |
ID of the team or teams to add to the repository. Teams can only be added to organization-owned repositories. |
See also: GitHub Developer Guide documentation.
Update a repository
Note: To edit a repository's topics, use the Replace all repository topics endpoint.
octokit.rest.repos.update({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
name | no |
The name of the repository. |
description | no |
A short description of the repository. |
homepage | no |
A URL with more information about the repository. |
private | no |
Either |
visibility | no |
Can be |
has_issues | no |
Either |
has_projects | no |
Either |
has_wiki | no |
Either |
is_template | no |
Either |
default_branch | no |
Updates the default branch for this repository. |
allow_squash_merge | no |
Either |
allow_merge_commit | no |
Either |
allow_rebase_merge | no |
Either |
delete_branch_on_merge | no |
Either |
archived | no |
|
See also: GitHub Developer Guide documentation.
Update branch protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Protecting a branch requires admin or owner permissions to the repository.
Note: Passing new arrays of users
and teams
replaces their previous values.
Note: The list of users, apps, and teams in total is limited to 100 items.
octokit.rest.repos.updateBranchProtection({
owner,
repo,
branch,
required_status_checks,
required_status_checks.strict,
required_status_checks.contexts,
enforce_admins,
required_pull_request_reviews,
restrictions,
restrictions.users,
restrictions.teams
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
required_status_checks | yes |
Require status checks to pass before merging. Set to |
required_status_checks.strict | yes |
Require branches to be up to date before merging. |
required_status_checks.contexts | yes |
The list of status checks to require in order to merge into this branch |
enforce_admins | yes |
Enforce all configured restrictions for administrators. Set to |
required_pull_request_reviews | yes |
Require at least one approving review on a pull request, before merging. Set to |
required_pull_request_reviews.dismissal_restrictions | no |
Specify which users and teams can dismiss pull request reviews. Pass an empty |
required_pull_request_reviews.dismissal_restrictions.users | no |
The list of user |
required_pull_request_reviews.dismissal_restrictions.teams | no |
The list of team |
required_pull_request_reviews.dismiss_stale_reviews | no |
Set to |
required_pull_request_reviews.require_code_owner_reviews | no |
Blocks merging pull requests until code owners review them. |
required_pull_request_reviews.required_approving_review_count | no |
Specify the number of reviewers required to approve pull requests. Use a number between 1 and 6. |
restrictions | yes |
Restrict who can push to the protected branch. User, app, and team |
restrictions.users | yes |
The list of user |
restrictions.teams | yes |
The list of team |
restrictions.apps | no |
The list of app |
required_linear_history | no |
Enforces a linear commit Git history, which prevents anyone from pushing merge commits to a branch. Set to |
allow_force_pushes | no |
Permits force pushes to the protected branch by anyone with write access to the repository. Set to |
allow_deletions | no |
Allows deletion of the protected branch by anyone with write access to the repository. Set to |
See also: GitHub Developer Guide documentation.
Update a commit comment
octokit.rest.repos.updateCommitComment({
owner,
repo,
comment_id,
body,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
comment_id | yes |
comment_id parameter |
body | yes |
The contents of the comment |
See also: GitHub Developer Guide documentation.
Update information about a GitHub Pages site
Updates information for a GitHub Pages site. For more information, see "About GitHub Pages.
octokit.rest.repos.updateInformationAboutPagesSite({
owner,
repo,
source,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
cname | no |
Specify a custom domain for the repository. Sending a |
public | no |
Configures access controls for the GitHub Pages site. If public is set to |
source | yes |
See also: GitHub Developer Guide documentation.
Update a repository invitation
octokit.rest.repos.updateInvitation({
owner,
repo,
invitation_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
invitation_id | yes |
invitation_id parameter |
permissions | no |
The permissions that the associated user will have on the repository. Valid values are |
See also: GitHub Developer Guide documentation.
Update pull request review protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Updating pull request review enforcement requires admin or owner permissions to the repository and branch protection to be enabled.
Note: Passing new arrays of users
and teams
replaces their previous values.
octokit.rest.repos.updatePullRequestReviewProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
dismissal_restrictions | no |
Specify which users and teams can dismiss pull request reviews. Pass an empty |
dismissal_restrictions.users | no |
The list of user |
dismissal_restrictions.teams | no |
The list of team |
dismiss_stale_reviews | no |
Set to |
require_code_owner_reviews | no |
Blocks merging pull requests until code owners have reviewed. |
required_approving_review_count | no |
Specifies the number of reviewers required to approve pull requests. Use a number between 1 and 6. |
See also: GitHub Developer Guide documentation.
Update a release
Users with push access to the repository can edit a release.
octokit.rest.repos.updateRelease({
owner,
repo,
release_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
release_id | yes |
release_id parameter |
tag_name | no |
The name of the tag. |
target_commitish | no |
Specifies the commitish value that determines where the Git tag is created from. Can be any branch or commit SHA. Unused if the Git tag already exists. Default: the repository's default branch (usually |
name | no |
The name of the release. |
body | no |
Text describing the contents of the tag. |
draft | no |
|
prerelease | no |
|
See also: GitHub Developer Guide documentation.
Update a release asset
Users with push access to the repository can edit a release asset.
octokit.rest.repos.updateReleaseAsset({
owner,
repo,
asset_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
asset_id | yes |
asset_id parameter |
name | no |
The file name of the asset. |
label | no |
An alternate short description of the asset. Used in place of the filename. |
state | no |
See also: GitHub Developer Guide documentation.
Update status check protection
Deprecated: This method has been renamed to repos.updateStatusCheckProtection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Updating required status checks requires admin or owner permissions to the repository and branch protection to be enabled.
octokit.rest.repos.updateStatusCheckPotection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
strict | no |
Require branches to be up to date before merging. |
contexts | no |
The list of status checks to require in order to merge into this branch |
See also: GitHub Developer Guide documentation.
Update status check protection
Protected branches are available in public repositories with GitHub Free and GitHub Free for organizations, and in public and private repositories with GitHub Pro, GitHub Team, GitHub Enterprise Cloud, and GitHub Enterprise Server. For more information, see GitHub's products in the GitHub Help documentation.
Updating required status checks requires admin or owner permissions to the repository and branch protection to be enabled.
octokit.rest.repos.updateStatusCheckProtection({
owner,
repo,
branch,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
branch | yes |
The name of the branch. |
strict | no |
Require branches to be up to date before merging. |
contexts | no |
The list of status checks to require in order to merge into this branch |
See also: GitHub Developer Guide documentation.
Update a repository webhook
Updates a webhook configured in a repository. If you previously had a secret
set, you must provide the same secret
or set a new secret
or the secret will be removed. If you are only updating individual webhook config
properties, use "Update a webhook configuration for a repository."
octokit.rest.repos.updateWebhook({
owner,
repo,
hook_id,
config.url
})
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes | |
config | no |
Key/value pairs to provide settings for this webhook. These are defined below. |
config.url | yes |
The URL to which the payloads will be delivered. |
config.content_type | no |
The media type used to serialize the payloads. Supported values include |
config.secret | no |
If provided, the |
config.insecure_ssl | no |
Determines whether the SSL certificate of the host for |
config.address | no | |
config.room | no | |
events | no |
Determines what events the hook is triggered for. This replaces the entire array of events. |
add_events | no |
Determines a list of events to be added to the list of events that the Hook triggers for. |
remove_events | no |
Determines a list of events to be removed from the list of events that the Hook triggers for. |
active | no |
Determines if notifications are sent when the webhook is triggered. Set to |
See also: GitHub Developer Guide documentation.
Update a webhook configuration for a repository
Updates the webhook configuration for a repository. To update more information about the webhook, including the active
state and events
, use "Update a repository webhook."
Access tokens must have the write:repo_hook
or repo
scope, and GitHub Apps must have the repository_hooks:write
permission.
octokit.rest.repos.updateWebhookConfigForRepo({
owner,
repo,
hook_id,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
hook_id | yes | |
url | no |
The URL to which the payloads will be delivered. |
content_type | no |
The media type used to serialize the payloads. Supported values include |
secret | no |
If provided, the |
insecure_ssl | no |
Determines whether the SSL certificate of the host for |
See also: GitHub Developer Guide documentation.
Upload a release asset
This endpoint makes use of a Hypermedia relation to determine which URL to access. The endpoint you call to upload release assets is specific to your release. Use the upload_url
returned in
the response of the Create a release endpoint to upload a release asset.
You need to use an HTTP client which supports SNI to make calls to this endpoint.
Most libraries will set the required Content-Length
header automatically. Use the required Content-Type
header to provide the media type of the asset. For a list of media types, see Media Types. For example:
application/zip
GitHub expects the asset data in its raw binary form, rather than JSON. You will send the raw binary content of the asset as the request body. Everything else about the endpoint is the same as the rest of the API. For example, you'll still need to pass your authentication to be able to upload an asset.
When an upstream failure occurs, you will receive a 502 Bad Gateway
status. This may leave an empty asset with a state of starter
. It can be safely deleted.
Notes:
- GitHub renames asset filenames that have special characters, non-alphanumeric characters, and leading or trailing periods. The "List assets for a release" endpoint lists the renamed filenames. For more information and help, contact GitHub Support.
- If you upload an asset with the same filename as another uploaded asset, you'll receive an error and must delete the old file before you can re-upload the new asset.
octokit.rest.repos.uploadReleaseAsset({
owner,
repo,
release_id,
data,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
release_id | yes |
release_id parameter |
name | no | |
label | no | |
data | yes |
The raw file data |
origin | no |
The URL origin (protocol + host name + port) is included in |
See also: GitHub Developer Guide documentation.
Search
Search code
Searches for query terms inside of a file. This method returns up to 100 results per page.
When searching for code, you can get text match metadata for the file content and file path fields when you pass the text-match
media type. For more details about how to receive highlighted search results, see Text match metadata.
For example, if you want to find the definition of the addClass
function inside jQuery repository, your query would look something like this:
q=addClass+in:file+language:js+repo:jquery/jquery
This query searches for the keyword addClass
within a file's contents. The query limits the search to files where the language is JavaScript in the jquery/jquery
repository.
Considerations for code search
Due to the complexity of searching code, there are a few restrictions on how searches are performed:
- Only the default branch is considered. In most cases, this will be the
master
branch. - Only files smaller than 384 KB are searchable.
- You must always include at least one search term when searching source code. For example, searching for
language:go
is not valid, whileamazing language:go
is.
octokit.rest.search.code({
q,
});
Parameters
name | required | description |
---|---|---|
q | yes |
The query contains one or more search keywords and qualifiers. Qualifiers allow you to limit your search to specific areas of GitHub. The REST API supports the same qualifiers as GitHub.com. To learn more about the format of the query, see Constructing a search query. See "Searching code" for a detailed list of qualifiers. |
sort | no |
Sorts the results of your query. Can only be |
order | no |
Determines whether the first search result returned is the highest number of matches ( |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Search commits
Find commits via various criteria on the default branch (usually master
). This method returns up to 100 results per page.
When searching for commits, you can get text match metadata for the message field when you provide the text-match
media type. For more details about how to receive highlighted search results, see Text match
metadata.
For example, if you want to find commits related to CSS in the octocat/Spoon-Knife repository. Your query would look something like this:
q=repo:octocat/Spoon-Knife+css
octokit.rest.search.commits({
q,
});
Parameters
name | required | description |
---|---|---|
q | yes |
The query contains one or more search keywords and qualifiers. Qualifiers allow you to limit your search to specific areas of GitHub. The REST API supports the same qualifiers as GitHub.com. To learn more about the format of the query, see Constructing a search query. See "Searching commits" for a detailed list of qualifiers. |
sort | no |
Sorts the results of your query by |
order | no |
Determines whether the first search result returned is the highest number of matches ( |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Search issues and pull requests
Find issues by state and keyword. This method returns up to 100 results per page.
When searching for issues, you can get text match metadata for the issue title, issue body, and issue comment body fields when you pass the text-match
media type. For more details about how to receive highlighted
search results, see Text match metadata.
For example, if you want to find the oldest unresolved Python bugs on Windows. Your query might look something like this.
q=windows+label:bug+language:python+state:open&sort=created&order=asc
This query searches for the keyword windows
, within any open issue that is labeled as bug
. The search runs across repositories whose primary language is Python. The results are sorted by creation date in ascending order, which means the oldest issues appear first in the search results.
Note: For user-to-server GitHub App requests, you can't retrieve a combination of issues and pull requests in a single query. Requests that don't include the is:issue
or is:pull-request
qualifier will receive an HTTP 422 Unprocessable Entity
response. To get results for both issues and pull requests, you must send separate queries for issues and pull requests. For more information about the is
qualifier, see "Searching only issues or pull requests."
octokit.rest.search.issuesAndPullRequests({
q,
});
Parameters
name | required | description |
---|---|---|
q | yes |
The query contains one or more search keywords and qualifiers. Qualifiers allow you to limit your search to specific areas of GitHub. The REST API supports the same qualifiers as GitHub.com. To learn more about the format of the query, see Constructing a search query. See "Searching issues and pull requests" for a detailed list of qualifiers. |
sort | no |
Sorts the results of your query by the number of |
order | no |
Determines whether the first search result returned is the highest number of matches ( |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Search labels
Find labels in a repository with names or descriptions that match search keywords. Returns up to 100 results per page.
When searching for labels, you can get text match metadata for the label name and description fields when you pass the text-match
media type. For more details about how to receive highlighted search results, see Text match metadata.
For example, if you want to find labels in the linguist
repository that match bug
, defect
, or enhancement
. Your query might look like this:
q=bug+defect+enhancement&repository_id=64778136
The labels that best match the query appear first in the search results.
octokit.rest.search.labels({
repository_id,
q,
});
Parameters
name | required | description |
---|---|---|
repository_id | yes |
The id of the repository. |
q | yes |
The search keywords. This endpoint does not accept qualifiers in the query. To learn more about the format of the query, see Constructing a search query. |
sort | no |
Sorts the results of your query by when the label was |
order | no |
Determines whether the first search result returned is the highest number of matches ( |
See also: GitHub Developer Guide documentation.
Search repositories
Find repositories via various criteria. This method returns up to 100 results per page.
When searching for repositories, you can get text match metadata for the name and description fields when you pass the text-match
media type. For more details about how to receive highlighted search results, see Text match metadata.
For example, if you want to search for popular Tetris repositories written in assembly code, your query might look like this:
q=tetris+language:assembly&sort=stars&order=desc
This query searches for repositories with the word tetris
in the name, the description, or the README. The results are limited to repositories where the primary language is assembly. The results are sorted by stars in descending order, so that the most popular repositories appear first in the search results.
When you include the mercy
preview header, you can also search for multiple topics by adding more topic:
instances. For example, your query might look like this:
q=topic:ruby+topic:rails
octokit.rest.search.repos({
q,
});
Parameters
name | required | description |
---|---|---|
q | yes |
The query contains one or more search keywords and qualifiers. Qualifiers allow you to limit your search to specific areas of GitHub. The REST API supports the same qualifiers as GitHub.com. To learn more about the format of the query, see Constructing a search query. See "Searching for repositories" for a detailed list of qualifiers. |
sort | no |
Sorts the results of your query by number of |
order | no |
Determines whether the first search result returned is the highest number of matches ( |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Search topics
Find topics via various criteria. Results are sorted by best match. This method returns up to 100 results per page. See "Searching topics" for a detailed list of qualifiers.
When searching for topics, you can get text match metadata for the topic's short_description, description, name, or display_name field when you pass the text-match
media type. For more details about how to receive highlighted search results, see Text match metadata.
For example, if you want to search for topics related to Ruby that are featured on https://github.com/topics. Your query might look like this:
q=ruby+is:featured
This query searches for topics with the keyword ruby
and limits the results to find only topics that are featured. The topics that are the best match for the query appear first in the search results.
octokit.rest.search.topics({
q,
});
Parameters
name | required | description |
---|---|---|
q | yes |
The query contains one or more search keywords and qualifiers. Qualifiers allow you to limit your search to specific areas of GitHub. The REST API supports the same qualifiers as GitHub.com. To learn more about the format of the query, see Constructing a search query. |
See also: GitHub Developer Guide documentation.
Search users
Find users via various criteria. This method returns up to 100 results per page.
When searching for users, you can get text match metadata for the issue login, email, and name fields when you pass the text-match
media type. For more details about highlighting search results, see Text match metadata. For more details about how to receive highlighted search results, see Text match metadata.
For example, if you're looking for a list of popular users, you might try this query:
q=tom+repos:%3E42+followers:%3E1000
This query searches for users with the name tom
. The results are restricted to users with more than 42 repositories and over 1,000 followers.
octokit.rest.search.users({
q,
});
Parameters
name | required | description |
---|---|---|
q | yes |
The query contains one or more search keywords and qualifiers. Qualifiers allow you to limit your search to specific areas of GitHub. The REST API supports the same qualifiers as GitHub.com. To learn more about the format of the query, see Constructing a search query. See "Searching users" for a detailed list of qualifiers. |
sort | no |
Sorts the results of your query by number of |
order | no |
Determines whether the first search result returned is the highest number of matches ( |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Secret-Scanning
Get a secret scanning alert
Gets a single secret scanning alert detected in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo
scope or security_events
scope.
GitHub Apps must have the secret_scanning_alerts
read permission to use this endpoint.
octokit.rest.secretScanning.getAlert({
owner,
repo,
alert_number,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
alert_number | yes |
The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the |
See also: GitHub Developer Guide documentation.
List secret scanning alerts for a repository
Lists all secret scanning alerts for a private repository, from newest to oldest. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo
scope or security_events
scope.
GitHub Apps must have the secret_scanning_alerts
read permission to use this endpoint.
octokit.rest.secretScanning.listAlertsForRepo({
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
state | no |
Set to |
page | no |
Page number of the results to fetch. |
per_page | no |
Results per page (max 100). |
See also: GitHub Developer Guide documentation.
Update a secret scanning alert
Updates the status of a secret scanning alert in a private repository. To use this endpoint, you must be an administrator for the repository or organization, and you must use an access token with the repo
scope or security_events
scope.
GitHub Apps must have the secret_scanning_alerts
write permission to use this endpoint.
octokit.rest.secretScanning.updateAlert({
owner,
repo,
alert_number,
state,
});
Parameters
name | required | description |
---|---|---|
owner | yes | |
repo | yes | |
alert_number | yes |
The number that identifies an alert. You can find this at the end of the URL for a code scanning alert within GitHub, and in the |
state | yes |
Sets the state of the secret scanning alert. Can be either |
resolution | no |
Required when the |
See also: GitHub Developer Guide documentation.
Teams
Add or update team membership for a user
Team synchronization is available for organizations using GitHub Enterprise Cloud. For more information, see GitHub's products in the GitHub Help documentation.
Adds an organization member to a team. An authenticated organization owner or team maintainer can add organization members to a team.
Note: When you have team synchronization set up for a team with your organization's identity provider (IdP), you will see an error if you attempt to use the API for making changes to the team's membership. If you have access to manage group membership in your IdP, you can manage GitHub team membership through your identity provider, which automatically adds and removes team members in an organization. For more information, see "Synchronizing teams between your identity provider and GitHub."
An organization owner can add someone who is not part of the team's organization to a team. When an organization owner adds someone to a team who is not an organization member, this endpoint will send an invitation to the person via email. This newly-created membership will be in the "pending" state until the person accepts the invitation, at which point the membership will transition to the "active" state and the user will be added as a member of the team.
If the user is already a member of the team, this endpoint will update the role of the team member's role. To update the membership of a team member, the authenticated user must be an organization owner or a team maintainer.
Note: You can also specify a team by org_id
and team_id
using the route PUT /organizations/{org_id}/team/{team_id}/memberships/{username}
.
octokit.rest.teams.addOrUpdateMembershipForUserInOrg({
org,
team_slug,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
username | yes | |
role | no |
The role that this user should have in the team. Can be one of: |
See also: GitHub Developer Guide documentation.
Add or update team project permissions
Adds an organization project to a team. To add a project to a team or update the team's permission on a project, the authenticated user must have admin
permissions for the project. The project and team must be part of the same organization.
Note: You can also specify a team by org_id
and team_id
using the route PUT /organizations/{org_id}/team/{team_id}/projects/{project_id}
.
octokit.rest.teams.addOrUpdateProjectPermissionsInOrg({
org,
team_slug,
project_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
project_id | yes | |
permission | no |
The permission to grant to the team for this project. Can be one of: |
See also: GitHub Developer Guide documentation.
Add or update team repository permissions
To add a repository to a team or update the team's permission on a repository, the authenticated user must have admin access to the repository, and must be able to see the team. The repository must be owned by the organization, or a direct fork of a repository owned by the organization. You will get a 422 Unprocessable Entity
status if you attempt to add a repository to a team that is not owned by the organization. Note that, if you choose not to pass any parameters, you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
Note: You can also specify a team by org_id
and team_id
using the route PUT /organizations/{org_id}/team/{team_id}/repos/{owner}/{repo}
.
For more information about the permission levels, see "Repository permission levels for an organization".
octokit.rest.teams.addOrUpdateRepoPermissionsInOrg({
org,
team_slug,
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
owner | yes | |
repo | yes | |
permission | no |
The permission to grant the team on this repository. Can be one of: If no permission is specified, the team's |
See also: GitHub Developer Guide documentation.
Check team permissions for a project
Checks whether a team has read
, write
, or admin
permissions for an organization project. The response includes projects inherited from a parent team.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/projects/{project_id}
.
octokit.rest.teams.checkPermissionsForProjectInOrg({
org,
team_slug,
project_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
project_id | yes |
See also: GitHub Developer Guide documentation.
Check team permissions for a repository
Checks whether a team has admin
, push
, maintain
, triage
, or pull
permission for a repository. Repositories inherited through a parent team will also be checked.
You can also get information about the specified repository, including what permissions the team grants on it, by passing the following custom media type via the application/vnd.github.v3.repository+json
accept header.
If a team doesn't have permission for the repository, you will receive a 404 Not Found
response status.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/repos/{owner}/{repo}
.
octokit.rest.teams.checkPermissionsForRepoInOrg({
org,
team_slug,
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Create a team
To create a team, the authenticated user must be a member or owner of {org}
. By default, organization members can create teams. Organization owners can limit team creation to organization owners. For more information, see "Setting team creation permissions."
When you create a new team, you automatically become a team maintainer without explicitly adding yourself to the optional array of maintainers
. For more information, see "About teams".
octokit.rest.teams.create({
org,
name,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
name | yes |
The name of the team. |
description | no |
The description of the team. |
maintainers | no |
List GitHub IDs for organization members who will become team maintainers. |
repo_names | no |
The full name (e.g., "organization-name/repository-name") of repositories to add the team to. |
privacy | no |
The level of privacy this team should have. The options are: |
permission | no |
Deprecated. The permission that new repositories will be added to the team with when none is specified. Can be one of: |
parent_team_id | no |
The ID of a team to set as the parent team. |
See also: GitHub Developer Guide documentation.
Create a discussion comment
Creates a new comment on a team discussion. OAuth access tokens require the write:discussion
scope.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
Note: You can also specify a team by org_id
and team_id
using the route POST /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}/comments
.
octokit.rest.teams.createDiscussionCommentInOrg({
org,
team_slug,
discussion_number,
body,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
body | yes |
The discussion comment's body text. |
See also: GitHub Developer Guide documentation.
Create a discussion
Creates a new discussion post on a team's page. OAuth access tokens require the write:discussion
scope.
This endpoint triggers notifications. Creating content too quickly using this endpoint may result in abuse rate limiting. See "Abuse rate limits" and "Dealing with abuse rate limits" for details.
Note: You can also specify a team by org_id
and team_id
using the route POST /organizations/{org_id}/team/{team_id}/discussions
.
octokit.rest.teams.createDiscussionInOrg({
org,
team_slug,
title,
body,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
title | yes |
The discussion post's title. |
body | yes |
The discussion post's body text. |
private | no |
Private posts are only visible to team members, organization owners, and team maintainers. Public posts are visible to all members of the organization. Set to |
See also: GitHub Developer Guide documentation.
Delete a discussion comment
Deletes a comment on a team discussion. OAuth access tokens require the write:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}/comments/{comment_number}
.
octokit.rest.teams.deleteDiscussionCommentInOrg({
org,
team_slug,
discussion_number,
comment_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
comment_number | yes |
See also: GitHub Developer Guide documentation.
Delete a discussion
Delete a discussion from a team's page. OAuth access tokens require the write:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}
.
octokit.rest.teams.deleteDiscussionInOrg({
org,
team_slug,
discussion_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes |
See also: GitHub Developer Guide documentation.
Delete a team
To delete a team, the authenticated user must be an organization owner or team maintainer.
If you are an organization owner, deleting a parent team will delete all of its child teams as well.
Note: You can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}
.
octokit.rest.teams.deleteInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
See also: GitHub Developer Guide documentation.
Get a team by name
Gets a team using the team's slug
. GitHub generates the slug
from the team name
.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}
.
octokit.rest.teams.getByName({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
See also: GitHub Developer Guide documentation.
Get a discussion comment
Get a specific comment on a team discussion. OAuth access tokens require the read:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}/comments/{comment_number}
.
octokit.rest.teams.getDiscussionCommentInOrg({
org,
team_slug,
discussion_number,
comment_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
comment_number | yes |
See also: GitHub Developer Guide documentation.
Get a discussion
Get a specific discussion on a team's page. OAuth access tokens require the read:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}
.
octokit.rest.teams.getDiscussionInOrg({
org,
team_slug,
discussion_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes |
See also: GitHub Developer Guide documentation.
Get team membership for a user
Team members will include the members of child teams.
To get a user's membership with a team, the team must be visible to the authenticated user.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/memberships/{username}
.
Note:
The response contains the state
of the membership and the member's role
.
The role
for organization owners is set to maintainer
. For more information about maintainer
roles, see see Create a team.
octokit.rest.teams.getMembershipForUserInOrg({
org,
team_slug,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
username | yes |
See also: GitHub Developer Guide documentation.
List teams
Lists all teams in an organization that are visible to the authenticated user.
octokit.rest.teams.list({
org,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List child teams
Lists the child teams of the team specified by {team_slug}
.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/teams
.
octokit.rest.teams.listChildInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List discussion comments
List all comments on a team discussion. OAuth access tokens require the read:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}/comments
.
octokit.rest.teams.listDiscussionCommentsInOrg({
org,
team_slug,
discussion_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
direction | no |
One of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List discussions
List all discussions on a team's page. OAuth access tokens require the read:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/discussions
.
octokit.rest.teams.listDiscussionsInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
direction | no |
One of |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
pinned | no |
Pinned discussions only filter |
See also: GitHub Developer Guide documentation.
List teams for the authenticated user
List all of the teams across all of the organizations to which the authenticated user belongs. This method requires user
, repo
, or read:org
scope when authenticating via OAuth.
octokit.rest.teams.listForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List team members
Team members will include the members of child teams.
To list members in a team, the team must be visible to the authenticated user.
octokit.rest.teams.listMembersInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
role | no |
Filters members returned by their role in the team. Can be one of: |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List pending team invitations
The return hash contains a role
field which refers to the Organization Invitation role and will be one of the following values: direct_member
, admin
, billing_manager
, hiring_manager
, or reinstate
. If the invitee is not a GitHub member, the login
field in the return hash will be null
.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/invitations
.
octokit.rest.teams.listPendingInvitationsInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List team projects
Lists the organization projects for a team.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/projects
.
octokit.rest.teams.listProjectsInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List team repositories
Lists a team's repositories visible to the authenticated user.
Note: You can also specify a team by org_id
and team_id
using the route GET /organizations/{org_id}/team/{team_id}/repos
.
octokit.rest.teams.listReposInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Remove team membership for a user
Team synchronization is available for organizations using GitHub Enterprise Cloud. For more information, see GitHub's products in the GitHub Help documentation.
To remove a membership between a user and a team, the authenticated user must have 'admin' permissions to the team or be an owner of the organization that the team is associated with. Removing team membership does not delete the user, it just removes their membership from the team.
Note: When you have team synchronization set up for a team with your organization's identity provider (IdP), you will see an error if you attempt to use the API for making changes to the team's membership. If you have access to manage group membership in your IdP, you can manage GitHub team membership through your identity provider, which automatically adds and removes team members in an organization. For more information, see "Synchronizing teams between your identity provider and GitHub."
Note: You can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}/memberships/{username}
.
octokit.rest.teams.removeMembershipForUserInOrg({
org,
team_slug,
username,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
username | yes |
See also: GitHub Developer Guide documentation.
Remove a project from a team
Removes an organization project from a team. An organization owner or a team maintainer can remove any project from the team. To remove a project from a team as an organization member, the authenticated user must have read
access to both the team and project, or admin
access to the team or project. This endpoint removes the project from the team, but does not delete the project.
Note: You can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}/projects/{project_id}
.
octokit.rest.teams.removeProjectInOrg({
org,
team_slug,
project_id,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
project_id | yes |
See also: GitHub Developer Guide documentation.
Remove a repository from a team
If the authenticated user is an organization owner or a team maintainer, they can remove any repositories from the team. To remove a repository from a team as an organization member, the authenticated user must have admin access to the repository and must be able to see the team. This does not delete the repository, it just removes it from the team.
Note: You can also specify a team by org_id
and team_id
using the route DELETE /organizations/{org_id}/team/{team_id}/repos/{owner}/{repo}
.
octokit.rest.teams.removeRepoInOrg({
org,
team_slug,
owner,
repo,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
owner | yes | |
repo | yes |
See also: GitHub Developer Guide documentation.
Update a discussion comment
Edits the body text of a discussion comment. OAuth access tokens require the write:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route PATCH /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}/comments/{comment_number}
.
octokit.rest.teams.updateDiscussionCommentInOrg({
org,
team_slug,
discussion_number,
comment_number,
body,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
comment_number | yes | |
body | yes |
The discussion comment's body text. |
See also: GitHub Developer Guide documentation.
Update a discussion
Edits the title and body text of a discussion post. Only the parameters you provide are updated. OAuth access tokens require the write:discussion
scope.
Note: You can also specify a team by org_id
and team_id
using the route PATCH /organizations/{org_id}/team/{team_id}/discussions/{discussion_number}
.
octokit.rest.teams.updateDiscussionInOrg({
org,
team_slug,
discussion_number,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
discussion_number | yes | |
title | no |
The discussion post's title. |
body | no |
The discussion post's body text. |
See also: GitHub Developer Guide documentation.
Update a team
To edit a team, the authenticated user must either be an organization owner or a team maintainer.
Note: You can also specify a team by org_id
and team_id
using the route PATCH /organizations/{org_id}/team/{team_id}
.
octokit.rest.teams.updateInOrg({
org,
team_slug,
});
Parameters
name | required | description |
---|---|---|
org | yes | |
team_slug | yes |
team_slug parameter |
name | no |
The name of the team. |
description | no |
The description of the team. |
privacy | no |
The level of privacy this team should have. Editing teams without specifying this parameter leaves |
permission | no |
Deprecated. The permission that new repositories will be added to the team with when none is specified. Can be one of: |
parent_team_id | no |
The ID of a team to set as the parent team. |
See also: GitHub Developer Guide documentation.
Users
Add an email address for the authenticated user
This endpoint is accessible with the user
scope.
octokit.rest.users.addEmailForAuthenticated({
emails,
});
Parameters
name | required | description |
---|---|---|
emails | yes |
Adds one or more email addresses to your GitHub account. Must contain at least one email address. Note: Alternatively, you can pass a single email address or an |
See also: GitHub Developer Guide documentation.
Block a user
octokit.rest.users.block({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Check if a user is blocked by the authenticated user
octokit.rest.users.checkBlocked({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Check if a user follows another user
octokit.rest.users.checkFollowingForUser({
username,
target_user,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
target_user | yes |
See also: GitHub Developer Guide documentation.
Check if a person is followed by the authenticated user
octokit.rest.users.checkPersonIsFollowedByAuthenticated({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Create a GPG key for the authenticated user
Adds a GPG key to the authenticated user's GitHub account. Requires that you are authenticated via Basic Auth, or OAuth with at least write:gpg_key
scope.
octokit.rest.users.createGpgKeyForAuthenticated({
armored_public_key,
});
Parameters
name | required | description |
---|---|---|
armored_public_key | yes |
A GPG key in ASCII-armored format. |
See also: GitHub Developer Guide documentation.
Create a public SSH key for the authenticated user
Adds a public SSH key to the authenticated user's GitHub account. Requires that you are authenticated via Basic Auth, or OAuth with at least write:public_key
scope.
octokit.rest.users.createPublicSshKeyForAuthenticated({
key,
});
Parameters
name | required | description |
---|---|---|
title | no |
A descriptive name for the new key. |
key | yes |
The public SSH key to add to your GitHub account. |
See also: GitHub Developer Guide documentation.
Delete an email address for the authenticated user
This endpoint is accessible with the user
scope.
octokit.rest.users.deleteEmailForAuthenticated({
emails,
});
Parameters
name | required | description |
---|---|---|
emails | yes |
Email addresses associated with the GitHub user account. |
See also: GitHub Developer Guide documentation.
Delete a GPG key for the authenticated user
Removes a GPG key from the authenticated user's GitHub account. Requires that you are authenticated via Basic Auth or via OAuth with at least admin:gpg_key
scope.
octokit.rest.users.deleteGpgKeyForAuthenticated({
gpg_key_id,
});
Parameters
name | required | description |
---|---|---|
gpg_key_id | yes |
gpgkeyid parameter |
See also: GitHub Developer Guide documentation.
Delete a public SSH key for the authenticated user
Removes a public SSH key from the authenticated user's GitHub account. Requires that you are authenticated via Basic Auth or via OAuth with at least admin:public_key
scope.
octokit.rest.users.deletePublicSshKeyForAuthenticated({
key_id,
});
Parameters
name | required | description |
---|---|---|
key_id | yes |
key_id parameter |
See also: GitHub Developer Guide documentation.
Follow a user
Note that you'll need to set Content-Length
to zero when calling out to this endpoint. For more information, see "HTTP verbs."
Following a user requires the user to be logged in and authenticated with basic auth or OAuth with the user:follow
scope.
octokit.rest.users.follow({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Get the authenticated user
If the authenticated user is authenticated through basic authentication or OAuth with the user
scope, then the response lists public and private profile information.
If the authenticated user is authenticated through OAuth without the user
scope, then the response lists only public profile information.
octokit.rest.users.getAuthenticated();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
Get a user
Provides publicly available information about someone with a GitHub account.
GitHub Apps with the Plan
user permission can use this endpoint to retrieve information about a user's GitHub plan. The GitHub App must be authenticated as a user. See "Identifying and authorizing users for GitHub Apps" for details about authentication. For an example response, see 'Response with GitHub plan information' below"
The email
key in the following response is the publicly visible email address from your GitHub profile page. When setting up your profile, you can select a primary email address to be “public” which provides an email entry for this endpoint. If you do not set a public email address for email
, then it will have a value of null
. You only see publicly visible email addresses when authenticated with GitHub. For more information, see Authentication.
The Emails API enables you to list all of your email addresses, and toggle a primary email to be visible publicly. For more information, see "Emails API".
octokit.rest.users.getByUsername({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Get contextual information for a user
Provides hovercard information when authenticated through basic auth or OAuth with the repo
scope. You can find out more about someone in relation to their pull requests, issues, repositories, and organizations.
The subject_type
and subject_id
parameters provide context for the person's hovercard, which returns more information than without the parameters. For example, if you wanted to find out more about octocat
who owns the Spoon-Knife
repository via cURL, it would look like this:
curl -u username:token
https://api.github.com/users/octocat/hovercard?subject_type=repository&subject_id=1300192
octokit.rest.users.getContextForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
subject_type | no |
Identifies which additional information you'd like to receive about the person's hovercard. Can be |
subject_id | no |
Uses the ID for the |
See also: GitHub Developer Guide documentation.
Get a GPG key for the authenticated user
View extended details for a single GPG key. Requires that you are authenticated via Basic Auth or via OAuth with at least read:gpg_key
scope.
octokit.rest.users.getGpgKeyForAuthenticated({
gpg_key_id,
});
Parameters
name | required | description |
---|---|---|
gpg_key_id | yes |
gpgkeyid parameter |
See also: GitHub Developer Guide documentation.
Get a public SSH key for the authenticated user
View extended details for a single public SSH key. Requires that you are authenticated via Basic Auth or via OAuth with at least read:public_key
scope.
octokit.rest.users.getPublicSshKeyForAuthenticated({
key_id,
});
Parameters
name | required | description |
---|---|---|
key_id | yes |
key_id parameter |
See also: GitHub Developer Guide documentation.
List users
Lists all users, in the order that they signed up on GitHub. This list includes personal user accounts and organization accounts.
Note: Pagination is powered exclusively by the since
parameter. Use the Link header to get the URL for the next page of users.
octokit.rest.users.list();
Parameters
name | required | description |
---|---|---|
since | no |
A user ID. Only return users with an ID greater than this ID. |
per_page | no |
Results per page (max 100). |
See also: GitHub Developer Guide documentation.
List users blocked by the authenticated user
List the users you've blocked on your personal account.
octokit.rest.users.listBlockedByAuthenticated();
Parameters
This endpoint has no parameters
See also: GitHub Developer Guide documentation.
List email addresses for the authenticated user
Lists all of your email addresses, and specifies which one is visible to the public. This endpoint is accessible with the user:email
scope.
octokit.rest.users.listEmailsForAuthenticated();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List the people the authenticated user follows
Lists the people who the authenticated user follows.
octokit.rest.users.listFollowedByAuthenticated();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List followers of the authenticated user
Lists the people following the authenticated user.
octokit.rest.users.listFollowersForAuthenticatedUser();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List followers of a user
Lists the people following the specified user.
octokit.rest.users.listFollowersForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List the people a user follows
Lists the people who the specified user follows.
octokit.rest.users.listFollowingForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List GPG keys for the authenticated user
Lists the current user's GPG keys. Requires that you are authenticated via Basic Auth or via OAuth with at least read:gpg_key
scope.
octokit.rest.users.listGpgKeysForAuthenticated();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List GPG keys for a user
Lists the GPG keys for a user. This information is accessible by anyone.
octokit.rest.users.listGpgKeysForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public email addresses for the authenticated user
Lists your publicly visible email address, which you can set with the Set primary email visibility for the authenticated user endpoint. This endpoint is accessible with the user:email
scope.
octokit.rest.users.listPublicEmailsForAuthenticated();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public keys for a user
Lists the verified public SSH keys for a user. This is accessible by anyone.
octokit.rest.users.listPublicKeysForUser({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes | |
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
List public SSH keys for the authenticated user
Lists the public SSH keys for the authenticated user's GitHub account. Requires that you are authenticated via Basic Auth or via OAuth with at least read:public_key
scope.
octokit.rest.users.listPublicSshKeysForAuthenticated();
Parameters
name | required | description |
---|---|---|
per_page | no |
Results per page (max 100). |
page | no |
Page number of the results to fetch. |
See also: GitHub Developer Guide documentation.
Set primary email visibility for the authenticated user
Sets the visibility for your primary email addresses.
octokit.rest.users.setPrimaryEmailVisibilityForAuthenticated({
email,
visibility,
});
Parameters
name | required | description |
---|---|---|
yes |
An email address associated with the GitHub user account to manage. | |
visibility | yes |
Denotes whether an email is publically visible. |
See also: GitHub Developer Guide documentation.
Unblock a user
octokit.rest.users.unblock({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Unfollow a user
Unfollowing a user requires the user to be logged in and authenticated with basic auth or OAuth with the user:follow
scope.
octokit.rest.users.unfollow({
username,
});
Parameters
name | required | description |
---|---|---|
username | yes |
See also: GitHub Developer Guide documentation.
Update the authenticated user
Note: If your email is set to private and you send an email
parameter as part of this request to update your profile, your privacy settings are still enforced: the email address will not be displayed on your public profile or via the API.
octokit.rest.users.updateAuthenticated();
Parameters
name | required | description |
---|---|---|
name | no |
The new name of the user. |
no |
The publicly visible email address of the user. | |
blog | no |
The new blog URL of the user. |
twitter_username | no |
The new Twitter username of the user. |
company | no |
The new company of the user. |
location | no |
The new location of the user. |
hireable | no |
The new hiring availability of the user. |
bio | no |
The new short biography of the user. |
See also: GitHub Developer Guide documentation.