Update checked-in dependencies

This commit is contained in:
github-actions[bot] 2025-06-02 17:50:04 +00:00
parent 55ff016766
commit 313daefcef
1570 changed files with 4230 additions and 228668 deletions

View file

@ -1,4 +1,4 @@
const VERSION = "5.0.2";
const VERSION = "5.0.3";
export {
VERSION
};

View file

@ -1 +1 @@
export declare const VERSION = "5.0.2";
export declare const VERSION = "5.0.3";

View file

@ -469,6 +469,9 @@ const Endpoints = {
getGithubBillingUsageReportOrg: [
"GET /organizations/{org}/settings/billing/usage"
],
getGithubBillingUsageReportUser: [
"GET /users/{username}/settings/billing/usage"
],
getGithubPackagesBillingOrg: ["GET /orgs/{org}/settings/billing/packages"],
getGithubPackagesBillingUser: [
"GET /users/{username}/settings/billing/packages"
@ -767,6 +770,7 @@ const Endpoints = {
],
listCopilotSeats: ["GET /orgs/{org}/copilot/billing/seats"]
},
credentials: { revoke: ["POST /credentials/revoke"] },
dependabot: {
addSelectedRepoToOrgSecret: [
"PUT /orgs/{org}/dependabot/secrets/{secret_name}/repositories/{repository_id}"

File diff suppressed because one or more lines are too long

View file

@ -1,4 +1,4 @@
const VERSION = "15.0.0";
const VERSION = "16.0.0";
export {
VERSION
};

View file

@ -1,7 +1,7 @@
{
"version": 3,
"sources": ["../../src/version.ts"],
"sourcesContent": ["export const VERSION = \"15.0.0\";\n"],
"sourcesContent": ["export const VERSION = \"16.0.0\";\n"],
"mappings": "AAAO,MAAM,UAAU;",
"names": []
}

View file

@ -2846,6 +2846,18 @@ export type RestEndpointMethods = {
url: string;
}>;
};
/**
* Gets a report of the total usage for a user.
*
* **Note:** This endpoint is only available to users with access to the enhanced billing platform.
*/
getGithubBillingUsageReportUser: {
(params?: RestEndpointMethodTypes["billing"]["getGithubBillingUsageReportUser"]["parameters"]): Promise<RestEndpointMethodTypes["billing"]["getGithubBillingUsageReportUser"]["response"]>;
defaults: RequestInterface["defaults"];
endpoint: EndpointInterface<{
url: string;
}>;
};
/**
* Gets the free and paid storage used for GitHub Packages in gigabytes.
*
@ -3098,11 +3110,9 @@ export type RestEndpointMethods = {
}>;
};
/**
* Triggers GitHub to rerequest an existing check run, without pushing new code to a repository. This endpoint will trigger the [`check_run` webhook](https://docs.github.com/webhooks/event-payloads/#check_run) event with the action `rerequested`. When a check run is `rerequested`, its `status` is reset to `queued` and the `conclusion` is cleared.
* Triggers GitHub to rerequest an existing check run, without pushing new code to a repository. This endpoint will trigger the [`check_run` webhook](https://docs.github.com/webhooks/event-payloads/#check_run) event with the action `rerequested`. When a check run is `rerequested`, the `status` of the check suite it belongs to is reset to `queued` and the `conclusion` is cleared. The check run itself is not updated. GitHub apps recieving the [`check_run` webhook](https://docs.github.com/webhooks/event-payloads/#check_run) with the `rerequested` action should then decide if the check run should be reset or updated and call the [update `check_run` endpoint](https://docs.github.com/rest/checks/runs#update-a-check-run) to update the check_run if desired.
*
* For more information about how to re-run GitHub Actions jobs, see "[Re-run a job from a workflow run](https://docs.github.com/rest/actions/workflow-runs#re-run-a-job-from-a-workflow-run)".
*
* OAuth apps and personal access tokens (classic) cannot use this endpoint.
*/
rerequestRun: {
(params?: RestEndpointMethodTypes["checks"]["rerequestRun"]["parameters"]): Promise<RestEndpointMethodTypes["checks"]["rerequestRun"]["response"]>;
@ -3113,8 +3123,6 @@ export type RestEndpointMethods = {
};
/**
* Triggers GitHub to rerequest an existing check suite, without pushing new code to a repository. This endpoint will trigger the [`check_suite` webhook](https://docs.github.com/webhooks/event-payloads/#check_suite) event with the action `rerequested`. When a check suite is `rerequested`, its `status` is reset to `queued` and the `conclusion` is cleared.
*
* OAuth apps and personal access tokens (classic) cannot use this endpoint.
*/
rerequestSuite: {
(params?: RestEndpointMethodTypes["checks"]["rerequestSuite"]["parameters"]): Promise<RestEndpointMethodTypes["checks"]["rerequestSuite"]["response"]>;
@ -4647,6 +4655,30 @@ export type RestEndpointMethods = {
}>;
};
};
credentials: {
/**
* Submit a list of credentials to be revoked. This endpoint is intended to revoke credentials the caller does not own and may have found exposed on GitHub.com or elsewhere. It can also be used for credentials associated with an old user account that you no longer have access to. Credential owners will be notified of the revocation.
*
* This endpoint currently accepts the following credential types:
* - Personal access tokens (classic)
* - Fine-grained personal access tokens
*
* Revoked credentials may impact users on GitHub Free, Pro, & Team and GitHub Enterprise Cloud, and GitHub Enterprise Cloud with Enterprise Managed Users.
* GitHub cannot reactivate any credentials that have been revoked; new credentials will need to be generated.
*
* To prevent abuse, this API is limited to only 60 unauthenticated requests per hour and a max of 1000 tokens per API request.
*
* > [!NOTE]
* > Any authenticated requests will return a 403.
*/
revoke: {
(params?: RestEndpointMethodTypes["credentials"]["revoke"]["parameters"]): Promise<RestEndpointMethodTypes["credentials"]["revoke"]["response"]>;
defaults: RequestInterface["defaults"];
endpoint: EndpointInterface<{
url: string;
}>;
};
};
dependabot: {
/**
* Adds a repository to an organization secret when the `visibility` for
@ -8101,9 +8133,6 @@ export type RestEndpointMethods = {
};
privateRegistries: {
/**
* > [!NOTE]
* > This endpoint is in public preview and is subject to change.
*
* Creates a private registry configuration with an encrypted value for an organization. Encrypt your secret using [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). For more information, see "[Encrypting secrets for the REST API](https://docs.github.com/rest/guides/encrypting-secrets-for-the-rest-api)."
*
* OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
@ -8116,9 +8145,6 @@ export type RestEndpointMethods = {
}>;
};
/**
* > [!NOTE]
* > This endpoint is in public preview and is subject to change.
*
* Delete a private registry configuration at the organization-level.
*
* OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
@ -8131,9 +8157,6 @@ export type RestEndpointMethods = {
}>;
};
/**
* > [!NOTE]
* > This endpoint is in public preview and is subject to change.
*
* Get the configuration of a single private registry defined for an organization, omitting its encrypted value.
*
* OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
@ -8146,9 +8169,6 @@ export type RestEndpointMethods = {
}>;
};
/**
* > [!NOTE]
* > This endpoint is in public preview and is subject to change.
*
* Gets the org public key, which is needed to encrypt private registry secrets. You need to encrypt a secret before you can create or update secrets.
*
* OAuth tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
@ -8161,9 +8181,6 @@ export type RestEndpointMethods = {
}>;
};
/**
* > [!NOTE]
* > This endpoint is in public preview and is subject to change.
*
* Lists all private registry configurations available at the organization-level without revealing their encrypted
* values.
*
@ -8177,9 +8194,6 @@ export type RestEndpointMethods = {
}>;
};
/**
* > [!NOTE]
* > This endpoint is in public preview and is subject to change.
*
* Updates a private registry configuration with an encrypted value for an organization. Encrypt your secret using [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). For more information, see "[Encrypting secrets for the REST API](https://docs.github.com/rest/guides/encrypting-secrets-for-the-rest-api)."
*
* OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
@ -8981,11 +8995,13 @@ export type RestEndpointMethods = {
}>;
};
/**
* This endpoint triggers [notifications](https://docs.github.com/github/managing-subscriptions-and-notifications-on-github/about-notifications). Creating content too quickly using this endpoint may result in secondary rate limiting. For more information, see "[Rate limits for the API](https://docs.github.com/rest/using-the-rest-api/rate-limits-for-the-rest-api#about-secondary-rate-limits)" and "[Best practices for using the REST API](https://docs.github.com/rest/guides/best-practices-for-using-the-rest-api)."
* Add a user to a repository with a specified level of access. If the repository is owned by an organization, this API does not add the user to the organization - a user that has repository access without being an organization member is called an "outside collaborator" (if they are not an Enterprise Managed User) or a "repository collaborator" if they are an Enterprise Managed User. These users are exempt from some organization policies - see "[Adding outside collaborators to repositories](https://docs.github.com/organizations/managing-user-access-to-your-organizations-repositories/managing-outside-collaborators/adding-outside-collaborators-to-repositories-in-your-organization)" to learn more about these collaborator types.
*
* Adding an outside collaborator may be restricted by enterprise administrators. For more information, see "[Enforcing repository management policies in your enterprise](https://docs.github.com/admin/policies/enforcing-policies-for-your-enterprise/enforcing-repository-management-policies-in-your-enterprise#enforcing-a-policy-for-inviting-outside-collaborators-to-repositories)."
* This endpoint triggers [notifications](https://docs.github.com/github/managing-subscriptions-and-notifications-on-github/about-notifications).
*
* For more information on permission levels, see "[Repository permission levels for an organization](https://docs.github.com/github/setting-up-and-managing-organizations-and-teams/repository-permission-levels-for-an-organization#permission-levels-for-repositories-owned-by-an-organization)". There are restrictions on which permissions can be granted to organization members when an organization base role is in place. In this case, the permission being given must be equal to or higher than the org base permission. Otherwise, the request will fail with:
* Adding an outside collaborator may be restricted by enterprise and organization administrators. For more information, see "[Enforcing repository management policies in your enterprise](https://docs.github.com/admin/policies/enforcing-policies-for-your-enterprise/enforcing-repository-management-policies-in-your-enterprise#enforcing-a-policy-for-inviting-outside-collaborators-to-repositories)" and "[Setting permissions for adding outside collaborators](https://docs.github.com/organizations/managing-organization-settings/setting-permissions-for-adding-outside-collaborators)" for organization settings.
*
* For more information on permission levels, see "[Repository permission levels for an organization](https://docs.github.com/github/setting-up-and-managing-organizations-and-teams/repository-permission-levels-for-an-organization#permission-levels-for-repositories-owned-by-an-organization)". There are restrictions on which permissions can be granted to organization members when an organization base role is in place. In this case, the role being given must be equal to or higher than the org base permission. Otherwise, the request will fail with:
*
* ```
* Cannot assign {member} permission of {role name}
@ -8995,6 +9011,8 @@ export type RestEndpointMethods = {
*
* The invitee will receive a notification that they have been invited to the repository, which they must accept or decline. They may do this via the notifications page, the email they receive, or by using the [API](https://docs.github.com/rest/collaborators/invitations).
*
* For Enterprise Managed Users, this endpoint does not send invitations - these users are automatically added to organizations and repositories. Enterprise Managed Users can only be added to organizations and repositories within their enterprise.
*
* **Updating an existing collaborator's permission level**
*
* The endpoint can also be used to change the permissions of an existing collaborator without first removing and re-adding the collaborator. To change the permissions, use the same endpoint and pass a different `permission` parameter. The response will be a `204`, with no other indication that the permission level changed.
@ -10126,13 +10144,15 @@ export type RestEndpointMethods = {
}>;
};
/**
* Checks the repository permission of a collaborator. The possible repository
* permissions are `admin`, `write`, `read`, and `none`.
* Checks the repository permission and role of a collaborator.
*
* *Note*: The `permission` attribute provides the legacy base roles of `admin`, `write`, `read`, and `none`, where the
* `maintain` role is mapped to `write` and the `triage` role is mapped to `read`. To determine the role assigned to the
* collaborator, see the `role_name` attribute, which will provide the full role name, including custom roles. The
* `permissions` hash can also be used to determine which base level of access the collaborator has to the repository.
* The `permission` attribute provides the legacy base roles of `admin`, `write`, `read`, and `none`, where the
* `maintain` role is mapped to `write` and the `triage` role is mapped to `read`.
* The `role_name` attribute provides the name of the assigned role, including custom roles. The
* `permission` can also be used to determine which base level of access the collaborator has to the repository.
*
* The calculated permissions are the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.
* There is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.
*/
getCollaboratorPermissionLevel: {
(params?: RestEndpointMethodTypes["repos"]["getCollaboratorPermissionLevel"]["parameters"]): Promise<RestEndpointMethodTypes["repos"]["getCollaboratorPermissionLevel"]["response"]>;
@ -10850,12 +10870,12 @@ export type RestEndpointMethods = {
};
/**
* For organization-owned repositories, the list of collaborators includes outside collaborators, organization members that are direct collaborators, organization members with access through team memberships, organization members with access through default organization permissions, and organization owners.
* Organization members with write, maintain, or admin privileges on the organization-owned repository can use this endpoint.
* The `permissions` hash returned in the response contains the base role permissions of the collaborator. The `role_name` is the highest role assigned to the collaborator after considering all sources of grants, including: repo, teams, organization, and enterprise.
* There is presently not a way to differentiate between an organization level grant and a repository level grant from this endpoint response.
*
* Team members will include the members of child teams.
*
* The authenticated user must have push access to the repository to use this endpoint.
*
* The authenticated user must have write, maintain, or admin privileges on the repository to use this endpoint. For organization-owned repositories, the authenticated user needs to be a member of the organization.
* OAuth app tokens and personal access tokens (classic) need the `read:org` and `repo` scopes to use this endpoint.
*/
listCollaborators: {

View file

@ -851,6 +851,10 @@ export type RestEndpointMethodTypes = {
parameters: RequestParameters & Endpoints["GET /organizations/{org}/settings/billing/usage"]["parameters"];
response: Endpoints["GET /organizations/{org}/settings/billing/usage"]["response"];
};
getGithubBillingUsageReportUser: {
parameters: RequestParameters & Endpoints["GET /users/{username}/settings/billing/usage"]["parameters"];
response: Endpoints["GET /users/{username}/settings/billing/usage"]["response"];
};
getGithubPackagesBillingOrg: {
parameters: RequestParameters & Endpoints["GET /orgs/{org}/settings/billing/packages"]["parameters"];
response: Endpoints["GET /orgs/{org}/settings/billing/packages"]["response"];
@ -1342,6 +1346,12 @@ export type RestEndpointMethodTypes = {
response: Endpoints["GET /orgs/{org}/copilot/billing/seats"]["response"];
};
};
credentials: {
revoke: {
parameters: RequestParameters & Endpoints["POST /credentials/revoke"]["parameters"];
response: Endpoints["POST /credentials/revoke"]["response"];
};
};
dependabot: {
addSelectedRepoToOrgSecret: {
parameters: RequestParameters & Endpoints["PUT /orgs/{org}/dependabot/secrets/{secret_name}/repositories/{repository_id}"]["parameters"];

View file

@ -1 +1 @@
export declare const VERSION = "15.0.0";
export declare const VERSION = "16.0.0";

View file

@ -1,6 +1,6 @@
{
"name": "@octokit/plugin-rest-endpoint-methods",
"version": "15.0.0",
"version": "16.0.0",
"type": "module",
"description": "Octokit plugin adding one method for all of api.github.com REST API endpoints",
"repository": "github:octokit/plugin-rest-endpoint-methods.js",
@ -13,10 +13,10 @@
"author": "Gregor Martynus (https://twitter.com/gr2m)",
"license": "MIT",
"dependencies": {
"@octokit/types": "^14.0.0"
"@octokit/types": "^14.1.0"
},
"devDependencies": {
"@octokit/core": "^6.0.0",
"@octokit/core": "^7.0.0",
"@octokit/tsconfig": "^4.0.0",
"@types/node": "^22.0.0",
"@vitest/coverage-v8": "^3.0.5",

4
node_modules/octokit/package.json generated vendored
View file

@ -1,6 +1,6 @@
{
"name": "octokit",
"version": "5.0.2",
"version": "5.0.3",
"type": "module",
"description": "The all-batteries-included GitHub SDK for Browsers, Node.js, and Deno",
"keywords": [
@ -18,7 +18,7 @@
"@octokit/oauth-app": "^8.0.1",
"@octokit/plugin-paginate-graphql": "^6.0.0",
"@octokit/plugin-paginate-rest": "^13.0.0",
"@octokit/plugin-rest-endpoint-methods": "^15.0.0",
"@octokit/plugin-rest-endpoint-methods": "^16.0.0",
"@octokit/plugin-retry": "^8.0.1",
"@octokit/plugin-throttling": "^11.0.1",
"@octokit/request-error": "^7.0.0",