commit_sha | yes |
diff --git a/docs/codespaces/addRepositoryForSecretForAuthenticatedUser.md b/docs/codespaces/addRepositoryForSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..68a9373f8
--- /dev/null
+++ b/docs/codespaces/addRepositoryForSecretForAuthenticatedUser.md
@@ -0,0 +1,44 @@
+---
+name: Add a selected repository to a user secret
+example: octokit.rest.codespaces.addRepositoryForSecretForAuthenticatedUser({ secret_name, repository_id })
+route: PUT /user/codespaces/secrets/{secret_name}/repositories/{repository_id}
+scope: codespaces
+type: API method
+---
+
+# Add a selected repository to a user secret
+
+Adds a repository to the selected repositories for a user's codespace secret.
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+GitHub Apps must have write access to the `codespaces_user_secrets` user permission and write access to the `codespaces_secrets` repository permission on the referenced repository to use this endpoint.
+
+```js
+octokit.rest.codespaces.addRepositoryForSecretForAuthenticatedUser({
+ secret_name,
+ repository_id,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+repository_id | yes |
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#add-a-selected-repository-to-a-user-secret).
diff --git a/docs/codespaces/codespaceMachinesForAuthenticatedUser.md b/docs/codespaces/codespaceMachinesForAuthenticatedUser.md
new file mode 100644
index 000000000..b1ca8094b
--- /dev/null
+++ b/docs/codespaces/codespaceMachinesForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: List machine types for a codespace
+example: octokit.rest.codespaces.codespaceMachinesForAuthenticatedUser({ codespace_name })
+route: GET /user/codespaces/{codespace_name}/machines
+scope: codespaces
+type: API method
+---
+
+# List machine types for a codespace
+
+List the machine types a codespace can transition to use.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_metadata` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.codespaceMachinesForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-machine-types-for-a-codespace).
diff --git a/docs/codespaces/createForAuthenticatedUser.md b/docs/codespaces/createForAuthenticatedUser.md
new file mode 100644
index 000000000..5547f3cb0
--- /dev/null
+++ b/docs/codespaces/createForAuthenticatedUser.md
@@ -0,0 +1,107 @@
+---
+name: Create a codespace for the authenticated user
+example: octokit.rest.codespaces.createForAuthenticatedUser({ repository_id, pull_request, pull_request.pull_request_number, pull_request.repository_id })
+route: POST /user/codespaces
+scope: codespaces
+type: API method
+---
+
+# Create a codespace for the authenticated user
+
+Creates a new codespace, owned by the authenticated user.
+
+This endpoint requires either a `repository_id` OR a `pull_request` but not both.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.createForAuthenticatedUser({
+ repository_id,
+pull_request,
+pull_request.pull_request_number,
+pull_request.repository_id
+ })
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ repository_id | yes |
+
+Repository id for this codespace
+
+ |
+ref | no |
+
+Git ref (typically a branch name) for this codespace
+
+ |
+location | no |
+
+Location for this codespace. Assigned by IP if not provided
+
+ |
+client_ip | no |
+
+IP for location auto-detection when proxying a request
+
+ |
+machine | no |
+
+Machine type to use for this codespace
+
+ |
+devcontainer_path | no |
+
+Path to devcontainer.json config to use for this codespace
+
+ |
+multi_repo_permissions_opt_out | no |
+
+Whether to authorize requested permissions from devcontainer.json
+
+ |
+working_directory | no |
+
+Working directory for this codespace
+
+ |
+idle_timeout_minutes | no |
+
+Time in minutes before codespace stops from inactivity
+
+ |
+display_name | no |
+
+Display name for this codespace
+
+ |
+pull_request | yes |
+
+Pull request number for this codespace
+
+ |
+pull_request.pull_request_number | yes |
+
+Pull request number
+
+ |
+pull_request.repository_id | yes |
+
+Repository id for this codespace
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#create-a-codespace-for-the-authenticated-user).
diff --git a/docs/codespaces/createOrUpdateRepoSecret.md b/docs/codespaces/createOrUpdateRepoSecret.md
new file mode 100644
index 000000000..09738145c
--- /dev/null
+++ b/docs/codespaces/createOrUpdateRepoSecret.md
@@ -0,0 +1,133 @@
+---
+name: Create or update a repository secret
+example: octokit.rest.codespaces.createOrUpdateRepoSecret({ owner, repo, secret_name })
+route: PUT /repos/{owner}/{repo}/codespaces/secrets/{secret_name}
+scope: codespaces
+type: API method
+---
+
+# Create or update a repository secret
+
+Creates or updates a repository secret with an encrypted value. Encrypt your secret using
+[LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). You must authenticate using an access
+token with the `repo` scope to use this endpoint. GitHub Apps must have the `codespaces_secrets` repository
+permission to use this endpoint.
+
+#### Example of encrypting a secret using Node.js
+
+Encrypt your secret using the [tweetsodium](https://github.com/github/tweetsodium) library.
+
+```
+const sodium = require('tweetsodium');
+
+const key = "base64-encoded-public-key";
+const value = "plain-text-secret";
+
+// Convert the message and key to Uint8Array's (Buffer implements that interface)
+const messageBytes = Buffer.from(value);
+const keyBytes = Buffer.from(key, 'base64');
+
+// Encrypt using LibSodium.
+const encryptedBytes = sodium.seal(messageBytes, keyBytes);
+
+// Base64 the encrypted secret
+const encrypted = Buffer.from(encryptedBytes).toString('base64');
+
+console.log(encrypted);
+```
+
+#### Example of encrypting a secret using Python
+
+Encrypt your secret using [pynacl](https://pynacl.readthedocs.io/en/latest/public/#nacl-public-sealedbox) with Python 3.
+
+```
+from base64 import b64encode
+from nacl import encoding, public
+
+def encrypt(public_key: str, secret_value: str) -> str:
+ """Encrypt a Unicode string using the public key."""
+ public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
+ sealed_box = public.SealedBox(public_key)
+ encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
+ return b64encode(encrypted).decode("utf-8")
+```
+
+#### Example of encrypting a secret using C#
+
+Encrypt your secret using the [Sodium.Core](https://www.nuget.org/packages/Sodium.Core/) package.
+
+```
+var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
+var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
+
+var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
+
+Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
+```
+
+#### Example of encrypting a secret using Ruby
+
+Encrypt your secret using the [rbnacl](https://github.com/RubyCrypto/rbnacl) gem.
+
+```ruby
+require "rbnacl"
+require "base64"
+
+key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
+public_key = RbNaCl::PublicKey.new(key)
+
+box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
+encrypted_secret = box.encrypt("my_secret")
+
+# Print the base64 encoded secret
+puts Base64.strict_encode64(encrypted_secret)
+```
+
+```js
+octokit.rest.codespaces.createOrUpdateRepoSecret({
+ owner,
+ repo,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+encrypted_value | no |
+
+Value for your secret, encrypted with [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages) using the public key retrieved from the [Get a repository public key](https://docs.github.com/rest/reference/codespaces#get-a-repository-public-key) endpoint.
+
+ |
+key_id | no |
+
+ID of the key you used to encrypt the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#create-or-update-a-repository-secret).
diff --git a/docs/codespaces/createOrUpdateSecretForAuthenticatedUser.md b/docs/codespaces/createOrUpdateSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..080dfe265
--- /dev/null
+++ b/docs/codespaces/createOrUpdateSecretForAuthenticatedUser.md
@@ -0,0 +1,129 @@
+---
+name: Create or update a secret for the authenticated user
+example: octokit.rest.codespaces.createOrUpdateSecretForAuthenticatedUser({ secret_name, key_id })
+route: PUT /user/codespaces/secrets/{secret_name}
+scope: codespaces
+type: API method
+---
+
+# Create or update a secret for the authenticated user
+
+Creates or updates a secret for a user's codespace with an encrypted value. Encrypt your secret using
+[LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages).
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must also have Codespaces access to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_user_secrets` user permission and `codespaces_secrets` repository permission on all referenced repositories to use this endpoint.
+
+#### Example encrypting a secret using Node.js
+
+Encrypt your secret using the [tweetsodium](https://github.com/github/tweetsodium) library.
+
+```
+const sodium = require('tweetsodium');
+
+const key = "base64-encoded-public-key";
+const value = "plain-text-secret";
+
+// Convert the message and key to Uint8Array's (Buffer implements that interface)
+const messageBytes = Buffer.from(value);
+const keyBytes = Buffer.from(key, 'base64');
+
+// Encrypt using LibSodium.
+const encryptedBytes = sodium.seal(messageBytes, keyBytes);
+
+// Base64 the encrypted secret
+const encrypted = Buffer.from(encryptedBytes).toString('base64');
+
+console.log(encrypted);
+```
+
+#### Example encrypting a secret using Python
+
+Encrypt your secret using [pynacl](https://pynacl.readthedocs.io/en/latest/public/#nacl-public-sealedbox) with Python 3.
+
+```
+from base64 import b64encode
+from nacl import encoding, public
+
+def encrypt(public_key: str, secret_value: str) -> str:
+ """Encrypt a Unicode string using the public key."""
+ public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
+ sealed_box = public.SealedBox(public_key)
+ encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
+ return b64encode(encrypted).decode("utf-8")
+```
+
+#### Example encrypting a secret using C#
+
+Encrypt your secret using the [Sodium.Core](https://www.nuget.org/packages/Sodium.Core/) package.
+
+```
+var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
+var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
+
+var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
+
+Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
+```
+
+#### Example encrypting a secret using Ruby
+
+Encrypt your secret using the [rbnacl](https://github.com/RubyCrypto/rbnacl) gem.
+
+```ruby
+require "rbnacl"
+require "base64"
+
+key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
+public_key = RbNaCl::PublicKey.new(key)
+
+box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
+encrypted_secret = box.encrypt("my_secret")
+
+# Print the base64 encoded secret
+puts Base64.strict_encode64(encrypted_secret)
+```
+
+```js
+octokit.rest.codespaces.createOrUpdateSecretForAuthenticatedUser({
+ secret_name,
+ key_id,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+encrypted_value | no |
+
+Value for your secret, encrypted with [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages) using the public key retrieved from the [Get the public key for the authenticated user](https://docs.github.com/rest/reference/codespaces#get-the-public-key-for-the-authenticated-user) endpoint.
+
+ |
+key_id | yes |
+
+ID of the key you used to encrypt the secret.
+
+ |
+selected_repository_ids | no |
+
+An array of repository ids that can access the user secret. You can manage the list of selected repositories using the [List selected repositories for a user secret](https://docs.github.com/rest/reference/codespaces#list-selected-repositories-for-a-user-secret), [Set selected repositories for a user secret](https://docs.github.com/rest/reference/codespaces#set-selected-repositories-for-a-user-secret), and [Remove a selected repository from a user secret](https://docs.github.com/rest/reference/codespaces#remove-a-selected-repository-from-a-user-secret) endpoints.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#create-or-update-a-secret-for-the-authenticated-user).
diff --git a/docs/codespaces/createWithPrForAuthenticatedUser.md b/docs/codespaces/createWithPrForAuthenticatedUser.md
new file mode 100644
index 000000000..2c7eac13e
--- /dev/null
+++ b/docs/codespaces/createWithPrForAuthenticatedUser.md
@@ -0,0 +1,94 @@
+---
+name: Create a codespace from a pull request
+example: octokit.rest.codespaces.createWithPrForAuthenticatedUser({ owner, repo, pull_number })
+route: POST /repos/{owner}/{repo}/pulls/{pull_number}/codespaces
+scope: codespaces
+type: API method
+---
+
+# Create a codespace from a pull request
+
+Creates a codespace owned by the authenticated user for the specified pull request.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.createWithPrForAuthenticatedUser({
+ owner,
+ repo,
+ pull_number,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+pull_number | yes |
+
+The number that identifies the pull request.
+
+ |
+location | no |
+
+Location for this codespace. Assigned by IP if not provided
+
+ |
+client_ip | no |
+
+IP for location auto-detection when proxying a request
+
+ |
+machine | no |
+
+Machine type to use for this codespace
+
+ |
+devcontainer_path | no |
+
+Path to devcontainer.json config to use for this codespace
+
+ |
+multi_repo_permissions_opt_out | no |
+
+Whether to authorize requested permissions from devcontainer.json
+
+ |
+working_directory | no |
+
+Working directory for this codespace
+
+ |
+idle_timeout_minutes | no |
+
+Time in minutes before codespace stops from inactivity
+
+ |
+display_name | no |
+
+Display name for this codespace
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#create-a-codespace-from-a-pull-request).
diff --git a/docs/codespaces/createWithRepoForAuthenticatedUser.md b/docs/codespaces/createWithRepoForAuthenticatedUser.md
new file mode 100644
index 000000000..5b321eae7
--- /dev/null
+++ b/docs/codespaces/createWithRepoForAuthenticatedUser.md
@@ -0,0 +1,93 @@
+---
+name: Create a codespace in a repository
+example: octokit.rest.codespaces.createWithRepoForAuthenticatedUser({ owner, repo })
+route: POST /repos/{owner}/{repo}/codespaces
+scope: codespaces
+type: API method
+---
+
+# Create a codespace in a repository
+
+Creates a codespace owned by the authenticated user in the specified repository.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.createWithRepoForAuthenticatedUser({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+ref | no |
+
+Git ref (typically a branch name) for this codespace
+
+ |
+location | no |
+
+Location for this codespace. Assigned by IP if not provided
+
+ |
+client_ip | no |
+
+IP for location auto-detection when proxying a request
+
+ |
+machine | no |
+
+Machine type to use for this codespace
+
+ |
+devcontainer_path | no |
+
+Path to devcontainer.json config to use for this codespace
+
+ |
+multi_repo_permissions_opt_out | no |
+
+Whether to authorize requested permissions from devcontainer.json
+
+ |
+working_directory | no |
+
+Working directory for this codespace
+
+ |
+idle_timeout_minutes | no |
+
+Time in minutes before codespace stops from inactivity
+
+ |
+display_name | no |
+
+Display name for this codespace
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#create-a-codespace-in-a-repository).
diff --git a/docs/codespaces/deleteForAuthenticatedUser.md b/docs/codespaces/deleteForAuthenticatedUser.md
new file mode 100644
index 000000000..862054716
--- /dev/null
+++ b/docs/codespaces/deleteForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Delete a codespace for the authenticated user
+example: octokit.rest.codespaces.deleteForAuthenticatedUser({ codespace_name })
+route: DELETE /user/codespaces/{codespace_name}
+scope: codespaces
+type: API method
+---
+
+# Delete a codespace for the authenticated user
+
+Deletes a user's codespace.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.deleteForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#delete-a-codespace-for-the-authenticated-user).
diff --git a/docs/codespaces/deleteRepoSecret.md b/docs/codespaces/deleteRepoSecret.md
new file mode 100644
index 000000000..a407fbae3
--- /dev/null
+++ b/docs/codespaces/deleteRepoSecret.md
@@ -0,0 +1,50 @@
+---
+name: Delete a repository secret
+example: octokit.rest.codespaces.deleteRepoSecret({ owner, repo, secret_name })
+route: DELETE /repos/{owner}/{repo}/codespaces/secrets/{secret_name}
+scope: codespaces
+type: API method
+---
+
+# Delete a repository secret
+
+Deletes a secret in a repository using the secret name. You must authenticate using an access token with the `repo` scope to use this endpoint. GitHub Apps must have the `codespaces_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.deleteRepoSecret({
+ owner,
+ repo,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#delete-a-repository-secret).
diff --git a/docs/codespaces/deleteSecretForAuthenticatedUser.md b/docs/codespaces/deleteSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..e4a83d231
--- /dev/null
+++ b/docs/codespaces/deleteSecretForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Delete a secret for the authenticated user
+example: octokit.rest.codespaces.deleteSecretForAuthenticatedUser({ secret_name })
+route: DELETE /user/codespaces/secrets/{secret_name}
+scope: codespaces
+type: API method
+---
+
+# Delete a secret for the authenticated user
+
+Deletes a secret from a user's codespaces using the secret name. Deleting the secret will remove access from all codespaces that were allowed to access the secret.
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces_user_secrets` user permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.deleteSecretForAuthenticatedUser({
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#delete-a-secret-for-the-authenticated-user).
diff --git a/docs/codespaces/exportForAuthenticatedUser.md b/docs/codespaces/exportForAuthenticatedUser.md
new file mode 100644
index 000000000..0d4edf9e7
--- /dev/null
+++ b/docs/codespaces/exportForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Export a codespace for the authenticated user
+example: octokit.rest.codespaces.exportForAuthenticatedUser({ codespace_name })
+route: POST /user/codespaces/{codespace_name}/exports
+scope: codespaces
+type: API method
+---
+
+# Export a codespace for the authenticated user
+
+Triggers an export of the specified codespace and returns a URL and ID where the status of the export can be monitored.
+
+You must authenticate using a personal access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces_lifecycle_admin` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.exportForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation]().
diff --git a/docs/codespaces/getExportDetailsForAuthenticatedUser.md b/docs/codespaces/getExportDetailsForAuthenticatedUser.md
new file mode 100644
index 000000000..8b4355bee
--- /dev/null
+++ b/docs/codespaces/getExportDetailsForAuthenticatedUser.md
@@ -0,0 +1,48 @@
+---
+name: Get details about a codespace export
+example: octokit.rest.codespaces.getExportDetailsForAuthenticatedUser({ codespace_name, export_id })
+route: GET /user/codespaces/{codespace_name}/exports/{export_id}
+scope: codespaces
+type: API method
+---
+
+# Get details about a codespace export
+
+Gets information about an export of a codespace.
+
+You must authenticate using a personal access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_lifecycle_admin` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.getExportDetailsForAuthenticatedUser({
+ codespace_name,
+ export_id,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+export_id | yes |
+
+The ID of the export operation, or `latest`. Currently only `latest` is currently supported.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation]().
diff --git a/docs/codespaces/getForAuthenticatedUser.md b/docs/codespaces/getForAuthenticatedUser.md
new file mode 100644
index 000000000..a8808af23
--- /dev/null
+++ b/docs/codespaces/getForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Get a codespace for the authenticated user
+example: octokit.rest.codespaces.getForAuthenticatedUser({ codespace_name })
+route: GET /user/codespaces/{codespace_name}
+scope: codespaces
+type: API method
+---
+
+# Get a codespace for the authenticated user
+
+Gets information about a user's codespace.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.getForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#get-a-codespace-for-the-authenticated-user).
diff --git a/docs/codespaces/getPublicKeyForAuthenticatedUser.md b/docs/codespaces/getPublicKeyForAuthenticatedUser.md
new file mode 100644
index 000000000..168c15184
--- /dev/null
+++ b/docs/codespaces/getPublicKeyForAuthenticatedUser.md
@@ -0,0 +1,25 @@
+---
+name: Get public key for the authenticated user
+example: octokit.rest.codespaces.getPublicKeyForAuthenticatedUser()
+route: GET /user/codespaces/secrets/public-key
+scope: codespaces
+type: API method
+---
+
+# Get public key for the authenticated user
+
+Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets.
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_user_secrets` user permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.getPublicKeyForAuthenticatedUser();
+```
+
+## Parameters
+
+This endpoint has no parameters
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#get-public-key-for-the-authenticated-user).
diff --git a/docs/codespaces/getRepoPublicKey.md b/docs/codespaces/getRepoPublicKey.md
new file mode 100644
index 000000000..b5ec7cb04
--- /dev/null
+++ b/docs/codespaces/getRepoPublicKey.md
@@ -0,0 +1,44 @@
+---
+name: Get a repository public key
+example: octokit.rest.codespaces.getRepoPublicKey({ owner, repo })
+route: GET /repos/{owner}/{repo}/codespaces/secrets/public-key
+scope: codespaces
+type: API method
+---
+
+# Get a repository public key
+
+Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the `repo` scope. GitHub Apps must have the `codespaces_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.getRepoPublicKey({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#get-a-repository-public-key).
diff --git a/docs/codespaces/getRepoSecret.md b/docs/codespaces/getRepoSecret.md
new file mode 100644
index 000000000..08a3528c3
--- /dev/null
+++ b/docs/codespaces/getRepoSecret.md
@@ -0,0 +1,50 @@
+---
+name: Get a repository secret
+example: octokit.rest.codespaces.getRepoSecret({ owner, repo, secret_name })
+route: GET /repos/{owner}/{repo}/codespaces/secrets/{secret_name}
+scope: codespaces
+type: API method
+---
+
+# Get a repository secret
+
+Gets a single repository secret without revealing its encrypted value. You must authenticate using an access token with the `repo` scope to use this endpoint. GitHub Apps must have the `codespaces_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.getRepoSecret({
+ owner,
+ repo,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#get-a-repository-secret).
diff --git a/docs/codespaces/getSecretForAuthenticatedUser.md b/docs/codespaces/getSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..92207b503
--- /dev/null
+++ b/docs/codespaces/getSecretForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Get a secret for the authenticated user
+example: octokit.rest.codespaces.getSecretForAuthenticatedUser({ secret_name })
+route: GET /user/codespaces/secrets/{secret_name}
+scope: codespaces
+type: API method
+---
+
+# Get a secret for the authenticated user
+
+Gets a secret available to a user's codespaces without revealing its encrypted value.
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_user_secrets` user permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.getSecretForAuthenticatedUser({
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#get-a-secret-for-the-authenticated-user).
diff --git a/docs/codespaces/listDevcontainersInRepositoryForAuthenticatedUser.md b/docs/codespaces/listDevcontainersInRepositoryForAuthenticatedUser.md
new file mode 100644
index 000000000..4094a3d83
--- /dev/null
+++ b/docs/codespaces/listDevcontainersInRepositoryForAuthenticatedUser.md
@@ -0,0 +1,59 @@
+---
+name: List devcontainer configurations in a repository for the authenticated user
+example: octokit.rest.codespaces.listDevcontainersInRepositoryForAuthenticatedUser({ owner, repo })
+route: GET /repos/{owner}/{repo}/codespaces/devcontainers
+scope: codespaces
+type: API method
+---
+
+# List devcontainer configurations in a repository for the authenticated user
+
+Lists the devcontainer.json files associated with a specified repository and the authenticated user. These files
+specify launchpoint configurations for codespaces created within the repository.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_metadata` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.listDevcontainersInRepositoryForAuthenticatedUser({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-devcontainers-in-a-repository-for-the-authenticated-user).
diff --git a/docs/codespaces/listForAuthenticatedUser.md b/docs/codespaces/listForAuthenticatedUser.md
new file mode 100644
index 000000000..69b561743
--- /dev/null
+++ b/docs/codespaces/listForAuthenticatedUser.md
@@ -0,0 +1,50 @@
+---
+name: List codespaces for the authenticated user
+example: octokit.rest.codespaces.listForAuthenticatedUser()
+route: GET /user/codespaces
+scope: codespaces
+type: API method
+---
+
+# List codespaces for the authenticated user
+
+Lists the authenticated user's codespaces.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.listForAuthenticatedUser();
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+repository_id | no |
+
+ID of the Repository to filter on
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-codespaces-for-the-authenticated-user).
diff --git a/docs/codespaces/listInRepositoryForAuthenticatedUser.md b/docs/codespaces/listInRepositoryForAuthenticatedUser.md
new file mode 100644
index 000000000..79171ec6a
--- /dev/null
+++ b/docs/codespaces/listInRepositoryForAuthenticatedUser.md
@@ -0,0 +1,58 @@
+---
+name: List codespaces in a repository for the authenticated user
+example: octokit.rest.codespaces.listInRepositoryForAuthenticatedUser({ owner, repo })
+route: GET /repos/{owner}/{repo}/codespaces
+scope: codespaces
+type: API method
+---
+
+# List codespaces in a repository for the authenticated user
+
+Lists the codespaces associated to a specified repository and the authenticated user.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.listInRepositoryForAuthenticatedUser({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-codespaces-in-a-repository-for-the-authenticated-user).
diff --git a/docs/codespaces/listRepoSecrets.md b/docs/codespaces/listRepoSecrets.md
new file mode 100644
index 000000000..55151bf18
--- /dev/null
+++ b/docs/codespaces/listRepoSecrets.md
@@ -0,0 +1,54 @@
+---
+name: List repository secrets
+example: octokit.rest.codespaces.listRepoSecrets({ owner, repo })
+route: GET /repos/{owner}/{repo}/codespaces/secrets
+scope: codespaces
+type: API method
+---
+
+# List repository secrets
+
+Lists all secrets available in a repository without revealing their encrypted values. You must authenticate using an access token with the `repo` scope to use this endpoint. GitHub Apps must have the `codespaces_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.listRepoSecrets({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-repository-secrets).
diff --git a/docs/codespaces/listRepositoriesForSecretForAuthenticatedUser.md b/docs/codespaces/listRepositoriesForSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..fc553b519
--- /dev/null
+++ b/docs/codespaces/listRepositoriesForSecretForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: List selected repositories for a user secret
+example: octokit.rest.codespaces.listRepositoriesForSecretForAuthenticatedUser({ secret_name })
+route: GET /user/codespaces/secrets/{secret_name}/repositories
+scope: codespaces
+type: API method
+---
+
+# List selected repositories for a user secret
+
+List the repositories that have been granted the ability to use a user's codespace secret.
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_user_secrets` user permission and write access to the `codespaces_secrets` repository permission on all referenced repositories to use this endpoint.
+
+```js
+octokit.rest.codespaces.listRepositoriesForSecretForAuthenticatedUser({
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-selected-repositories-for-a-user-secret).
diff --git a/docs/codespaces/listSecretsForAuthenticatedUser.md b/docs/codespaces/listSecretsForAuthenticatedUser.md
new file mode 100644
index 000000000..6ef47f5d6
--- /dev/null
+++ b/docs/codespaces/listSecretsForAuthenticatedUser.md
@@ -0,0 +1,46 @@
+---
+name: List secrets for the authenticated user
+example: octokit.rest.codespaces.listSecretsForAuthenticatedUser()
+route: GET /user/codespaces/secrets
+scope: codespaces
+type: API method
+---
+
+# List secrets for the authenticated user
+
+Lists all secrets available for a user's Codespaces without revealing their
+encrypted values.
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+
+GitHub Apps must have read access to the `codespaces_user_secrets` user permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.listSecretsForAuthenticatedUser();
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-secrets-for-the-authenticated-user).
diff --git a/docs/codespaces/removeRepositoryForSecretForAuthenticatedUser.md b/docs/codespaces/removeRepositoryForSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..68f77823c
--- /dev/null
+++ b/docs/codespaces/removeRepositoryForSecretForAuthenticatedUser.md
@@ -0,0 +1,44 @@
+---
+name: Remove a selected repository from a user secret
+example: octokit.rest.codespaces.removeRepositoryForSecretForAuthenticatedUser({ secret_name, repository_id })
+route: DELETE /user/codespaces/secrets/{secret_name}/repositories/{repository_id}
+scope: codespaces
+type: API method
+---
+
+# Remove a selected repository from a user secret
+
+Removes a repository from the selected repositories for a user's codespace secret.
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+GitHub Apps must have write access to the `codespaces_user_secrets` user permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.removeRepositoryForSecretForAuthenticatedUser({
+ secret_name,
+ repository_id,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+repository_id | yes |
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#remove-a-selected-repository-from-a-user-secret).
diff --git a/docs/codespaces/repoMachinesForAuthenticatedUser.md b/docs/codespaces/repoMachinesForAuthenticatedUser.md
new file mode 100644
index 000000000..357f2afeb
--- /dev/null
+++ b/docs/codespaces/repoMachinesForAuthenticatedUser.md
@@ -0,0 +1,58 @@
+---
+name: List available machine types for a repository
+example: octokit.rest.codespaces.repoMachinesForAuthenticatedUser({ owner, repo })
+route: GET /repos/{owner}/{repo}/codespaces/machines
+scope: codespaces
+type: API method
+---
+
+# List available machine types for a repository
+
+List the machine types available for a given repository based on its configuration.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces_metadata` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.repoMachinesForAuthenticatedUser({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+location | no |
+
+The location to check for available machines. Assigned by IP if not provided.
+
+ |
+client_ip | no |
+
+IP for location auto-detection when proxying a request
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#list-available-machine-types-for-a-repository).
diff --git a/docs/codespaces/setRepositoriesForSecretForAuthenticatedUser.md b/docs/codespaces/setRepositoriesForSecretForAuthenticatedUser.md
new file mode 100644
index 000000000..be55870be
--- /dev/null
+++ b/docs/codespaces/setRepositoriesForSecretForAuthenticatedUser.md
@@ -0,0 +1,48 @@
+---
+name: Set selected repositories for a user secret
+example: octokit.rest.codespaces.setRepositoriesForSecretForAuthenticatedUser({ secret_name, selected_repository_ids })
+route: PUT /user/codespaces/secrets/{secret_name}/repositories
+scope: codespaces
+type: API method
+---
+
+# Set selected repositories for a user secret
+
+Select the repositories that will use a user's codespace secret.
+
+You must authenticate using an access token with the `codespace` or `codespace:secrets` scope to use this endpoint. User must have Codespaces access to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces_user_secrets` user permission and write access to the `codespaces_secrets` repository permission on all referenced repositories to use this endpoint.
+
+```js
+octokit.rest.codespaces.setRepositoriesForSecretForAuthenticatedUser({
+ secret_name,
+ selected_repository_ids,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ secret_name | yes |
+
+The name of the secret.
+
+ |
+selected_repository_ids | yes |
+
+An array of repository ids for which a codespace can access the secret. You can manage the list of selected repositories using the [List selected repositories for a user secret](https://docs.github.com/rest/reference/codespaces#list-selected-repositories-for-a-user-secret), [Add a selected repository to a user secret](https://docs.github.com/rest/reference/codespaces#add-a-selected-repository-to-a-user-secret), and [Remove a selected repository from a user secret](https://docs.github.com/rest/reference/codespaces#remove-a-selected-repository-from-a-user-secret) endpoints.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#set-selected-repositories-for-a-user-secret).
diff --git a/docs/codespaces/startForAuthenticatedUser.md b/docs/codespaces/startForAuthenticatedUser.md
new file mode 100644
index 000000000..a2511d425
--- /dev/null
+++ b/docs/codespaces/startForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Start a codespace for the authenticated user
+example: octokit.rest.codespaces.startForAuthenticatedUser({ codespace_name })
+route: POST /user/codespaces/{codespace_name}/start
+scope: codespaces
+type: API method
+---
+
+# Start a codespace for the authenticated user
+
+Starts a user's codespace.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces_lifecycle_admin` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.startForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#start-a-codespace-for-the-authenticated-user).
diff --git a/docs/codespaces/stopForAuthenticatedUser.md b/docs/codespaces/stopForAuthenticatedUser.md
new file mode 100644
index 000000000..cec008f16
--- /dev/null
+++ b/docs/codespaces/stopForAuthenticatedUser.md
@@ -0,0 +1,42 @@
+---
+name: Stop a codespace for the authenticated user
+example: octokit.rest.codespaces.stopForAuthenticatedUser({ codespace_name })
+route: POST /user/codespaces/{codespace_name}/stop
+scope: codespaces
+type: API method
+---
+
+# Stop a codespace for the authenticated user
+
+Stops a user's codespace.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces_lifecycle_admin` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.stopForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#stop-a-codespace-for-the-authenticated-user).
diff --git a/docs/codespaces/updateForAuthenticatedUser.md b/docs/codespaces/updateForAuthenticatedUser.md
new file mode 100644
index 000000000..673cb607d
--- /dev/null
+++ b/docs/codespaces/updateForAuthenticatedUser.md
@@ -0,0 +1,59 @@
+---
+name: Update a codespace for the authenticated user
+example: octokit.rest.codespaces.updateForAuthenticatedUser({ codespace_name })
+route: PATCH /user/codespaces/{codespace_name}
+scope: codespaces
+type: API method
+---
+
+# Update a codespace for the authenticated user
+
+Updates a codespace owned by the authenticated user. Currently only the codespace's machine type and recent folders can be modified using this endpoint.
+
+If you specify a new machine type it will be applied the next time your codespace is started.
+
+You must authenticate using an access token with the `codespace` scope to use this endpoint.
+
+GitHub Apps must have write access to the `codespaces` repository permission to use this endpoint.
+
+```js
+octokit.rest.codespaces.updateForAuthenticatedUser({
+ codespace_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ codespace_name | yes |
+
+The name of the codespace.
+
+ |
+machine | no |
+
+A valid machine to transition this codespace to.
+
+ |
+display_name | no |
+
+Display name for this codespace
+
+ |
+recent_folders | no |
+
+Recently opened folders inside the codespace. It is currently used by the clients to determine the folder path to load the codespace in.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/codespaces#update-a-codespace-for-the-authenticated-user).
diff --git a/docs/dependabot/addSelectedRepoToOrgSecret.md b/docs/dependabot/addSelectedRepoToOrgSecret.md
new file mode 100644
index 000000000..6523c3e72
--- /dev/null
+++ b/docs/dependabot/addSelectedRepoToOrgSecret.md
@@ -0,0 +1,48 @@
+---
+name: Add selected repository to an organization secret
+example: octokit.rest.dependabot.addSelectedRepoToOrgSecret({ org, secret_name, repository_id })
+route: PUT /orgs/{org}/dependabot/secrets/{secret_name}/repositories/{repository_id}
+scope: dependabot
+type: API method
+---
+
+# Add selected repository to an organization secret
+
+Adds a repository to an organization secret when the `visibility` for repository access is set to `selected`. The visibility is set when you [Create or update an organization secret](https://docs.github.com/rest/reference/dependabot#create-or-update-an-organization-secret). You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.addSelectedRepoToOrgSecret({
+ org,
+ secret_name,
+ repository_id,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+repository_id | yes |
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#add-selected-repository-to-an-organization-secret).
diff --git a/docs/dependabot/createOrUpdateOrgSecret.md b/docs/dependabot/createOrUpdateOrgSecret.md
new file mode 100644
index 000000000..0bbb4123c
--- /dev/null
+++ b/docs/dependabot/createOrUpdateOrgSecret.md
@@ -0,0 +1,138 @@
+---
+name: Create or update an organization secret
+example: octokit.rest.dependabot.createOrUpdateOrgSecret({ org, secret_name, visibility })
+route: PUT /orgs/{org}/dependabot/secrets/{secret_name}
+scope: dependabot
+type: API method
+---
+
+# Create or update an organization secret
+
+Creates or updates an organization secret with an encrypted value. Encrypt your secret using
+[LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). You must authenticate using an access
+token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization
+permission to use this endpoint.
+
+#### Example encrypting a secret using Node.js
+
+Encrypt your secret using the [tweetsodium](https://github.com/github/tweetsodium) library.
+
+```
+const sodium = require('tweetsodium');
+
+const key = "base64-encoded-public-key";
+const value = "plain-text-secret";
+
+// Convert the message and key to Uint8Array's (Buffer implements that interface)
+const messageBytes = Buffer.from(value);
+const keyBytes = Buffer.from(key, 'base64');
+
+// Encrypt using LibSodium.
+const encryptedBytes = sodium.seal(messageBytes, keyBytes);
+
+// Base64 the encrypted secret
+const encrypted = Buffer.from(encryptedBytes).toString('base64');
+
+console.log(encrypted);
+```
+
+#### Example encrypting a secret using Python
+
+Encrypt your secret using [pynacl](https://pynacl.readthedocs.io/en/latest/public/#nacl-public-sealedbox) with Python 3.
+
+```
+from base64 import b64encode
+from nacl import encoding, public
+
+def encrypt(public_key: str, secret_value: str) -> str:
+ """Encrypt a Unicode string using the public key."""
+ public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
+ sealed_box = public.SealedBox(public_key)
+ encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
+ return b64encode(encrypted).decode("utf-8")
+```
+
+#### Example encrypting a secret using C#
+
+Encrypt your secret using the [Sodium.Core](https://www.nuget.org/packages/Sodium.Core/) package.
+
+```
+var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
+var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
+
+var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
+
+Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
+```
+
+#### Example encrypting a secret using Ruby
+
+Encrypt your secret using the [rbnacl](https://github.com/RubyCrypto/rbnacl) gem.
+
+```ruby
+require "rbnacl"
+require "base64"
+
+key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
+public_key = RbNaCl::PublicKey.new(key)
+
+box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
+encrypted_secret = box.encrypt("my_secret")
+
+# Print the base64 encoded secret
+puts Base64.strict_encode64(encrypted_secret)
+```
+
+```js
+octokit.rest.dependabot.createOrUpdateOrgSecret({
+ org,
+ secret_name,
+ visibility,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+encrypted_value | no |
+
+Value for your secret, encrypted with [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages) using the public key retrieved from the [Get an organization public key](https://docs.github.com/rest/reference/dependabot#get-an-organization-public-key) endpoint.
+
+ |
+key_id | no |
+
+ID of the key you used to encrypt the secret.
+
+ |
+visibility | yes |
+
+Which type of organization repositories have access to the organization secret. `selected` means only the repositories specified by `selected_repository_ids` can access the secret.
+
+ |
+selected_repository_ids | no |
+
+An array of repository ids that can access the organization secret. You can only provide a list of repository ids when the `visibility` is set to `selected`. You can manage the list of selected repositories using the [List selected repositories for an organization secret](https://docs.github.com/rest/reference/dependabot#list-selected-repositories-for-an-organization-secret), [Set selected repositories for an organization secret](https://docs.github.com/rest/reference/dependabot#set-selected-repositories-for-an-organization-secret), and [Remove selected repository from an organization secret](https://docs.github.com/rest/reference/dependabot#remove-selected-repository-from-an-organization-secret) endpoints.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#create-or-update-an-organization-secret).
diff --git a/docs/dependabot/createOrUpdateRepoSecret.md b/docs/dependabot/createOrUpdateRepoSecret.md
new file mode 100644
index 000000000..d0f2c6d68
--- /dev/null
+++ b/docs/dependabot/createOrUpdateRepoSecret.md
@@ -0,0 +1,133 @@
+---
+name: Create or update a repository secret
+example: octokit.rest.dependabot.createOrUpdateRepoSecret({ owner, repo, secret_name })
+route: PUT /repos/{owner}/{repo}/dependabot/secrets/{secret_name}
+scope: dependabot
+type: API method
+---
+
+# Create or update a repository secret
+
+Creates or updates a repository secret with an encrypted value. Encrypt your secret using
+[LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). You must authenticate using an access
+token with the `repo` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` repository
+permission to use this endpoint.
+
+#### Example encrypting a secret using Node.js
+
+Encrypt your secret using the [tweetsodium](https://github.com/github/tweetsodium) library.
+
+```
+const sodium = require('tweetsodium');
+
+const key = "base64-encoded-public-key";
+const value = "plain-text-secret";
+
+// Convert the message and key to Uint8Array's (Buffer implements that interface)
+const messageBytes = Buffer.from(value);
+const keyBytes = Buffer.from(key, 'base64');
+
+// Encrypt using LibSodium.
+const encryptedBytes = sodium.seal(messageBytes, keyBytes);
+
+// Base64 the encrypted secret
+const encrypted = Buffer.from(encryptedBytes).toString('base64');
+
+console.log(encrypted);
+```
+
+#### Example encrypting a secret using Python
+
+Encrypt your secret using [pynacl](https://pynacl.readthedocs.io/en/latest/public/#nacl-public-sealedbox) with Python 3.
+
+```
+from base64 import b64encode
+from nacl import encoding, public
+
+def encrypt(public_key: str, secret_value: str) -> str:
+ """Encrypt a Unicode string using the public key."""
+ public_key = public.PublicKey(public_key.encode("utf-8"), encoding.Base64Encoder())
+ sealed_box = public.SealedBox(public_key)
+ encrypted = sealed_box.encrypt(secret_value.encode("utf-8"))
+ return b64encode(encrypted).decode("utf-8")
+```
+
+#### Example encrypting a secret using C#
+
+Encrypt your secret using the [Sodium.Core](https://www.nuget.org/packages/Sodium.Core/) package.
+
+```
+var secretValue = System.Text.Encoding.UTF8.GetBytes("mySecret");
+var publicKey = Convert.FromBase64String("2Sg8iYjAxxmI2LvUXpJjkYrMxURPc8r+dB7TJyvvcCU=");
+
+var sealedPublicKeyBox = Sodium.SealedPublicKeyBox.Create(secretValue, publicKey);
+
+Console.WriteLine(Convert.ToBase64String(sealedPublicKeyBox));
+```
+
+#### Example encrypting a secret using Ruby
+
+Encrypt your secret using the [rbnacl](https://github.com/RubyCrypto/rbnacl) gem.
+
+```ruby
+require "rbnacl"
+require "base64"
+
+key = Base64.decode64("+ZYvJDZMHUfBkJdyq5Zm9SKqeuBQ4sj+6sfjlH4CgG0=")
+public_key = RbNaCl::PublicKey.new(key)
+
+box = RbNaCl::Boxes::Sealed.from_public_key(public_key)
+encrypted_secret = box.encrypt("my_secret")
+
+# Print the base64 encoded secret
+puts Base64.strict_encode64(encrypted_secret)
+```
+
+```js
+octokit.rest.dependabot.createOrUpdateRepoSecret({
+ owner,
+ repo,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+encrypted_value | no |
+
+Value for your secret, encrypted with [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages) using the public key retrieved from the [Get a repository public key](https://docs.github.com/rest/reference/dependabot#get-a-repository-public-key) endpoint.
+
+ |
+key_id | no |
+
+ID of the key you used to encrypt the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#create-or-update-a-repository-secret).
diff --git a/docs/dependabot/deleteOrgSecret.md b/docs/dependabot/deleteOrgSecret.md
new file mode 100644
index 000000000..a23038de6
--- /dev/null
+++ b/docs/dependabot/deleteOrgSecret.md
@@ -0,0 +1,44 @@
+---
+name: Delete an organization secret
+example: octokit.rest.dependabot.deleteOrgSecret({ org, secret_name })
+route: DELETE /orgs/{org}/dependabot/secrets/{secret_name}
+scope: dependabot
+type: API method
+---
+
+# Delete an organization secret
+
+Deletes a secret in an organization using the secret name. You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.deleteOrgSecret({
+ org,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#delete-an-organization-secret).
diff --git a/docs/dependabot/deleteRepoSecret.md b/docs/dependabot/deleteRepoSecret.md
new file mode 100644
index 000000000..b37286c3a
--- /dev/null
+++ b/docs/dependabot/deleteRepoSecret.md
@@ -0,0 +1,50 @@
+---
+name: Delete a repository secret
+example: octokit.rest.dependabot.deleteRepoSecret({ owner, repo, secret_name })
+route: DELETE /repos/{owner}/{repo}/dependabot/secrets/{secret_name}
+scope: dependabot
+type: API method
+---
+
+# Delete a repository secret
+
+Deletes a secret in a repository using the secret name. You must authenticate using an access token with the `repo` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.deleteRepoSecret({
+ owner,
+ repo,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#delete-a-repository-secret).
diff --git a/docs/dependabot/getOrgPublicKey.md b/docs/dependabot/getOrgPublicKey.md
new file mode 100644
index 000000000..5a85dfc9d
--- /dev/null
+++ b/docs/dependabot/getOrgPublicKey.md
@@ -0,0 +1,38 @@
+---
+name: Get an organization public key
+example: octokit.rest.dependabot.getOrgPublicKey({ org })
+route: GET /orgs/{org}/dependabot/secrets/public-key
+scope: dependabot
+type: API method
+---
+
+# Get an organization public key
+
+Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets. You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.getOrgPublicKey({
+ org,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#get-an-organization-public-key).
diff --git a/docs/dependabot/getOrgSecret.md b/docs/dependabot/getOrgSecret.md
new file mode 100644
index 000000000..5689d35db
--- /dev/null
+++ b/docs/dependabot/getOrgSecret.md
@@ -0,0 +1,44 @@
+---
+name: Get an organization secret
+example: octokit.rest.dependabot.getOrgSecret({ org, secret_name })
+route: GET /orgs/{org}/dependabot/secrets/{secret_name}
+scope: dependabot
+type: API method
+---
+
+# Get an organization secret
+
+Gets a single organization secret without revealing its encrypted value. You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.getOrgSecret({
+ org,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#get-an-organization-secret).
diff --git a/docs/dependabot/getRepoPublicKey.md b/docs/dependabot/getRepoPublicKey.md
new file mode 100644
index 000000000..886fb6a1e
--- /dev/null
+++ b/docs/dependabot/getRepoPublicKey.md
@@ -0,0 +1,44 @@
+---
+name: Get a repository public key
+example: octokit.rest.dependabot.getRepoPublicKey({ owner, repo })
+route: GET /repos/{owner}/{repo}/dependabot/secrets/public-key
+scope: dependabot
+type: API method
+---
+
+# Get a repository public key
+
+Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets. Anyone with read access to the repository can use this endpoint. If the repository is private you must use an access token with the `repo` scope. GitHub Apps must have the `dependabot_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.getRepoPublicKey({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#get-a-repository-public-key).
diff --git a/docs/dependabot/getRepoSecret.md b/docs/dependabot/getRepoSecret.md
new file mode 100644
index 000000000..41bf0dc1d
--- /dev/null
+++ b/docs/dependabot/getRepoSecret.md
@@ -0,0 +1,50 @@
+---
+name: Get a repository secret
+example: octokit.rest.dependabot.getRepoSecret({ owner, repo, secret_name })
+route: GET /repos/{owner}/{repo}/dependabot/secrets/{secret_name}
+scope: dependabot
+type: API method
+---
+
+# Get a repository secret
+
+Gets a single repository secret without revealing its encrypted value. You must authenticate using an access token with the `repo` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.getRepoSecret({
+ owner,
+ repo,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#get-a-repository-secret).
diff --git a/docs/dependabot/listOrgSecrets.md b/docs/dependabot/listOrgSecrets.md
new file mode 100644
index 000000000..77cdfc939
--- /dev/null
+++ b/docs/dependabot/listOrgSecrets.md
@@ -0,0 +1,48 @@
+---
+name: List organization secrets
+example: octokit.rest.dependabot.listOrgSecrets({ org })
+route: GET /orgs/{org}/dependabot/secrets
+scope: dependabot
+type: API method
+---
+
+# List organization secrets
+
+Lists all secrets available in an organization without revealing their encrypted values. You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.listOrgSecrets({
+ org,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#list-organization-secrets).
diff --git a/docs/dependabot/listRepoSecrets.md b/docs/dependabot/listRepoSecrets.md
new file mode 100644
index 000000000..42b0ebfdb
--- /dev/null
+++ b/docs/dependabot/listRepoSecrets.md
@@ -0,0 +1,54 @@
+---
+name: List repository secrets
+example: octokit.rest.dependabot.listRepoSecrets({ owner, repo })
+route: GET /repos/{owner}/{repo}/dependabot/secrets
+scope: dependabot
+type: API method
+---
+
+# List repository secrets
+
+Lists all secrets available in a repository without revealing their encrypted values. You must authenticate using an access token with the `repo` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` repository permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.listRepoSecrets({
+ owner,
+ repo,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+per_page | no |
+
+The number of results per page (max 100).
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#list-repository-secrets).
diff --git a/docs/dependabot/listSelectedReposForOrgSecret.md b/docs/dependabot/listSelectedReposForOrgSecret.md
new file mode 100644
index 000000000..797546ae4
--- /dev/null
+++ b/docs/dependabot/listSelectedReposForOrgSecret.md
@@ -0,0 +1,54 @@
+---
+name: List selected repositories for an organization secret
+example: octokit.rest.dependabot.listSelectedReposForOrgSecret({ org, secret_name })
+route: GET /orgs/{org}/dependabot/secrets/{secret_name}/repositories
+scope: dependabot
+type: API method
+---
+
+# List selected repositories for an organization secret
+
+Lists all repositories that have been selected when the `visibility` for repository access to a secret is set to `selected`. You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.listSelectedReposForOrgSecret({
+ org,
+ secret_name,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+page | no |
+
+Page number of the results to fetch.
+
+ |
+per_page | no |
+
+The number of results per page (max 100).
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#list-selected-repositories-for-an-organization-secret).
diff --git a/docs/dependabot/removeSelectedRepoFromOrgSecret.md b/docs/dependabot/removeSelectedRepoFromOrgSecret.md
new file mode 100644
index 000000000..38824d0b0
--- /dev/null
+++ b/docs/dependabot/removeSelectedRepoFromOrgSecret.md
@@ -0,0 +1,48 @@
+---
+name: Remove selected repository from an organization secret
+example: octokit.rest.dependabot.removeSelectedRepoFromOrgSecret({ org, secret_name, repository_id })
+route: DELETE /orgs/{org}/dependabot/secrets/{secret_name}/repositories/{repository_id}
+scope: dependabot
+type: API method
+---
+
+# Remove selected repository from an organization secret
+
+Removes a repository from an organization secret when the `visibility` for repository access is set to `selected`. The visibility is set when you [Create or update an organization secret](https://docs.github.com/rest/reference/dependabot#create-or-update-an-organization-secret). You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.removeSelectedRepoFromOrgSecret({
+ org,
+ secret_name,
+ repository_id,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+repository_id | yes |
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#remove-selected-repository-from-an-organization-secret).
diff --git a/docs/dependabot/setSelectedReposForOrgSecret.md b/docs/dependabot/setSelectedReposForOrgSecret.md
new file mode 100644
index 000000000..f8133ad3b
--- /dev/null
+++ b/docs/dependabot/setSelectedReposForOrgSecret.md
@@ -0,0 +1,50 @@
+---
+name: Set selected repositories for an organization secret
+example: octokit.rest.dependabot.setSelectedReposForOrgSecret({ org, secret_name, selected_repository_ids })
+route: PUT /orgs/{org}/dependabot/secrets/{secret_name}/repositories
+scope: dependabot
+type: API method
+---
+
+# Set selected repositories for an organization secret
+
+Replaces all repositories for an organization secret when the `visibility` for repository access is set to `selected`. The visibility is set when you [Create or update an organization secret](https://docs.github.com/rest/reference/dependabot#create-or-update-an-organization-secret). You must authenticate using an access token with the `admin:org` scope to use this endpoint. GitHub Apps must have the `dependabot_secrets` organization permission to use this endpoint.
+
+```js
+octokit.rest.dependabot.setSelectedReposForOrgSecret({
+ org,
+ secret_name,
+ selected_repository_ids,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ org | yes |
+
+The organization name. The name is not case sensitive.
+
+ |
+secret_name | yes |
+
+The name of the secret.
+
+ |
+selected_repository_ids | yes |
+
+An array of repository ids that can access the organization secret. You can only provide a list of repository ids when the `visibility` is set to `selected`. You can add and remove individual repositories using the [Set selected repositories for an organization secret](https://docs.github.com/rest/reference/dependabot#set-selected-repositories-for-an-organization-secret) and [Remove selected repository from an organization secret](https://docs.github.com/rest/reference/dependabot#remove-selected-repository-from-an-organization-secret) endpoints.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependabot#set-selected-repositories-for-an-organization-secret).
diff --git a/docs/dependencyGraph/diffRange.md b/docs/dependencyGraph/diffRange.md
new file mode 100644
index 000000000..b6c426974
--- /dev/null
+++ b/docs/dependencyGraph/diffRange.md
@@ -0,0 +1,55 @@
+---
+name: Get a diff of the dependencies between commits
+example: octokit.rest.dependencyGraph.diffRange({ owner, repo, basehead })
+route: GET /repos/{owner}/{repo}/dependency-graph/compare/{basehead}
+scope: dependencyGraph
+type: API method
+---
+
+# Get a diff of the dependencies between commits
+
+Gets the diff of the dependency changes between two commits of a repository, based on the changes to the dependency manifests made in those commits.
+
+```js
+octokit.rest.dependencyGraph.diffRange({
+ owner,
+ repo,
+ basehead,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ owner | yes |
+
+The account owner of the repository. The name is not case sensitive.
+
+ |
+repo | yes |
+
+The name of the repository. The name is not case sensitive.
+
+ |
+basehead | yes |
+
+The base and head Git revisions to compare. The Git revisions will be resolved to commit SHAs. Named revisions will be resolved to their corresponding HEAD commits, and an appropriate merge base will be determined. This parameter expects the format `{base}...{head}`.
+
+ |
+name | no |
+
+The full path, relative to the repository root, of the dependency manifest file.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/dependency-graph#get-a-diff-of-the-dependencies-between-commits).
diff --git a/docs/enterpriseAdmin/addCustomLabelsToSelfHostedRunnerForEnterprise.md b/docs/enterpriseAdmin/addCustomLabelsToSelfHostedRunnerForEnterprise.md
new file mode 100644
index 000000000..001c95c37
--- /dev/null
+++ b/docs/enterpriseAdmin/addCustomLabelsToSelfHostedRunnerForEnterprise.md
@@ -0,0 +1,52 @@
+---
+name: Add custom labels to a self-hosted runner for an enterprise
+example: octokit.rest.enterpriseAdmin.addCustomLabelsToSelfHostedRunnerForEnterprise({ enterprise, runner_id, labels })
+route: POST /enterprises/{enterprise}/actions/runners/{runner_id}/labels
+scope: enterpriseAdmin
+type: API method
+---
+
+# Add custom labels to a self-hosted runner for an enterprise
+
+Add custom labels to a self-hosted runner configured in an enterprise.
+
+You must authenticate using an access token with the `manage_runners:enterprise` scope to use this endpoint.
+
+```js
+octokit.rest.enterpriseAdmin.addCustomLabelsToSelfHostedRunnerForEnterprise({
+ enterprise,
+ runner_id,
+ labels,
+});
+```
+
+## Parameters
+
+
+
+
+ name |
+ required |
+ description |
+
+
+
+ enterprise | yes |
+
+The slug version of the enterprise name. You can also substitute this value with the enterprise id.
+
+ |
+runner_id | yes |
+
+Unique identifier of the self-hosted runner.
+
+ |
+labels | yes |
+
+The names of the custom labels to add to the runner.
+
+ |
+
+
+
+See also: [GitHub Developer Guide documentation](https://docs.github.com/rest/reference/actions#add-custom-labels-to-a-self-hosted-runner-for-an-enterprise).
diff --git a/docs/enterpriseAdmin/disableSelectedOrganizationGithubActionsEnterprise.md b/docs/enterpriseAdmin/disableSelectedOrganizationGithubActionsEnterprise.md
index 92da80d5d..27ef28c06 100644
--- a/docs/enterpriseAdmin/disableSelectedOrganizationGithubActionsEnterprise.md
+++ b/docs/enterpriseAdmin/disableSelectedOrganizationGithubActionsEnterprise.md
@@ -39,10 +39,10 @@ The slug version of the enterprise name. You can also substitute this value with
|