From 4351fce23571fe1515942c758f6fddfc551feded Mon Sep 17 00:00:00 2001 From: Gregor Martynus <39992+gr2m@users.noreply.github.com> Date: Thu, 11 Mar 2021 21:11:55 -0800 Subject: [PATCH 1/2] GitHub Apps OAuth Web Flow: document `allow_signup` parameter --- .../apps/identifying-and-authorizing-users-for-github-apps.md | 1 + 1 file changed, 1 insertion(+) diff --git a/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md b/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md index 0c27bda883..3cf8854f42 100644 --- a/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md +++ b/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md @@ -50,6 +50,7 @@ Name | Type | Description `redirect_uri` | `string` | The URL in your application where users will be sent after authorization. This must be an exact match to {% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.0" %} one of the URLs you provided as a **Callback URL** {% else %} the URL you provided in the **User authorization callback URL** field{% endif %} when setting up your GitHub App and can't contain any additional parameters. `state` | `string` | This should contain a random string to protect against forgery attacks and could contain any other arbitrary data. `login` | `string` | Suggests a specific account to use for signing in and authorizing the app. +`allow_signup` | `string` | Whether or not unauthenticated users will be offered an option to sign up for GitHub during the OAuth flow. The default is `true`. Use `false` when a policy prohibits signups. {% note %} From e7d61d9118c2c956663f06d7c337d9548bda60e5 Mon Sep 17 00:00:00 2001 From: Martin Lopes Date: Thu, 25 Mar 2021 09:09:21 +1000 Subject: [PATCH 2/2] Update identifying-and-authorizing-users-for-github-apps.md --- .../apps/identifying-and-authorizing-users-for-github-apps.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md b/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md index 3cf8854f42..abda0fa6d2 100644 --- a/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md +++ b/content/developers/apps/identifying-and-authorizing-users-for-github-apps.md @@ -50,7 +50,7 @@ Name | Type | Description `redirect_uri` | `string` | The URL in your application where users will be sent after authorization. This must be an exact match to {% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.0" %} one of the URLs you provided as a **Callback URL** {% else %} the URL you provided in the **User authorization callback URL** field{% endif %} when setting up your GitHub App and can't contain any additional parameters. `state` | `string` | This should contain a random string to protect against forgery attacks and could contain any other arbitrary data. `login` | `string` | Suggests a specific account to use for signing in and authorizing the app. -`allow_signup` | `string` | Whether or not unauthenticated users will be offered an option to sign up for GitHub during the OAuth flow. The default is `true`. Use `false` when a policy prohibits signups. +`allow_signup` | `string` | Whether or not unauthenticated users will be offered an option to sign up for {% data variables.product.prodname_dotcom %} during the OAuth flow. The default is `true`. Use `false` when a policy prohibits signups. {% note %}