From a03aff9281f27b49144d68d70b51af85b3e57fb2 Mon Sep 17 00:00:00 2001 From: docs-bot <77750099+docs-bot@users.noreply.github.com> Date: Tue, 18 Jul 2023 06:37:03 -0700 Subject: [PATCH] Update OpenAPI Description (#39226) --- .../fine-grained-pat-permissions.json | 13 ++- .../data/fpt-2022-11-28/fine-grained-pat.json | 10 +- .../server-to-server-permissions.json | 15 ++- .../fpt-2022-11-28/server-to-server-rest.json | 10 +- .../fpt-2022-11-28/user-to-server-rest.json | 10 +- .../fine-grained-pat-permissions.json | 13 ++- .../ghec-2022-11-28/fine-grained-pat.json | 10 +- .../server-to-server-permissions.json | 15 ++- .../server-to-server-rest.json | 10 +- .../ghec-2022-11-28/user-to-server-rest.json | 10 +- src/github-apps/lib/config.json | 2 +- src/rest/data/fpt-2022-11-28/schema.json | 93 ++++++++++++++++++- src/rest/data/ghec-2022-11-28/schema.json | 93 ++++++++++++++++++- src/rest/data/ghes-3.6/schema.json | 2 +- src/rest/data/ghes-3.7/schema.json | 2 +- src/rest/data/ghes-3.8/schema.json | 2 +- src/rest/data/ghes-3.9-2022-11-28/schema.json | 2 +- src/rest/lib/config.json | 2 +- src/webhooks/lib/config.json | 2 +- 19 files changed, 285 insertions(+), 31 deletions(-) diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json index 330246d1c2..fa4e992dec 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat-permissions.json @@ -363,7 +363,7 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing", + "requestPath": "/orgs/{org}/copilot/billing", "additional-permissions": [], "access": "write" }, @@ -372,7 +372,7 @@ "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats", + "requestPath": "/orgs/{org}/copilot/billing/seats", "additional-permissions": [], "access": "write" }, @@ -2182,6 +2182,15 @@ "additional-permissions": [], "access": "write" }, + { + "category": "repos", + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes", + "additional-permissions": [], + "access": "write" + }, { "category": "repos", "slug": "enable-automated-security-fixes", diff --git a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json index 6938ef834b..41886981fc 100644 --- a/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/fpt-2022-11-28/fine-grained-pat.json @@ -1754,13 +1754,13 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing" + "requestPath": "/orgs/{org}/copilot/billing" }, { "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats" + "requestPath": "/orgs/{org}/copilot/billing/seats" }, { "slug": "add-teams-to-the-copilot-for-business-subscription-for-an-organization", @@ -3770,6 +3770,12 @@ "verb": "delete", "requestPath": "/repos/{owner}/{repo}/autolinks/{autolink_id}" }, + { + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes" + }, { "slug": "enable-automated-security-fixes", "subcategory": "repos", diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json index 473d4551a5..e85aecc227 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-permissions.json @@ -437,7 +437,7 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing", + "requestPath": "/orgs/{org}/copilot/billing", "access": "write", "user-to-server": true, "server-to-server": true, @@ -448,7 +448,7 @@ "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats", + "requestPath": "/orgs/{org}/copilot/billing/seats", "access": "write", "user-to-server": true, "server-to-server": true, @@ -2730,6 +2730,17 @@ "server-to-server": true, "additional-permissions": [] }, + { + "category": "repos", + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": [] + }, { "category": "repos", "slug": "enable-automated-security-fixes", diff --git a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json index e4783311cb..c32622a6bb 100644 --- a/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/server-to-server-rest.json @@ -1538,13 +1538,13 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing" + "requestPath": "/orgs/{org}/copilot/billing" }, { "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats" + "requestPath": "/orgs/{org}/copilot/billing/seats" }, { "slug": "add-teams-to-the-copilot-for-business-subscription-for-an-organization", @@ -3406,6 +3406,12 @@ "verb": "delete", "requestPath": "/repos/{owner}/{repo}/autolinks/{autolink_id}" }, + { + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes" + }, { "slug": "enable-automated-security-fixes", "subcategory": "repos", diff --git a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json index ff1abcb66b..0f1efc67ff 100644 --- a/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/fpt-2022-11-28/user-to-server-rest.json @@ -1772,13 +1772,13 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing" + "requestPath": "/orgs/{org}/copilot/billing" }, { "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats" + "requestPath": "/orgs/{org}/copilot/billing/seats" }, { "slug": "add-teams-to-the-copilot-for-business-subscription-for-an-organization", @@ -3836,6 +3836,12 @@ "verb": "delete", "requestPath": "/repos/{owner}/{repo}/autolinks/{autolink_id}" }, + { + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes" + }, { "slug": "enable-automated-security-fixes", "subcategory": "repos", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json index ddd64d71e7..650e8b0513 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat-permissions.json @@ -660,7 +660,7 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing", + "requestPath": "/orgs/{org}/copilot/billing", "additional-permissions": [], "access": "write" }, @@ -669,7 +669,7 @@ "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats", + "requestPath": "/orgs/{org}/copilot/billing/seats", "additional-permissions": [], "access": "write" }, @@ -2741,6 +2741,15 @@ "additional-permissions": [], "access": "write" }, + { + "category": "repos", + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes", + "additional-permissions": [], + "access": "write" + }, { "category": "repos", "slug": "enable-automated-security-fixes", diff --git a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json index 3268ee52b8..199c7efbb1 100644 --- a/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json +++ b/src/github-apps/data/ghec-2022-11-28/fine-grained-pat.json @@ -1870,13 +1870,13 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing" + "requestPath": "/orgs/{org}/copilot/billing" }, { "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats" + "requestPath": "/orgs/{org}/copilot/billing/seats" }, { "slug": "add-teams-to-the-copilot-for-business-subscription-for-an-organization", @@ -4020,6 +4020,12 @@ "verb": "delete", "requestPath": "/repos/{owner}/{repo}/autolinks/{autolink_id}" }, + { + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes" + }, { "slug": "enable-automated-security-fixes", "subcategory": "repos", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json index 875cb46aea..cbcc649795 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-permissions.json @@ -809,7 +809,7 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing", + "requestPath": "/orgs/{org}/copilot/billing", "access": "write", "user-to-server": true, "server-to-server": true, @@ -820,7 +820,7 @@ "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats", + "requestPath": "/orgs/{org}/copilot/billing/seats", "access": "write", "user-to-server": true, "server-to-server": true, @@ -3420,6 +3420,17 @@ "server-to-server": true, "additional-permissions": [] }, + { + "category": "repos", + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes", + "access": "write", + "user-to-server": true, + "server-to-server": true, + "additional-permissions": [] + }, { "category": "repos", "slug": "enable-automated-security-fixes", diff --git a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json index c4b3fcfb45..db7732cbcc 100644 --- a/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/server-to-server-rest.json @@ -1654,13 +1654,13 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing" + "requestPath": "/orgs/{org}/copilot/billing" }, { "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats" + "requestPath": "/orgs/{org}/copilot/billing/seats" }, { "slug": "add-teams-to-the-copilot-for-business-subscription-for-an-organization", @@ -3656,6 +3656,12 @@ "verb": "delete", "requestPath": "/repos/{owner}/{repo}/autolinks/{autolink_id}" }, + { + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes" + }, { "slug": "enable-automated-security-fixes", "subcategory": "repos", diff --git a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json index 3a2e5b44b3..d3de62f4c0 100644 --- a/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json +++ b/src/github-apps/data/ghec-2022-11-28/user-to-server-rest.json @@ -1888,13 +1888,13 @@ "slug": "get-copilot-for-business-seat-information-and-settings-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing" + "requestPath": "/orgs/{org}/copilot/billing" }, { "slug": "list-all-copilot-for-business-seat-assignments-for-an-organization", "subcategory": "copilot-for-business", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats" + "requestPath": "/orgs/{org}/copilot/billing/seats" }, { "slug": "add-teams-to-the-copilot-for-business-subscription-for-an-organization", @@ -4086,6 +4086,12 @@ "verb": "delete", "requestPath": "/repos/{owner}/{repo}/autolinks/{autolink_id}" }, + { + "slug": "check-if-automated-security-fixes-are-enabled-for-a-repository", + "subcategory": "repos", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes" + }, { "slug": "enable-automated-security-fixes", "subcategory": "repos", diff --git a/src/github-apps/lib/config.json b/src/github-apps/lib/config.json index 4af9a98a24..a8bc76f3aa 100644 --- a/src/github-apps/lib/config.json +++ b/src/github-apps/lib/config.json @@ -60,5 +60,5 @@ "2022-11-28" ] }, - "sha": "19833171fa53a9a674f247f795f0cf44a65a05e4" + "sha": "741cbd72628a3a80f15ba2321e18a2237b69b803" } \ No newline at end of file diff --git a/src/rest/data/fpt-2022-11-28/schema.json b/src/rest/data/fpt-2022-11-28/schema.json index 94ecf63f82..41b8a69195 100644 --- a/src/rest/data/fpt-2022-11-28/schema.json +++ b/src/rest/data/fpt-2022-11-28/schema.json @@ -213729,7 +213729,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing", + "requestPath": "/orgs/{org}/copilot/billing", "title": "Get Copilot for Business seat information and settings for an organization", "category": "copilot", "subcategory": "copilot-for-business", @@ -213866,7 +213866,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats", + "requestPath": "/orgs/{org}/copilot/billing/seats", "title": "List all Copilot for Business seat assignments for an organization", "category": "copilot", "subcategory": "copilot-for-business", @@ -458725,6 +458725,95 @@ } ] }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes", + "title": "Check if automated security fixes are enabled for a repository", + "category": "repos", + "subcategory": "repos", + "parameters": [ + { + "name": "owner", + "description": "
The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
Response if dependabot is enabled
", + "example": { + "enabled": true, + "paused": false + }, + "schema": { + "title": "Check Automated Security Fixes", + "description": "Check Automated Security Fixes", + "type": "object", + "properties": { + "enabled": { + "type": "boolean", + "description": "Whether automated security fixes are enabled for the repository.", + "examples": [ + true + ] + }, + "paused": { + "type": "boolean", + "description": "Whether automated security fixes are paused for the repository.", + "examples": [ + false + ] + } + }, + "required": [ + "enabled", + "paused" + ] + } + } + } + ], + "previews": [], + "descriptionHTML": "Shows whether automated security fixes are enabled, disabled or paused for a repository. The authenticated user must have admin read access to the repository. For more information, see \"Configuring automated security fixes\".
", + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "Response if dependabot is enabled
" + }, + { + "httpStatusCode": "404", + "description": "Not Found if dependabot is not enabled for the repository
" + } + ] + }, { "serverUrl": "https://api.github.com", "verb": "put", diff --git a/src/rest/data/ghec-2022-11-28/schema.json b/src/rest/data/ghec-2022-11-28/schema.json index c8a28d8ab9..a4bc171c30 100644 --- a/src/rest/data/ghec-2022-11-28/schema.json +++ b/src/rest/data/ghec-2022-11-28/schema.json @@ -225428,7 +225428,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing", + "requestPath": "/orgs/{org}/copilot/billing", "title": "Get Copilot for Business seat information and settings for an organization", "category": "copilot", "subcategory": "copilot-for-business", @@ -225565,7 +225565,7 @@ { "serverUrl": "https://api.github.com", "verb": "get", - "requestPath": "/organizations/{org}/copilot/billing/seats", + "requestPath": "/orgs/{org}/copilot/billing/seats", "title": "List all Copilot for Business seat assignments for an organization", "category": "copilot", "subcategory": "copilot-for-business", @@ -475772,6 +475772,95 @@ } ] }, + { + "serverUrl": "https://api.github.com", + "verb": "get", + "requestPath": "/repos/{owner}/{repo}/automated-security-fixes", + "title": "Check if automated security fixes are enabled for a repository", + "category": "repos", + "subcategory": "repos", + "parameters": [ + { + "name": "owner", + "description": "The account owner of the repository. The name is not case sensitive.
", + "in": "path", + "required": true, + "schema": { + "type": "string" + } + }, + { + "name": "repo", + "description": "The name of the repository without the .git extension. The name is not case sensitive.
Response if dependabot is enabled
", + "example": { + "enabled": true, + "paused": false + }, + "schema": { + "title": "Check Automated Security Fixes", + "description": "Check Automated Security Fixes", + "type": "object", + "properties": { + "enabled": { + "type": "boolean", + "description": "Whether automated security fixes are enabled for the repository.", + "examples": [ + true + ] + }, + "paused": { + "type": "boolean", + "description": "Whether automated security fixes are paused for the repository.", + "examples": [ + false + ] + } + }, + "required": [ + "enabled", + "paused" + ] + } + } + } + ], + "previews": [], + "descriptionHTML": "Shows whether automated security fixes are enabled, disabled or paused for a repository. The authenticated user must have admin read access to the repository. For more information, see \"Configuring automated security fixes\".
", + "statusCodes": [ + { + "httpStatusCode": "200", + "description": "Response if dependabot is enabled
" + }, + { + "httpStatusCode": "404", + "description": "Not Found if dependabot is not enabled for the repository
" + } + ] + }, { "serverUrl": "https://api.github.com", "verb": "put", diff --git a/src/rest/data/ghes-3.6/schema.json b/src/rest/data/ghes-3.6/schema.json index ce5905a17e..21499549dd 100644 --- a/src/rest/data/ghes-3.6/schema.json +++ b/src/rest/data/ghes-3.6/schema.json @@ -306018,7 +306018,7 @@ } ], "previews": [], - "descriptionHTML": "Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].
Deprecation Notice: GitHub Enterprise Server will discontinue the OAuth Authorizations API, which is used by integrations to create personal access tokens and OAuth tokens, and you must now create these tokens using our web application flow. The OAuth Authorizations API will be removed on November, 13, 2020. For more information, including scheduled brownouts, see the blog post.
\nYou can use this API to list the set of OAuth applications that have been granted access to your account. Unlike the list your authorizations API, this API does not manage individual tokens. This API will return one entry for each OAuth application that has been granted access to your account, regardless of the number of tokens an application has generated for your user. The list of OAuth applications returned matches what is shown on the application authorizations settings screen within GitHub. The scopes returned are the union of scopes authorized for the application. For example, if an application has one token with repo scope and another token with user scope, the grant will return [\"repo\", \"user\"].