Skip to content
This repository was archived by the owner on Nov 1, 2017. It is now read-only.

Add required permissions for repo keys #163

Closed
wants to merge 2 commits into from

Conversation

pythonandchips
Copy link

There is no documentation on what authorisation scope is required when accessing the api. Took me a while to figure it out so though I would add something to clear it up.

Add instruction to add repo:keys to authorization to ensure requests will work
made authorization clearer
@pengwynn
Copy link
Contributor

Thanks for the patch. I believe you need repo scope since repo:keys does not exist. I'd love to fully document the scopes required for each method, but I think we're better off automating that via the build process to to pull from the X-Accepted-OAuth-Scopes header or something. I'm going to close this until we can do it across the board.

@pengwynn pengwynn closed this Oct 21, 2012
@pythonandchips
Copy link
Author

Indeed that would be a lot better if it was generated.

Interestingly when I tried to add a key with a repo scope it wouldn't work but with repo:keys it did. need to try it again with just the repo scope.

Cheers

Stay Frosty
Colin
Sent with Sparrow (http://www.sparrowmailapp.com/?sig)

On Sunday, 21 October 2012 at 14:26, Wynn Netherland wrote:

Thanks for the patch. I believe you need repo scope since repo:keys does not exist. I'd love to fully document the scopes required for each method, but I think we're better off automating that via the build process to to pull from the X-Accepted-OAuth-Scopes header (http://developer.github.com/v3/oauth/#scopes) or something. I'm going to close this until we can do it across the board.


Reply to this email directly or view it on GitHub (#163 (comment)).

gjtorikian added a commit that referenced this pull request Nov 24, 2014
Update CI guide so that commit statuses are created on the base repo of pull requests
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy