Skip to content

Commit 477ab1c

Browse files
Merge pull request #57 from Wei18/dependabot/submodules/Submodule/github/rest-api-description-b29a2c5
Bump Submodule/github/rest-api-description from `4adfd3e` to `b29a2c5`
2 parents 722db35 + 04830bb commit 477ab1c

File tree

3 files changed

+41
-41
lines changed

3 files changed

+41
-41
lines changed

Sources/apps/Client.swift

+10-10
Original file line numberDiff line numberDiff line change
@@ -1388,7 +1388,7 @@ public struct Client: APIProtocol {
13881388
}
13891389
/// Delete an app authorization
13901390
///
1391-
/// OAuth and GitHub application owners can revoke a grant for their application and a specific user. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) when accessing this endpoint, using the OAuth application's `client_id` and `client_secret` as the username and password. You must also provide a valid OAuth `access_token` as an input parameter and the grant for the token's owner will be deleted.
1391+
/// OAuth and GitHub application owners can revoke a grant for their application and a specific user. You must provide a valid OAuth `access_token` as an input parameter and the grant for the token's owner will be deleted.
13921392
/// Deleting an application's grant will also delete all OAuth tokens associated with the application for the user. Once deleted, the application will have no access to the user's account and will no longer be listed on [the application authorizations settings screen within GitHub](https://github.com/settings/applications#authorized).
13931393
///
13941394
/// - Remark: HTTP `DELETE /applications/{client_id}/grant`.
@@ -1464,7 +1464,7 @@ public struct Client: APIProtocol {
14641464
}
14651465
/// Check a token
14661466
///
1467-
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method for checking OAuth token validity without exceeding the normal rate limits for failed login attempts. Authentication works differently with this particular endpoint. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) to use this endpoint, where the username is the application `client_id` and the password is its `client_secret`. Invalid tokens will return `404 NOT FOUND`.
1467+
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method for checking OAuth token validity without exceeding the normal rate limits for failed login attempts. Authentication works differently with this particular endpoint. Invalid tokens will return `404 NOT FOUND`.
14681468
///
14691469
/// - Remark: HTTP `POST /applications/{client_id}/token`.
14701470
/// - Remark: Generated from `#/paths//applications/{client_id}/token/post(apps/check-token)`.
@@ -1581,7 +1581,7 @@ public struct Client: APIProtocol {
15811581
}
15821582
/// Reset a token
15831583
///
1584-
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method to reset a valid OAuth token without end-user involvement. Applications must save the "token" property in the response because changes take effect immediately. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) when accessing this endpoint, using the application's `client_id` and `client_secret` as the username and password. Invalid tokens will return `404 NOT FOUND`.
1584+
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method to reset a valid OAuth token without end-user involvement. Applications must save the "token" property in the response because changes take effect immediately. Invalid tokens will return `404 NOT FOUND`.
15851585
///
15861586
/// - Remark: HTTP `PATCH /applications/{client_id}/token`.
15871587
/// - Remark: Generated from `#/paths//applications/{client_id}/token/patch(apps/reset-token)`.
@@ -1676,7 +1676,7 @@ public struct Client: APIProtocol {
16761676
}
16771677
/// Delete an app token
16781678
///
1679-
/// OAuth or GitHub application owners can revoke a single token for an OAuth application or a GitHub application with an OAuth authorization. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) when accessing this endpoint, using the application's `client_id` and `client_secret` as the username and password.
1679+
/// OAuth or GitHub application owners can revoke a single token for an OAuth application or a GitHub application with an OAuth authorization.
16801680
///
16811681
/// - Remark: HTTP `DELETE /applications/{client_id}/token`.
16821682
/// - Remark: Generated from `#/paths//applications/{client_id}/token/delete(apps/delete-token)`.
@@ -1757,10 +1757,6 @@ public struct Client: APIProtocol {
17571757
///
17581758
/// Invalid tokens will return `404 NOT FOUND`.
17591759
///
1760-
/// You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication)
1761-
/// when accessing this endpoint, using the `client_id` and `client_secret` of the GitHub App
1762-
/// as the username and password.
1763-
///
17641760
/// - Remark: HTTP `POST /applications/{client_id}/token/scoped`.
17651761
/// - Remark: Generated from `#/paths//applications/{client_id}/token/scoped/post(apps/scope-token)`.
17661762
public func apps_sol_scope_hyphen_token(_ input: Operations.apps_sol_scope_hyphen_token.Input) async throws -> Operations.apps_sol_scope_hyphen_token.Output {
@@ -3375,7 +3371,9 @@ public struct Client: APIProtocol {
33753371
}
33763372
/// Add a repository to an app installation
33773373
///
3378-
/// Add a single repository to an installation. The authenticated user must have admin access to the repository.
3374+
/// Add a single repository to an installation. The authenticated user must have admin access to the repository.
3375+
///
3376+
/// This endpoint only works for PATs (classic) with the `repo` scope.
33793377
///
33803378
/// - Remark: HTTP `PUT /user/installations/{installation_id}/repositories/{repository_id}`.
33813379
/// - Remark: Generated from `#/paths//user/installations/{installation_id}/repositories/{repository_id}/put(apps/add-repo-to-installation-for-authenticated-user)`.
@@ -3466,7 +3464,9 @@ public struct Client: APIProtocol {
34663464
}
34673465
/// Remove a repository from an app installation
34683466
///
3469-
/// Remove a single repository from an installation. The authenticated user must have admin access to the repository. The installation must have the `repository_selection` of `selected`.
3467+
/// Remove a single repository from an installation. The authenticated user must have admin access to the repository. The installation must have the `repository_selection` of `selected`.
3468+
///
3469+
/// This endpoint only works for PATs (classic) with the `repo` scope.
34703470
///
34713471
/// - Remark: HTTP `DELETE /user/installations/{installation_id}/repositories/{repository_id}`.
34723472
/// - Remark: Generated from `#/paths//user/installations/{installation_id}/repositories/{repository_id}/delete(apps/remove-repo-from-installation-for-authenticated-user)`.

0 commit comments

Comments
 (0)