Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump Submodule/github/rest-api-description from 4adfd3e to b29a2c5 #57

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 10 additions & 10 deletions Sources/apps/Client.swift
Original file line number Diff line number Diff line change
Expand Up @@ -1388,7 +1388,7 @@ public struct Client: APIProtocol {
}
/// Delete an app authorization
///
/// OAuth and GitHub application owners can revoke a grant for their application and a specific user. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) when accessing this endpoint, using the OAuth application's `client_id` and `client_secret` as the username and password. You must also provide a valid OAuth `access_token` as an input parameter and the grant for the token's owner will be deleted.
/// OAuth and GitHub application owners can revoke a grant for their application and a specific user. You must provide a valid OAuth `access_token` as an input parameter and the grant for the token's owner will be deleted.
/// Deleting an application's grant will also delete all OAuth tokens associated with the application for the user. Once deleted, the application will have no access to the user's account and will no longer be listed on [the application authorizations settings screen within GitHub](https://github.com/settings/applications#authorized).
///
/// - Remark: HTTP `DELETE /applications/{client_id}/grant`.
Expand Down Expand Up @@ -1464,7 +1464,7 @@ public struct Client: APIProtocol {
}
/// Check a token
///
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method for checking OAuth token validity without exceeding the normal rate limits for failed login attempts. Authentication works differently with this particular endpoint. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) to use this endpoint, where the username is the application `client_id` and the password is its `client_secret`. Invalid tokens will return `404 NOT FOUND`.
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method for checking OAuth token validity without exceeding the normal rate limits for failed login attempts. Authentication works differently with this particular endpoint. Invalid tokens will return `404 NOT FOUND`.
///
/// - Remark: HTTP `POST /applications/{client_id}/token`.
/// - Remark: Generated from `#/paths//applications/{client_id}/token/post(apps/check-token)`.
Expand Down Expand Up @@ -1581,7 +1581,7 @@ public struct Client: APIProtocol {
}
/// Reset a token
///
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method to reset a valid OAuth token without end-user involvement. Applications must save the "token" property in the response because changes take effect immediately. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) when accessing this endpoint, using the application's `client_id` and `client_secret` as the username and password. Invalid tokens will return `404 NOT FOUND`.
/// OAuth applications and GitHub applications with OAuth authorizations can use this API method to reset a valid OAuth token without end-user involvement. Applications must save the "token" property in the response because changes take effect immediately. Invalid tokens will return `404 NOT FOUND`.
///
/// - Remark: HTTP `PATCH /applications/{client_id}/token`.
/// - Remark: Generated from `#/paths//applications/{client_id}/token/patch(apps/reset-token)`.
Expand Down Expand Up @@ -1676,7 +1676,7 @@ public struct Client: APIProtocol {
}
/// Delete an app token
///
/// OAuth or GitHub application owners can revoke a single token for an OAuth application or a GitHub application with an OAuth authorization. You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication) when accessing this endpoint, using the application's `client_id` and `client_secret` as the username and password.
/// OAuth or GitHub application owners can revoke a single token for an OAuth application or a GitHub application with an OAuth authorization.
///
/// - Remark: HTTP `DELETE /applications/{client_id}/token`.
/// - Remark: Generated from `#/paths//applications/{client_id}/token/delete(apps/delete-token)`.
Expand Down Expand Up @@ -1757,10 +1757,6 @@ public struct Client: APIProtocol {
///
/// Invalid tokens will return `404 NOT FOUND`.
///
/// You must use [Basic Authentication](https://docs.github.com/rest/authentication/authenticating-to-the-rest-api#using-basic-authentication)
/// when accessing this endpoint, using the `client_id` and `client_secret` of the GitHub App
/// as the username and password.
///
/// - Remark: HTTP `POST /applications/{client_id}/token/scoped`.
/// - Remark: Generated from `#/paths//applications/{client_id}/token/scoped/post(apps/scope-token)`.
public func apps_sol_scope_hyphen_token(_ input: Operations.apps_sol_scope_hyphen_token.Input) async throws -> Operations.apps_sol_scope_hyphen_token.Output {
Expand Down Expand Up @@ -3375,7 +3371,9 @@ public struct Client: APIProtocol {
}
/// Add a repository to an app installation
///
/// Add a single repository to an installation. The authenticated user must have admin access to the repository.
/// Add a single repository to an installation. The authenticated user must have admin access to the repository.
///
/// This endpoint only works for PATs (classic) with the `repo` scope.
///
/// - Remark: HTTP `PUT /user/installations/{installation_id}/repositories/{repository_id}`.
/// - Remark: Generated from `#/paths//user/installations/{installation_id}/repositories/{repository_id}/put(apps/add-repo-to-installation-for-authenticated-user)`.
Expand Down Expand Up @@ -3466,7 +3464,9 @@ public struct Client: APIProtocol {
}
/// Remove a repository from an app installation
///
/// Remove a single repository from an installation. The authenticated user must have admin access to the repository. The installation must have the `repository_selection` of `selected`.
/// Remove a single repository from an installation. The authenticated user must have admin access to the repository. The installation must have the `repository_selection` of `selected`.
///
/// This endpoint only works for PATs (classic) with the `repo` scope.
///
/// - Remark: HTTP `DELETE /user/installations/{installation_id}/repositories/{repository_id}`.
/// - Remark: Generated from `#/paths//user/installations/{installation_id}/repositories/{repository_id}/delete(apps/remove-repo-from-installation-for-authenticated-user)`.
Expand Down
Loading