You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* upstream/main:
Simplify the error message when `index.js` couldn't be loaded (go-gitea#22354)
Support asciicast files as new markup (go-gitea#22448)
Support scoped access tokens (go-gitea#20908)
some refactor about code comments (go-gitea#20821)
docs: add swagger.json file location to FAQ (go-gitea#22489)
docs: bump Gitea version (go-gitea#22490)
chore: changelog 1.18.1 (go-gitea#22471) (go-gitea#22487)
Fixed lint warnings in Grafana raised by Mixtool (go-gitea#22486)
Set disable_gravatar/enable_federated_avatar when offline mode is true (go-gitea#22479)
Fix pull request API field `closed_at` always being `null` (go-gitea#22482)
Fix migration from gitbucket (repost) (go-gitea#22477)
Copy file name to clipboardExpand all lines: docs/content/doc/developers/oauth2-provider.en-us.md
+35-1Lines changed: 35 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,41 @@ To use the Authorization Code Grant as a third party application it is required
42
42
43
43
## Scopes
44
44
45
-
Currently Gitea does not support scopes (see [#4300](https://github.com/go-gitea/gitea/issues/4300)) and all third party applications will be granted access to all resources of the user and their organizations.
45
+
Gitea supports the following scopes for tokens:
46
+
47
+
| Name | Description |
48
+
| ---- | ----------- |
49
+
|**(no scope)**| Grants read-only access to public user profile and public repositories. |
50
+
|**repo**| Full control over all repositories. |
51
+
| **repo:status**| Grants read/write access to commit status in all repositories. |
52
+
| **public_repo**| Grants read/write access to public repositories only. |
53
+
|**admin:repo_hook**| Grants access to repository hooks of all repositories. This is included in the `repo` scope. |
54
+
| **write:repo_hook**| Grants read/write access to repository hooks |
55
+
| **read:repo_hook**| Grants read-only access to repository hooks |
56
+
|**admin:org**| Grants full access to organization settings |
57
+
| **write:org**| Grants read/write access to organization settings |
58
+
| **read:org**| Grants read-only access to organization settings |
59
+
|**admin:public_key**| Grants full access for managing public keys |
60
+
| **write:public_key**| Grant read/write access to public keys |
61
+
| **read:public_key**| Grant read-only access to public keys |
62
+
|**admin:org_hook**| Grants full access to organizational-level hooks |
63
+
|**notification**| Grants full access to notifications |
64
+
|**user**| Grants full access to user profile info |
65
+
| **read:user**| Grants read access to user's profile |
66
+
| **user:email**| Grants read access to user's email addresses |
67
+
| **user:follow**| Grants access to follow/un-follow a user |
68
+
|**delete_repo**| Grants access to delete repositories as an admin |
69
+
|**package**| Grants full access to hosted packages |
70
+
| **write:package**| Grants read/write access to packages |
71
+
| **read:package**| Grants read access to packages |
72
+
| **delete:package**| Grants delete access to packages |
73
+
|**admin:gpg_key**| Grants full access for managing GPG keys |
74
+
| **write:gpg_key**| Grants read/write access to GPG keys |
75
+
| **read:gpg_key**| Grants read-only access to GPG keys |
76
+
|**admin:application**| Grants full access to manage applications |
77
+
| **write:application**| Grants read/write access for managing applications |
78
+
| **read:application**| Grants read access for managing applications |
79
+
|**sudo**| Allows to perform actions as the site admin. |
0 commit comments