Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Github token permissions #86

Open
ralight opened this issue Apr 6, 2018 · 4 comments
Open

Github token permissions #86

ralight opened this issue Apr 6, 2018 · 4 comments
Assignees

Comments

@ralight
Copy link

ralight commented Apr 6, 2018

The documentation currently suggests creating a github token with permissions to everything, including delete_repo and admin:write:org. This isn't great, could you please find out what is actually necessary and update the docs?

@ralight
Copy link
Author

ralight commented Apr 11, 2018

repo:public_repo seems to be enough for public repositories - but my test is from getting updated data with a setup that was originally configured using a token with much greater access.

@stuartlangridge
Copy link
Collaborator

microsoft/ghcrawler#97 is the upstream ghcrawler issue for this, although obviously they don't know exactly what's being fetched, and we do for Measure, so we should be able to work it out.

@stuartlangridge
Copy link
Collaborator

We probably also need read:user and user:email for contributor information.

@grooverdan
Copy link

read:org is probably needed for teams, collaborators. There's also an events but don't know yet what that requires.

Seems X-Accepted-OAuth-Scopes response header described in https://developer.github.com/apps/building-oauth-apps/understanding-scopes-for-oauth-apps/ could be used to narrow down the requirement.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants