GitHub-Authorization
view release on metacpan or search on metacpan
more optional ones:
Parameters
* user (required)
The user-name or email of the user the authorization is being
created against.
* password (required)
The user's password.
* scopes
An ArrayRef of scopes (described "Legal Scopes").
* note
A short note (or reminder) describing what the authorization is for.
* note_url
A link that describes why the authorization has been generated We
throw an exception on error or failure, and return the structure
describing the new authorization token (and the token itself, as
described below) on success.
* client_id (required if client_secret is given)
If requesting an authorization for a specific app, pass its client
key here.
* client_secret (required if client_id is given)
If requesting an authorization for a specific app, pass its client
secret here.
On success...
A successful return from get_gh_token() will look something like this:
{
app => {
name => "test! (API)",
url => "http://developer.github.com/v3/oauth/#oauth-authorizations-api",
},
created_at => "2012-12-24T14:28:17Z",
id => xxxxxxx, # an integer > 0
note => "test!",
note_url => undef,
scopes => ["public_repo"],
token => "****************************************",
updated_at => "2012-12-24T14:28:17Z",
url => "https://api.github.com/authorizations/xxxxxxx",
}
The "token" slot is probably the bit you want.
On failure/error...
On failure, we confess() our sins:
Failed: 401/Unauthorized / Bad credentials ...
That is, we "confess" in Carp with the status code, status message, and
the message returned from GitHub itself.
legal_scopes
Returns a list of legal scope names. (See get_gh_token() doc for the
list)
is_legal_scope('scope_name')
Returns true if the scope name given is a legal scope.
MANAGING AUTHORIZATIONS
All of a user's GitHub authorization tokens can be viewed and revoked on
their GitHub Applications <https://github.com/settings/applications>
account page.
Users may revoke tokens at any time through GitHub proper.
SSL VALIDATION
We instruct our user-agent (HTTP::Tiny in this case) to validate the
remote server's certificate, as described in "SSL-SUPPORT" in
HTTP::Tiny. (Essentially, using Mozilla::CA).
While this satisfies the "let's be cautious" alarms in the author's
head, this may be too paranoid or not paranoid enough for you. If so,
please file an issue or pull request and we'll work something out.
LIMITATIONS
This package currently has no capabilities for deleting, altering, or
otherwise doing anything with tokens outside of creating them.
SEE ALSO
Please see those modules/websites for more information related to this
module.
* The GitHub OAuth API reference
<http://developer.github.com/v3/oauth/#create-a-new-authorization>
* Net::GitHub
* Pithub
SOURCE
The development version is on github at
<http://github.com/RsrchBoy/github-authorization> and may be cloned from
<git://github.com/RsrchBoy/github-authorization.git>
BUGS
Please report any bugs or feature requests on the bugtracker website
https://github.com/RsrchBoy/github-authorization/issues
When submitting a bug or request, please include a test-file or a patch
to an existing test-file that illustrates the bug or desired feature.
AUTHOR
Chris Weyl <cweyl@alumni.drew.edu>
COPYRIGHT AND LICENSE
This software is Copyright (c) 2012 by Chris Weyl.
( run in 0.867 second using v1.01-cache-2.11-cpan-39bf76dae61 )