You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* <pre><code>GitLab Endpoint: POST /api/v4/applications</code></pre>
122
+
*
123
+
* @param name the name for the OAUTH Application
124
+
* @param redirectUri the redirect URI for the OAUTH Application
125
+
* @param scopes the scopes of the application (api, read_user, sudo, read_repository, openid, profile, email)
126
+
* @param confidential The application is used where the client secret can be kept confidential. Native mobile apps and Single Page Apps are considered non-confidential
127
+
* @return the created Application instance
128
+
* @throws GitLabApiException if any exception occurs
Copy file name to clipboardexpand all lines: gitlab4j-models/src/main/java/org/gitlab4j/models/Constants.java
+38-9
Original file line number
Diff line number
Diff line change
@@ -829,26 +829,55 @@ public String toString() {
829
829
* Enum for the various Application scope values.
830
830
*/
831
831
publicenumApplicationScope {
832
-
833
-
/** Access the authenticated user's API */
832
+
/** Grants complete read/write access to the API, including all groups and projects, the container registry, the dependency proxy, and the package registry. */
834
833
API,
835
834
836
-
/** Read the authenticated user's personal information */
835
+
/** Grants read access to the API, including all groups and projects, the container registry, and the package registry. */
836
+
READ_API,
837
+
838
+
/** Grants read-only access to your profile through the /user API endpoint, which includes username, public email, and full name. Also grants access to read-only API endpoints under /users. */
837
839
READ_USER,
838
840
839
-
/** Perform API actions as any user in the system */
840
-
SUDO,
841
+
/** Grants create access to the runners. */
842
+
CREATE_RUNNER,
841
843
842
-
/** Allows read-access to the repository */
844
+
/** Grants access to manage the runners. */
845
+
MANAGE_RUNNER,
846
+
847
+
/** Grants permission to perform Kubernetes API calls using the agent for Kubernetes. */
848
+
K8S_PROXY,
849
+
850
+
/** Grants read-only access to repositories on private projects using Git-over-HTTP or the Repository Files API. */
843
851
READ_REPOSITORY,
844
852
845
-
/** Authenticate using OpenID Connect */
853
+
/** Grants read-write access to repositories on private projects using Git-over-HTTP (not using the API). */
854
+
WRITE_REPOSITORY,
855
+
856
+
/** Grants read-only access to GitLab Observability. */
857
+
READ_OBSERVABILITY,
858
+
859
+
/** Grants write access to GitLab Observability. */
860
+
WRITE_OBSERVABILITY,
861
+
862
+
/** Grants access to GitLab Duo related API endpoints. */
863
+
AI_FEATURES,
864
+
865
+
/** Grants permission to perform API actions as any user in the system, when authenticated as an admin user. */
866
+
SUDO,
867
+
868
+
/** Grants permission to perform API actions as an administrator, when Admin Mode is enabled. */
869
+
ADMIN_MODE,
870
+
871
+
/** Grant access to download Service Ping payload via API when authenticated as an admin user. */
872
+
READ_SERVICE_PING,
873
+
874
+
/** Grants permission to authenticate with GitLab using OpenID Connect. Also gives read-only access to the user's profile and group memberships. */
846
875
OPENID,
847
876
848
-
/** Allows read-only access to the user's personal information using OpenID Connect */
877
+
/** Grants read-only access to the user's profile data using OpenID Connect. */
849
878
PROFILE,
850
879
851
-
/** Allows read-only access to the user's primary email address using OpenID Connect */
880
+
/** Grants read-only access to the user's primary email address using OpenID Connect. */
0 commit comments