@@ -109,6 +109,9 @@ public CallSummary<EmptyPayload, GetClientResponse> client(String clientId) thro
109
109
*
110
110
* The caller's scopes must satisfy `scopes`.
111
111
*
112
+ * Required scopes:
113
+ * * auth:create-client:<clientId>
114
+ *
112
115
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#createClient
113
116
*/
114
117
public CallSummary <CreateClientRequest , CreateClientResponse > createClient (String clientId , CreateClientRequest payload ) throws APICallFailure {
@@ -123,6 +126,9 @@ public CallSummary<CreateClientRequest, CreateClientResponse> createClient(Strin
123
126
* There is no way to retrieve an existing `accessToken`, so if you loose it
124
127
* you must reset the accessToken to acquire it again.
125
128
*
129
+ * Required scopes:
130
+ * * auth:reset-access-token:<clientId>
131
+ *
126
132
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#resetAccessToken
127
133
*/
128
134
public CallSummary <EmptyPayload , CreateClientResponse > resetAccessToken (String clientId ) throws APICallFailure {
@@ -136,6 +142,9 @@ public CallSummary<EmptyPayload, CreateClientResponse> resetAccessToken(String c
136
142
* If no scopes are given in the request, the client's scopes remain
137
143
* unchanged
138
144
*
145
+ * Required scopes:
146
+ * * auth:update-client:<clientId>
147
+ *
139
148
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#updateClient
140
149
*/
141
150
public CallSummary <CreateClientRequest , GetClientResponse > updateClient (String clientId , CreateClientRequest payload ) throws APICallFailure {
@@ -149,6 +158,9 @@ public CallSummary<CreateClientRequest, GetClientResponse> updateClient(String c
149
158
* This is typically used by identity providers to re-enable clients that
150
159
* had been disabled when the corresponding identity's scopes changed.
151
160
*
161
+ * Required scopes:
162
+ * * auth:enable-client:<clientId>
163
+ *
152
164
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#enableClient
153
165
*/
154
166
public CallSummary <EmptyPayload , GetClientResponse > enableClient (String clientId ) throws APICallFailure {
@@ -161,6 +173,9 @@ public CallSummary<EmptyPayload, GetClientResponse> enableClient(String clientId
161
173
* This is typically used by identity providers to disable clients when the
162
174
* corresponding identity's scopes no longer satisfy the client's scopes.
163
175
*
176
+ * Required scopes:
177
+ * * auth:disable-client:<clientId>
178
+ *
164
179
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#disableClient
165
180
*/
166
181
public CallSummary <EmptyPayload , GetClientResponse > disableClient (String clientId ) throws APICallFailure {
@@ -171,6 +186,9 @@ public CallSummary<EmptyPayload, GetClientResponse> disableClient(String clientI
171
186
* Delete a client, please note that any roles related to this client must
172
187
* be deleted independently.
173
188
*
189
+ * Required scopes:
190
+ * * auth:delete-client:<clientId>
191
+ *
174
192
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#deleteClient
175
193
*/
176
194
public CallSummary <EmptyPayload , EmptyPayload > deleteClient (String clientId ) throws APICallFailure {
@@ -205,6 +223,9 @@ public CallSummary<EmptyPayload, GetRoleResponse> role(String roleId) throws API
205
223
* If there already exists a role with the same `roleId` this operation
206
224
* will fail. Use `updateRole` to modify an existing role.
207
225
*
226
+ * Required scopes:
227
+ * * auth:create-role:<roleId>
228
+ *
208
229
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#createRole
209
230
*/
210
231
public CallSummary <CreateRoleRequest , GetRoleResponse > createRole (String roleId , CreateRoleRequest payload ) throws APICallFailure {
@@ -217,6 +238,9 @@ public CallSummary<CreateRoleRequest, GetRoleResponse> createRole(String roleId,
217
238
* The caller's scopes must satisfy all of the new scopes being added, but
218
239
* need not satisfy all of the client's existing scopes.
219
240
*
241
+ * Required scopes:
242
+ * * auth:update-role:<roleId>
243
+ *
220
244
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#updateRole
221
245
*/
222
246
public CallSummary <CreateRoleRequest , GetRoleResponse > updateRole (String roleId , CreateRoleRequest payload ) throws APICallFailure {
@@ -227,6 +251,9 @@ public CallSummary<CreateRoleRequest, GetRoleResponse> updateRole(String roleId,
227
251
* Delete a role. This operation will succeed regardless of whether or not
228
252
* the role exists.
229
253
*
254
+ * Required scopes:
255
+ * * auth:delete-role:<roleId>
256
+ *
230
257
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#deleteRole
231
258
*/
232
259
public CallSummary <EmptyPayload , EmptyPayload > deleteRole (String roleId ) throws APICallFailure {
@@ -308,6 +335,9 @@ public CallSummary<EmptyPayload, SetOfScopes> currentScopes() throws APICallFail
308
335
* access to `my-folder/file.txt` as expected, but also to `my-folder.txt`,
309
336
* which may not be intended.
310
337
*
338
+ * Required scopes:
339
+ * * auth:aws-s3:<level>:<bucket>/<prefix>
340
+ *
311
341
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#awsS3Credentials
312
342
*/
313
343
public CallSummary <EmptyPayload , AWSS3CredentialsResponse > awsS3Credentials (String level , String bucket , String prefix ) throws APICallFailure {
@@ -319,6 +349,9 @@ public CallSummary<EmptyPayload, AWSS3CredentialsResponse> awsS3Credentials(Stri
319
349
* Table Storage table. Note, this will create the table, if it doesn't
320
350
* already exist.
321
351
*
352
+ * Required scopes:
353
+ * * auth:azure-table-access:<account>/<table>
354
+ *
322
355
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#azureTableSAS
323
356
*/
324
357
public CallSummary <EmptyPayload , AzureSharedAccessSignatureResponse > azureTableSAS (String account , String table ) throws APICallFailure {
@@ -334,6 +367,9 @@ public CallSummary<EmptyPayload, AzureSharedAccessSignatureResponse> azureTableS
334
367
* initial team configured for this component. Contact a Sentry admin
335
368
* to have the project transferred to a team you have access to if needed
336
369
*
370
+ * Required scopes:
371
+ * * auth:sentry:<project>
372
+ *
337
373
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#sentryDSN
338
374
*/
339
375
public CallSummary <EmptyPayload , SentryDSNResponse > sentryDSN (String project ) throws APICallFailure {
@@ -345,6 +381,9 @@ public CallSummary<EmptyPayload, SentryDSNResponse> sentryDSN(String project) th
345
381
*
346
382
* The token is valid for 24 hours, clients should refresh after expiration.
347
383
*
384
+ * Required scopes:
385
+ * * auth:statsum:<project>
386
+ *
348
387
* See https://docs.taskcluster.net/reference/platform/auth/api-docs#statsumToken
349
388
*/
350
389
public CallSummary <EmptyPayload , StatsumTokenResponse > statsumToken (String project ) throws APICallFailure {
0 commit comments