Skip to main content

apps

Overview

Nameapps
TypeResource
Idgithub.apps.apps

Fields

NameDatatypeDescription
idintegerThe ID of the installation.
single_file_pathsarray
suspended_byobjectA GitHub user.
access_tokens_urlstring
app_slugstring
updated_atstring
suspended_atstring
target_idintegerThe ID of the user or organization this token is being scoped to.
target_typestring
created_atstring
repository_selectionstringDescribe whether all repositories have been selected or there's a selection involved
accountobjectA GitHub user.
repositories_urlstring
has_multiple_single_filesboolean
contact_emailstring
app_idinteger
html_urlstring
single_file_namestring
permissionsobjectThe permissions granted to the user access token.
eventsarray

Methods

NameAccessible byRequired ParamsDescription
get_installationSELECTinstallation_idEnables an authenticated GitHub App to find an installation's information using the installation id.

You must use a JWT to access this endpoint.
get_org_installationSELECTorgEnables an authenticated GitHub App to find the organization's installation information.

You must use a JWT to access this endpoint.
get_repo_installationSELECTowner, repoEnables an authenticated GitHub App to find the repository's installation information. The installation's account type will be either an organization or a user account, depending which account the repository belongs to.

You must use a JWT to access this endpoint.
get_user_installationSELECTusernameEnables an authenticated GitHub App to find the user’s installation information.

You must use a JWT to access this endpoint.
list_installationsSELECTYou must use a JWT to access this endpoint.

The permissions the installation has are included under the permissions key.
create_from_manifestINSERTcodeUse this endpoint to complete the handshake necessary when implementing the GitHub App Manifest flow. When you create a GitHub App with the manifest flow, you receive a temporary code used to retrieve the GitHub App's id, pem (private key), and webhook_secret.
create_installation_access_tokenINSERTinstallation_idCreates an installation access token that enables a GitHub App to make authenticated API requests for the app's installation on an organization or individual account. Installation tokens expire one hour from the time you create them. Using an expired token produces a status code of 401 - Unauthorized, and requires creating a new installation token. By default the installation token has access to all repositories that the installation can access. To restrict the access to specific repositories, you can provide the repository_ids when creating the token. When you omit repository_ids, the response does not contain the repositories key.

You must use a JWT to access this endpoint.
delete_installationDELETEinstallation_idUninstalls a GitHub App on a user, organization, or business account. If you prefer to temporarily suspend an app's access to your account's resources, then we recommend the "Suspend an app installation" endpoint.

You must use a JWT to access this endpoint.
scope_tokenEXECclient_id, data__access_tokenUse a non-scoped user access token to create a repository scoped and/or permission scoped user access token. You can specify which repositories the token can access and which permissions are granted to the token. You must use Basic Authentication when accessing this endpoint, using the client_id and client_secret of the GitHub App as the username and password. Invalid tokens will return 404 NOT FOUND.
suspend_installationEXECinstallation_idSuspends a GitHub App on a user, organization, or business account, which blocks the app from accessing the account's resources. When a GitHub App is suspended, the app's access to the GitHub API or webhook events is blocked for that account.

You must use a JWT to access this endpoint.
unsuspend_installationEXECinstallation_idRemoves a GitHub App installation suspension.

You must use a JWT to access this endpoint.