curl --request GET \
--url https://api.diversion.dev/v0/repos/{repo_id}/granular-permissions \
--header 'Authorization: Bearer <token>'{
"items": [
{
"id": "<string>",
"repo_id": "<string>",
"path_pattern": "<string>",
"access_level": "ADMIN",
"permission_type": "ALLOW_LT_EQ",
"evaluation_order": 123,
"created_unix": 123,
"updated_unix": 123,
"created_by": "<string>",
"last_updated_by": "<string>",
"user_id": "<string>",
"group_id": "<string>"
}
]
}List all granular permissions configured for this repository
curl --request GET \
--url https://api.diversion.dev/v0/repos/{repo_id}/granular-permissions \
--header 'Authorization: Bearer <token>'{
"items": [
{
"id": "<string>",
"repo_id": "<string>",
"path_pattern": "<string>",
"access_level": "ADMIN",
"permission_type": "ALLOW_LT_EQ",
"evaluation_order": 123,
"created_unix": 123,
"updated_unix": 123,
"created_by": "<string>",
"last_updated_by": "<string>",
"user_id": "<string>",
"group_id": "<string>"
}
]
}This API uses OAuth 2 with the implicit grant flow
The repo ID of the repository. Repo name can be used instead of the ID, but usage of ID for permanent linking and API requests is preferred.
3 - 128"example_id"
A list of granular permission objects
Show child attributes
Granular permission identifier
Repository ID this permission belongs to
Path pattern for matching files
Access level for path permissions. Hierarchical: ADMIN > WRITE > READ > NO_ACCESS.
ADMIN, WRITE, READ, NO_ACCESS Permission type controlling how access levels are granted or denied. ALLOW_LT_EQ grants specified level and all lower levels. ALLOW_EQ grants only the exact level. DENY_ALL denies all level granted above in the table. DENY_EQ denies only the exact level.
ALLOW_LT_EQ, ALLOW_EQ, DENY_ALL, DENY_EQ Rule evaluation priority. Higher values are evaluated first (read-only).
Creation timestamp (Unix epoch)
Last update timestamp (Unix epoch)
User ID who created this permission
User ID who last updated this permission
User ID this permission is assigned to
Group ID this permission is assigned to