You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: versions/3.0.md
+27-4Lines changed: 27 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@ For example, if a field has an array value, the JSON array representation will b
102
102
103
103
```json
104
104
{
105
-
"field": [...]
105
+
"field": [1, 2, 3]
106
106
}
107
107
```
108
108
All field names in the specification are **case sensitive**.
@@ -632,10 +632,33 @@ The path is appended to the URL from the [`Server Object`](#serverObject) in ord
632
632
633
633
Field Pattern | Type | Description
634
634
---|:---:|---
635
-
<a name="pathsPath"></a>/{path} | [Path Item Object](#pathItemObject) | A relative path to an individual endpoint. The field name MUST begin with a slash. The path is **appended** (no relative URL resolution) to the expanded URL from the [`Server Object`](#serverObject)'s `url` field in order to construct the full URL. [Path templating](#pathTemplating) is allowed.
635
+
<a name="pathsPath"></a>/{path} | [Path Item Object](#pathItemObject) | A relative path to an individual endpoint. The field name MUST begin with a slash. The path is **appended** (no relative URL resolution) to the expanded URL from the [`Server Object`](#serverObject)'s `url` field in order to construct the full URL. [Path templating](#pathTemplating) is allowed. When matching URLs, concrete (non-templated) paths would be matched before their templated counterparts. Templated paths with the same hierarchy but different templated names MUST NOT exist as they are identical. In case of ambiguous matching, it's up to the tooling to decide which one to use.
636
636
637
637
This object can be extended with [Specification Extensions](#specificationExtensions).
638
638
639
+
##### Path Templating Matching
640
+
641
+
Assuming the following paths, the concrete definition, `/pets/mine`, will be matched first if used:
642
+
643
+
```
644
+
/pets/{petId}
645
+
/pets/mine
646
+
```
647
+
648
+
The following paths are considered identical and invalid:
649
+
650
+
```
651
+
/pets/{petId}
652
+
/pets/{name}
653
+
```
654
+
655
+
The following may lead to ambiguous resolution:
656
+
657
+
```
658
+
/{entity}/me
659
+
/books/{id}
660
+
```
661
+
639
662
##### Paths Object Example
640
663
641
664
```json
@@ -1728,7 +1751,7 @@ The key value used to identify the callback object is an expression, evaluated a
1728
1751
##### Patterned Fields
1729
1752
Field Pattern | Type | Description
1730
1753
---|:---:|---
1731
-
<a name="callbackExpression"></a>{expression} | [Path Item Object](#pathItemObject) | A Path Item Object used to define a callback request and expected responses.
1754
+
<a name="callbackExpression"></a>{expression} | [Path Item Object](#pathItemObject) | A Path Item Object used to define a callback request and expected responses. A full example may be found at https://github.com/OAI/OpenAPI-Specification/blob/OpenAPI.next/examples/v3.0/callback-example.yaml
1732
1755
1733
1756
This object can be extended with [Specification Extensions](#specificationExtensions).
1734
1757
@@ -3351,7 +3374,7 @@ Field Name | Type | Validity | Description
3351
3374
<aname="securitySchemeDescription"></a>description | `string` | Any | A short description for security scheme. [CommonMark syntax](http://spec.commonmark.org/) can be used for rich text representation.
3352
3375
<aname="securitySchemeName"></a>name | `string` | `apiKey` | **REQUIRED**. The name of the header or query parameter to be used.
3353
3376
<aname="securitySchemeIn"></a>in | `string` | `apiKey` | **REQUIRED**. The ___location of the API key. Valid values are `"query"`, `"header"` or `"cookie"`.
3354
-
<aname="securitySchemeScheme"></a>scheme | `string` | `http` | **REQUIRED**. The name of the HTTP Authorization scheme to be used in the [Authorization header as defined in RFC7235](https://tools.ietf.org/html/rfc7235#section-4.2).
3377
+
<aname="securitySchemeScheme"></a>scheme | `string` | `http` | **REQUIRED**. The name of the HTTP Authorization scheme to be used in the [Authorization header as defined in RFC7235](https://tools.ietf.org/html/rfc7235#section-5.1).
3355
3378
<aname="securitySchemeBearerFormat"></a>bearerFormat | `string` | `http` (`"bearer"`) | A hint to the client to identify how the bearer token is formatted. Bearer tokens are usually generated by an authorization server, so this information is primarily for documentation purposes.
3356
3379
<aname="securitySchemeFlows"></a>flows | [OAuth Flows Object](#oauthFlowsObject) | `oauth2` | **REQUIRED**. An object containing configuration information for the flow types supported.
3357
3380
<aname="securitySchemeOpenIdConnectUrl"></a>openIdConnectUrl | `string` | `openIdConnect` | **REQUIRED**. OpenId Connect URL to discover OAuth2 configuration values. This MUST be in the form of a URL.
0 commit comments