Repository (PRO Feature)

The Repository page connects your Git provider (GitHub or Bitbucket) directly to WordPress, enabling you to review commits, inspect code changes, and monitor CI/CD workflows without leaving the dashboard. It centralizes development visibility and gives both technical and non-technical team members quick access to repository activity.

This feature is available exclusively for PRO users.


Accessing the Repository Page

Navigate to: All DashAI WP → Repository

The interface adjusts depending on whether you authenticate using OAuth or a manual token and depending on the chosen provider (GitHub or Bitbucket).


Authentication Methods

OAuth (Recommended)

OAuth offers automatic token refresh, better security, and seamless authorization. Tokens are stored securely and refreshed without user interaction.

Supported for:

  • GitHub OAuth Apps

  • Bitbucket OAuth Consumers


Manual Token

All DashAI WP supports two authentication methods for GitHub: OAuth and Manual Tokens. OAuth is the recommended option for most users due to automatic token refresh, secure workflow, and simplified authorization. However, certain organizations restrict OAuth integrations, in which case Manual Token authentication becomes necessary.

GitHub currently offers two types of personal access tokens:

  1. Fine-grained Personal Access Tokens

  2. Classic Personal Access Tokens

Both are supported, but they differ in compatibility depending on the repository type and the security policies of the organization.

This section explains when to use each token type and provides detailed setup instructions.


When to Use Fine-Grained Tokens

Fine-grained tokens are recommended when:

  • You are accessing repositories from your personal GitHub account.

  • You are working within organizations that allow fine-grained token permissions.

  • You only need read-only access to public or private repositories under normal GitHub accounts.

Fine-grained tokens may not work when:

  • The repository belongs to an enterprise or corporate organization.

  • The organization enforces SAML single sign-on.

  • The organization restricts fine-grained tokens at the policy level.

  • The “Repository permissions” section does not appear when creating the token.

In these cases, the GitHub API will return 404 responses even if you have browser access to the repository.


When to Use Classic Tokens (Required for Enterprise Repositories)

Classic personal access tokens are required when:

  • The repository belongs to enterprise accounts, including WPVIP, Automattic, GitHub Enterprise, and organizations with strict security policies.

  • Fine-grained tokens do not expose repository permissions.

  • The organization blocks OAuth but allows PAT Classic.

  • You need reliable access to private repositories for commit viewing or CI/CD monitoring.

A Classic token with the repo scope grants full read access to all repositories you personally have permission to access, including enterprise-level repositories.

This is the recommended token type for users working with:

  • WPVIP repositories

  • Enterprise organizations

  • Repositories with SAML or policy restrictions


How to Create a GitHub Classic Personal Access Token

Classic tokens provide broad repository access and are the most compatible for enterprise environments.

Step 1: Open the Classic Token Page

https://github.com/settings/tokens/new

Or navigate manually:
GitHub → Settings → Developer settings → Personal access tokens → Tokens (classic) → Generate new token

Step 2: Configure Token Details

  • Name: alldashaiwp

  • Expiration: Select a date (recommended: 1 year)

Step 3: Select Required Scopes

Enable the following scope:

  • repo (grants access to private and public repositories)

This includes:

  • Access to repository contents

  • Commit history

  • Deployment status

  • Repository metadata

No additional scopes are required unless you need to access organizational membership or GitHub Actions.

Step 4: Generate the Token

Click “Generate token” and copy it immediately.

Step 5: Add Token to All DashAI WP

WordPress → All DashAI WP → Settings → Repository
Paste the token under “GitHub Personal Access Token”.


How to Create a Fine-Grained Personal Access Token (When Applicable)

Fine-grained tokens offer more granular security but are not always compatible with enterprise repositories.

Use these only if:

  • Accessing your personal repositories

  • Accessing non-enterprise repositories

  • Your organization allows fine-grained permissions

Step 1: Create a Fine-Grained Token

https://github.com/settings/personal-access-tokens/new

Step 2: Configure Token Details

  • Name: alldashaiwp

  • Expiration: 1 year

  • Resource owner: Your GitHub username or organization

Step 3: Repository Access

Select one of the following:

  • Public repositories

  • All repositories (recommended)

  • Only selected repositories

Step 4: Permissions

For commit viewing, no additional permissions are required.
Default read-only access is sufficient.

If monitoring CI/CD:

  • Actions → Read-only

Step 5: Save and Add Token

Paste the token in All DashAI WP → Settings → Repository.


Troubleshooting Token Issues

Issue: “Repository not found”
Cause: Organization restricts fine-grained tokens
Solution: Use a Classic PAT

Issue: “Insufficient permissions”
Cause: Missing repo scope or fine-grained repo permissions
Solution: Recreate token with correct scopes

Issue: OAuth blocked
Cause: Enterprise policy
Solution: Switch to Manual Token → Classic PAT

Issue: Private repositories not appearing
Cause: Fine-grained token missing repository permissions
Solution: Use Classic token with repo scope


Security Best Practices

  • Always set an expiration date

  • Use the minimum scopes necessary

  • Revoke unused tokens

  • Avoid sharing tokens across applications

  • Delete tokens immediately if compromised

GitHub Classic tokens can be revoked at:
https://github.com/settings/tokens

Fine-grained tokens can be revoked at:
https://github.com/settings/personal-access-tokens


Bitbucket API Token (Atlassian Account)

Bitbucket uses Atlassian Account API tokens for authentication.

Step 1: Access API Tokens

Go to:
https://id.atlassian.com/manage-profile/security/api-tokens

Or navigate manually:
Atlassian Account → Security → API tokens


Step 2: Create New Token

  • Click “Create API token”

  • Enter a label (e.g., alldashaiwp)

  • Click “Create”


Step 3: Copy and Save Token

  • Copy the token immediately — it will only be shown once

  • Store it securely if needed

  • Paste the token in:
    All DashAI WP → Settings → Repository → Bitbucket Token field


Step 4: Configure in All DashAI WP

For Bitbucket, enter your Atlassian account email in the Username/Email field.

FieldValue
Bitbucket TokenThe API token you just created
Username/EmailYour Atlassian account email

Token Security Best Practices

  • Set expiration dates

  • Use minimal permissions

  • Revoke unused tokens

  • Never share tokens

  • One token per application


Revoking Tokens

GitHub

Bitbucket

All DashAI WP will auto-detect revoked tokens and prompt for updates.


Troubleshooting Token Issues

IssueSolution
“Invalid token”Verify token copied correctly
“Insufficient permissions”Check repository access
“Token expired”Create a new token
“Rate limit exceeded”Wait or use OAuth
Cannot see private reposUse “All repositories” or selected repos

Commit Viewer

The Commit Viewer shows the latest commits for your selected repository and branch.

  • Unlimited commits with pagination

  • 10 commits per page

  • SHA, message, author, date

  • Commit modal

  • Navigation for historical commits


Commit Detail Modal

Displays:

  • Full commit message

  • Author and timestamp

  • GitHub/Bitbucket link

  • Modified files

  • Line additions/removals

  • AI Code Analysis (optional)


AI Code Analysis

Provides insights such as:

  • Commit purpose

  • Risks

  • Suggestions

  • Code quality observations

Only selected commit data is processed.


CI/CD Monitoring

Supports:

  • GitHub Actions

  • Bitbucket Pipelines

Panel shows:

  • Build status

  • Triggering commit

  • Timestamps

  • Provider logs


Pagination and Navigation

  • 10 commits per page

  • URL context persists


Caching

Cache Durations

Content TypeDuration
Commit list5 minutes
Commit detail24 hours
CI/CD status3 minutes

Cache clears when:

  • Repository settings change

  • User clears cache

  • TTL expires


Error Handling

Includes clear messages for:

  • Invalid/expired OAuth tokens

  • Insufficient permissions

  • Incorrect repository URL

  • Rate limits


Security and Privacy

  • Secure OAuth storage

  • AES-256-CBC encryption

  • Nonces on AJAX

  • Capability checks

  • Strict sanitization/escaping

  • AI only processes chosen commit data


Multisite Behavior

  • Separate configuration per site

  • Separate cache

  • Site-specific authentication


Enterprise Repositories and OAuth Restrictions

Some organizations restrict OAuth.

When OAuth Blocking Occurs

Occurs when:

  • Third-party OAuth disabled

  • Enterprise policies enforced

  • OAuth not approved

  • App requires admin approval

Dashboard detects and guides users.


Available Actions

Works instantly.


Message Displayed When OAuth Is Blocked

  • Title: GitHub Organization “{organization}” has blocked OAuth integrations

  • Status: OAuth Access Restricted

  • Actions: Switch to Manual Token, request approval, etc.


Recommended Workflow

Manual Token is the safest approach for Enterprise repositories:

  • No admin approval required

  • Works even with OAuth blocked

  • AES-256 encrypted

  • Tokens revocable anytime