Module octorust::types[][src]

Expand description

The data types sent to and returned from the API client.

Structs

The public key used for setting Actions Secrets.

Set secrets for GitHub Actions.

Actor

Added to Project Issue Event

Api Overview

The permissions granted to the user-to-server access token.

The authorization associated with an OAuth Access.

An artifact

Assigned Issue Event

Authentication Token

The authorization for an OAuth app, GitHub App, or a Personal Access Token.

The status of auto merging a pull request.

Base Gist

Basic Error

Blob

Branch Protection

Branch Restriction Policy

Branch Short

Branch With Protection

Check Annotation

A check performed on the code of a given code change

A suite of checks performed on the code of a given code change

Check suite configuration preferences for a repository.

Check runs can accept a variety of data in the output object, including a title and summary and can optionally provide descriptive details about the run. See the output object description.

Check runs can accept a variety of data in the output object, including a title and summary and can optionally provide descriptive details about the run. See the output object description.

JSON payload with extra information about the webhook event that your action or worklow may use.

Clone Traffic

Code Of Conduct

Code of Conduct Simple

Describe a region within a file for the alert.

Successful deletion of a code scanning analysis

Code Search Result Item

Collaborator

Combined Commit Status

Commit Activity

Commit Comment

Commit Comparison

Commit

Commit Search Result Item

Community Profile

Content File

Content Reference attachments allow you to provide context around URLs posted in comments

An object describing a symlink

An object describing a symlink

Content Traffic

Content Tree

Contributor

Contributor Activity

Converted Note to Issue Issue Event

Credential Authorization

Demilestoned Issue Event

An SSH key granting access to a single repository.

A request for a specific ref(branch,sha,tag) to be deployed

The type of deployment branch policy for this environment. To allow all branches to deploy, set to null.

A deployment created as the result of an Actions check run from a workflow that references an environment

The status of a deployment.

Diff Entry

Email

An object without any properties.

An enterprise account

An entry in the reviews log for environment deployments

Details of a deployment environment

Event

Feed

File Commit

Gist

Full Repository

A comment made to a gist.

Gist Commit

Gist History

Gist Simple

Names and content for the files that make up the gist

Names of files to be updated

Low-level Git commit operations within a repository

Identifying information for the git-user

Information about the author of the commit. By default, the author will be the authenticated user and the current date. See the author and committer object below for details.

Information about the person who is making the commit. By default, committer will use the information set in author. See the author and committer object below for details.

An object with information about the individual creating the tag.

Git references within a repository

Metadata for a Git tag

The hierarchy between files in a Git repository.

Metaproperties for Git author/committer information.

Gitignore Template

A unique encryption key

External Groups to be mapped to a team for membership

Webhooks for repositories.

Hovercard

A repository import from an external source.

Input keys and values configured in the workflow file. The maximum number of properties is 10. Any default properties configured in the workflow file will be used when inputs are omitted.

Installation

Authentication token for a GitHub App installed on a user or org.

GitHub apps are a new way to extend GitHub. They can be installed directly on organizations and user accounts and granted access to specific repositories. They come with granular permissions and built-in webhooks. GitHub apps are first class actors within GitHub.

Limit interactions to a specific type of user for a specified duration

Interaction limit settings.

Issues are a great way to keep track of tasks, enhancements, and bugs for your projects.

Comments provide a way for people to collaborate on an issue.

Issue Event

Issue Event Label

Issue Event Milestone

Issue Event Project Card

Issue Event Rename

Issue Search Result Item

Issue Simple

Information of a job execution in a workflow run

Key

Key Simple

Color-coded labels help you categorize and filter your issues (just like labels in Gmail).

Label Search Result Item

Labeled Issue Event

Language

License Content

License

License Simple

Hypermedia Link

Hypermedia Link with Type

Locked Issue Event

Marketplace Listing Plan

Marketplace Purchase

A migration.

A collection of related issues and pull requests.

Milestoned Issue Event

Minimal Repository

Moved Column in Project Issue Event

Org Hook

Org Membership

Secrets for GitHub Actions for an organization.

Organization Full

Organization Invitation

Organization Simple

Key/value pairs to provide settings for this webhook. These are defined below.

Key/value pairs to provide settings for this webhook. These are defined below.

A software package

A version of a software package

The configuration for GitHub Pages for a repository.

Page Build

Page Build Status

Pages Health Check Status

Details of a deployment that is waiting for protection rules to pass

The set of permissions for the GitHub app

Porter Author

Porter Large File

Private User

Projects are a way to organize columns and cards of work.

Project cards represent a scope of work.

Project columns contain cards of work.

Branch protections protect branches

Protected Branch Admin Enforced

Protected Branch Pull Request Review

Public User

Pull requests let you tell others about changes you’ve pushed to a repository on GitHub. Once a pull request is sent, interested parties can review the set of changes, discuss potential modifications, and even push follow-up commits if necessary.

Pull Request Merge Result

Pull Request Review Request

Pull Request Review Comments are comments on a portion of the Pull Request’s diff.

Pull Request Reviews are reviews on pull requests.

Pull Request Simple

Rate Limit Overview

Reactions to conversations provide a way to help people express their feelings more simply and effectively.

Referrer Traffic

A release.

Data related to a release.

Removed from Project Issue Event

Renamed Issue Event

Repo Search Result Item

The source branch and directory used to publish your Pages site.

The source branch and directory used to publish your Pages site.

The author of the file. Default: The committer or the authenticated user if you omit committer.

The person that committed the file. Default: the authenticated user.

Key/value pairs to provide settings for this webhook. These are defined below.

object containing information about the author.

object containing information about the committer.

Require at least one approving review on a pull request, before merging. Set to null to disable.

Specify which users and teams can dismiss pull request reviews. Pass an empty dismissal_restrictions object to disable. User and team dismissal_restrictions are only available for organization-owned repositories. Omit this parameter for personal repositories.

Require status checks to pass before merging. Set to null to disable.

Specify which security and analysis features to enable or disable. For example, to enable GitHub Advanced Security, use this data in the body of the PATCH request: {"security_and_analysis": {"advanced_security": {"status": "enabled"}}}. If you have admin permissions for a private repository covered by an Advanced Security license, you can check which security and analysis features are currently enabled by using a GET /repos/{owner}/{repo} request.

Use the status property to enable or disable GitHub Advanced Security for this repository. For more information, see “About GitHub Advanced Security.”

Use the status property to enable or disable secret scanning for this repository. For more information, see “About secret scanning.”

Key/value pairs to provide settings for this webhook. These are defined below.

A git repository

Repository Collaborator Permission

Repository invitations let you manage who you collaborate with.

Repository invitations let you manage who you collaborate with.

Restrict who can push to the protected branch. User, app, and team restrictions are only available for organization-owned repositories. Set to null to disable.

Legacy Review Comment

Review Dismissed Issue Event

Review Request Removed Issue Event

Review Requested Issue Event

A self hosted runner

Runner Application

Scim Error

SCIM /Users provisioning endpoints

SCIM User List

Short Blob

Short Branch

Simple Commit

Simple User

Stargazer

Starred Repository

The status of a commit.

Status Check Policy

Tag

Groups of organization members that gives permissions on specified repositories.

A team discussion is a persistent record of a free-form conversation within a team.

A reply to a discussion within a team.

Groups of organization members that gives permissions on specified repositories.

Team Membership

A team’s access to a project.

A team’s access to a repository.

Groups of organization members that gives permissions on specified repositories.

Thread

Thread Subscription

Timeline Assigned Issue Event

Timeline Comment Event

Timeline Commit Commented Event

Timeline Committed Event

Timeline Cross Referenced Event

Timeline Event

Timeline Line Commented Event

Timeline Reviewed Event

Timeline Unassigned Issue Event

A topic aggregates entities that are related to a subject.

Topic Search Result Item

Unassigned Issue Event

Unlabeled Issue Event

User Marketplace Purchase

User Search Result Item

Deletes one or more email addresses from your GitHub account. Must contain at least one email address. Note: Alternatively, you can pass a single email address or an array of emails addresses directly, but we recommend that you pass an object using the emails key.

Validation Error

Validation Error Simple

View Traffic

Configuration object of the webhook

A GitHub Actions workflow

An invocation of a workflow

Workflow Run Usage

Workflow Usage

Enums

The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: read or write.

Visibility of a runner group. You can select all repositories, select individual repositories, or limit access to private repositories. Can be one of: all, selected, or private.

Configures the access that repositories have to the organization secret. Can be one of:
- all - All repositories in an organization can access the secret.
- private - Private repositories in an organization can access the secret.
- selected - Only specific repositories can access the secret.

Filters jobs by their completed_at timestamp. Can be one of:
* latest: Returns jobs from the most recent execution of the workflow run.
* all: Returns all jobs for a workflow run, including from old executions of the workflow run.

Whether to approve or reject deployment to the specified environments. Must be one of: approved or rejected

Visibility of a runner group. You can select all repositories, select individual repositories, or all private repositories. Can be one of: all, selected, or private.

The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: read or write.

Filters the collaborators by their affiliation. Can be one of:
* outside: Outside collaborators of a project that are not a member of the project’s organization.
* direct: Collaborators with permissions to a project, regardless of organization membership status.
* all: All collaborators the authenticated user can see.

The permissions policy that controls the actions that are allowed to run. Can be one of: all, local_only, or selected.

The level of the annotation. Can be one of notice, warning, or failure.

To return the oldest accounts first, set to asc. Can be one of asc or desc. Ignored without the sort parameter.

Filters the project cards that are returned by the card’s state. Can be one of all,archived, or not_archived.

How the author is associated with the repository.

The phase of the lifecycle that the check is currently in.

The level of permission to grant the access token for checks on code. Can be one of: read or write.

Required if you provide completed_at or a status of completed. The final conclusion of the check. Can be one of action_required, cancelled, failure, neutral, success, skipped, stale, or timed_out. When the conclusion is action_required, additional details should be provided on the site specified by details_url.
Note: Providing conclusion will automatically set the status parameter to completed. You cannot change a check run conclusion to stale, only GitHub can set this.

The current status. Can be one of queued, in_progress, or completed.

Filters check runs by their completed_at timestamp. Can be one of latest (returning the most recent check runs) or all.

Required if you provide completed_at or a status of completed. The final conclusion of the check. Can be one of action_required, cancelled, failure, neutral, success, skipped, stale, or timed_out.
Note: Providing conclusion will automatically set the status parameter to completed. You cannot change a check run conclusion to stale, only GitHub can set this.

A classification of the file. For example to identify it as generated.

Required when the state is dismissed. The reason for dismissing or closing the alert. Can be one of: false positive, won't fix, and used in tests.

Sets the state of the code scanning alert. Can be one of open or dismissed. You must provide dismissed_reason when you set the state to dismissed.

State of a code scanning alert.

The reaction to use

The level of permission to grant the access token for notification of content references and creation content attachments. Can be one of: read or write.

The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: read or write.

Default permission level members have for organization repositories:
* read - can pull, but not push to or administer this repository.
* write - can pull and push, but not administer this repository.
* admin - can pull, push, and administer this repository.
* none - no permissions granted by default.

The type of reviewer. Must be one of: User or Team

The state of the status.

The level of permission to grant the access token for deployments and deployment statuses. Can be one of: read or write.

One of asc (ascending) or desc (descending).

The policy that controls the organizations in the enterprise that are allowed to run GitHub Actions. Can be one of: all, none, or selected.

The policy that controls the repositories in the organization that are allowed to run GitHub Actions. Can be one of: all, none, or selected.

Visibility of a runner group. You can select all organizations or select individual organization. Can be one of: all or selected

Visibility of a runner group. You can select all organizations or select individual organizations. Can be one of: all or selected

Whether deployment to the environment(s) was approved or rejected

The level of permission to grant the access token for managing repository environments. Can be one of: read or write.

Allowed values that can be passed to the exclude param.

Indicates which sorts of issues to return. Can be one of:
* assigned: Issues assigned to you
* created: Issues created by you
* mentioned: Issues mentioning you
* subscribed: Issues you’re subscribed to updates for
* all: All issues the authenticated user can see, regardless of participation or creation

The type of the object we’re tagging. Normally this is a commit but it can also be a tree or a blob.

The file mode; one of 100644 for file (blob), 100755 for executable (blob), 040000 for subdirectory (tree), 160000 for submodule (commit), or 120000 for a blob that specifies the path of a symlink.

Either blob, tree, or commit.

The event types to include:

The duration of the interaction restriction. Can be one of: one_day, three_days, one_week, one_month, six_months. Default: one_day.

The type of GitHub user that can comment, open issues, or create pull requests while the interaction limit is in effect. Can be one of: existing_users, contributors_only, collaborators_only.

The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: read or write.

One of the following types:

The state of the milestone. Either open or closed.

One of the following types:

Either asc or desc. Ignored without the sort parameter.

The direction of the sort. Either asc or desc.

What to sort results by. Either due_on or completeness.

The state of the milestone. Either open, closed, or all.

What to sort results by. Can be either created, updated, comments.

Indicates the state of the issues to return. Can be either open, closed, or all.

One of the following types:

State of the issue. Either open or closed.

The phase of the lifecycle that the job is currently in.

One of the following types:

The reason for locking the issue or pull request conversation. Lock will fail if you don’t use one of these reasons:
* off-topic
* too heated
* resolved
* spam

The level of permission to grant the access token for organization teams and members. Can be one of: read or write.

Specifies which types of repositories non-admin organization members can create. Can be one of:
* all - all organization members can create public and private repositories.
* private - members can create private repositories. This option is only available to repositories that are part of an organization on GitHub Enterprise Cloud.
* none - only admin members can create repositories.
Note: This parameter is deprecated and will be removed in the future. Its return value ignores internal repositories. Using this parameter overrides values set in members_can_create_repositories. See the parameter deprecation notice in the operation description for details.

The merge method to use.

The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: read or write.

One of the following types:

The rendering mode.

The order of audit log events. To list newest events first, specify desc. To list oldest events first, specify asc.

Determines whether the first search result returned is the highest number of matches (desc) or lowest number of matches (asc). This parameter is ignored unless you provide sort.

The state of the member in the organization. The pending state indicates the user has not yet accepted an invitation.

The level of permission to grant the access token to manage access to an organization. Can be one of: read or write.

The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: read or write.

The level of permission to grant the access token for organization packages published to GitHub Packages. Can be one of: read or write.

The baseline permission that all organization members have on this project. Only present if owner is an organization.

The level of permission to grant the access token for viewing an organization’s plan. Can be one of: read.

The level of permission to grant the access token to manage organization projects, columns, and cards. Can be one of: read, write, or admin.

The level of permission to grant the access token to manage organization secrets. Can be one of: read or write.

The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: read or write.

The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: read or write.

Specify role for new member. Can be one of:
* admin - Organization owners with full administrative rights to the organization and complete access to all repositories and teams.
* direct_member - Non-owner organization members with ability to see other members and join teams by invitation.
* billing_manager - Non-owner organization members with ability to manage the billing settings of your organization.

Filter members returned in the list. Can be one of:
* 2fa_disabled - Members without two-factor authentication enabled. Available for organization owners.
* all - All members the authenticated user can see.

Filter members returned by their role. Can be one of:
* all - All members of the organization, regardless of role.
* admin - Organization owners.
* member - Non-owner organization members.

Indicates the state of the memberships to return. Can be either active or pending. If not specified, the API returns both active and pending memberships.

Filter the list of outside collaborators. Can be one of:
* 2fa_disabled: Outside collaborators without two-factor authentication enabled.
* all: All outside collaborators.

The role to give the user in the organization. Can be one of:
* admin - The user will become an owner of the organization.
* member - The user will become a non-owner member of the organization.

The state that the membership should be in. Only "active" will be accepted.

One of the following types:

The type of supported package. Can be one of npm, maven, rubygems, nuget, docker, or container. Packages in GitHub’s Gradle registry have the type maven. Docker images pushed to GitHub’s Container registry (ghcr.io) have the type container. You can use the type docker to find images that were pushed to GitHub’s Docker registry (docker.pkg.github.com), even if these have now been migrated to the Container registry.

The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: read or write.

The state of the package, either active or deleted.

The status of the most recent build of the Page.

The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: read or write.

The repository directory that includes the source files for the Pages site. Allowed paths are / or /docs. Default: /

One of the following types:

Must be one of: day, week.

Deprecated. The permission that new repositories will be added to the team with when none is specified. Can be one of:
* pull - team members can pull, but not push to or administer newly-added repositories.
* push - team members can pull and push, but not administer newly-added repositories.
* admin - team members can pull, push and administer newly-added repositories.

The level of privacy this team should have

pending files have not yet been processed, while complete means all results in the SARIF have been stored.

The permission to grant the collaborator.

One of the following types:

Indicates the state of the projects to return. Can be either open, closed, or all.

The baseline permission that all organization members have on this project

One of the following types:

State of this Pull Request. Either open or closed.

The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: read or write.

Required with comfort-fade preview. In a split diff view, the side of the diff that the pull request’s changes appear on. Can be LEFT or RIGHT. Use LEFT for deletions that appear in red. Use RIGHT for additions that appear in green or unchanged lines that appear in white and are shown for context. For a multi-line comment, side represents whether the last line of the comment range is a deletion or addition. For more information, see “Diff view options” in the GitHub Help documentation.

Required when using multi-line comments. To create multi-line comments, you must use the comfort-fade preview header. The start_side is the starting side of the diff that the comment applies to. Can be LEFT or RIGHT. To learn more about multi-line comments, see “Commenting on a pull request” in the GitHub Help documentation. See side in this table for additional context.

The review action you want to perform. The review actions include: APPROVE, REQUEST_CHANGES, or COMMENT. By leaving this blank, you set the review action state to PENDING, which means you will need to submit the pull request review when you are ready.

The direction of the sort. Can be either asc or desc. Default: desc when sort is created or sort is not specified, otherwise asc.

Can be either asc or desc. Ignored without sort parameter.

What to sort results by. Can be either created, updated, popularity (comment count) or long-running (age, filtering by pulls updated in the last month).

Either open, closed, or all to filter by state.

Merge method to use. Possible values are merge, squash or rebase. Default is merge.

The review action you want to perform. The review actions include: APPROVE, REQUEST_CHANGES, or COMMENT. When you leave this blank, the API returns HTTP 422 (Unrecognizable entity) and sets the review action state to PENDING, which means you will need to re-submit the pull request review using a review action.

The reaction type to add to the commit comment.

The reaction type to add to the issue comment.

The reaction type to add to the issue.

The reaction type to add to the pull request review comment.

The reaction type to add to the release.

The reaction type to add to the team discussion comment.

The reaction type to add to the team discussion.

Returns a single reaction type. Omit this parameter to list all reactions to a commit comment.

Returns a single reaction type. Omit this parameter to list all reactions to an issue comment.

Returns a single reaction type. Omit this parameter to list all reactions to an issue.

Returns a single reaction type. Omit this parameter to list all reactions to a pull request review comment.

Returns a single reaction type. Omit this parameter to list all reactions to a team discussion comment.

Returns a single reaction type. Omit this parameter to list all reactions to a team discussion.

State of the release asset.

One of the following types:

The permission to grant the collaborator. Only valid on organization-owned repositories. Can be one of:
* pull - can pull, but not push to or administer this repository.
* push - can pull and push, but not administer this repository.
* admin - can pull, push and administer this repository.
* maintain - Recommended for project managers who need to manage the repository without access to sensitive or destructive actions.
* triage - Recommended for contributors who need to proactively manage issues and pull requests without write access.

One of the following types:

One of the following types:

One of the following types:

The state of the status. Can be one of error, failure, pending, or success.

One of the following types:

Name for the target deployment environment, which can be changed when setting a deploy status. For example, production, staging, or qa. Note: This parameter requires you to use the application/vnd.github.flash-preview+json custom media type.

The state of the status. Can be one of error, failure, inactive, in_progress, queued pending, or success. Note: To use the inactive state, you must provide the application/vnd.github.ant-man-preview+json custom media type. To use the in_progress and queued states, you must provide the application/vnd.github.flash-preview+json custom media type. When you set a transient deployment to inactive, the deployment will be shown as destroyed in GitHub.

Can be public or private. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be internal. Note: For GitHub Enterprise Server and GitHub AE, this endpoint will only list repositories available to all users on the enterprise. For more information, see “Creating an internal repository” in the GitHub Help documentation.
The visibility parameter overrides the private parameter when you use both parameters with the nebula-preview preview header.

One of the following types:

Filter collaborators returned by their affiliation. Can be one of:
* outside: All outside collaborators of an organization-owned repository.
* direct: All collaborators with permissions to an organization-owned repository, regardless of organization membership status.
* all: All collaborators the authenticated user can see.

Can be one of asc or desc. Default: asc when using full_name, otherwise desc

The sort order. Can be either newest, oldest, or stargazers.

Can be one of asc or desc. Default: when using full_name: asc, otherwise desc

Can be one of created, updated, pushed, full_name.

Specifies the types of repositories you want returned. Can be one of all, public, private, forks, sources, member, internal. Note: For GitHub AE, can be one of all, private, forks, sources, member, internal. Default: all. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, type can also be internal. However, the internal value is not yet supported when a GitHub App calls this API with an installation access token.

Can be one of all, owner, public, private, member. Note: For GitHub AE, can be one of all, owner, internal, private, member. Default: all

Can be one of all, owner, member.

Can be one of all, public, or private. Note: For GitHub AE, can be one of all, internal, or private.

The permissions that the associated user will have on the repository. Valid values are read, write, maintain, triage, and admin.

Can be public or private. If your organization is associated with an enterprise account using GitHub Enterprise Cloud or GitHub Enterprise Server 2.20+, visibility can also be internal. The visibility parameter overrides the private parameter when you use both along with the nebula-preview preview header.

The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: read or write.

The permission associated with the invitation.

The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: read, write, or admin.

Describe whether all repositories have been selected or there’s a selection involved

The user’s membership type in the organization.

One of the following types:

One of the following types:

Sorts the results of your query. Can only be indexed, which indicates how recently a file has been indexed by the GitHub search infrastructure. Default: best match

Sorts the results of your query by author-date or committer-date. Default: best match

Sorts the results of your query by the number of comments, reactions, reactions-+1, reactions--1, reactions-smile, reactions-thinking_face, reactions-heart, reactions-tada, or interactions. You can also sort results by how recently the items were created or updated, Default: best match

Sorts the results of your query by when the label was created or updated. Default: best match

Sorts the results of your query by number of stars, forks, or help-wanted-issues or how recently the items were updated. Default: best match

Sorts the results of your query by number of followers or repositories, or when the person joined GitHub. Default: best match

Required when the state is resolved. The reason for resolving the alert. Can be one of false_positive, wont_fix, revoked, or used_in_tests.

Sets the state of the secret scanning alert. Can be either open or resolved. You must provide resolution when you set the state to resolved.

The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: read or write.

Set to open or resolved to only list secret scanning alerts in a specific state.

The level of permission to grant the access token to manage repository secrets. Can be one of: read or write.

The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: read or write.

The security severity of the alert.

The severity of the alert.

The side of the diff to which the comment applies. The side of the last line of the range for a multi-line comment

The level of permission to grant the access token to manage just a single file. Can be one of: read or write.

One of created (when the repository was starred) or updated (when it was last pushed to).

Update the source for the repository. Must include the branch name, and may optionally specify the subdirectory /docs. Possible values are "gh-pages", "master", and "master /docs".

The side of the first line of the range for a multi-line comment.

The state of the milestone.

Returns check runs with the specified status. Can be one of queued, in_progress, or completed.

The level of permission to grant the access token for commit statuses. Can be one of: read or write.

Identifies which additional information you’d like to receive about the person’s hovercard. Can be organization, repository, issue, pull_request. Required when using subject_id.

The level of permission to grant the access token to manage team discussions and related comments. Can be one of: read or write.

The role of the user in the team.

The state of the user’s membership in the team.

The role that this user should have in the team. Can be one of:
* member - a normal member of the team.
* maintainer - a team maintainer. Able to add/remove other team members, promote other team members to team maintainer, and edit the team’s name and description.

The permission to grant to the team for this project. Can be one of:
* read - team members can read, but not write to or administer this project.
* write - team members can read and write, but not administer this project.
* admin - team members can read, write and administer this project.
Default: the team’s permission attribute will be used to determine what permission to grant the team on this project. Note that, if you choose not to pass any parameters, you’ll need to set Content-Length to zero when calling out to this endpoint. For more information, see “HTTP verbs.”

The permission to grant the team on this repository. Can be one of:
* pull - team members can pull, but not push to or administer this repository.
* push - team members can pull and push, but not administer this repository.
* admin - team members can pull, push and administer this repository.
* maintain - team members can manage the repository without access to sensitive or destructive actions. Recommended for project managers. Only applies to repositories owned by organizations.
* triage - team members can proactively manage issues and pull requests without write access. Recommended for contributors who triage a repository. Only applies to repositories owned by organizations.

The permission to grant the team on this repository. Can be one of:
* pull - team members can pull, but not push to or administer this repository.
* push - team members can pull and push, but not administer this repository.
* admin - team members can pull, push and administer this repository.

The level of privacy this team should have. The options are:
For a non-nested team:
* secret - only visible to organization owners and members of this team.
* closed - visible to all members of this organization.
Default: secret
For a parent or child team:
* closed - visible to all members of this organization.
Default for child team: closed

Filters members returned by their role in the team. Can be one of:
* member - normal members of the team.
* maintainer - team maintainers.
* all - all members of the team.

The level of privacy this team should have. Editing teams without specifying this parameter leaves privacy intact. When a team is nested, the privacy for parent teams cannot be secret. The options are:
For a non-nested team:
* secret - only visible to organization owners and members of this team.
* closed - visible to all members of this organization.
For a parent or child team:
* closed - visible to all members of this organization.

The level of privacy this team should have. Editing teams without specifying this parameter leaves privacy intact. The options are:
For a non-nested team:
* secret - only visible to organization owners and members of this team.
* closed - visible to all members of this organization.
For a parent or child team:
* closed - visible to all members of this organization.

One of the following types:

The type of label. Read-only labels are applied automatically when the runner is configured.

Can be one of opt_in (large files will be stored using Git LFS) or opt_out (large files will be removed during the import).

One of the following types:

One of the following types:

One of the following types:

Denotes whether an email is publicly visible.

One of the following types:

The originating VCS type. Can be one of subversion, git, mercurial, or tfvc. Please be aware that without this parameter, the import job will take additional time to detect the VCS type before beginning the import. This detection step will be reflected in the response.

Visibility of a secret

The level of permission to grant the access token to retrieve Dependabot alerts. Can be one of: read.

One of the following types:

One of the following types:

Returns workflow runs with the check run status or conclusion that you specify. For example, a conclusion can be success or a status can be in_progress. Only GitHub can set a status of waiting or requested. For a list of the possible status and conclusion options, see “Create a check run.”

The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: write.