Struct jinxapi_github::v1_1_4::schema::AppPermissions
source · [−]pub struct AppPermissions<'a> {Show 31 fields
pub actions: Option<Cow<'a, str>>,
pub administration: Option<Cow<'a, str>>,
pub checks: Option<Cow<'a, str>>,
pub contents: Option<Cow<'a, str>>,
pub deployments: Option<Cow<'a, str>>,
pub environments: Option<Cow<'a, str>>,
pub issues: Option<Cow<'a, str>>,
pub metadata: Option<Cow<'a, str>>,
pub packages: Option<Cow<'a, str>>,
pub pages: Option<Cow<'a, str>>,
pub pull_requests: Option<Cow<'a, str>>,
pub repository_hooks: Option<Cow<'a, str>>,
pub repository_projects: Option<Cow<'a, str>>,
pub secret_scanning_alerts: Option<Cow<'a, str>>,
pub secrets: Option<Cow<'a, str>>,
pub security_events: Option<Cow<'a, str>>,
pub single_file: Option<Cow<'a, str>>,
pub statuses: Option<Cow<'a, str>>,
pub vulnerability_alerts: Option<Cow<'a, str>>,
pub workflows: Option<Cow<'a, str>>,
pub members: Option<Cow<'a, str>>,
pub organization_administration: Option<Cow<'a, str>>,
pub organization_hooks: Option<Cow<'a, str>>,
pub organization_plan: Option<Cow<'a, str>>,
pub organization_projects: Option<Cow<'a, str>>,
pub organization_packages: Option<Cow<'a, str>>,
pub organization_secrets: Option<Cow<'a, str>>,
pub organization_self_hosted_runners: Option<Cow<'a, str>>,
pub organization_user_blocking: Option<Cow<'a, str>>,
pub team_discussions: Option<Cow<'a, str>>,
pub additionalProperties: HashMap<Cow<'a, str>, Value>,
}
Expand description
App Permissions
The permissions granted to the user-to-server access token.
Example
{
"contents": "read",
"deployments": "write",
"issues": "read",
"single_file": "read"
}
Fields
actions: Option<Cow<'a, str>>
The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: read
or write
.
administration: Option<Cow<'a, str>>
The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: read
or write
.
checks: Option<Cow<'a, str>>
The level of permission to grant the access token for checks on code. Can be one of: read
or write
.
contents: Option<Cow<'a, str>>
The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: read
or write
.
deployments: Option<Cow<'a, str>>
The level of permission to grant the access token for deployments and deployment statuses. Can be one of: read
or write
.
environments: Option<Cow<'a, str>>
The level of permission to grant the access token for managing repository environments. Can be one of: read
or write
.
issues: Option<Cow<'a, str>>
The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: read
or write
.
metadata: Option<Cow<'a, str>>
The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: read
or write
.
packages: Option<Cow<'a, str>>
The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: read
or write
.
pages: Option<Cow<'a, str>>
The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: read
or write
.
pull_requests: Option<Cow<'a, str>>
The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: read
or write
.
repository_hooks: Option<Cow<'a, str>>
The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: read
or write
.
repository_projects: Option<Cow<'a, str>>
The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: read
, write
, or admin
.
secret_scanning_alerts: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: read
or write
.
secrets: Option<Cow<'a, str>>
The level of permission to grant the access token to manage repository secrets. Can be one of: read
or write
.
security_events: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: read
or write
.
single_file: Option<Cow<'a, str>>
The level of permission to grant the access token to manage just a single file. Can be one of: read
or write
.
statuses: Option<Cow<'a, str>>
The level of permission to grant the access token for commit statuses. Can be one of: read
or write
.
vulnerability_alerts: Option<Cow<'a, str>>
The level of permission to grant the access token to manage Dependabot alerts. Can be one of: read
or write
.
workflows: Option<Cow<'a, str>>
The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: write
.
members: Option<Cow<'a, str>>
The level of permission to grant the access token for organization teams and members. Can be one of: read
or write
.
organization_administration: Option<Cow<'a, str>>
The level of permission to grant the access token to manage access to an organization. Can be one of: read
or write
.
organization_hooks: Option<Cow<'a, str>>
The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: read
or write
.
organization_plan: Option<Cow<'a, str>>
The level of permission to grant the access token for viewing an organization’s plan. Can be one of: read
.
organization_projects: Option<Cow<'a, str>>
The level of permission to grant the access token to manage organization projects and projects beta (where available). Can be one of: read
, write
, or admin
.
organization_packages: Option<Cow<'a, str>>
The level of permission to grant the access token for organization packages published to GitHub Packages. Can be one of: read
or write
.
organization_secrets: Option<Cow<'a, str>>
The level of permission to grant the access token to manage organization secrets. Can be one of: read
or write
.
organization_self_hosted_runners: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: read
or write
.
organization_user_blocking: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: read
or write
.
team_discussions: Option<Cow<'a, str>>
The level of permission to grant the access token to manage team discussions and related comments. Can be one of: read
or write
.
additionalProperties: HashMap<Cow<'a, str>, Value>
Trait Implementations
sourceimpl<'a> Clone for AppPermissions<'a>
impl<'a> Clone for AppPermissions<'a>
sourcefn clone(&self) -> AppPermissions<'a>
fn clone(&self) -> AppPermissions<'a>
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl<'a> Debug for AppPermissions<'a>
impl<'a> Debug for AppPermissions<'a>
sourceimpl<'a> Default for AppPermissions<'a>
impl<'a> Default for AppPermissions<'a>
sourcefn default() -> AppPermissions<'a>
fn default() -> AppPermissions<'a>
Returns the “default value” for a type. Read more
sourceimpl<'de, 'a> Deserialize<'de> for AppPermissions<'a>
impl<'de, 'a> Deserialize<'de> for AppPermissions<'a>
sourcefn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
Deserialize this value from the given Serde deserializer. Read more
sourceimpl<'a> PartialEq<AppPermissions<'a>> for AppPermissions<'a>
impl<'a> PartialEq<AppPermissions<'a>> for AppPermissions<'a>
sourcefn eq(&self, other: &AppPermissions<'a>) -> bool
fn eq(&self, other: &AppPermissions<'a>) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &AppPermissions<'a>) -> bool
fn ne(&self, other: &AppPermissions<'a>) -> bool
This method tests for !=
.
sourceimpl<'a> Serialize for AppPermissions<'a>
impl<'a> Serialize for AppPermissions<'a>
impl<'a> Eq for AppPermissions<'a>
impl<'a> StructuralEq for AppPermissions<'a>
impl<'a> StructuralPartialEq for AppPermissions<'a>
Auto Trait Implementations
impl<'a> RefUnwindSafe for AppPermissions<'a>
impl<'a> Send for AppPermissions<'a>
impl<'a> Sync for AppPermissions<'a>
impl<'a> Unpin for AppPermissions<'a>
impl<'a> UnwindSafe for AppPermissions<'a>
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<Q, K> Equivalent<K> for Q where
Q: Eq + ?Sized,
K: Borrow<Q> + ?Sized,
impl<Q, K> Equivalent<K> for Q where
Q: Eq + ?Sized,
K: Borrow<Q> + ?Sized,
sourcefn equivalent(&self, key: &K) -> bool
fn equivalent(&self, key: &K) -> bool
Compare self to key
and return true
if they are equal.
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
impl<V, T> VZip<V> for T where
V: MultiLane<T>,
impl<V, T> VZip<V> for T where
V: MultiLane<T>,
fn vzip(self) -> V
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more