Struct AppPermissions

Source
pub struct AppPermissions<'a> {
Show 31 fields pub actions: Option<Cow<'a, str>>, pub administration: Option<Cow<'a, str>>, pub checks: Option<Cow<'a, str>>, pub contents: Option<Cow<'a, str>>, pub deployments: Option<Cow<'a, str>>, pub environments: Option<Cow<'a, str>>, pub issues: Option<Cow<'a, str>>, pub metadata: Option<Cow<'a, str>>, pub packages: Option<Cow<'a, str>>, pub pages: Option<Cow<'a, str>>, pub pull_requests: Option<Cow<'a, str>>, pub repository_hooks: Option<Cow<'a, str>>, pub repository_projects: Option<Cow<'a, str>>, pub secret_scanning_alerts: Option<Cow<'a, str>>, pub secrets: Option<Cow<'a, str>>, pub security_events: Option<Cow<'a, str>>, pub single_file: Option<Cow<'a, str>>, pub statuses: Option<Cow<'a, str>>, pub vulnerability_alerts: Option<Cow<'a, str>>, pub workflows: Option<Cow<'a, str>>, pub members: Option<Cow<'a, str>>, pub organization_administration: Option<Cow<'a, str>>, pub organization_hooks: Option<Cow<'a, str>>, pub organization_plan: Option<Cow<'a, str>>, pub organization_projects: Option<Cow<'a, str>>, pub organization_packages: Option<Cow<'a, str>>, pub organization_secrets: Option<Cow<'a, str>>, pub organization_self_hosted_runners: Option<Cow<'a, str>>, pub organization_user_blocking: Option<Cow<'a, str>>, pub team_discussions: Option<Cow<'a, str>>, pub additionalProperties: HashMap<Cow<'a, str>, Value>,
}
Expand description

App Permissions

The permissions granted to the user-to-server access token.

§Example

{
  "contents": "read",
  "deployments": "write",
  "issues": "read",
  "single_file": "read"
}

Fields§

§actions: Option<Cow<'a, str>>

The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: read or write.

§administration: Option<Cow<'a, str>>

The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: read or write.

§checks: Option<Cow<'a, str>>

The level of permission to grant the access token for checks on code. Can be one of: read or write.

§contents: Option<Cow<'a, str>>

The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: read or write.

§deployments: Option<Cow<'a, str>>

The level of permission to grant the access token for deployments and deployment statuses. Can be one of: read or write.

§environments: Option<Cow<'a, str>>

The level of permission to grant the access token for managing repository environments. Can be one of: read or write.

§issues: Option<Cow<'a, str>>

The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: read or write.

§metadata: Option<Cow<'a, str>>

The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: read or write.

§packages: Option<Cow<'a, str>>

The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: read or write.

§pages: Option<Cow<'a, str>>

The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: read or write.

§pull_requests: Option<Cow<'a, str>>

The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: read or write.

§repository_hooks: Option<Cow<'a, str>>

The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: read or write.

§repository_projects: Option<Cow<'a, str>>

The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: read, write, or admin.

§secret_scanning_alerts: Option<Cow<'a, str>>

The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: read or write.

§secrets: Option<Cow<'a, str>>

The level of permission to grant the access token to manage repository secrets. Can be one of: read or write.

§security_events: Option<Cow<'a, str>>

The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: read or write.

§single_file: Option<Cow<'a, str>>

The level of permission to grant the access token to manage just a single file. Can be one of: read or write.

§statuses: Option<Cow<'a, str>>

The level of permission to grant the access token for commit statuses. Can be one of: read or write.

§vulnerability_alerts: Option<Cow<'a, str>>

The level of permission to grant the access token to manage Dependabot alerts. Can be one of: read or write.

§workflows: Option<Cow<'a, str>>

The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: write.

§members: Option<Cow<'a, str>>

The level of permission to grant the access token for organization teams and members. Can be one of: read or write.

§organization_administration: Option<Cow<'a, str>>

The level of permission to grant the access token to manage access to an organization. Can be one of: read or write.

§organization_hooks: Option<Cow<'a, str>>

The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: read or write.

§organization_plan: Option<Cow<'a, str>>

The level of permission to grant the access token for viewing an organization’s plan. Can be one of: read.

§organization_projects: Option<Cow<'a, str>>

The level of permission to grant the access token to manage organization projects and projects beta (where available). Can be one of: read, write, or admin.

§organization_packages: Option<Cow<'a, str>>

The level of permission to grant the access token for organization packages published to GitHub Packages. Can be one of: read or write.

§organization_secrets: Option<Cow<'a, str>>

The level of permission to grant the access token to manage organization secrets. Can be one of: read or write.

§organization_self_hosted_runners: Option<Cow<'a, str>>

The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: read or write.

§organization_user_blocking: Option<Cow<'a, str>>

The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: read or write.

§team_discussions: Option<Cow<'a, str>>

The level of permission to grant the access token to manage team discussions and related comments. Can be one of: read or write.

§additionalProperties: HashMap<Cow<'a, str>, Value>

Trait Implementations§

Source§

impl<'a> Clone for AppPermissions<'a>

Source§

fn clone(&self) -> AppPermissions<'a>

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl<'a> Debug for AppPermissions<'a>

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl<'a> Default for AppPermissions<'a>

Source§

fn default() -> AppPermissions<'a>

Returns the “default value” for a type. Read more
Source§

impl<'de, 'a> Deserialize<'de> for AppPermissions<'a>

Source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>
where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more
Source§

impl<'a> PartialEq for AppPermissions<'a>

Source§

fn eq(&self, other: &AppPermissions<'a>) -> bool

Tests for self and other values to be equal, and is used by ==.
1.0.0 · Source§

fn ne(&self, other: &Rhs) -> bool

Tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
Source§

impl<'a> Serialize for AppPermissions<'a>

Source§

fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error>
where __S: Serializer,

Serialize this value into the given Serde serializer. Read more
Source§

impl<'a> Eq for AppPermissions<'a>

Source§

impl<'a> StructuralPartialEq for AppPermissions<'a>

Auto Trait Implementations§

§

impl<'a> Freeze for AppPermissions<'a>

§

impl<'a> RefUnwindSafe for AppPermissions<'a>

§

impl<'a> Send for AppPermissions<'a>

§

impl<'a> Sync for AppPermissions<'a>

§

impl<'a> Unpin for AppPermissions<'a>

§

impl<'a> UnwindSafe for AppPermissions<'a>

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

Source§

fn equivalent(&self, key: &K) -> bool

Checks if this value is equivalent to the given key. Read more
Source§

impl<Q, K> Equivalent<K> for Q
where Q: Eq + ?Sized, K: Borrow<Q> + ?Sized,

Source§

fn equivalent(&self, key: &K) -> bool

Compare self to key and return true if they are equal.
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T> Instrument for T

Source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
Source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> Same for T

Source§

type Output = T

Should always be Self
Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
Source§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

Source§

fn vzip(self) -> V

Source§

impl<T> WithSubscriber for T

Source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,

Source§

impl<T> ErasedDestructor for T
where T: 'static,