pub struct AppPermissions<'a> {Show 31 fields
pub actions: Option<Cow<'a, str>>,
pub administration: Option<Cow<'a, str>>,
pub checks: Option<Cow<'a, str>>,
pub contents: Option<Cow<'a, str>>,
pub deployments: Option<Cow<'a, str>>,
pub environments: Option<Cow<'a, str>>,
pub issues: Option<Cow<'a, str>>,
pub metadata: Option<Cow<'a, str>>,
pub packages: Option<Cow<'a, str>>,
pub pages: Option<Cow<'a, str>>,
pub pull_requests: Option<Cow<'a, str>>,
pub repository_hooks: Option<Cow<'a, str>>,
pub repository_projects: Option<Cow<'a, str>>,
pub secret_scanning_alerts: Option<Cow<'a, str>>,
pub secrets: Option<Cow<'a, str>>,
pub security_events: Option<Cow<'a, str>>,
pub single_file: Option<Cow<'a, str>>,
pub statuses: Option<Cow<'a, str>>,
pub vulnerability_alerts: Option<Cow<'a, str>>,
pub workflows: Option<Cow<'a, str>>,
pub members: Option<Cow<'a, str>>,
pub organization_administration: Option<Cow<'a, str>>,
pub organization_hooks: Option<Cow<'a, str>>,
pub organization_plan: Option<Cow<'a, str>>,
pub organization_projects: Option<Cow<'a, str>>,
pub organization_packages: Option<Cow<'a, str>>,
pub organization_secrets: Option<Cow<'a, str>>,
pub organization_self_hosted_runners: Option<Cow<'a, str>>,
pub organization_user_blocking: Option<Cow<'a, str>>,
pub team_discussions: Option<Cow<'a, str>>,
pub additionalProperties: HashMap<Cow<'a, str>, Value>,
}
Expand description
App Permissions
The permissions granted to the user-to-server access token.
§Example
{
"contents": "read",
"deployments": "write",
"issues": "read",
"single_file": "read"
}
Fields§
§actions: Option<Cow<'a, str>>
The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: read
or write
.
administration: Option<Cow<'a, str>>
The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: read
or write
.
checks: Option<Cow<'a, str>>
The level of permission to grant the access token for checks on code. Can be one of: read
or write
.
contents: Option<Cow<'a, str>>
The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: read
or write
.
deployments: Option<Cow<'a, str>>
The level of permission to grant the access token for deployments and deployment statuses. Can be one of: read
or write
.
environments: Option<Cow<'a, str>>
The level of permission to grant the access token for managing repository environments. Can be one of: read
or write
.
issues: Option<Cow<'a, str>>
The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: read
or write
.
metadata: Option<Cow<'a, str>>
The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: read
or write
.
packages: Option<Cow<'a, str>>
The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: read
or write
.
pages: Option<Cow<'a, str>>
The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: read
or write
.
pull_requests: Option<Cow<'a, str>>
The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: read
or write
.
repository_hooks: Option<Cow<'a, str>>
The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: read
or write
.
repository_projects: Option<Cow<'a, str>>
The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: read
, write
, or admin
.
secret_scanning_alerts: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: read
or write
.
secrets: Option<Cow<'a, str>>
The level of permission to grant the access token to manage repository secrets. Can be one of: read
or write
.
security_events: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: read
or write
.
single_file: Option<Cow<'a, str>>
The level of permission to grant the access token to manage just a single file. Can be one of: read
or write
.
statuses: Option<Cow<'a, str>>
The level of permission to grant the access token for commit statuses. Can be one of: read
or write
.
vulnerability_alerts: Option<Cow<'a, str>>
The level of permission to grant the access token to manage Dependabot alerts. Can be one of: read
or write
.
workflows: Option<Cow<'a, str>>
The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: write
.
members: Option<Cow<'a, str>>
The level of permission to grant the access token for organization teams and members. Can be one of: read
or write
.
organization_administration: Option<Cow<'a, str>>
The level of permission to grant the access token to manage access to an organization. Can be one of: read
or write
.
organization_hooks: Option<Cow<'a, str>>
The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: read
or write
.
organization_plan: Option<Cow<'a, str>>
The level of permission to grant the access token for viewing an organization’s plan. Can be one of: read
.
organization_projects: Option<Cow<'a, str>>
The level of permission to grant the access token to manage organization projects and projects beta (where available). Can be one of: read
, write
, or admin
.
organization_packages: Option<Cow<'a, str>>
The level of permission to grant the access token for organization packages published to GitHub Packages. Can be one of: read
or write
.
organization_secrets: Option<Cow<'a, str>>
The level of permission to grant the access token to manage organization secrets. Can be one of: read
or write
.
organization_self_hosted_runners: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: read
or write
.
organization_user_blocking: Option<Cow<'a, str>>
The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: read
or write
.
team_discussions: Option<Cow<'a, str>>
The level of permission to grant the access token to manage team discussions and related comments. Can be one of: read
or write
.
additionalProperties: HashMap<Cow<'a, str>, Value>
Trait Implementations§
Source§impl<'a> Clone for AppPermissions<'a>
impl<'a> Clone for AppPermissions<'a>
Source§fn clone(&self) -> AppPermissions<'a>
fn clone(&self) -> AppPermissions<'a>
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl<'a> Debug for AppPermissions<'a>
impl<'a> Debug for AppPermissions<'a>
Source§impl<'a> Default for AppPermissions<'a>
impl<'a> Default for AppPermissions<'a>
Source§fn default() -> AppPermissions<'a>
fn default() -> AppPermissions<'a>
Source§impl<'de, 'a> Deserialize<'de> for AppPermissions<'a>
impl<'de, 'a> Deserialize<'de> for AppPermissions<'a>
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Source§impl<'a> PartialEq for AppPermissions<'a>
impl<'a> PartialEq for AppPermissions<'a>
Source§impl<'a> Serialize for AppPermissions<'a>
impl<'a> Serialize for AppPermissions<'a>
impl<'a> Eq for AppPermissions<'a>
impl<'a> StructuralPartialEq for AppPermissions<'a>
Auto Trait Implementations§
impl<'a> Freeze for AppPermissions<'a>
impl<'a> RefUnwindSafe for AppPermissions<'a>
impl<'a> Send for AppPermissions<'a>
impl<'a> Sync for AppPermissions<'a>
impl<'a> Unpin for AppPermissions<'a>
impl<'a> UnwindSafe for AppPermissions<'a>
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
Source§impl<Q, K> Equivalent<K> for Q
impl<Q, K> Equivalent<K> for Q
Source§fn equivalent(&self, key: &K) -> bool
fn equivalent(&self, key: &K) -> bool
key
and return true
if they are equal.