Struct InstallationPermissions

Source
pub struct InstallationPermissions {
Show 37 fields pub actions: Option<InstallationPermissionsActions>, pub administration: Option<InstallationPermissionsAdministration>, pub blocking: Option<InstallationPermissionsBlocking>, pub checks: Option<InstallationPermissionsChecks>, pub content_references: Option<InstallationPermissionsContentReferences>, pub contents: Option<InstallationPermissionsContents>, pub deployments: Option<InstallationPermissionsDeployments>, pub discussions: Option<InstallationPermissionsDiscussions>, pub emails: Option<InstallationPermissionsEmails>, pub environments: Option<InstallationPermissionsEnvironments>, pub issues: Option<InstallationPermissionsIssues>, pub members: Option<InstallationPermissionsMembers>, pub merge_queues: Option<InstallationPermissionsMergeQueues>, pub metadata: Option<InstallationPermissionsMetadata>, pub organization_administration: Option<InstallationPermissionsOrganizationAdministration>, pub organization_events: Option<InstallationPermissionsOrganizationEvents>, pub organization_hooks: Option<InstallationPermissionsOrganizationHooks>, pub organization_packages: Option<InstallationPermissionsOrganizationPackages>, pub organization_plan: Option<InstallationPermissionsOrganizationPlan>, pub organization_projects: Option<InstallationPermissionsOrganizationProjects>, pub organization_secrets: Option<InstallationPermissionsOrganizationSecrets>, pub organization_self_hosted_runners: Option<InstallationPermissionsOrganizationSelfHostedRunners>, pub organization_user_blocking: Option<InstallationPermissionsOrganizationUserBlocking>, pub packages: Option<InstallationPermissionsPackages>, pub pages: Option<InstallationPermissionsPages>, pub pull_requests: Option<InstallationPermissionsPullRequests>, pub repository_hooks: Option<InstallationPermissionsRepositoryHooks>, pub repository_projects: Option<InstallationPermissionsRepositoryProjects>, pub secret_scanning_alerts: Option<InstallationPermissionsSecretScanningAlerts>, pub secrets: Option<InstallationPermissionsSecrets>, pub security_events: Option<InstallationPermissionsSecurityEvents>, pub security_scanning_alert: Option<InstallationPermissionsSecurityScanningAlert>, pub single_file: Option<InstallationPermissionsSingleFile>, pub statuses: Option<InstallationPermissionsStatuses>, pub team_discussions: Option<InstallationPermissionsTeamDiscussions>, pub vulnerability_alerts: Option<InstallationPermissionsVulnerabilityAlerts>, pub workflows: Option<InstallationPermissionsWorkflows>,
}
Expand description

InstallationPermissions

JSON schema
{
 "type": "object",
 "properties": {
   "actions": {
     "description": "The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "administration": {
     "description": "The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "blocking": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "checks": {
     "description": "The level of permission granted to the access token for checks on code.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "content_references": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "contents": {
     "description": "The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "deployments": {
     "description": "The level of permission granted to the access token for deployments and deployment statuses.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "discussions": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "emails": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "environments": {
     "description": "The level of permission granted to the access token for managing repository environments.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "issues": {
     "description": "The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "members": {
     "description": "The level of permission granted to the access token for organization teams and members.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "merge_queues": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "metadata": {
     "description": "The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_administration": {
     "description": "The level of permission granted to the access token to manage access to an organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_events": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_hooks": {
     "description": "The level of permission granted to the access token to manage the post-receive hooks for an organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_packages": {
     "description": "The level of permission granted to the access token for organization packages published to GitHub Packages.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_plan": {
     "description": "The level of permission granted to the access token for viewing an organization's plan.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_projects": {
     "description": "The level of permission granted to the access token to manage organization projects and projects beta (where available).",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_secrets": {
     "description": "The level of permission granted to the access token to manage organization secrets.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_self_hosted_runners": {
     "description": "The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_user_blocking": {
     "description": "The level of permission granted to the access token to view and manage users blocked by the organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "packages": {
     "description": "The level of permission granted to the access token for packages published to GitHub Packages.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "pages": {
     "description": "The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "pull_requests": {
     "description": "The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "repository_hooks": {
     "description": "The level of permission granted to the access token to manage the post-receive hooks for a repository.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "repository_projects": {
     "description": "The level of permission granted to the access token to manage repository projects, columns, and cards.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "secret_scanning_alerts": {
     "description": "The level of permission granted to the access token to view and manage secret scanning alerts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "secrets": {
     "description": "The level of permission granted to the access token to manage repository secrets.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "security_events": {
     "description": "The level of permission granted to the access token to view and manage security events like code scanning alerts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "security_scanning_alert": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "single_file": {
     "description": "The level of permission granted to the access token to manage just a single file.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "statuses": {
     "description": "The level of permission granted to the access token for commit statuses.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "team_discussions": {
     "description": "The level of permission granted to the access token to manage team discussions and related comments.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "vulnerability_alerts": {
     "description": "The level of permission granted to the access token to manage Dependabot alerts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "workflows": {
     "description": "The level of permission granted to the access token to update GitHub Actions workflow files.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   }
 },
 "additionalProperties": false
}

Fields§

§actions: Option<InstallationPermissionsActions>

The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.

§administration: Option<InstallationPermissionsAdministration>

The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.

§blocking: Option<InstallationPermissionsBlocking>§checks: Option<InstallationPermissionsChecks>

The level of permission granted to the access token for checks on code.

§content_references: Option<InstallationPermissionsContentReferences>§contents: Option<InstallationPermissionsContents>

The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.

§deployments: Option<InstallationPermissionsDeployments>

The level of permission granted to the access token for deployments and deployment statuses.

§discussions: Option<InstallationPermissionsDiscussions>§emails: Option<InstallationPermissionsEmails>§environments: Option<InstallationPermissionsEnvironments>

The level of permission granted to the access token for managing repository environments.

§issues: Option<InstallationPermissionsIssues>

The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.

§members: Option<InstallationPermissionsMembers>

The level of permission granted to the access token for organization teams and members.

§merge_queues: Option<InstallationPermissionsMergeQueues>§metadata: Option<InstallationPermissionsMetadata>

The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.

§organization_administration: Option<InstallationPermissionsOrganizationAdministration>

The level of permission granted to the access token to manage access to an organization.

§organization_events: Option<InstallationPermissionsOrganizationEvents>§organization_hooks: Option<InstallationPermissionsOrganizationHooks>

The level of permission granted to the access token to manage the post-receive hooks for an organization.

§organization_packages: Option<InstallationPermissionsOrganizationPackages>

The level of permission granted to the access token for organization packages published to GitHub Packages.

§organization_plan: Option<InstallationPermissionsOrganizationPlan>

The level of permission granted to the access token for viewing an organization’s plan.

§organization_projects: Option<InstallationPermissionsOrganizationProjects>

The level of permission granted to the access token to manage organization projects and projects beta (where available).

§organization_secrets: Option<InstallationPermissionsOrganizationSecrets>

The level of permission granted to the access token to manage organization secrets.

§organization_self_hosted_runners: Option<InstallationPermissionsOrganizationSelfHostedRunners>

The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.

§organization_user_blocking: Option<InstallationPermissionsOrganizationUserBlocking>

The level of permission granted to the access token to view and manage users blocked by the organization.

§packages: Option<InstallationPermissionsPackages>

The level of permission granted to the access token for packages published to GitHub Packages.

§pages: Option<InstallationPermissionsPages>

The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.

§pull_requests: Option<InstallationPermissionsPullRequests>

The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.

§repository_hooks: Option<InstallationPermissionsRepositoryHooks>

The level of permission granted to the access token to manage the post-receive hooks for a repository.

§repository_projects: Option<InstallationPermissionsRepositoryProjects>

The level of permission granted to the access token to manage repository projects, columns, and cards.

§secret_scanning_alerts: Option<InstallationPermissionsSecretScanningAlerts>

The level of permission granted to the access token to view and manage secret scanning alerts.

§secrets: Option<InstallationPermissionsSecrets>

The level of permission granted to the access token to manage repository secrets.

§security_events: Option<InstallationPermissionsSecurityEvents>

The level of permission granted to the access token to view and manage security events like code scanning alerts.

§security_scanning_alert: Option<InstallationPermissionsSecurityScanningAlert>§single_file: Option<InstallationPermissionsSingleFile>

The level of permission granted to the access token to manage just a single file.

§statuses: Option<InstallationPermissionsStatuses>

The level of permission granted to the access token for commit statuses.

§team_discussions: Option<InstallationPermissionsTeamDiscussions>

The level of permission granted to the access token to manage team discussions and related comments.

§vulnerability_alerts: Option<InstallationPermissionsVulnerabilityAlerts>

The level of permission granted to the access token to manage Dependabot alerts.

§workflows: Option<InstallationPermissionsWorkflows>

The level of permission granted to the access token to update GitHub Actions workflow files.

Implementations§

Trait Implementations§

Source§

impl Clone for InstallationPermissions

Source§

fn clone(&self) -> InstallationPermissions

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl Debug for InstallationPermissions

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl<'de> Deserialize<'de> for InstallationPermissions

Source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>
where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more
Source§

impl From<&InstallationPermissions> for InstallationPermissions

Source§

fn from(value: &InstallationPermissions) -> Self

Converts to this type from the input type.
Source§

impl From<InstallationPermissions> for InstallationPermissions

Source§

fn from(value: InstallationPermissions) -> Self

Converts to this type from the input type.
Source§

impl Serialize for InstallationPermissions

Source§

fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error>
where __S: Serializer,

Serialize this value into the given Serde serializer. Read more
Source§

impl TryFrom<InstallationPermissions> for InstallationPermissions

Source§

type Error = String

The type returned in the event of a conversion error.
Source§

fn try_from(value: InstallationPermissions) -> Result<Self, String>

Performs the conversion.

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
Source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,