Struct InstallationSuspendInstallationPermissions

Source
pub struct InstallationSuspendInstallationPermissions {
Show 37 fields pub actions: Option<InstallationSuspendInstallationPermissionsActions>, pub administration: Option<InstallationSuspendInstallationPermissionsAdministration>, pub blocking: Option<InstallationSuspendInstallationPermissionsBlocking>, pub checks: Option<InstallationSuspendInstallationPermissionsChecks>, pub content_references: Option<InstallationSuspendInstallationPermissionsContentReferences>, pub contents: Option<InstallationSuspendInstallationPermissionsContents>, pub deployments: Option<InstallationSuspendInstallationPermissionsDeployments>, pub discussions: Option<InstallationSuspendInstallationPermissionsDiscussions>, pub emails: Option<InstallationSuspendInstallationPermissionsEmails>, pub environments: Option<InstallationSuspendInstallationPermissionsEnvironments>, pub issues: Option<InstallationSuspendInstallationPermissionsIssues>, pub members: Option<InstallationSuspendInstallationPermissionsMembers>, pub merge_queues: Option<InstallationSuspendInstallationPermissionsMergeQueues>, pub metadata: Option<InstallationSuspendInstallationPermissionsMetadata>, pub organization_administration: Option<InstallationSuspendInstallationPermissionsOrganizationAdministration>, pub organization_events: Option<InstallationSuspendInstallationPermissionsOrganizationEvents>, pub organization_hooks: Option<InstallationSuspendInstallationPermissionsOrganizationHooks>, pub organization_packages: Option<InstallationSuspendInstallationPermissionsOrganizationPackages>, pub organization_plan: Option<InstallationSuspendInstallationPermissionsOrganizationPlan>, pub organization_projects: Option<InstallationSuspendInstallationPermissionsOrganizationProjects>, pub organization_secrets: Option<InstallationSuspendInstallationPermissionsOrganizationSecrets>, pub organization_self_hosted_runners: Option<InstallationSuspendInstallationPermissionsOrganizationSelfHostedRunners>, pub organization_user_blocking: Option<InstallationSuspendInstallationPermissionsOrganizationUserBlocking>, pub packages: Option<InstallationSuspendInstallationPermissionsPackages>, pub pages: Option<InstallationSuspendInstallationPermissionsPages>, pub pull_requests: Option<InstallationSuspendInstallationPermissionsPullRequests>, pub repository_hooks: Option<InstallationSuspendInstallationPermissionsRepositoryHooks>, pub repository_projects: Option<InstallationSuspendInstallationPermissionsRepositoryProjects>, pub secret_scanning_alerts: Option<InstallationSuspendInstallationPermissionsSecretScanningAlerts>, pub secrets: Option<InstallationSuspendInstallationPermissionsSecrets>, pub security_events: Option<InstallationSuspendInstallationPermissionsSecurityEvents>, pub security_scanning_alert: Option<InstallationSuspendInstallationPermissionsSecurityScanningAlert>, pub single_file: Option<InstallationSuspendInstallationPermissionsSingleFile>, pub statuses: Option<InstallationSuspendInstallationPermissionsStatuses>, pub team_discussions: Option<InstallationSuspendInstallationPermissionsTeamDiscussions>, pub vulnerability_alerts: Option<InstallationSuspendInstallationPermissionsVulnerabilityAlerts>, pub workflows: Option<InstallationSuspendInstallationPermissionsWorkflows>,
}
Expand description

InstallationSuspendInstallationPermissions

JSON schema
{
 "type": "object",
 "properties": {
   "actions": {
     "description": "The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "administration": {
     "description": "The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "blocking": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "checks": {
     "description": "The level of permission granted to the access token for checks on code.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "content_references": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "contents": {
     "description": "The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "deployments": {
     "description": "The level of permission granted to the access token for deployments and deployment statuses.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "discussions": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "emails": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "environments": {
     "description": "The level of permission granted to the access token for managing repository environments.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "issues": {
     "description": "The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "members": {
     "description": "The level of permission granted to the access token for organization teams and members.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "merge_queues": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "metadata": {
     "description": "The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_administration": {
     "description": "The level of permission granted to the access token to manage access to an organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_events": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_hooks": {
     "description": "The level of permission granted to the access token to manage the post-receive hooks for an organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_packages": {
     "description": "The level of permission granted to the access token for organization packages published to GitHub Packages.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_plan": {
     "description": "The level of permission granted to the access token for viewing an organization's plan.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_projects": {
     "description": "The level of permission granted to the access token to manage organization projects and projects beta (where available).",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_secrets": {
     "description": "The level of permission granted to the access token to manage organization secrets.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_self_hosted_runners": {
     "description": "The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "organization_user_blocking": {
     "description": "The level of permission granted to the access token to view and manage users blocked by the organization.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "packages": {
     "description": "The level of permission granted to the access token for packages published to GitHub Packages.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "pages": {
     "description": "The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "pull_requests": {
     "description": "The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "repository_hooks": {
     "description": "The level of permission granted to the access token to manage the post-receive hooks for a repository.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "repository_projects": {
     "description": "The level of permission granted to the access token to manage repository projects, columns, and cards.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "secret_scanning_alerts": {
     "description": "The level of permission granted to the access token to view and manage secret scanning alerts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "secrets": {
     "description": "The level of permission granted to the access token to manage repository secrets.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "security_events": {
     "description": "The level of permission granted to the access token to view and manage security events like code scanning alerts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "security_scanning_alert": {
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "single_file": {
     "description": "The level of permission granted to the access token to manage just a single file.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "statuses": {
     "description": "The level of permission granted to the access token for commit statuses.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "team_discussions": {
     "description": "The level of permission granted to the access token to manage team discussions and related comments.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "vulnerability_alerts": {
     "description": "The level of permission granted to the access token to manage Dependabot alerts.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   },
   "workflows": {
     "description": "The level of permission granted to the access token to update GitHub Actions workflow files.",
     "type": "string",
     "enum": [
       "read",
       "write"
     ]
   }
 },
 "additionalProperties": false
}

Fields§

§actions: Option<InstallationSuspendInstallationPermissionsActions>

The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.

§administration: Option<InstallationSuspendInstallationPermissionsAdministration>

The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.

§blocking: Option<InstallationSuspendInstallationPermissionsBlocking>§checks: Option<InstallationSuspendInstallationPermissionsChecks>

The level of permission granted to the access token for checks on code.

§content_references: Option<InstallationSuspendInstallationPermissionsContentReferences>§contents: Option<InstallationSuspendInstallationPermissionsContents>

The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.

§deployments: Option<InstallationSuspendInstallationPermissionsDeployments>

The level of permission granted to the access token for deployments and deployment statuses.

§discussions: Option<InstallationSuspendInstallationPermissionsDiscussions>§emails: Option<InstallationSuspendInstallationPermissionsEmails>§environments: Option<InstallationSuspendInstallationPermissionsEnvironments>

The level of permission granted to the access token for managing repository environments.

§issues: Option<InstallationSuspendInstallationPermissionsIssues>

The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.

§members: Option<InstallationSuspendInstallationPermissionsMembers>

The level of permission granted to the access token for organization teams and members.

§merge_queues: Option<InstallationSuspendInstallationPermissionsMergeQueues>§metadata: Option<InstallationSuspendInstallationPermissionsMetadata>

The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.

§organization_administration: Option<InstallationSuspendInstallationPermissionsOrganizationAdministration>

The level of permission granted to the access token to manage access to an organization.

§organization_events: Option<InstallationSuspendInstallationPermissionsOrganizationEvents>§organization_hooks: Option<InstallationSuspendInstallationPermissionsOrganizationHooks>

The level of permission granted to the access token to manage the post-receive hooks for an organization.

§organization_packages: Option<InstallationSuspendInstallationPermissionsOrganizationPackages>

The level of permission granted to the access token for organization packages published to GitHub Packages.

§organization_plan: Option<InstallationSuspendInstallationPermissionsOrganizationPlan>

The level of permission granted to the access token for viewing an organization’s plan.

§organization_projects: Option<InstallationSuspendInstallationPermissionsOrganizationProjects>

The level of permission granted to the access token to manage organization projects and projects beta (where available).

§organization_secrets: Option<InstallationSuspendInstallationPermissionsOrganizationSecrets>

The level of permission granted to the access token to manage organization secrets.

§organization_self_hosted_runners: Option<InstallationSuspendInstallationPermissionsOrganizationSelfHostedRunners>

The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.

§organization_user_blocking: Option<InstallationSuspendInstallationPermissionsOrganizationUserBlocking>

The level of permission granted to the access token to view and manage users blocked by the organization.

§packages: Option<InstallationSuspendInstallationPermissionsPackages>

The level of permission granted to the access token for packages published to GitHub Packages.

§pages: Option<InstallationSuspendInstallationPermissionsPages>

The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.

§pull_requests: Option<InstallationSuspendInstallationPermissionsPullRequests>

The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.

§repository_hooks: Option<InstallationSuspendInstallationPermissionsRepositoryHooks>

The level of permission granted to the access token to manage the post-receive hooks for a repository.

§repository_projects: Option<InstallationSuspendInstallationPermissionsRepositoryProjects>

The level of permission granted to the access token to manage repository projects, columns, and cards.

§secret_scanning_alerts: Option<InstallationSuspendInstallationPermissionsSecretScanningAlerts>

The level of permission granted to the access token to view and manage secret scanning alerts.

§secrets: Option<InstallationSuspendInstallationPermissionsSecrets>

The level of permission granted to the access token to manage repository secrets.

§security_events: Option<InstallationSuspendInstallationPermissionsSecurityEvents>

The level of permission granted to the access token to view and manage security events like code scanning alerts.

§security_scanning_alert: Option<InstallationSuspendInstallationPermissionsSecurityScanningAlert>§single_file: Option<InstallationSuspendInstallationPermissionsSingleFile>

The level of permission granted to the access token to manage just a single file.

§statuses: Option<InstallationSuspendInstallationPermissionsStatuses>

The level of permission granted to the access token for commit statuses.

§team_discussions: Option<InstallationSuspendInstallationPermissionsTeamDiscussions>

The level of permission granted to the access token to manage team discussions and related comments.

§vulnerability_alerts: Option<InstallationSuspendInstallationPermissionsVulnerabilityAlerts>

The level of permission granted to the access token to manage Dependabot alerts.

§workflows: Option<InstallationSuspendInstallationPermissionsWorkflows>

The level of permission granted to the access token to update GitHub Actions workflow files.

Implementations§

Trait Implementations§

Source§

impl Clone for InstallationSuspendInstallationPermissions

Source§

fn clone(&self) -> InstallationSuspendInstallationPermissions

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl Debug for InstallationSuspendInstallationPermissions

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl<'de> Deserialize<'de> for InstallationSuspendInstallationPermissions

Source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>
where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more
Source§

impl From<&InstallationSuspendInstallationPermissions> for InstallationSuspendInstallationPermissions

Source§

fn from(value: &InstallationSuspendInstallationPermissions) -> Self

Converts to this type from the input type.
Source§

impl From<InstallationSuspendInstallationPermissions> for InstallationSuspendInstallationPermissions

Source§

fn from(value: InstallationSuspendInstallationPermissions) -> Self

Converts to this type from the input type.
Source§

impl Serialize for InstallationSuspendInstallationPermissions

Source§

fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error>
where __S: Serializer,

Serialize this value into the given Serde serializer. Read more
Source§

impl TryFrom<InstallationSuspendInstallationPermissions> for InstallationSuspendInstallationPermissions

Source§

type Error = String

The type returned in the event of a conversion error.
Source§

fn try_from( value: InstallationSuspendInstallationPermissions, ) -> Result<Self, String>

Performs the conversion.

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
Source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,