pub struct InstallationUnsuspendInstallationPermissions {Show 37 fields
pub actions: Option<InstallationUnsuspendInstallationPermissionsActions>,
pub administration: Option<InstallationUnsuspendInstallationPermissionsAdministration>,
pub blocking: Option<InstallationUnsuspendInstallationPermissionsBlocking>,
pub checks: Option<InstallationUnsuspendInstallationPermissionsChecks>,
pub content_references: Option<InstallationUnsuspendInstallationPermissionsContentReferences>,
pub contents: Option<InstallationUnsuspendInstallationPermissionsContents>,
pub deployments: Option<InstallationUnsuspendInstallationPermissionsDeployments>,
pub discussions: Option<InstallationUnsuspendInstallationPermissionsDiscussions>,
pub emails: Option<InstallationUnsuspendInstallationPermissionsEmails>,
pub environments: Option<InstallationUnsuspendInstallationPermissionsEnvironments>,
pub issues: Option<InstallationUnsuspendInstallationPermissionsIssues>,
pub members: Option<InstallationUnsuspendInstallationPermissionsMembers>,
pub merge_queues: Option<InstallationUnsuspendInstallationPermissionsMergeQueues>,
pub metadata: Option<InstallationUnsuspendInstallationPermissionsMetadata>,
pub organization_administration: Option<InstallationUnsuspendInstallationPermissionsOrganizationAdministration>,
pub organization_events: Option<InstallationUnsuspendInstallationPermissionsOrganizationEvents>,
pub organization_hooks: Option<InstallationUnsuspendInstallationPermissionsOrganizationHooks>,
pub organization_packages: Option<InstallationUnsuspendInstallationPermissionsOrganizationPackages>,
pub organization_plan: Option<InstallationUnsuspendInstallationPermissionsOrganizationPlan>,
pub organization_projects: Option<InstallationUnsuspendInstallationPermissionsOrganizationProjects>,
pub organization_secrets: Option<InstallationUnsuspendInstallationPermissionsOrganizationSecrets>,
pub organization_self_hosted_runners: Option<InstallationUnsuspendInstallationPermissionsOrganizationSelfHostedRunners>,
pub organization_user_blocking: Option<InstallationUnsuspendInstallationPermissionsOrganizationUserBlocking>,
pub packages: Option<InstallationUnsuspendInstallationPermissionsPackages>,
pub pages: Option<InstallationUnsuspendInstallationPermissionsPages>,
pub pull_requests: Option<InstallationUnsuspendInstallationPermissionsPullRequests>,
pub repository_hooks: Option<InstallationUnsuspendInstallationPermissionsRepositoryHooks>,
pub repository_projects: Option<InstallationUnsuspendInstallationPermissionsRepositoryProjects>,
pub secret_scanning_alerts: Option<InstallationUnsuspendInstallationPermissionsSecretScanningAlerts>,
pub secrets: Option<InstallationUnsuspendInstallationPermissionsSecrets>,
pub security_events: Option<InstallationUnsuspendInstallationPermissionsSecurityEvents>,
pub security_scanning_alert: Option<InstallationUnsuspendInstallationPermissionsSecurityScanningAlert>,
pub single_file: Option<InstallationUnsuspendInstallationPermissionsSingleFile>,
pub statuses: Option<InstallationUnsuspendInstallationPermissionsStatuses>,
pub team_discussions: Option<InstallationUnsuspendInstallationPermissionsTeamDiscussions>,
pub vulnerability_alerts: Option<InstallationUnsuspendInstallationPermissionsVulnerabilityAlerts>,
pub workflows: Option<InstallationUnsuspendInstallationPermissionsWorkflows>,
}
Expand description
InstallationUnsuspendInstallationPermissions
JSON schema
{
"type": "object",
"properties": {
"actions": {
"description": "The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.",
"type": "string",
"enum": [
"read",
"write"
]
},
"administration": {
"description": "The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.",
"type": "string",
"enum": [
"read",
"write"
]
},
"blocking": {
"type": "string",
"enum": [
"read",
"write"
]
},
"checks": {
"description": "The level of permission granted to the access token for checks on code.",
"type": "string",
"enum": [
"read",
"write"
]
},
"content_references": {
"type": "string",
"enum": [
"read",
"write"
]
},
"contents": {
"description": "The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.",
"type": "string",
"enum": [
"read",
"write"
]
},
"deployments": {
"description": "The level of permission granted to the access token for deployments and deployment statuses.",
"type": "string",
"enum": [
"read",
"write"
]
},
"discussions": {
"type": "string",
"enum": [
"read",
"write"
]
},
"emails": {
"type": "string",
"enum": [
"read",
"write"
]
},
"environments": {
"description": "The level of permission granted to the access token for managing repository environments.",
"type": "string",
"enum": [
"read",
"write"
]
},
"issues": {
"description": "The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.",
"type": "string",
"enum": [
"read",
"write"
]
},
"members": {
"description": "The level of permission granted to the access token for organization teams and members.",
"type": "string",
"enum": [
"read",
"write"
]
},
"merge_queues": {
"type": "string",
"enum": [
"read",
"write"
]
},
"metadata": {
"description": "The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_administration": {
"description": "The level of permission granted to the access token to manage access to an organization.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_events": {
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_hooks": {
"description": "The level of permission granted to the access token to manage the post-receive hooks for an organization.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_packages": {
"description": "The level of permission granted to the access token for organization packages published to GitHub Packages.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_plan": {
"description": "The level of permission granted to the access token for viewing an organization's plan.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_projects": {
"description": "The level of permission granted to the access token to manage organization projects and projects beta (where available).",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_secrets": {
"description": "The level of permission granted to the access token to manage organization secrets.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_self_hosted_runners": {
"description": "The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.",
"type": "string",
"enum": [
"read",
"write"
]
},
"organization_user_blocking": {
"description": "The level of permission granted to the access token to view and manage users blocked by the organization.",
"type": "string",
"enum": [
"read",
"write"
]
},
"packages": {
"description": "The level of permission granted to the access token for packages published to GitHub Packages.",
"type": "string",
"enum": [
"read",
"write"
]
},
"pages": {
"description": "The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.",
"type": "string",
"enum": [
"read",
"write"
]
},
"pull_requests": {
"description": "The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.",
"type": "string",
"enum": [
"read",
"write"
]
},
"repository_hooks": {
"description": "The level of permission granted to the access token to manage the post-receive hooks for a repository.",
"type": "string",
"enum": [
"read",
"write"
]
},
"repository_projects": {
"description": "The level of permission granted to the access token to manage repository projects, columns, and cards.",
"type": "string",
"enum": [
"read",
"write"
]
},
"secret_scanning_alerts": {
"description": "The level of permission granted to the access token to view and manage secret scanning alerts.",
"type": "string",
"enum": [
"read",
"write"
]
},
"secrets": {
"description": "The level of permission granted to the access token to manage repository secrets.",
"type": "string",
"enum": [
"read",
"write"
]
},
"security_events": {
"description": "The level of permission granted to the access token to view and manage security events like code scanning alerts.",
"type": "string",
"enum": [
"read",
"write"
]
},
"security_scanning_alert": {
"type": "string",
"enum": [
"read",
"write"
]
},
"single_file": {
"description": "The level of permission granted to the access token to manage just a single file.",
"type": "string",
"enum": [
"read",
"write"
]
},
"statuses": {
"description": "The level of permission granted to the access token for commit statuses.",
"type": "string",
"enum": [
"read",
"write"
]
},
"team_discussions": {
"description": "The level of permission granted to the access token to manage team discussions and related comments.",
"type": "string",
"enum": [
"read",
"write"
]
},
"vulnerability_alerts": {
"description": "The level of permission granted to the access token to manage Dependabot alerts.",
"type": "string",
"enum": [
"read",
"write"
]
},
"workflows": {
"description": "The level of permission granted to the access token to update GitHub Actions workflow files.",
"type": "string",
"enum": [
"read",
"write"
]
}
},
"additionalProperties": false
}
Fields§
§actions: Option<InstallationUnsuspendInstallationPermissionsActions>
The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.
administration: Option<InstallationUnsuspendInstallationPermissionsAdministration>
The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.
blocking: Option<InstallationUnsuspendInstallationPermissionsBlocking>
§checks: Option<InstallationUnsuspendInstallationPermissionsChecks>
The level of permission granted to the access token for checks on code.
content_references: Option<InstallationUnsuspendInstallationPermissionsContentReferences>
§contents: Option<InstallationUnsuspendInstallationPermissionsContents>
The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.
deployments: Option<InstallationUnsuspendInstallationPermissionsDeployments>
The level of permission granted to the access token for deployments and deployment statuses.
discussions: Option<InstallationUnsuspendInstallationPermissionsDiscussions>
§emails: Option<InstallationUnsuspendInstallationPermissionsEmails>
§environments: Option<InstallationUnsuspendInstallationPermissionsEnvironments>
The level of permission granted to the access token for managing repository environments.
issues: Option<InstallationUnsuspendInstallationPermissionsIssues>
The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.
members: Option<InstallationUnsuspendInstallationPermissionsMembers>
The level of permission granted to the access token for organization teams and members.
merge_queues: Option<InstallationUnsuspendInstallationPermissionsMergeQueues>
§metadata: Option<InstallationUnsuspendInstallationPermissionsMetadata>
The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.
organization_administration: Option<InstallationUnsuspendInstallationPermissionsOrganizationAdministration>
The level of permission granted to the access token to manage access to an organization.
organization_events: Option<InstallationUnsuspendInstallationPermissionsOrganizationEvents>
§organization_hooks: Option<InstallationUnsuspendInstallationPermissionsOrganizationHooks>
The level of permission granted to the access token to manage the post-receive hooks for an organization.
organization_packages: Option<InstallationUnsuspendInstallationPermissionsOrganizationPackages>
The level of permission granted to the access token for organization packages published to GitHub Packages.
organization_plan: Option<InstallationUnsuspendInstallationPermissionsOrganizationPlan>
The level of permission granted to the access token for viewing an organization’s plan.
organization_projects: Option<InstallationUnsuspendInstallationPermissionsOrganizationProjects>
The level of permission granted to the access token to manage organization projects and projects beta (where available).
organization_secrets: Option<InstallationUnsuspendInstallationPermissionsOrganizationSecrets>
The level of permission granted to the access token to manage organization secrets.
organization_self_hosted_runners: Option<InstallationUnsuspendInstallationPermissionsOrganizationSelfHostedRunners>
The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.
organization_user_blocking: Option<InstallationUnsuspendInstallationPermissionsOrganizationUserBlocking>
The level of permission granted to the access token to view and manage users blocked by the organization.
packages: Option<InstallationUnsuspendInstallationPermissionsPackages>
The level of permission granted to the access token for packages published to GitHub Packages.
pages: Option<InstallationUnsuspendInstallationPermissionsPages>
The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.
pull_requests: Option<InstallationUnsuspendInstallationPermissionsPullRequests>
The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.
repository_hooks: Option<InstallationUnsuspendInstallationPermissionsRepositoryHooks>
The level of permission granted to the access token to manage the post-receive hooks for a repository.
repository_projects: Option<InstallationUnsuspendInstallationPermissionsRepositoryProjects>
The level of permission granted to the access token to manage repository projects, columns, and cards.
secret_scanning_alerts: Option<InstallationUnsuspendInstallationPermissionsSecretScanningAlerts>
The level of permission granted to the access token to view and manage secret scanning alerts.
secrets: Option<InstallationUnsuspendInstallationPermissionsSecrets>
The level of permission granted to the access token to manage repository secrets.
security_events: Option<InstallationUnsuspendInstallationPermissionsSecurityEvents>
The level of permission granted to the access token to view and manage security events like code scanning alerts.
security_scanning_alert: Option<InstallationUnsuspendInstallationPermissionsSecurityScanningAlert>
§single_file: Option<InstallationUnsuspendInstallationPermissionsSingleFile>
The level of permission granted to the access token to manage just a single file.
statuses: Option<InstallationUnsuspendInstallationPermissionsStatuses>
The level of permission granted to the access token for commit statuses.
team_discussions: Option<InstallationUnsuspendInstallationPermissionsTeamDiscussions>
The level of permission granted to the access token to manage team discussions and related comments.
vulnerability_alerts: Option<InstallationUnsuspendInstallationPermissionsVulnerabilityAlerts>
The level of permission granted to the access token to manage Dependabot alerts.
workflows: Option<InstallationUnsuspendInstallationPermissionsWorkflows>
The level of permission granted to the access token to update GitHub Actions workflow files.
Implementations§
Trait Implementations§
Source§impl Clone for InstallationUnsuspendInstallationPermissions
impl Clone for InstallationUnsuspendInstallationPermissions
Source§fn clone(&self) -> InstallationUnsuspendInstallationPermissions
fn clone(&self) -> InstallationUnsuspendInstallationPermissions
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more