openapi_github/apis/
codespaces_api.rs

1/*
2 * GitHub's official OpenAPI spec + Octokit extension
3 *
4 * OpenAPI specs from https://github.com/github/rest-api-description with the 'x-octokit' extension required by the Octokit SDKs
5 *
6 * The version of the OpenAPI document: 16.6.0
7 * 
8 * Generated by: https://openapi-generator.tech
9 */
10
11
12use reqwest;
13use serde::{Deserialize, Serialize};
14use crate::{apis::ResponseContent, models};
15use super::{Error, configuration};
16
17
18/// struct for typed errors of method [`codespaces_slash_add_repository_for_secret_for_authenticated_user`]
19#[derive(Debug, Clone, Serialize, Deserialize)]
20#[serde(untagged)]
21pub enum CodespacesSlashAddRepositoryForSecretForAuthenticatedUserError {
22    Status401(models::BasicError),
23    Status403(models::BasicError),
24    Status404(models::BasicError),
25    Status500(models::BasicError),
26    UnknownValue(serde_json::Value),
27}
28
29/// struct for typed errors of method [`codespaces_slash_add_selected_repo_to_org_secret`]
30#[derive(Debug, Clone, Serialize, Deserialize)]
31#[serde(untagged)]
32pub enum CodespacesSlashAddSelectedRepoToOrgSecretError {
33    Status404(models::BasicError),
34    Status409(),
35    Status422(models::ValidationError),
36    UnknownValue(serde_json::Value),
37}
38
39/// struct for typed errors of method [`codespaces_slash_check_permissions_for_devcontainer`]
40#[derive(Debug, Clone, Serialize, Deserialize)]
41#[serde(untagged)]
42pub enum CodespacesSlashCheckPermissionsForDevcontainerError {
43    Status401(models::BasicError),
44    Status403(models::BasicError),
45    Status404(models::BasicError),
46    Status422(models::ValidationError),
47    Status503(models::SecretScanningListAlertsForEnterprise503Response),
48    UnknownValue(serde_json::Value),
49}
50
51/// struct for typed errors of method [`codespaces_slash_codespace_machines_for_authenticated_user`]
52#[derive(Debug, Clone, Serialize, Deserialize)]
53#[serde(untagged)]
54pub enum CodespacesSlashCodespaceMachinesForAuthenticatedUserError {
55    Status401(models::BasicError),
56    Status403(models::BasicError),
57    Status404(models::BasicError),
58    Status500(models::BasicError),
59    UnknownValue(serde_json::Value),
60}
61
62/// struct for typed errors of method [`codespaces_slash_create_for_authenticated_user`]
63#[derive(Debug, Clone, Serialize, Deserialize)]
64#[serde(untagged)]
65pub enum CodespacesSlashCreateForAuthenticatedUserError {
66    Status401(models::BasicError),
67    Status403(models::BasicError),
68    Status404(models::BasicError),
69    Status503(models::SecretScanningListAlertsForEnterprise503Response),
70    UnknownValue(serde_json::Value),
71}
72
73/// struct for typed errors of method [`codespaces_slash_create_or_update_org_secret`]
74#[derive(Debug, Clone, Serialize, Deserialize)]
75#[serde(untagged)]
76pub enum CodespacesSlashCreateOrUpdateOrgSecretError {
77    Status404(models::BasicError),
78    Status422(models::ValidationError),
79    UnknownValue(serde_json::Value),
80}
81
82/// struct for typed errors of method [`codespaces_slash_create_or_update_repo_secret`]
83#[derive(Debug, Clone, Serialize, Deserialize)]
84#[serde(untagged)]
85pub enum CodespacesSlashCreateOrUpdateRepoSecretError {
86    UnknownValue(serde_json::Value),
87}
88
89/// struct for typed errors of method [`codespaces_slash_create_or_update_secret_for_authenticated_user`]
90#[derive(Debug, Clone, Serialize, Deserialize)]
91#[serde(untagged)]
92pub enum CodespacesSlashCreateOrUpdateSecretForAuthenticatedUserError {
93    Status404(models::BasicError),
94    Status422(models::ValidationError),
95    UnknownValue(serde_json::Value),
96}
97
98/// struct for typed errors of method [`codespaces_slash_create_with_pr_for_authenticated_user`]
99#[derive(Debug, Clone, Serialize, Deserialize)]
100#[serde(untagged)]
101pub enum CodespacesSlashCreateWithPrForAuthenticatedUserError {
102    Status401(models::BasicError),
103    Status403(models::BasicError),
104    Status404(models::BasicError),
105    Status503(models::SecretScanningListAlertsForEnterprise503Response),
106    UnknownValue(serde_json::Value),
107}
108
109/// struct for typed errors of method [`codespaces_slash_create_with_repo_for_authenticated_user`]
110#[derive(Debug, Clone, Serialize, Deserialize)]
111#[serde(untagged)]
112pub enum CodespacesSlashCreateWithRepoForAuthenticatedUserError {
113    Status400(models::BasicError),
114    Status401(models::BasicError),
115    Status403(models::BasicError),
116    Status404(models::BasicError),
117    Status503(models::SecretScanningListAlertsForEnterprise503Response),
118    UnknownValue(serde_json::Value),
119}
120
121/// struct for typed errors of method [`codespaces_slash_delete_codespaces_access_users`]
122#[derive(Debug, Clone, Serialize, Deserialize)]
123#[serde(untagged)]
124pub enum CodespacesSlashDeleteCodespacesAccessUsersError {
125    Status400(),
126    Status404(models::BasicError),
127    Status422(models::ValidationError),
128    Status500(models::BasicError),
129    UnknownValue(serde_json::Value),
130}
131
132/// struct for typed errors of method [`codespaces_slash_delete_for_authenticated_user`]
133#[derive(Debug, Clone, Serialize, Deserialize)]
134#[serde(untagged)]
135pub enum CodespacesSlashDeleteForAuthenticatedUserError {
136    Status401(models::BasicError),
137    Status403(models::BasicError),
138    Status404(models::BasicError),
139    Status500(models::BasicError),
140    UnknownValue(serde_json::Value),
141}
142
143/// struct for typed errors of method [`codespaces_slash_delete_from_organization`]
144#[derive(Debug, Clone, Serialize, Deserialize)]
145#[serde(untagged)]
146pub enum CodespacesSlashDeleteFromOrganizationError {
147    Status401(models::BasicError),
148    Status403(models::BasicError),
149    Status404(models::BasicError),
150    Status500(models::BasicError),
151    UnknownValue(serde_json::Value),
152}
153
154/// struct for typed errors of method [`codespaces_slash_delete_org_secret`]
155#[derive(Debug, Clone, Serialize, Deserialize)]
156#[serde(untagged)]
157pub enum CodespacesSlashDeleteOrgSecretError {
158    Status404(models::BasicError),
159    UnknownValue(serde_json::Value),
160}
161
162/// struct for typed errors of method [`codespaces_slash_delete_repo_secret`]
163#[derive(Debug, Clone, Serialize, Deserialize)]
164#[serde(untagged)]
165pub enum CodespacesSlashDeleteRepoSecretError {
166    UnknownValue(serde_json::Value),
167}
168
169/// struct for typed errors of method [`codespaces_slash_delete_secret_for_authenticated_user`]
170#[derive(Debug, Clone, Serialize, Deserialize)]
171#[serde(untagged)]
172pub enum CodespacesSlashDeleteSecretForAuthenticatedUserError {
173    UnknownValue(serde_json::Value),
174}
175
176/// struct for typed errors of method [`codespaces_slash_export_for_authenticated_user`]
177#[derive(Debug, Clone, Serialize, Deserialize)]
178#[serde(untagged)]
179pub enum CodespacesSlashExportForAuthenticatedUserError {
180    Status401(models::BasicError),
181    Status403(models::BasicError),
182    Status404(models::BasicError),
183    Status422(models::ValidationError),
184    Status500(models::BasicError),
185    UnknownValue(serde_json::Value),
186}
187
188/// struct for typed errors of method [`codespaces_slash_get_codespaces_for_user_in_org`]
189#[derive(Debug, Clone, Serialize, Deserialize)]
190#[serde(untagged)]
191pub enum CodespacesSlashGetCodespacesForUserInOrgError {
192    Status401(models::BasicError),
193    Status403(models::BasicError),
194    Status404(models::BasicError),
195    Status500(models::BasicError),
196    UnknownValue(serde_json::Value),
197}
198
199/// struct for typed errors of method [`codespaces_slash_get_export_details_for_authenticated_user`]
200#[derive(Debug, Clone, Serialize, Deserialize)]
201#[serde(untagged)]
202pub enum CodespacesSlashGetExportDetailsForAuthenticatedUserError {
203    Status404(models::BasicError),
204    UnknownValue(serde_json::Value),
205}
206
207/// struct for typed errors of method [`codespaces_slash_get_for_authenticated_user`]
208#[derive(Debug, Clone, Serialize, Deserialize)]
209#[serde(untagged)]
210pub enum CodespacesSlashGetForAuthenticatedUserError {
211    Status401(models::BasicError),
212    Status403(models::BasicError),
213    Status404(models::BasicError),
214    Status500(models::BasicError),
215    UnknownValue(serde_json::Value),
216}
217
218/// struct for typed errors of method [`codespaces_slash_get_org_public_key`]
219#[derive(Debug, Clone, Serialize, Deserialize)]
220#[serde(untagged)]
221pub enum CodespacesSlashGetOrgPublicKeyError {
222    UnknownValue(serde_json::Value),
223}
224
225/// struct for typed errors of method [`codespaces_slash_get_org_secret`]
226#[derive(Debug, Clone, Serialize, Deserialize)]
227#[serde(untagged)]
228pub enum CodespacesSlashGetOrgSecretError {
229    UnknownValue(serde_json::Value),
230}
231
232/// struct for typed errors of method [`codespaces_slash_get_public_key_for_authenticated_user`]
233#[derive(Debug, Clone, Serialize, Deserialize)]
234#[serde(untagged)]
235pub enum CodespacesSlashGetPublicKeyForAuthenticatedUserError {
236    UnknownValue(serde_json::Value),
237}
238
239/// struct for typed errors of method [`codespaces_slash_get_repo_public_key`]
240#[derive(Debug, Clone, Serialize, Deserialize)]
241#[serde(untagged)]
242pub enum CodespacesSlashGetRepoPublicKeyError {
243    UnknownValue(serde_json::Value),
244}
245
246/// struct for typed errors of method [`codespaces_slash_get_repo_secret`]
247#[derive(Debug, Clone, Serialize, Deserialize)]
248#[serde(untagged)]
249pub enum CodespacesSlashGetRepoSecretError {
250    UnknownValue(serde_json::Value),
251}
252
253/// struct for typed errors of method [`codespaces_slash_get_secret_for_authenticated_user`]
254#[derive(Debug, Clone, Serialize, Deserialize)]
255#[serde(untagged)]
256pub enum CodespacesSlashGetSecretForAuthenticatedUserError {
257    UnknownValue(serde_json::Value),
258}
259
260/// struct for typed errors of method [`codespaces_slash_list_devcontainers_in_repository_for_authenticated_user`]
261#[derive(Debug, Clone, Serialize, Deserialize)]
262#[serde(untagged)]
263pub enum CodespacesSlashListDevcontainersInRepositoryForAuthenticatedUserError {
264    Status400(models::BasicError),
265    Status401(models::BasicError),
266    Status403(models::BasicError),
267    Status404(models::BasicError),
268    Status500(models::BasicError),
269    UnknownValue(serde_json::Value),
270}
271
272/// struct for typed errors of method [`codespaces_slash_list_for_authenticated_user`]
273#[derive(Debug, Clone, Serialize, Deserialize)]
274#[serde(untagged)]
275pub enum CodespacesSlashListForAuthenticatedUserError {
276    Status401(models::BasicError),
277    Status403(models::BasicError),
278    Status404(models::BasicError),
279    Status500(models::BasicError),
280    UnknownValue(serde_json::Value),
281}
282
283/// struct for typed errors of method [`codespaces_slash_list_in_organization`]
284#[derive(Debug, Clone, Serialize, Deserialize)]
285#[serde(untagged)]
286pub enum CodespacesSlashListInOrganizationError {
287    Status401(models::BasicError),
288    Status403(models::BasicError),
289    Status404(models::BasicError),
290    Status500(models::BasicError),
291    UnknownValue(serde_json::Value),
292}
293
294/// struct for typed errors of method [`codespaces_slash_list_in_repository_for_authenticated_user`]
295#[derive(Debug, Clone, Serialize, Deserialize)]
296#[serde(untagged)]
297pub enum CodespacesSlashListInRepositoryForAuthenticatedUserError {
298    Status401(models::BasicError),
299    Status403(models::BasicError),
300    Status404(models::BasicError),
301    Status500(models::BasicError),
302    UnknownValue(serde_json::Value),
303}
304
305/// struct for typed errors of method [`codespaces_slash_list_org_secrets`]
306#[derive(Debug, Clone, Serialize, Deserialize)]
307#[serde(untagged)]
308pub enum CodespacesSlashListOrgSecretsError {
309    UnknownValue(serde_json::Value),
310}
311
312/// struct for typed errors of method [`codespaces_slash_list_repo_secrets`]
313#[derive(Debug, Clone, Serialize, Deserialize)]
314#[serde(untagged)]
315pub enum CodespacesSlashListRepoSecretsError {
316    UnknownValue(serde_json::Value),
317}
318
319/// struct for typed errors of method [`codespaces_slash_list_repositories_for_secret_for_authenticated_user`]
320#[derive(Debug, Clone, Serialize, Deserialize)]
321#[serde(untagged)]
322pub enum CodespacesSlashListRepositoriesForSecretForAuthenticatedUserError {
323    Status401(models::BasicError),
324    Status403(models::BasicError),
325    Status404(models::BasicError),
326    Status500(models::BasicError),
327    UnknownValue(serde_json::Value),
328}
329
330/// struct for typed errors of method [`codespaces_slash_list_secrets_for_authenticated_user`]
331#[derive(Debug, Clone, Serialize, Deserialize)]
332#[serde(untagged)]
333pub enum CodespacesSlashListSecretsForAuthenticatedUserError {
334    UnknownValue(serde_json::Value),
335}
336
337/// struct for typed errors of method [`codespaces_slash_list_selected_repos_for_org_secret`]
338#[derive(Debug, Clone, Serialize, Deserialize)]
339#[serde(untagged)]
340pub enum CodespacesSlashListSelectedReposForOrgSecretError {
341    Status404(models::BasicError),
342    UnknownValue(serde_json::Value),
343}
344
345/// struct for typed errors of method [`codespaces_slash_pre_flight_with_repo_for_authenticated_user`]
346#[derive(Debug, Clone, Serialize, Deserialize)]
347#[serde(untagged)]
348pub enum CodespacesSlashPreFlightWithRepoForAuthenticatedUserError {
349    Status401(models::BasicError),
350    Status403(models::BasicError),
351    Status404(models::BasicError),
352    UnknownValue(serde_json::Value),
353}
354
355/// struct for typed errors of method [`codespaces_slash_publish_for_authenticated_user`]
356#[derive(Debug, Clone, Serialize, Deserialize)]
357#[serde(untagged)]
358pub enum CodespacesSlashPublishForAuthenticatedUserError {
359    Status401(models::BasicError),
360    Status403(models::BasicError),
361    Status404(models::BasicError),
362    Status422(models::ValidationError),
363    UnknownValue(serde_json::Value),
364}
365
366/// struct for typed errors of method [`codespaces_slash_remove_repository_for_secret_for_authenticated_user`]
367#[derive(Debug, Clone, Serialize, Deserialize)]
368#[serde(untagged)]
369pub enum CodespacesSlashRemoveRepositoryForSecretForAuthenticatedUserError {
370    Status401(models::BasicError),
371    Status403(models::BasicError),
372    Status404(models::BasicError),
373    Status500(models::BasicError),
374    UnknownValue(serde_json::Value),
375}
376
377/// struct for typed errors of method [`codespaces_slash_remove_selected_repo_from_org_secret`]
378#[derive(Debug, Clone, Serialize, Deserialize)]
379#[serde(untagged)]
380pub enum CodespacesSlashRemoveSelectedRepoFromOrgSecretError {
381    Status404(models::BasicError),
382    Status409(),
383    Status422(models::ValidationError),
384    UnknownValue(serde_json::Value),
385}
386
387/// struct for typed errors of method [`codespaces_slash_repo_machines_for_authenticated_user`]
388#[derive(Debug, Clone, Serialize, Deserialize)]
389#[serde(untagged)]
390pub enum CodespacesSlashRepoMachinesForAuthenticatedUserError {
391    Status401(models::BasicError),
392    Status403(models::BasicError),
393    Status404(models::BasicError),
394    Status500(models::BasicError),
395    UnknownValue(serde_json::Value),
396}
397
398/// struct for typed errors of method [`codespaces_slash_set_codespaces_access`]
399#[derive(Debug, Clone, Serialize, Deserialize)]
400#[serde(untagged)]
401pub enum CodespacesSlashSetCodespacesAccessError {
402    Status400(),
403    Status404(models::BasicError),
404    Status422(models::ValidationError),
405    Status500(models::BasicError),
406    UnknownValue(serde_json::Value),
407}
408
409/// struct for typed errors of method [`codespaces_slash_set_codespaces_access_users`]
410#[derive(Debug, Clone, Serialize, Deserialize)]
411#[serde(untagged)]
412pub enum CodespacesSlashSetCodespacesAccessUsersError {
413    Status400(),
414    Status404(models::BasicError),
415    Status422(models::ValidationError),
416    Status500(models::BasicError),
417    UnknownValue(serde_json::Value),
418}
419
420/// struct for typed errors of method [`codespaces_slash_set_repositories_for_secret_for_authenticated_user`]
421#[derive(Debug, Clone, Serialize, Deserialize)]
422#[serde(untagged)]
423pub enum CodespacesSlashSetRepositoriesForSecretForAuthenticatedUserError {
424    Status401(models::BasicError),
425    Status403(models::BasicError),
426    Status404(models::BasicError),
427    Status500(models::BasicError),
428    UnknownValue(serde_json::Value),
429}
430
431/// struct for typed errors of method [`codespaces_slash_set_selected_repos_for_org_secret`]
432#[derive(Debug, Clone, Serialize, Deserialize)]
433#[serde(untagged)]
434pub enum CodespacesSlashSetSelectedReposForOrgSecretError {
435    Status404(models::BasicError),
436    Status409(),
437    UnknownValue(serde_json::Value),
438}
439
440/// struct for typed errors of method [`codespaces_slash_start_for_authenticated_user`]
441#[derive(Debug, Clone, Serialize, Deserialize)]
442#[serde(untagged)]
443pub enum CodespacesSlashStartForAuthenticatedUserError {
444    Status400(models::BasicError),
445    Status401(models::BasicError),
446    Status402(models::BasicError),
447    Status403(models::BasicError),
448    Status404(models::BasicError),
449    Status409(models::BasicError),
450    Status500(models::BasicError),
451    UnknownValue(serde_json::Value),
452}
453
454/// struct for typed errors of method [`codespaces_slash_stop_for_authenticated_user`]
455#[derive(Debug, Clone, Serialize, Deserialize)]
456#[serde(untagged)]
457pub enum CodespacesSlashStopForAuthenticatedUserError {
458    Status401(models::BasicError),
459    Status403(models::BasicError),
460    Status404(models::BasicError),
461    Status500(models::BasicError),
462    UnknownValue(serde_json::Value),
463}
464
465/// struct for typed errors of method [`codespaces_slash_stop_in_organization`]
466#[derive(Debug, Clone, Serialize, Deserialize)]
467#[serde(untagged)]
468pub enum CodespacesSlashStopInOrganizationError {
469    Status401(models::BasicError),
470    Status403(models::BasicError),
471    Status404(models::BasicError),
472    Status500(models::BasicError),
473    UnknownValue(serde_json::Value),
474}
475
476/// struct for typed errors of method [`codespaces_slash_update_for_authenticated_user`]
477#[derive(Debug, Clone, Serialize, Deserialize)]
478#[serde(untagged)]
479pub enum CodespacesSlashUpdateForAuthenticatedUserError {
480    Status401(models::BasicError),
481    Status403(models::BasicError),
482    Status404(models::BasicError),
483    UnknownValue(serde_json::Value),
484}
485
486
487/// Adds a repository to the selected repositories for a user's development environment secret.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
488pub async fn codespaces_slash_add_repository_for_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str, repository_id: i32) -> Result<(), Error<CodespacesSlashAddRepositoryForSecretForAuthenticatedUserError>> {
489    let local_var_configuration = configuration;
490
491    let local_var_client = &local_var_configuration.client;
492
493    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}/repositories/{repository_id}", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name), repository_id=repository_id);
494    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
495
496    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
497        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
498    }
499
500    let local_var_req = local_var_req_builder.build()?;
501    let local_var_resp = local_var_client.execute(local_var_req).await?;
502
503    let local_var_status = local_var_resp.status();
504    let local_var_content = local_var_resp.text().await?;
505
506    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
507        Ok(())
508    } else {
509        let local_var_entity: Option<CodespacesSlashAddRepositoryForSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
510        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
511        Err(Error::ResponseError(local_var_error))
512    }
513}
514
515/// Adds a repository to an organization development environment secret when the `visibility` for repository access is set to `selected`. The visibility is set when you [Create or update an organization secret](https://docs.github.com/rest/codespaces/organization-secrets#create-or-update-an-organization-secret). OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
516pub async fn codespaces_slash_add_selected_repo_to_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str, repository_id: i32) -> Result<(), Error<CodespacesSlashAddSelectedRepoToOrgSecretError>> {
517    let local_var_configuration = configuration;
518
519    let local_var_client = &local_var_configuration.client;
520
521    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}/repositories/{repository_id}", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name), repository_id=repository_id);
522    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
523
524    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
525        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
526    }
527
528    let local_var_req = local_var_req_builder.build()?;
529    let local_var_resp = local_var_client.execute(local_var_req).await?;
530
531    let local_var_status = local_var_resp.status();
532    let local_var_content = local_var_resp.text().await?;
533
534    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
535        Ok(())
536    } else {
537        let local_var_entity: Option<CodespacesSlashAddSelectedRepoToOrgSecretError> = serde_json::from_str(&local_var_content).ok();
538        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
539        Err(Error::ResponseError(local_var_error))
540    }
541}
542
543/// Checks whether the permissions defined by a given devcontainer configuration have been accepted by the authenticated user.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
544pub async fn codespaces_slash_check_permissions_for_devcontainer(configuration: &configuration::Configuration, owner: &str, repo: &str, r#ref: &str, devcontainer_path: &str) -> Result<models::CodespacesPermissionsCheckForDevcontainer, Error<CodespacesSlashCheckPermissionsForDevcontainerError>> {
545    let local_var_configuration = configuration;
546
547    let local_var_client = &local_var_configuration.client;
548
549    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/permissions_check", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
550    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
551
552    local_var_req_builder = local_var_req_builder.query(&[("ref", &r#ref.to_string())]);
553    local_var_req_builder = local_var_req_builder.query(&[("devcontainer_path", &devcontainer_path.to_string())]);
554    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
555        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
556    }
557
558    let local_var_req = local_var_req_builder.build()?;
559    let local_var_resp = local_var_client.execute(local_var_req).await?;
560
561    let local_var_status = local_var_resp.status();
562    let local_var_content = local_var_resp.text().await?;
563
564    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
565        serde_json::from_str(&local_var_content).map_err(Error::from)
566    } else {
567        let local_var_entity: Option<CodespacesSlashCheckPermissionsForDevcontainerError> = serde_json::from_str(&local_var_content).ok();
568        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
569        Err(Error::ResponseError(local_var_error))
570    }
571}
572
573/// List the machine types a codespace can transition to use.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
574pub async fn codespaces_slash_codespace_machines_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str) -> Result<models::CodespacesRepoMachinesForAuthenticatedUser200Response, Error<CodespacesSlashCodespaceMachinesForAuthenticatedUserError>> {
575    let local_var_configuration = configuration;
576
577    let local_var_client = &local_var_configuration.client;
578
579    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}/machines", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
580    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
581
582    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
583        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
584    }
585
586    let local_var_req = local_var_req_builder.build()?;
587    let local_var_resp = local_var_client.execute(local_var_req).await?;
588
589    let local_var_status = local_var_resp.status();
590    let local_var_content = local_var_resp.text().await?;
591
592    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
593        serde_json::from_str(&local_var_content).map_err(Error::from)
594    } else {
595        let local_var_entity: Option<CodespacesSlashCodespaceMachinesForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
596        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
597        Err(Error::ResponseError(local_var_error))
598    }
599}
600
601/// Creates a new codespace, owned by the authenticated user.  This endpoint requires either a `repository_id` OR a `pull_request` but not both.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
602pub async fn codespaces_slash_create_for_authenticated_user(configuration: &configuration::Configuration, codespaces_create_for_authenticated_user_request: models::CodespacesCreateForAuthenticatedUserRequest) -> Result<models::Codespace, Error<CodespacesSlashCreateForAuthenticatedUserError>> {
603    let local_var_configuration = configuration;
604
605    let local_var_client = &local_var_configuration.client;
606
607    let local_var_uri_str = format!("{}/user/codespaces", local_var_configuration.base_path);
608    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
609
610    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
611        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
612    }
613    local_var_req_builder = local_var_req_builder.json(&codespaces_create_for_authenticated_user_request);
614
615    let local_var_req = local_var_req_builder.build()?;
616    let local_var_resp = local_var_client.execute(local_var_req).await?;
617
618    let local_var_status = local_var_resp.status();
619    let local_var_content = local_var_resp.text().await?;
620
621    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
622        serde_json::from_str(&local_var_content).map_err(Error::from)
623    } else {
624        let local_var_entity: Option<CodespacesSlashCreateForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
625        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
626        Err(Error::ResponseError(local_var_error))
627    }
628}
629
630/// Creates or updates an organization development environment secret with an encrypted value. Encrypt your secret using [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). For more information, see \"[Encrypting secrets for the REST API](https://docs.github.com/rest/guides/encrypting-secrets-for-the-rest-api).\"  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
631pub async fn codespaces_slash_create_or_update_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str, codespaces_create_or_update_org_secret_request: models::CodespacesCreateOrUpdateOrgSecretRequest) -> Result<serde_json::Value, Error<CodespacesSlashCreateOrUpdateOrgSecretError>> {
632    let local_var_configuration = configuration;
633
634    let local_var_client = &local_var_configuration.client;
635
636    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name));
637    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
638
639    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
640        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
641    }
642    local_var_req_builder = local_var_req_builder.json(&codespaces_create_or_update_org_secret_request);
643
644    let local_var_req = local_var_req_builder.build()?;
645    let local_var_resp = local_var_client.execute(local_var_req).await?;
646
647    let local_var_status = local_var_resp.status();
648    let local_var_content = local_var_resp.text().await?;
649
650    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
651        serde_json::from_str(&local_var_content).map_err(Error::from)
652    } else {
653        let local_var_entity: Option<CodespacesSlashCreateOrUpdateOrgSecretError> = serde_json::from_str(&local_var_content).ok();
654        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
655        Err(Error::ResponseError(local_var_error))
656    }
657}
658
659/// Creates or updates a repository development environment secret with an encrypted value. Encrypt your secret using [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). For more information, see \"[Encrypting secrets for the REST API](https://docs.github.com/rest/guides/encrypting-secrets-for-the-rest-api).\"  OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint.
660pub async fn codespaces_slash_create_or_update_repo_secret(configuration: &configuration::Configuration, owner: &str, repo: &str, secret_name: &str, codespaces_create_or_update_repo_secret_request: models::CodespacesCreateOrUpdateRepoSecretRequest) -> Result<serde_json::Value, Error<CodespacesSlashCreateOrUpdateRepoSecretError>> {
661    let local_var_configuration = configuration;
662
663    let local_var_client = &local_var_configuration.client;
664
665    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/secrets/{secret_name}", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo), secret_name=crate::apis::urlencode(secret_name));
666    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
667
668    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
669        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
670    }
671    local_var_req_builder = local_var_req_builder.json(&codespaces_create_or_update_repo_secret_request);
672
673    let local_var_req = local_var_req_builder.build()?;
674    let local_var_resp = local_var_client.execute(local_var_req).await?;
675
676    let local_var_status = local_var_resp.status();
677    let local_var_content = local_var_resp.text().await?;
678
679    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
680        serde_json::from_str(&local_var_content).map_err(Error::from)
681    } else {
682        let local_var_entity: Option<CodespacesSlashCreateOrUpdateRepoSecretError> = serde_json::from_str(&local_var_content).ok();
683        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
684        Err(Error::ResponseError(local_var_error))
685    }
686}
687
688/// Creates or updates a development environment secret for a user's codespace with an encrypted value. Encrypt your secret using [LibSodium](https://libsodium.gitbook.io/doc/bindings_for_other_languages). For more information, see \"[Encrypting secrets for the REST API](https://docs.github.com/rest/guides/encrypting-secrets-for-the-rest-api).\"  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
689pub async fn codespaces_slash_create_or_update_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str, codespaces_create_or_update_secret_for_authenticated_user_request: models::CodespacesCreateOrUpdateSecretForAuthenticatedUserRequest) -> Result<serde_json::Value, Error<CodespacesSlashCreateOrUpdateSecretForAuthenticatedUserError>> {
690    let local_var_configuration = configuration;
691
692    let local_var_client = &local_var_configuration.client;
693
694    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name));
695    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
696
697    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
698        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
699    }
700    local_var_req_builder = local_var_req_builder.json(&codespaces_create_or_update_secret_for_authenticated_user_request);
701
702    let local_var_req = local_var_req_builder.build()?;
703    let local_var_resp = local_var_client.execute(local_var_req).await?;
704
705    let local_var_status = local_var_resp.status();
706    let local_var_content = local_var_resp.text().await?;
707
708    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
709        serde_json::from_str(&local_var_content).map_err(Error::from)
710    } else {
711        let local_var_entity: Option<CodespacesSlashCreateOrUpdateSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
712        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
713        Err(Error::ResponseError(local_var_error))
714    }
715}
716
717/// Creates a codespace owned by the authenticated user for the specified pull request.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
718pub async fn codespaces_slash_create_with_pr_for_authenticated_user(configuration: &configuration::Configuration, owner: &str, repo: &str, pull_number: i32, codespaces_create_with_pr_for_authenticated_user_request: Option<models::CodespacesCreateWithPrForAuthenticatedUserRequest>) -> Result<models::Codespace, Error<CodespacesSlashCreateWithPrForAuthenticatedUserError>> {
719    let local_var_configuration = configuration;
720
721    let local_var_client = &local_var_configuration.client;
722
723    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/pulls/{pull_number}/codespaces", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo), pull_number=pull_number);
724    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
725
726    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
727        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
728    }
729    local_var_req_builder = local_var_req_builder.json(&codespaces_create_with_pr_for_authenticated_user_request);
730
731    let local_var_req = local_var_req_builder.build()?;
732    let local_var_resp = local_var_client.execute(local_var_req).await?;
733
734    let local_var_status = local_var_resp.status();
735    let local_var_content = local_var_resp.text().await?;
736
737    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
738        serde_json::from_str(&local_var_content).map_err(Error::from)
739    } else {
740        let local_var_entity: Option<CodespacesSlashCreateWithPrForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
741        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
742        Err(Error::ResponseError(local_var_error))
743    }
744}
745
746/// Creates a codespace owned by the authenticated user in the specified repository.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
747pub async fn codespaces_slash_create_with_repo_for_authenticated_user(configuration: &configuration::Configuration, owner: &str, repo: &str, codespaces_create_with_repo_for_authenticated_user_request: Option<models::CodespacesCreateWithRepoForAuthenticatedUserRequest>) -> Result<models::Codespace, Error<CodespacesSlashCreateWithRepoForAuthenticatedUserError>> {
748    let local_var_configuration = configuration;
749
750    let local_var_client = &local_var_configuration.client;
751
752    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
753    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
754
755    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
756        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
757    }
758    local_var_req_builder = local_var_req_builder.json(&codespaces_create_with_repo_for_authenticated_user_request);
759
760    let local_var_req = local_var_req_builder.build()?;
761    let local_var_resp = local_var_client.execute(local_var_req).await?;
762
763    let local_var_status = local_var_resp.status();
764    let local_var_content = local_var_resp.text().await?;
765
766    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
767        serde_json::from_str(&local_var_content).map_err(Error::from)
768    } else {
769        let local_var_entity: Option<CodespacesSlashCreateWithRepoForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
770        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
771        Err(Error::ResponseError(local_var_error))
772    }
773}
774
775/// Codespaces for the specified users will no longer be billed to the organization.  To use this endpoint, the access settings for the organization must be set to `selected_members`. For information on how to change this setting, see \"[Manage access control for organization codespaces](https://docs.github.com/rest/codespaces/organizations#manage-access-control-for-organization-codespaces).\"  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
776pub async fn codespaces_slash_delete_codespaces_access_users(configuration: &configuration::Configuration, org: &str, codespaces_delete_codespaces_access_users_request: models::CodespacesDeleteCodespacesAccessUsersRequest) -> Result<(), Error<CodespacesSlashDeleteCodespacesAccessUsersError>> {
777    let local_var_configuration = configuration;
778
779    let local_var_client = &local_var_configuration.client;
780
781    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/access/selected_users", local_var_configuration.base_path, org=crate::apis::urlencode(org));
782    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
783
784    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
785        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
786    }
787    local_var_req_builder = local_var_req_builder.json(&codespaces_delete_codespaces_access_users_request);
788
789    let local_var_req = local_var_req_builder.build()?;
790    let local_var_resp = local_var_client.execute(local_var_req).await?;
791
792    let local_var_status = local_var_resp.status();
793    let local_var_content = local_var_resp.text().await?;
794
795    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
796        Ok(())
797    } else {
798        let local_var_entity: Option<CodespacesSlashDeleteCodespacesAccessUsersError> = serde_json::from_str(&local_var_content).ok();
799        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
800        Err(Error::ResponseError(local_var_error))
801    }
802}
803
804/// Deletes a user's codespace.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
805pub async fn codespaces_slash_delete_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str) -> Result<serde_json::Value, Error<CodespacesSlashDeleteForAuthenticatedUserError>> {
806    let local_var_configuration = configuration;
807
808    let local_var_client = &local_var_configuration.client;
809
810    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
811    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
812
813    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
814        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
815    }
816
817    let local_var_req = local_var_req_builder.build()?;
818    let local_var_resp = local_var_client.execute(local_var_req).await?;
819
820    let local_var_status = local_var_resp.status();
821    let local_var_content = local_var_resp.text().await?;
822
823    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
824        serde_json::from_str(&local_var_content).map_err(Error::from)
825    } else {
826        let local_var_entity: Option<CodespacesSlashDeleteForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
827        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
828        Err(Error::ResponseError(local_var_error))
829    }
830}
831
832/// Deletes a user's codespace.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
833pub async fn codespaces_slash_delete_from_organization(configuration: &configuration::Configuration, org: &str, username: &str, codespace_name: &str) -> Result<serde_json::Value, Error<CodespacesSlashDeleteFromOrganizationError>> {
834    let local_var_configuration = configuration;
835
836    let local_var_client = &local_var_configuration.client;
837
838    let local_var_uri_str = format!("{}/orgs/{org}/members/{username}/codespaces/{codespace_name}", local_var_configuration.base_path, org=crate::apis::urlencode(org), username=crate::apis::urlencode(username), codespace_name=crate::apis::urlencode(codespace_name));
839    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
840
841    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
842        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
843    }
844
845    let local_var_req = local_var_req_builder.build()?;
846    let local_var_resp = local_var_client.execute(local_var_req).await?;
847
848    let local_var_status = local_var_resp.status();
849    let local_var_content = local_var_resp.text().await?;
850
851    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
852        serde_json::from_str(&local_var_content).map_err(Error::from)
853    } else {
854        let local_var_entity: Option<CodespacesSlashDeleteFromOrganizationError> = serde_json::from_str(&local_var_content).ok();
855        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
856        Err(Error::ResponseError(local_var_error))
857    }
858}
859
860/// Deletes an organization development environment secret using the secret name.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
861pub async fn codespaces_slash_delete_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str) -> Result<(), Error<CodespacesSlashDeleteOrgSecretError>> {
862    let local_var_configuration = configuration;
863
864    let local_var_client = &local_var_configuration.client;
865
866    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name));
867    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
868
869    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
870        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
871    }
872
873    let local_var_req = local_var_req_builder.build()?;
874    let local_var_resp = local_var_client.execute(local_var_req).await?;
875
876    let local_var_status = local_var_resp.status();
877    let local_var_content = local_var_resp.text().await?;
878
879    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
880        Ok(())
881    } else {
882        let local_var_entity: Option<CodespacesSlashDeleteOrgSecretError> = serde_json::from_str(&local_var_content).ok();
883        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
884        Err(Error::ResponseError(local_var_error))
885    }
886}
887
888/// Deletes a development environment secret in a repository using the secret name.  OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint.
889pub async fn codespaces_slash_delete_repo_secret(configuration: &configuration::Configuration, owner: &str, repo: &str, secret_name: &str) -> Result<(), Error<CodespacesSlashDeleteRepoSecretError>> {
890    let local_var_configuration = configuration;
891
892    let local_var_client = &local_var_configuration.client;
893
894    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/secrets/{secret_name}", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo), secret_name=crate::apis::urlencode(secret_name));
895    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
896
897    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
898        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
899    }
900
901    let local_var_req = local_var_req_builder.build()?;
902    let local_var_resp = local_var_client.execute(local_var_req).await?;
903
904    let local_var_status = local_var_resp.status();
905    let local_var_content = local_var_resp.text().await?;
906
907    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
908        Ok(())
909    } else {
910        let local_var_entity: Option<CodespacesSlashDeleteRepoSecretError> = serde_json::from_str(&local_var_content).ok();
911        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
912        Err(Error::ResponseError(local_var_error))
913    }
914}
915
916/// Deletes a development environment secret from a user's codespaces using the secret name. Deleting the secret will remove access from all codespaces that were allowed to access the secret.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
917pub async fn codespaces_slash_delete_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str) -> Result<(), Error<CodespacesSlashDeleteSecretForAuthenticatedUserError>> {
918    let local_var_configuration = configuration;
919
920    let local_var_client = &local_var_configuration.client;
921
922    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name));
923    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
924
925    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
926        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
927    }
928
929    let local_var_req = local_var_req_builder.build()?;
930    let local_var_resp = local_var_client.execute(local_var_req).await?;
931
932    let local_var_status = local_var_resp.status();
933    let local_var_content = local_var_resp.text().await?;
934
935    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
936        Ok(())
937    } else {
938        let local_var_entity: Option<CodespacesSlashDeleteSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
939        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
940        Err(Error::ResponseError(local_var_error))
941    }
942}
943
944/// Triggers an export of the specified codespace and returns a URL and ID where the status of the export can be monitored.  If changes cannot be pushed to the codespace's repository, they will be pushed to a new or previously-existing fork instead.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
945pub async fn codespaces_slash_export_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str) -> Result<models::CodespaceExportDetails, Error<CodespacesSlashExportForAuthenticatedUserError>> {
946    let local_var_configuration = configuration;
947
948    let local_var_client = &local_var_configuration.client;
949
950    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}/exports", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
951    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
952
953    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
954        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
955    }
956
957    let local_var_req = local_var_req_builder.build()?;
958    let local_var_resp = local_var_client.execute(local_var_req).await?;
959
960    let local_var_status = local_var_resp.status();
961    let local_var_content = local_var_resp.text().await?;
962
963    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
964        serde_json::from_str(&local_var_content).map_err(Error::from)
965    } else {
966        let local_var_entity: Option<CodespacesSlashExportForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
967        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
968        Err(Error::ResponseError(local_var_error))
969    }
970}
971
972/// Lists the codespaces that a member of an organization has for repositories in that organization.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
973pub async fn codespaces_slash_get_codespaces_for_user_in_org(configuration: &configuration::Configuration, org: &str, username: &str, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListInOrganization200Response, Error<CodespacesSlashGetCodespacesForUserInOrgError>> {
974    let local_var_configuration = configuration;
975
976    let local_var_client = &local_var_configuration.client;
977
978    let local_var_uri_str = format!("{}/orgs/{org}/members/{username}/codespaces", local_var_configuration.base_path, org=crate::apis::urlencode(org), username=crate::apis::urlencode(username));
979    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
980
981    if let Some(ref local_var_str) = per_page {
982        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
983    }
984    if let Some(ref local_var_str) = page {
985        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
986    }
987    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
988        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
989    }
990
991    let local_var_req = local_var_req_builder.build()?;
992    let local_var_resp = local_var_client.execute(local_var_req).await?;
993
994    let local_var_status = local_var_resp.status();
995    let local_var_content = local_var_resp.text().await?;
996
997    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
998        serde_json::from_str(&local_var_content).map_err(Error::from)
999    } else {
1000        let local_var_entity: Option<CodespacesSlashGetCodespacesForUserInOrgError> = serde_json::from_str(&local_var_content).ok();
1001        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1002        Err(Error::ResponseError(local_var_error))
1003    }
1004}
1005
1006/// Gets information about an export of a codespace.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1007pub async fn codespaces_slash_get_export_details_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str, export_id: &str) -> Result<models::CodespaceExportDetails, Error<CodespacesSlashGetExportDetailsForAuthenticatedUserError>> {
1008    let local_var_configuration = configuration;
1009
1010    let local_var_client = &local_var_configuration.client;
1011
1012    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}/exports/{export_id}", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name), export_id=crate::apis::urlencode(export_id));
1013    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1014
1015    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1016        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1017    }
1018
1019    let local_var_req = local_var_req_builder.build()?;
1020    let local_var_resp = local_var_client.execute(local_var_req).await?;
1021
1022    let local_var_status = local_var_resp.status();
1023    let local_var_content = local_var_resp.text().await?;
1024
1025    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1026        serde_json::from_str(&local_var_content).map_err(Error::from)
1027    } else {
1028        let local_var_entity: Option<CodespacesSlashGetExportDetailsForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1029        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1030        Err(Error::ResponseError(local_var_error))
1031    }
1032}
1033
1034/// Gets information about a user's codespace.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1035pub async fn codespaces_slash_get_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str) -> Result<models::Codespace, Error<CodespacesSlashGetForAuthenticatedUserError>> {
1036    let local_var_configuration = configuration;
1037
1038    let local_var_client = &local_var_configuration.client;
1039
1040    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
1041    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1042
1043    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1044        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1045    }
1046
1047    let local_var_req = local_var_req_builder.build()?;
1048    let local_var_resp = local_var_client.execute(local_var_req).await?;
1049
1050    let local_var_status = local_var_resp.status();
1051    let local_var_content = local_var_resp.text().await?;
1052
1053    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1054        serde_json::from_str(&local_var_content).map_err(Error::from)
1055    } else {
1056        let local_var_entity: Option<CodespacesSlashGetForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1057        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1058        Err(Error::ResponseError(local_var_error))
1059    }
1060}
1061
1062/// Gets a public key for an organization, which is required in order to encrypt secrets. You need to encrypt the value of a secret before you can create or update secrets. OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1063pub async fn codespaces_slash_get_org_public_key(configuration: &configuration::Configuration, org: &str) -> Result<models::CodespacesPublicKey, Error<CodespacesSlashGetOrgPublicKeyError>> {
1064    let local_var_configuration = configuration;
1065
1066    let local_var_client = &local_var_configuration.client;
1067
1068    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/public-key", local_var_configuration.base_path, org=crate::apis::urlencode(org));
1069    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1070
1071    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1072        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1073    }
1074
1075    let local_var_req = local_var_req_builder.build()?;
1076    let local_var_resp = local_var_client.execute(local_var_req).await?;
1077
1078    let local_var_status = local_var_resp.status();
1079    let local_var_content = local_var_resp.text().await?;
1080
1081    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1082        serde_json::from_str(&local_var_content).map_err(Error::from)
1083    } else {
1084        let local_var_entity: Option<CodespacesSlashGetOrgPublicKeyError> = serde_json::from_str(&local_var_content).ok();
1085        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1086        Err(Error::ResponseError(local_var_error))
1087    }
1088}
1089
1090/// Gets an organization development environment secret without revealing its encrypted value.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1091pub async fn codespaces_slash_get_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str) -> Result<models::CodespacesOrgSecret, Error<CodespacesSlashGetOrgSecretError>> {
1092    let local_var_configuration = configuration;
1093
1094    let local_var_client = &local_var_configuration.client;
1095
1096    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name));
1097    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1098
1099    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1100        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1101    }
1102
1103    let local_var_req = local_var_req_builder.build()?;
1104    let local_var_resp = local_var_client.execute(local_var_req).await?;
1105
1106    let local_var_status = local_var_resp.status();
1107    let local_var_content = local_var_resp.text().await?;
1108
1109    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1110        serde_json::from_str(&local_var_content).map_err(Error::from)
1111    } else {
1112        let local_var_entity: Option<CodespacesSlashGetOrgSecretError> = serde_json::from_str(&local_var_content).ok();
1113        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1114        Err(Error::ResponseError(local_var_error))
1115    }
1116}
1117
1118/// Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
1119pub async fn codespaces_slash_get_public_key_for_authenticated_user(configuration: &configuration::Configuration, ) -> Result<models::CodespacesUserPublicKey, Error<CodespacesSlashGetPublicKeyForAuthenticatedUserError>> {
1120    let local_var_configuration = configuration;
1121
1122    let local_var_client = &local_var_configuration.client;
1123
1124    let local_var_uri_str = format!("{}/user/codespaces/secrets/public-key", local_var_configuration.base_path);
1125    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1126
1127    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1128        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1129    }
1130
1131    let local_var_req = local_var_req_builder.build()?;
1132    let local_var_resp = local_var_client.execute(local_var_req).await?;
1133
1134    let local_var_status = local_var_resp.status();
1135    let local_var_content = local_var_resp.text().await?;
1136
1137    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1138        serde_json::from_str(&local_var_content).map_err(Error::from)
1139    } else {
1140        let local_var_entity: Option<CodespacesSlashGetPublicKeyForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1141        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1142        Err(Error::ResponseError(local_var_error))
1143    }
1144}
1145
1146/// Gets your public key, which you need to encrypt secrets. You need to encrypt a secret before you can create or update secrets.  Anyone with read access to the repository can use this endpoint.  If the repository is private, OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint.
1147pub async fn codespaces_slash_get_repo_public_key(configuration: &configuration::Configuration, owner: &str, repo: &str) -> Result<models::CodespacesPublicKey, Error<CodespacesSlashGetRepoPublicKeyError>> {
1148    let local_var_configuration = configuration;
1149
1150    let local_var_client = &local_var_configuration.client;
1151
1152    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/secrets/public-key", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
1153    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1154
1155    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1156        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1157    }
1158
1159    let local_var_req = local_var_req_builder.build()?;
1160    let local_var_resp = local_var_client.execute(local_var_req).await?;
1161
1162    let local_var_status = local_var_resp.status();
1163    let local_var_content = local_var_resp.text().await?;
1164
1165    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1166        serde_json::from_str(&local_var_content).map_err(Error::from)
1167    } else {
1168        let local_var_entity: Option<CodespacesSlashGetRepoPublicKeyError> = serde_json::from_str(&local_var_content).ok();
1169        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1170        Err(Error::ResponseError(local_var_error))
1171    }
1172}
1173
1174/// Gets a single repository development environment secret without revealing its encrypted value.  OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint.
1175pub async fn codespaces_slash_get_repo_secret(configuration: &configuration::Configuration, owner: &str, repo: &str, secret_name: &str) -> Result<models::RepoCodespacesSecret, Error<CodespacesSlashGetRepoSecretError>> {
1176    let local_var_configuration = configuration;
1177
1178    let local_var_client = &local_var_configuration.client;
1179
1180    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/secrets/{secret_name}", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo), secret_name=crate::apis::urlencode(secret_name));
1181    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1182
1183    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1184        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1185    }
1186
1187    let local_var_req = local_var_req_builder.build()?;
1188    let local_var_resp = local_var_client.execute(local_var_req).await?;
1189
1190    let local_var_status = local_var_resp.status();
1191    let local_var_content = local_var_resp.text().await?;
1192
1193    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1194        serde_json::from_str(&local_var_content).map_err(Error::from)
1195    } else {
1196        let local_var_entity: Option<CodespacesSlashGetRepoSecretError> = serde_json::from_str(&local_var_content).ok();
1197        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1198        Err(Error::ResponseError(local_var_error))
1199    }
1200}
1201
1202/// Gets a development environment secret available to a user's codespaces without revealing its encrypted value.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
1203pub async fn codespaces_slash_get_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str) -> Result<models::CodespacesSecret, Error<CodespacesSlashGetSecretForAuthenticatedUserError>> {
1204    let local_var_configuration = configuration;
1205
1206    let local_var_client = &local_var_configuration.client;
1207
1208    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name));
1209    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1210
1211    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1212        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1213    }
1214
1215    let local_var_req = local_var_req_builder.build()?;
1216    let local_var_resp = local_var_client.execute(local_var_req).await?;
1217
1218    let local_var_status = local_var_resp.status();
1219    let local_var_content = local_var_resp.text().await?;
1220
1221    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1222        serde_json::from_str(&local_var_content).map_err(Error::from)
1223    } else {
1224        let local_var_entity: Option<CodespacesSlashGetSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1225        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1226        Err(Error::ResponseError(local_var_error))
1227    }
1228}
1229
1230/// Lists the devcontainer.json files associated with a specified repository and the authenticated user. These files specify launchpoint configurations for codespaces created within the repository.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1231pub async fn codespaces_slash_list_devcontainers_in_repository_for_authenticated_user(configuration: &configuration::Configuration, owner: &str, repo: &str, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListDevcontainersInRepositoryForAuthenticatedUser200Response, Error<CodespacesSlashListDevcontainersInRepositoryForAuthenticatedUserError>> {
1232    let local_var_configuration = configuration;
1233
1234    let local_var_client = &local_var_configuration.client;
1235
1236    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/devcontainers", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
1237    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1238
1239    if let Some(ref local_var_str) = per_page {
1240        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1241    }
1242    if let Some(ref local_var_str) = page {
1243        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1244    }
1245    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1246        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1247    }
1248
1249    let local_var_req = local_var_req_builder.build()?;
1250    let local_var_resp = local_var_client.execute(local_var_req).await?;
1251
1252    let local_var_status = local_var_resp.status();
1253    let local_var_content = local_var_resp.text().await?;
1254
1255    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1256        serde_json::from_str(&local_var_content).map_err(Error::from)
1257    } else {
1258        let local_var_entity: Option<CodespacesSlashListDevcontainersInRepositoryForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1259        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1260        Err(Error::ResponseError(local_var_error))
1261    }
1262}
1263
1264/// Lists the authenticated user's codespaces.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1265pub async fn codespaces_slash_list_for_authenticated_user(configuration: &configuration::Configuration, per_page: Option<i32>, page: Option<i32>, repository_id: Option<i32>) -> Result<models::CodespacesListInOrganization200Response, Error<CodespacesSlashListForAuthenticatedUserError>> {
1266    let local_var_configuration = configuration;
1267
1268    let local_var_client = &local_var_configuration.client;
1269
1270    let local_var_uri_str = format!("{}/user/codespaces", local_var_configuration.base_path);
1271    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1272
1273    if let Some(ref local_var_str) = per_page {
1274        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1275    }
1276    if let Some(ref local_var_str) = page {
1277        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1278    }
1279    if let Some(ref local_var_str) = repository_id {
1280        local_var_req_builder = local_var_req_builder.query(&[("repository_id", &local_var_str.to_string())]);
1281    }
1282    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1283        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1284    }
1285
1286    let local_var_req = local_var_req_builder.build()?;
1287    let local_var_resp = local_var_client.execute(local_var_req).await?;
1288
1289    let local_var_status = local_var_resp.status();
1290    let local_var_content = local_var_resp.text().await?;
1291
1292    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1293        serde_json::from_str(&local_var_content).map_err(Error::from)
1294    } else {
1295        let local_var_entity: Option<CodespacesSlashListForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1296        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1297        Err(Error::ResponseError(local_var_error))
1298    }
1299}
1300
1301/// Lists the codespaces associated to a specified organization.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1302pub async fn codespaces_slash_list_in_organization(configuration: &configuration::Configuration, org: &str, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListInOrganization200Response, Error<CodespacesSlashListInOrganizationError>> {
1303    let local_var_configuration = configuration;
1304
1305    let local_var_client = &local_var_configuration.client;
1306
1307    let local_var_uri_str = format!("{}/orgs/{org}/codespaces", local_var_configuration.base_path, org=crate::apis::urlencode(org));
1308    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1309
1310    if let Some(ref local_var_str) = per_page {
1311        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1312    }
1313    if let Some(ref local_var_str) = page {
1314        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1315    }
1316    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1317        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1318    }
1319
1320    let local_var_req = local_var_req_builder.build()?;
1321    let local_var_resp = local_var_client.execute(local_var_req).await?;
1322
1323    let local_var_status = local_var_resp.status();
1324    let local_var_content = local_var_resp.text().await?;
1325
1326    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1327        serde_json::from_str(&local_var_content).map_err(Error::from)
1328    } else {
1329        let local_var_entity: Option<CodespacesSlashListInOrganizationError> = serde_json::from_str(&local_var_content).ok();
1330        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1331        Err(Error::ResponseError(local_var_error))
1332    }
1333}
1334
1335/// Lists the codespaces associated to a specified repository and the authenticated user.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1336pub async fn codespaces_slash_list_in_repository_for_authenticated_user(configuration: &configuration::Configuration, owner: &str, repo: &str, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListInOrganization200Response, Error<CodespacesSlashListInRepositoryForAuthenticatedUserError>> {
1337    let local_var_configuration = configuration;
1338
1339    let local_var_client = &local_var_configuration.client;
1340
1341    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
1342    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1343
1344    if let Some(ref local_var_str) = per_page {
1345        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1346    }
1347    if let Some(ref local_var_str) = page {
1348        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1349    }
1350    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1351        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1352    }
1353
1354    let local_var_req = local_var_req_builder.build()?;
1355    let local_var_resp = local_var_client.execute(local_var_req).await?;
1356
1357    let local_var_status = local_var_resp.status();
1358    let local_var_content = local_var_resp.text().await?;
1359
1360    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1361        serde_json::from_str(&local_var_content).map_err(Error::from)
1362    } else {
1363        let local_var_entity: Option<CodespacesSlashListInRepositoryForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1364        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1365        Err(Error::ResponseError(local_var_error))
1366    }
1367}
1368
1369/// Lists all Codespaces development environment secrets available at the organization-level without revealing their encrypted values.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1370pub async fn codespaces_slash_list_org_secrets(configuration: &configuration::Configuration, org: &str, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListOrgSecrets200Response, Error<CodespacesSlashListOrgSecretsError>> {
1371    let local_var_configuration = configuration;
1372
1373    let local_var_client = &local_var_configuration.client;
1374
1375    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets", local_var_configuration.base_path, org=crate::apis::urlencode(org));
1376    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1377
1378    if let Some(ref local_var_str) = per_page {
1379        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1380    }
1381    if let Some(ref local_var_str) = page {
1382        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1383    }
1384    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1385        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1386    }
1387
1388    let local_var_req = local_var_req_builder.build()?;
1389    let local_var_resp = local_var_client.execute(local_var_req).await?;
1390
1391    let local_var_status = local_var_resp.status();
1392    let local_var_content = local_var_resp.text().await?;
1393
1394    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1395        serde_json::from_str(&local_var_content).map_err(Error::from)
1396    } else {
1397        let local_var_entity: Option<CodespacesSlashListOrgSecretsError> = serde_json::from_str(&local_var_content).ok();
1398        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1399        Err(Error::ResponseError(local_var_error))
1400    }
1401}
1402
1403/// Lists all development environment secrets available in a repository without revealing their encrypted values.  OAuth app tokens and personal access tokens (classic) need the `repo` scope to use this endpoint.
1404pub async fn codespaces_slash_list_repo_secrets(configuration: &configuration::Configuration, owner: &str, repo: &str, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListRepoSecrets200Response, Error<CodespacesSlashListRepoSecretsError>> {
1405    let local_var_configuration = configuration;
1406
1407    let local_var_client = &local_var_configuration.client;
1408
1409    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/secrets", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
1410    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1411
1412    if let Some(ref local_var_str) = per_page {
1413        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1414    }
1415    if let Some(ref local_var_str) = page {
1416        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1417    }
1418    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1419        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1420    }
1421
1422    let local_var_req = local_var_req_builder.build()?;
1423    let local_var_resp = local_var_client.execute(local_var_req).await?;
1424
1425    let local_var_status = local_var_resp.status();
1426    let local_var_content = local_var_resp.text().await?;
1427
1428    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1429        serde_json::from_str(&local_var_content).map_err(Error::from)
1430    } else {
1431        let local_var_entity: Option<CodespacesSlashListRepoSecretsError> = serde_json::from_str(&local_var_content).ok();
1432        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1433        Err(Error::ResponseError(local_var_error))
1434    }
1435}
1436
1437/// List the repositories that have been granted the ability to use a user's development environment secret.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
1438pub async fn codespaces_slash_list_repositories_for_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str) -> Result<models::ActionsListSelectedReposForOrgSecret200Response, Error<CodespacesSlashListRepositoriesForSecretForAuthenticatedUserError>> {
1439    let local_var_configuration = configuration;
1440
1441    let local_var_client = &local_var_configuration.client;
1442
1443    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}/repositories", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name));
1444    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1445
1446    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1447        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1448    }
1449
1450    let local_var_req = local_var_req_builder.build()?;
1451    let local_var_resp = local_var_client.execute(local_var_req).await?;
1452
1453    let local_var_status = local_var_resp.status();
1454    let local_var_content = local_var_resp.text().await?;
1455
1456    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1457        serde_json::from_str(&local_var_content).map_err(Error::from)
1458    } else {
1459        let local_var_entity: Option<CodespacesSlashListRepositoriesForSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1460        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1461        Err(Error::ResponseError(local_var_error))
1462    }
1463}
1464
1465/// Lists all development environment secrets available for a user's codespaces without revealing their encrypted values.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
1466pub async fn codespaces_slash_list_secrets_for_authenticated_user(configuration: &configuration::Configuration, per_page: Option<i32>, page: Option<i32>) -> Result<models::CodespacesListSecretsForAuthenticatedUser200Response, Error<CodespacesSlashListSecretsForAuthenticatedUserError>> {
1467    let local_var_configuration = configuration;
1468
1469    let local_var_client = &local_var_configuration.client;
1470
1471    let local_var_uri_str = format!("{}/user/codespaces/secrets", local_var_configuration.base_path);
1472    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1473
1474    if let Some(ref local_var_str) = per_page {
1475        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1476    }
1477    if let Some(ref local_var_str) = page {
1478        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1479    }
1480    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1481        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1482    }
1483
1484    let local_var_req = local_var_req_builder.build()?;
1485    let local_var_resp = local_var_client.execute(local_var_req).await?;
1486
1487    let local_var_status = local_var_resp.status();
1488    let local_var_content = local_var_resp.text().await?;
1489
1490    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1491        serde_json::from_str(&local_var_content).map_err(Error::from)
1492    } else {
1493        let local_var_entity: Option<CodespacesSlashListSecretsForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1494        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1495        Err(Error::ResponseError(local_var_error))
1496    }
1497}
1498
1499/// Lists all repositories that have been selected when the `visibility` for repository access to a secret is set to `selected`.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1500pub async fn codespaces_slash_list_selected_repos_for_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str, page: Option<i32>, per_page: Option<i32>) -> Result<models::ActionsListSelectedReposForOrgSecret200Response, Error<CodespacesSlashListSelectedReposForOrgSecretError>> {
1501    let local_var_configuration = configuration;
1502
1503    let local_var_client = &local_var_configuration.client;
1504
1505    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}/repositories", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name));
1506    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1507
1508    if let Some(ref local_var_str) = page {
1509        local_var_req_builder = local_var_req_builder.query(&[("page", &local_var_str.to_string())]);
1510    }
1511    if let Some(ref local_var_str) = per_page {
1512        local_var_req_builder = local_var_req_builder.query(&[("per_page", &local_var_str.to_string())]);
1513    }
1514    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1515        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1516    }
1517
1518    let local_var_req = local_var_req_builder.build()?;
1519    let local_var_resp = local_var_client.execute(local_var_req).await?;
1520
1521    let local_var_status = local_var_resp.status();
1522    let local_var_content = local_var_resp.text().await?;
1523
1524    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1525        serde_json::from_str(&local_var_content).map_err(Error::from)
1526    } else {
1527        let local_var_entity: Option<CodespacesSlashListSelectedReposForOrgSecretError> = serde_json::from_str(&local_var_content).ok();
1528        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1529        Err(Error::ResponseError(local_var_error))
1530    }
1531}
1532
1533/// Gets the default attributes for codespaces created by the user with the repository.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1534pub async fn codespaces_slash_pre_flight_with_repo_for_authenticated_user(configuration: &configuration::Configuration, owner: &str, repo: &str, r#ref: Option<&str>, client_ip: Option<&str>) -> Result<models::CodespacesPreFlightWithRepoForAuthenticatedUser200Response, Error<CodespacesSlashPreFlightWithRepoForAuthenticatedUserError>> {
1535    let local_var_configuration = configuration;
1536
1537    let local_var_client = &local_var_configuration.client;
1538
1539    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/new", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
1540    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1541
1542    if let Some(ref local_var_str) = r#ref {
1543        local_var_req_builder = local_var_req_builder.query(&[("ref", &local_var_str.to_string())]);
1544    }
1545    if let Some(ref local_var_str) = client_ip {
1546        local_var_req_builder = local_var_req_builder.query(&[("client_ip", &local_var_str.to_string())]);
1547    }
1548    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1549        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1550    }
1551
1552    let local_var_req = local_var_req_builder.build()?;
1553    let local_var_resp = local_var_client.execute(local_var_req).await?;
1554
1555    let local_var_status = local_var_resp.status();
1556    let local_var_content = local_var_resp.text().await?;
1557
1558    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1559        serde_json::from_str(&local_var_content).map_err(Error::from)
1560    } else {
1561        let local_var_entity: Option<CodespacesSlashPreFlightWithRepoForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1562        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1563        Err(Error::ResponseError(local_var_error))
1564    }
1565}
1566
1567/// Publishes an unpublished codespace, creating a new repository and assigning it to the codespace.  The codespace's token is granted write permissions to the repository, allowing the user to push their changes.  This will fail for a codespace that is already published, meaning it has an associated repository.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1568pub async fn codespaces_slash_publish_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str, codespaces_publish_for_authenticated_user_request: models::CodespacesPublishForAuthenticatedUserRequest) -> Result<models::CodespaceWithFullRepository, Error<CodespacesSlashPublishForAuthenticatedUserError>> {
1569    let local_var_configuration = configuration;
1570
1571    let local_var_client = &local_var_configuration.client;
1572
1573    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}/publish", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
1574    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
1575
1576    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1577        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1578    }
1579    local_var_req_builder = local_var_req_builder.json(&codespaces_publish_for_authenticated_user_request);
1580
1581    let local_var_req = local_var_req_builder.build()?;
1582    let local_var_resp = local_var_client.execute(local_var_req).await?;
1583
1584    let local_var_status = local_var_resp.status();
1585    let local_var_content = local_var_resp.text().await?;
1586
1587    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1588        serde_json::from_str(&local_var_content).map_err(Error::from)
1589    } else {
1590        let local_var_entity: Option<CodespacesSlashPublishForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1591        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1592        Err(Error::ResponseError(local_var_error))
1593    }
1594}
1595
1596/// Removes a repository from the selected repositories for a user's development environment secret.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
1597pub async fn codespaces_slash_remove_repository_for_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str, repository_id: i32) -> Result<(), Error<CodespacesSlashRemoveRepositoryForSecretForAuthenticatedUserError>> {
1598    let local_var_configuration = configuration;
1599
1600    let local_var_client = &local_var_configuration.client;
1601
1602    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}/repositories/{repository_id}", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name), repository_id=repository_id);
1603    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
1604
1605    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1606        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1607    }
1608
1609    let local_var_req = local_var_req_builder.build()?;
1610    let local_var_resp = local_var_client.execute(local_var_req).await?;
1611
1612    let local_var_status = local_var_resp.status();
1613    let local_var_content = local_var_resp.text().await?;
1614
1615    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1616        Ok(())
1617    } else {
1618        let local_var_entity: Option<CodespacesSlashRemoveRepositoryForSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1619        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1620        Err(Error::ResponseError(local_var_error))
1621    }
1622}
1623
1624/// Removes a repository from an organization development environment secret when the `visibility` for repository access is set to `selected`. The visibility is set when you [Create or update an organization secret](https://docs.github.com/rest/codespaces/organization-secrets#create-or-update-an-organization-secret).  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1625pub async fn codespaces_slash_remove_selected_repo_from_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str, repository_id: i32) -> Result<(), Error<CodespacesSlashRemoveSelectedRepoFromOrgSecretError>> {
1626    let local_var_configuration = configuration;
1627
1628    let local_var_client = &local_var_configuration.client;
1629
1630    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}/repositories/{repository_id}", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name), repository_id=repository_id);
1631    let mut local_var_req_builder = local_var_client.request(reqwest::Method::DELETE, local_var_uri_str.as_str());
1632
1633    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1634        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1635    }
1636
1637    let local_var_req = local_var_req_builder.build()?;
1638    let local_var_resp = local_var_client.execute(local_var_req).await?;
1639
1640    let local_var_status = local_var_resp.status();
1641    let local_var_content = local_var_resp.text().await?;
1642
1643    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1644        Ok(())
1645    } else {
1646        let local_var_entity: Option<CodespacesSlashRemoveSelectedRepoFromOrgSecretError> = serde_json::from_str(&local_var_content).ok();
1647        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1648        Err(Error::ResponseError(local_var_error))
1649    }
1650}
1651
1652/// List the machine types available for a given repository based on its configuration.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1653pub async fn codespaces_slash_repo_machines_for_authenticated_user(configuration: &configuration::Configuration, owner: &str, repo: &str, location: Option<&str>, client_ip: Option<&str>, r#ref: Option<&str>) -> Result<models::CodespacesRepoMachinesForAuthenticatedUser200Response, Error<CodespacesSlashRepoMachinesForAuthenticatedUserError>> {
1654    let local_var_configuration = configuration;
1655
1656    let local_var_client = &local_var_configuration.client;
1657
1658    let local_var_uri_str = format!("{}/repos/{owner}/{repo}/codespaces/machines", local_var_configuration.base_path, owner=crate::apis::urlencode(owner), repo=crate::apis::urlencode(repo));
1659    let mut local_var_req_builder = local_var_client.request(reqwest::Method::GET, local_var_uri_str.as_str());
1660
1661    if let Some(ref local_var_str) = location {
1662        local_var_req_builder = local_var_req_builder.query(&[("location", &local_var_str.to_string())]);
1663    }
1664    if let Some(ref local_var_str) = client_ip {
1665        local_var_req_builder = local_var_req_builder.query(&[("client_ip", &local_var_str.to_string())]);
1666    }
1667    if let Some(ref local_var_str) = r#ref {
1668        local_var_req_builder = local_var_req_builder.query(&[("ref", &local_var_str.to_string())]);
1669    }
1670    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1671        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1672    }
1673
1674    let local_var_req = local_var_req_builder.build()?;
1675    let local_var_resp = local_var_client.execute(local_var_req).await?;
1676
1677    let local_var_status = local_var_resp.status();
1678    let local_var_content = local_var_resp.text().await?;
1679
1680    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1681        serde_json::from_str(&local_var_content).map_err(Error::from)
1682    } else {
1683        let local_var_entity: Option<CodespacesSlashRepoMachinesForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1684        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1685        Err(Error::ResponseError(local_var_error))
1686    }
1687}
1688
1689/// Sets which users can access codespaces in an organization. This is synonymous with granting or revoking codespaces access permissions for users according to the visibility. OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1690pub async fn codespaces_slash_set_codespaces_access(configuration: &configuration::Configuration, org: &str, codespaces_set_codespaces_access_request: models::CodespacesSetCodespacesAccessRequest) -> Result<(), Error<CodespacesSlashSetCodespacesAccessError>> {
1691    let local_var_configuration = configuration;
1692
1693    let local_var_client = &local_var_configuration.client;
1694
1695    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/access", local_var_configuration.base_path, org=crate::apis::urlencode(org));
1696    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
1697
1698    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1699        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1700    }
1701    local_var_req_builder = local_var_req_builder.json(&codespaces_set_codespaces_access_request);
1702
1703    let local_var_req = local_var_req_builder.build()?;
1704    let local_var_resp = local_var_client.execute(local_var_req).await?;
1705
1706    let local_var_status = local_var_resp.status();
1707    let local_var_content = local_var_resp.text().await?;
1708
1709    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1710        Ok(())
1711    } else {
1712        let local_var_entity: Option<CodespacesSlashSetCodespacesAccessError> = serde_json::from_str(&local_var_content).ok();
1713        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1714        Err(Error::ResponseError(local_var_error))
1715    }
1716}
1717
1718/// Codespaces for the specified users will be billed to the organization.  To use this endpoint, the access settings for the organization must be set to `selected_members`. For information on how to change this setting, see \"[Manage access control for organization codespaces](https://docs.github.com/rest/codespaces/organizations#manage-access-control-for-organization-codespaces).\"  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1719pub async fn codespaces_slash_set_codespaces_access_users(configuration: &configuration::Configuration, org: &str, codespaces_set_codespaces_access_users_request: models::CodespacesSetCodespacesAccessUsersRequest) -> Result<(), Error<CodespacesSlashSetCodespacesAccessUsersError>> {
1720    let local_var_configuration = configuration;
1721
1722    let local_var_client = &local_var_configuration.client;
1723
1724    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/access/selected_users", local_var_configuration.base_path, org=crate::apis::urlencode(org));
1725    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
1726
1727    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1728        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1729    }
1730    local_var_req_builder = local_var_req_builder.json(&codespaces_set_codespaces_access_users_request);
1731
1732    let local_var_req = local_var_req_builder.build()?;
1733    let local_var_resp = local_var_client.execute(local_var_req).await?;
1734
1735    let local_var_status = local_var_resp.status();
1736    let local_var_content = local_var_resp.text().await?;
1737
1738    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1739        Ok(())
1740    } else {
1741        let local_var_entity: Option<CodespacesSlashSetCodespacesAccessUsersError> = serde_json::from_str(&local_var_content).ok();
1742        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1743        Err(Error::ResponseError(local_var_error))
1744    }
1745}
1746
1747/// Select the repositories that will use a user's development environment secret.  The authenticated user must have Codespaces access to use this endpoint.  OAuth app tokens and personal access tokens (classic) need the `codespace` or `codespace:secrets` scope to use this endpoint.
1748pub async fn codespaces_slash_set_repositories_for_secret_for_authenticated_user(configuration: &configuration::Configuration, secret_name: &str, codespaces_set_repositories_for_secret_for_authenticated_user_request: models::CodespacesSetRepositoriesForSecretForAuthenticatedUserRequest) -> Result<(), Error<CodespacesSlashSetRepositoriesForSecretForAuthenticatedUserError>> {
1749    let local_var_configuration = configuration;
1750
1751    let local_var_client = &local_var_configuration.client;
1752
1753    let local_var_uri_str = format!("{}/user/codespaces/secrets/{secret_name}/repositories", local_var_configuration.base_path, secret_name=crate::apis::urlencode(secret_name));
1754    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
1755
1756    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1757        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1758    }
1759    local_var_req_builder = local_var_req_builder.json(&codespaces_set_repositories_for_secret_for_authenticated_user_request);
1760
1761    let local_var_req = local_var_req_builder.build()?;
1762    let local_var_resp = local_var_client.execute(local_var_req).await?;
1763
1764    let local_var_status = local_var_resp.status();
1765    let local_var_content = local_var_resp.text().await?;
1766
1767    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1768        Ok(())
1769    } else {
1770        let local_var_entity: Option<CodespacesSlashSetRepositoriesForSecretForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1771        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1772        Err(Error::ResponseError(local_var_error))
1773    }
1774}
1775
1776/// Replaces all repositories for an organization development environment secret when the `visibility` for repository access is set to `selected`. The visibility is set when you [Create or update an organization secret](https://docs.github.com/rest/codespaces/organization-secrets#create-or-update-an-organization-secret).  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1777pub async fn codespaces_slash_set_selected_repos_for_org_secret(configuration: &configuration::Configuration, org: &str, secret_name: &str, codespaces_set_selected_repos_for_org_secret_request: models::CodespacesSetSelectedReposForOrgSecretRequest) -> Result<(), Error<CodespacesSlashSetSelectedReposForOrgSecretError>> {
1778    let local_var_configuration = configuration;
1779
1780    let local_var_client = &local_var_configuration.client;
1781
1782    let local_var_uri_str = format!("{}/orgs/{org}/codespaces/secrets/{secret_name}/repositories", local_var_configuration.base_path, org=crate::apis::urlencode(org), secret_name=crate::apis::urlencode(secret_name));
1783    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PUT, local_var_uri_str.as_str());
1784
1785    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1786        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1787    }
1788    local_var_req_builder = local_var_req_builder.json(&codespaces_set_selected_repos_for_org_secret_request);
1789
1790    let local_var_req = local_var_req_builder.build()?;
1791    let local_var_resp = local_var_client.execute(local_var_req).await?;
1792
1793    let local_var_status = local_var_resp.status();
1794    let local_var_content = local_var_resp.text().await?;
1795
1796    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1797        Ok(())
1798    } else {
1799        let local_var_entity: Option<CodespacesSlashSetSelectedReposForOrgSecretError> = serde_json::from_str(&local_var_content).ok();
1800        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1801        Err(Error::ResponseError(local_var_error))
1802    }
1803}
1804
1805/// Starts a user's codespace.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1806pub async fn codespaces_slash_start_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str) -> Result<models::Codespace, Error<CodespacesSlashStartForAuthenticatedUserError>> {
1807    let local_var_configuration = configuration;
1808
1809    let local_var_client = &local_var_configuration.client;
1810
1811    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}/start", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
1812    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
1813
1814    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1815        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1816    }
1817
1818    let local_var_req = local_var_req_builder.build()?;
1819    let local_var_resp = local_var_client.execute(local_var_req).await?;
1820
1821    let local_var_status = local_var_resp.status();
1822    let local_var_content = local_var_resp.text().await?;
1823
1824    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1825        serde_json::from_str(&local_var_content).map_err(Error::from)
1826    } else {
1827        let local_var_entity: Option<CodespacesSlashStartForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1828        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1829        Err(Error::ResponseError(local_var_error))
1830    }
1831}
1832
1833/// Stops a user's codespace.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1834pub async fn codespaces_slash_stop_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str) -> Result<models::Codespace, Error<CodespacesSlashStopForAuthenticatedUserError>> {
1835    let local_var_configuration = configuration;
1836
1837    let local_var_client = &local_var_configuration.client;
1838
1839    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}/stop", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
1840    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
1841
1842    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1843        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1844    }
1845
1846    let local_var_req = local_var_req_builder.build()?;
1847    let local_var_resp = local_var_client.execute(local_var_req).await?;
1848
1849    let local_var_status = local_var_resp.status();
1850    let local_var_content = local_var_resp.text().await?;
1851
1852    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1853        serde_json::from_str(&local_var_content).map_err(Error::from)
1854    } else {
1855        let local_var_entity: Option<CodespacesSlashStopForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1856        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1857        Err(Error::ResponseError(local_var_error))
1858    }
1859}
1860
1861/// Stops a user's codespace.  OAuth app tokens and personal access tokens (classic) need the `admin:org` scope to use this endpoint.
1862pub async fn codespaces_slash_stop_in_organization(configuration: &configuration::Configuration, org: &str, username: &str, codespace_name: &str) -> Result<models::Codespace, Error<CodespacesSlashStopInOrganizationError>> {
1863    let local_var_configuration = configuration;
1864
1865    let local_var_client = &local_var_configuration.client;
1866
1867    let local_var_uri_str = format!("{}/orgs/{org}/members/{username}/codespaces/{codespace_name}/stop", local_var_configuration.base_path, org=crate::apis::urlencode(org), username=crate::apis::urlencode(username), codespace_name=crate::apis::urlencode(codespace_name));
1868    let mut local_var_req_builder = local_var_client.request(reqwest::Method::POST, local_var_uri_str.as_str());
1869
1870    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1871        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1872    }
1873
1874    let local_var_req = local_var_req_builder.build()?;
1875    let local_var_resp = local_var_client.execute(local_var_req).await?;
1876
1877    let local_var_status = local_var_resp.status();
1878    let local_var_content = local_var_resp.text().await?;
1879
1880    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1881        serde_json::from_str(&local_var_content).map_err(Error::from)
1882    } else {
1883        let local_var_entity: Option<CodespacesSlashStopInOrganizationError> = serde_json::from_str(&local_var_content).ok();
1884        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1885        Err(Error::ResponseError(local_var_error))
1886    }
1887}
1888
1889/// Updates a codespace owned by the authenticated user. Currently only the codespace's machine type and recent folders can be modified using this endpoint.  If you specify a new machine type it will be applied the next time your codespace is started.  OAuth app tokens and personal access tokens (classic) need the `codespace` scope to use this endpoint.
1890pub async fn codespaces_slash_update_for_authenticated_user(configuration: &configuration::Configuration, codespace_name: &str, codespaces_update_for_authenticated_user_request: Option<models::CodespacesUpdateForAuthenticatedUserRequest>) -> Result<models::Codespace, Error<CodespacesSlashUpdateForAuthenticatedUserError>> {
1891    let local_var_configuration = configuration;
1892
1893    let local_var_client = &local_var_configuration.client;
1894
1895    let local_var_uri_str = format!("{}/user/codespaces/{codespace_name}", local_var_configuration.base_path, codespace_name=crate::apis::urlencode(codespace_name));
1896    let mut local_var_req_builder = local_var_client.request(reqwest::Method::PATCH, local_var_uri_str.as_str());
1897
1898    if let Some(ref local_var_user_agent) = local_var_configuration.user_agent {
1899        local_var_req_builder = local_var_req_builder.header(reqwest::header::USER_AGENT, local_var_user_agent.clone());
1900    }
1901    local_var_req_builder = local_var_req_builder.json(&codespaces_update_for_authenticated_user_request);
1902
1903    let local_var_req = local_var_req_builder.build()?;
1904    let local_var_resp = local_var_client.execute(local_var_req).await?;
1905
1906    let local_var_status = local_var_resp.status();
1907    let local_var_content = local_var_resp.text().await?;
1908
1909    if !local_var_status.is_client_error() && !local_var_status.is_server_error() {
1910        serde_json::from_str(&local_var_content).map_err(Error::from)
1911    } else {
1912        let local_var_entity: Option<CodespacesSlashUpdateForAuthenticatedUserError> = serde_json::from_str(&local_var_content).ok();
1913        let local_var_error = ResponseContent { status: local_var_status, content: local_var_content, entity: local_var_entity };
1914        Err(Error::ResponseError(local_var_error))
1915    }
1916}
1917