Struct roctogen::models::AppPermissions[][src]

pub struct AppPermissions {
Show fields pub actions: Option<String>, pub administration: Option<String>, pub checks: Option<String>, pub content_references: Option<String>, pub contents: Option<String>, pub deployments: Option<String>, pub environments: Option<String>, pub issues: Option<String>, pub metadata: Option<String>, pub packages: Option<String>, pub pages: Option<String>, pub pull_requests: Option<String>, pub repository_hooks: Option<String>, pub repository_projects: Option<String>, pub secret_scanning_alerts: Option<String>, pub secrets: Option<String>, pub security_events: Option<String>, pub single_file: Option<String>, pub statuses: Option<String>, pub vulnerability_alerts: Option<String>, pub workflows: Option<String>, pub members: Option<String>, pub organization_administration: Option<String>, pub organization_hooks: Option<String>, pub organization_plan: Option<String>, pub organization_projects: Option<String>, pub organization_secrets: Option<String>, pub organization_self_hosted_runners: Option<String>, pub organization_user_blocking: Option<String>, pub team_discussions: Option<String>,
}
Expand description

The permissions granted to the user-to-server access token.

Fields

actions: Option<String>
Expand description

The level of permission to grant the access token for GitHub Actions workflows, workflow runs, and artifacts. Can be one of: read or write.

administration: Option<String>
Expand description

The level of permission to grant the access token for repository creation, deletion, settings, teams, and collaborators creation. Can be one of: read or write.

checks: Option<String>
Expand description

The level of permission to grant the access token for checks on code. Can be one of: read or write.

content_references: Option<String>
Expand description

The level of permission to grant the access token for notification of content references and creation content attachments. Can be one of: read or write.

contents: Option<String>
Expand description

The level of permission to grant the access token for repository contents, commits, branches, downloads, releases, and merges. Can be one of: read or write.

deployments: Option<String>
Expand description

The level of permission to grant the access token for deployments and deployment statuses. Can be one of: read or write.

environments: Option<String>
Expand description

The level of permission to grant the access token for managing repository environments. Can be one of: read or write.

issues: Option<String>
Expand description

The level of permission to grant the access token for issues and related comments, assignees, labels, and milestones. Can be one of: read or write.

metadata: Option<String>
Expand description

The level of permission to grant the access token to search repositories, list collaborators, and access repository metadata. Can be one of: read or write.

packages: Option<String>
Expand description

The level of permission to grant the access token for packages published to GitHub Packages. Can be one of: read or write.

pages: Option<String>
Expand description

The level of permission to grant the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds. Can be one of: read or write.

pull_requests: Option<String>
Expand description

The level of permission to grant the access token for pull requests and related comments, assignees, labels, milestones, and merges. Can be one of: read or write.

repository_hooks: Option<String>
Expand description

The level of permission to grant the access token to manage the post-receive hooks for a repository. Can be one of: read or write.

repository_projects: Option<String>
Expand description

The level of permission to grant the access token to manage repository projects, columns, and cards. Can be one of: read, write, or admin.

secret_scanning_alerts: Option<String>
Expand description

The level of permission to grant the access token to view and manage secret scanning alerts. Can be one of: read or write.

secrets: Option<String>
Expand description

The level of permission to grant the access token to manage repository secrets. Can be one of: read or write.

security_events: Option<String>
Expand description

The level of permission to grant the access token to view and manage security events like code scanning alerts. Can be one of: read or write.

single_file: Option<String>
Expand description

The level of permission to grant the access token to manage just a single file. Can be one of: read or write.

statuses: Option<String>
Expand description

The level of permission to grant the access token for commit statuses. Can be one of: read or write.

vulnerability_alerts: Option<String>
Expand description

The level of permission to grant the access token to retrieve Dependabot alerts. Can be one of: read.

workflows: Option<String>
Expand description

The level of permission to grant the access token to update GitHub Actions workflow files. Can be one of: write.

members: Option<String>
Expand description

The level of permission to grant the access token for organization teams and members. Can be one of: read or write.

organization_administration: Option<String>
Expand description

The level of permission to grant the access token to manage access to an organization. Can be one of: read or write.

organization_hooks: Option<String>
Expand description

The level of permission to grant the access token to manage the post-receive hooks for an organization. Can be one of: read or write.

organization_plan: Option<String>
Expand description

The level of permission to grant the access token for viewing an organization’s plan. Can be one of: read.

organization_projects: Option<String>
Expand description

The level of permission to grant the access token to manage organization projects, columns, and cards. Can be one of: read, write, or admin.

organization_secrets: Option<String>
Expand description

The level of permission to grant the access token to manage organization secrets. Can be one of: read or write.

organization_self_hosted_runners: Option<String>
Expand description

The level of permission to grant the access token to view and manage GitHub Actions self-hosted runners available to an organization. Can be one of: read or write.

organization_user_blocking: Option<String>
Expand description

The level of permission to grant the access token to view and manage users blocked by the organization. Can be one of: read or write.

team_discussions: Option<String>
Expand description

The level of permission to grant the access token to manage team discussions and related comments. Can be one of: read or write.

Trait Implementations

impl Clone for AppPermissions[src]

fn clone(&self) -> AppPermissions[src]

Returns a copy of the value. Read more

fn clone_from(&mut self, source: &Self)1.0.0[src]

Performs copy-assignment from source. Read more

impl Debug for AppPermissions[src]

fn fmt(&self, f: &mut Formatter<'_>) -> Result[src]

Formats the value using the given formatter. Read more

impl Default for AppPermissions[src]

fn default() -> AppPermissions[src]

Returns the “default value” for a type. Read more

impl<'de> Deserialize<'de> for AppPermissions[src]

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
    __D: Deserializer<'de>, 
[src]

Deserialize this value from the given Serde deserializer. Read more

impl PartialEq<AppPermissions> for AppPermissions[src]

fn eq(&self, other: &AppPermissions) -> bool[src]

This method tests for self and other values to be equal, and is used by ==. Read more

fn ne(&self, other: &AppPermissions) -> bool[src]

This method tests for !=.

impl Serialize for AppPermissions[src]

fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
    __S: Serializer
[src]

Serialize this value into the given Serde serializer. Read more

impl StructuralPartialEq for AppPermissions[src]

Auto Trait Implementations

Blanket Implementations

impl<T> Any for T where
    T: 'static + ?Sized
[src]

pub fn type_id(&self) -> TypeId[src]

Gets the TypeId of self. Read more

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

pub fn borrow(&self) -> &T[src]

Immutably borrows from an owned value. Read more

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

pub fn borrow_mut(&mut self) -> &mut T[src]

Mutably borrows from an owned value. Read more

impl<T> From<T> for T[src]

pub fn from(t: T) -> T[src]

Performs the conversion.

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

pub fn into(self) -> U[src]

Performs the conversion.

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

pub fn to_owned(&self) -> T[src]

Creates owned data from borrowed data, usually by cloning. Read more

pub fn clone_into(&self, target: &mut T)[src]

🔬 This is a nightly-only experimental API. (toowned_clone_into)

recently added

Uses borrowed data to replace owned data, usually by cloning. Read more

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>[src]

Performs the conversion.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

pub fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>[src]

Performs the conversion.

impl<T> DeserializeOwned for T where
    T: for<'de> Deserialize<'de>, 
[src]