pub struct InstallationPermissions {
Show 37 fields pub actions: Option<InstallationPermissionsActions>, pub administration: Option<InstallationPermissionsAdministration>, pub blocking: Option<InstallationPermissionsBlocking>, pub checks: Option<InstallationPermissionsChecks>, pub content_references: Option<InstallationPermissionsContentReferences>, pub contents: Option<InstallationPermissionsContents>, pub deployments: Option<InstallationPermissionsDeployments>, pub discussions: Option<InstallationPermissionsDiscussions>, pub emails: Option<InstallationPermissionsEmails>, pub environments: Option<InstallationPermissionsEnvironments>, pub issues: Option<InstallationPermissionsIssues>, pub members: Option<InstallationPermissionsMembers>, pub merge_queues: Option<InstallationPermissionsMergeQueues>, pub metadata: Option<InstallationPermissionsMetadata>, pub organization_administration: Option<InstallationPermissionsOrganizationAdministration>, pub organization_events: Option<InstallationPermissionsOrganizationEvents>, pub organization_hooks: Option<InstallationPermissionsOrganizationHooks>, pub organization_packages: Option<InstallationPermissionsOrganizationPackages>, pub organization_plan: Option<InstallationPermissionsOrganizationPlan>, pub organization_projects: Option<InstallationPermissionsOrganizationProjects>, pub organization_secrets: Option<InstallationPermissionsOrganizationSecrets>, pub organization_self_hosted_runners: Option<InstallationPermissionsOrganizationSelfHostedRunners>, pub organization_user_blocking: Option<InstallationPermissionsOrganizationUserBlocking>, pub packages: Option<InstallationPermissionsPackages>, pub pages: Option<InstallationPermissionsPages>, pub pull_requests: Option<InstallationPermissionsPullRequests>, pub repository_hooks: Option<InstallationPermissionsRepositoryHooks>, pub repository_projects: Option<InstallationPermissionsRepositoryProjects>, pub secret_scanning_alerts: Option<InstallationPermissionsSecretScanningAlerts>, pub secrets: Option<InstallationPermissionsSecrets>, pub security_events: Option<InstallationPermissionsSecurityEvents>, pub security_scanning_alert: Option<InstallationPermissionsSecurityScanningAlert>, pub single_file: Option<InstallationPermissionsSingleFile>, pub statuses: Option<InstallationPermissionsStatuses>, pub team_discussions: Option<InstallationPermissionsTeamDiscussions>, pub vulnerability_alerts: Option<InstallationPermissionsVulnerabilityAlerts>, pub workflows: Option<InstallationPermissionsWorkflows>,
}

Fields§

§actions: Option<InstallationPermissionsActions>

The level of permission granted to the access token for GitHub Actions workflows, workflow runs, and artifacts.

§administration: Option<InstallationPermissionsAdministration>

The level of permission granted to the access token for repository creation, deletion, settings, teams, and collaborators creation.

§blocking: Option<InstallationPermissionsBlocking>§checks: Option<InstallationPermissionsChecks>

The level of permission granted to the access token for checks on code.

§content_references: Option<InstallationPermissionsContentReferences>§contents: Option<InstallationPermissionsContents>

The level of permission granted to the access token for repository contents, commits, branches, downloads, releases, and merges.

§deployments: Option<InstallationPermissionsDeployments>

The level of permission granted to the access token for deployments and deployment statuses.

§discussions: Option<InstallationPermissionsDiscussions>§emails: Option<InstallationPermissionsEmails>§environments: Option<InstallationPermissionsEnvironments>

The level of permission granted to the access token for managing repository environments.

§issues: Option<InstallationPermissionsIssues>

The level of permission granted to the access token for issues and related comments, assignees, labels, and milestones.

§members: Option<InstallationPermissionsMembers>

The level of permission granted to the access token for organization teams and members.

§merge_queues: Option<InstallationPermissionsMergeQueues>§metadata: Option<InstallationPermissionsMetadata>

The level of permission granted to the access token to search repositories, list collaborators, and access repository metadata.

§organization_administration: Option<InstallationPermissionsOrganizationAdministration>

The level of permission granted to the access token to manage access to an organization.

§organization_events: Option<InstallationPermissionsOrganizationEvents>§organization_hooks: Option<InstallationPermissionsOrganizationHooks>

The level of permission granted to the access token to manage the post-receive hooks for an organization.

§organization_packages: Option<InstallationPermissionsOrganizationPackages>

The level of permission granted to the access token for organization packages published to GitHub Packages.

§organization_plan: Option<InstallationPermissionsOrganizationPlan>

The level of permission granted to the access token for viewing an organization’s plan.

§organization_projects: Option<InstallationPermissionsOrganizationProjects>

The level of permission granted to the access token to manage organization projects and projects beta (where available).

§organization_secrets: Option<InstallationPermissionsOrganizationSecrets>

The level of permission granted to the access token to manage organization secrets.

§organization_self_hosted_runners: Option<InstallationPermissionsOrganizationSelfHostedRunners>

The level of permission granted to the access token to view and manage GitHub Actions self-hosted runners available to an organization.

§organization_user_blocking: Option<InstallationPermissionsOrganizationUserBlocking>

The level of permission granted to the access token to view and manage users blocked by the organization.

§packages: Option<InstallationPermissionsPackages>

The level of permission granted to the access token for packages published to GitHub Packages.

§pages: Option<InstallationPermissionsPages>

The level of permission granted to the access token to retrieve Pages statuses, configuration, and builds, as well as create new builds.

§pull_requests: Option<InstallationPermissionsPullRequests>

The level of permission granted to the access token for pull requests and related comments, assignees, labels, milestones, and merges.

§repository_hooks: Option<InstallationPermissionsRepositoryHooks>

The level of permission granted to the access token to manage the post-receive hooks for a repository.

§repository_projects: Option<InstallationPermissionsRepositoryProjects>

The level of permission granted to the access token to manage repository projects, columns, and cards.

§secret_scanning_alerts: Option<InstallationPermissionsSecretScanningAlerts>

The level of permission granted to the access token to view and manage secret scanning alerts.

§secrets: Option<InstallationPermissionsSecrets>

The level of permission granted to the access token to manage repository secrets.

§security_events: Option<InstallationPermissionsSecurityEvents>

The level of permission granted to the access token to view and manage security events like code scanning alerts.

§security_scanning_alert: Option<InstallationPermissionsSecurityScanningAlert>§single_file: Option<InstallationPermissionsSingleFile>

The level of permission granted to the access token to manage just a single file.

§statuses: Option<InstallationPermissionsStatuses>

The level of permission granted to the access token for commit statuses.

§team_discussions: Option<InstallationPermissionsTeamDiscussions>

The level of permission granted to the access token to manage team discussions and related comments.

§vulnerability_alerts: Option<InstallationPermissionsVulnerabilityAlerts>

The level of permission granted to the access token to manage Dependabot alerts.

§workflows: Option<InstallationPermissionsWorkflows>

The level of permission granted to the access token to update GitHub Actions workflow files.

Trait Implementations§

source§

impl Debug for InstallationPermissions

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl<'de> Deserialize<'de> for InstallationPermissions

source§

fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where __D: Deserializer<'de>,

Deserialize this value from the given Serde deserializer. Read more

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for Twhere T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for Twhere T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for Twhere T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T, U> Into<U> for Twhere U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T, U> TryFrom<U> for Twhere U: Into<T>,

§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for Twhere U: TryFrom<T>,

§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> DeserializeOwned for Twhere T: for<'de> Deserialize<'de>,