Struct aws_sdk_workmail::types::AccessControlRule
source · #[non_exhaustive]pub struct AccessControlRule {Show 13 fields
pub name: Option<String>,
pub effect: Option<AccessControlRuleEffect>,
pub description: Option<String>,
pub ip_ranges: Option<Vec<String>>,
pub not_ip_ranges: Option<Vec<String>>,
pub actions: Option<Vec<String>>,
pub not_actions: Option<Vec<String>>,
pub user_ids: Option<Vec<String>>,
pub not_user_ids: Option<Vec<String>>,
pub date_created: Option<DateTime>,
pub date_modified: Option<DateTime>,
pub impersonation_role_ids: Option<Vec<String>>,
pub not_impersonation_role_ids: Option<Vec<String>>,
}
Expand description
A rule that controls access to an WorkMail organization.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.name: Option<String>
The rule name.
effect: Option<AccessControlRuleEffect>
The rule effect.
description: Option<String>
The rule description.
ip_ranges: Option<Vec<String>>
IPv4 CIDR ranges to include in the rule.
not_ip_ranges: Option<Vec<String>>
IPv4 CIDR ranges to exclude from the rule.
actions: Option<Vec<String>>
Access protocol actions to include in the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
not_actions: Option<Vec<String>>
Access protocol actions to exclude from the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
user_ids: Option<Vec<String>>
User IDs to include in the rule.
not_user_ids: Option<Vec<String>>
User IDs to exclude from the rule.
date_created: Option<DateTime>
The date that the rule was created.
date_modified: Option<DateTime>
The date that the rule was modified.
impersonation_role_ids: Option<Vec<String>>
Impersonation role IDs to include in the rule.
not_impersonation_role_ids: Option<Vec<String>>
Impersonation role IDs to exclude from the rule.
Implementations§
source§impl AccessControlRule
impl AccessControlRule
sourcepub fn effect(&self) -> Option<&AccessControlRuleEffect>
pub fn effect(&self) -> Option<&AccessControlRuleEffect>
The rule effect.
sourcepub fn description(&self) -> Option<&str>
pub fn description(&self) -> Option<&str>
The rule description.
sourcepub fn ip_ranges(&self) -> &[String]
pub fn ip_ranges(&self) -> &[String]
IPv4 CIDR ranges to include in the rule.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .ip_ranges.is_none()
.
sourcepub fn not_ip_ranges(&self) -> &[String]
pub fn not_ip_ranges(&self) -> &[String]
IPv4 CIDR ranges to exclude from the rule.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .not_ip_ranges.is_none()
.
sourcepub fn actions(&self) -> &[String]
pub fn actions(&self) -> &[String]
Access protocol actions to include in the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .actions.is_none()
.
sourcepub fn not_actions(&self) -> &[String]
pub fn not_actions(&self) -> &[String]
Access protocol actions to exclude from the rule. Valid values include ActiveSync
, AutoDiscover
, EWS
, IMAP
, SMTP
, WindowsOutlook
, and WebMail
.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .not_actions.is_none()
.
sourcepub fn user_ids(&self) -> &[String]
pub fn user_ids(&self) -> &[String]
User IDs to include in the rule.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .user_ids.is_none()
.
sourcepub fn not_user_ids(&self) -> &[String]
pub fn not_user_ids(&self) -> &[String]
User IDs to exclude from the rule.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .not_user_ids.is_none()
.
sourcepub fn date_created(&self) -> Option<&DateTime>
pub fn date_created(&self) -> Option<&DateTime>
The date that the rule was created.
sourcepub fn date_modified(&self) -> Option<&DateTime>
pub fn date_modified(&self) -> Option<&DateTime>
The date that the rule was modified.
sourcepub fn impersonation_role_ids(&self) -> &[String]
pub fn impersonation_role_ids(&self) -> &[String]
Impersonation role IDs to include in the rule.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .impersonation_role_ids.is_none()
.
sourcepub fn not_impersonation_role_ids(&self) -> &[String]
pub fn not_impersonation_role_ids(&self) -> &[String]
Impersonation role IDs to exclude from the rule.
If no value was sent for this field, a default will be set. If you want to determine if no value was sent, use .not_impersonation_role_ids.is_none()
.
source§impl AccessControlRule
impl AccessControlRule
sourcepub fn builder() -> AccessControlRuleBuilder
pub fn builder() -> AccessControlRuleBuilder
Creates a new builder-style object to manufacture AccessControlRule
.
Trait Implementations§
source§impl Clone for AccessControlRule
impl Clone for AccessControlRule
source§fn clone(&self) -> AccessControlRule
fn clone(&self) -> AccessControlRule
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for AccessControlRule
impl Debug for AccessControlRule
source§impl PartialEq for AccessControlRule
impl PartialEq for AccessControlRule
source§fn eq(&self, other: &AccessControlRule) -> bool
fn eq(&self, other: &AccessControlRule) -> bool
self
and other
values to be equal, and is used
by ==
.impl StructuralPartialEq for AccessControlRule
Auto Trait Implementations§
impl Freeze for AccessControlRule
impl RefUnwindSafe for AccessControlRule
impl Send for AccessControlRule
impl Sync for AccessControlRule
impl Unpin for AccessControlRule
impl UnwindSafe for AccessControlRule
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more