pub struct DefaultObjectAccessControl {
pub kind: String,
pub entity: Entity,
pub role: Role,
pub email: Option<String>,
pub entity_id: Option<String>,
pub domain: Option<String>,
pub project_team: Option<ProjectTeam>,
pub etag: String,
pub bucket: String,
}Expand description
The DefaultObjectAccessControls resources represent the Access Control Lists (ACLs) applied to a new object within Google Cloud Storage when no ACL was provided for that object. ACLs let you specify who has access to your data and to what extent.
Fields§
§kind: StringThe kind of item this is. For object access control entries, this is always storage#objectAccessControl.
entity: EntityThe entity holding the permission, in one of the following forms:
user-userIduser-emailgroup-groupIdgroup-emaildomain-domainproject-team-projectIdallUsersallAuthenticatedUsers
Examples:
- The user liz@example.com would be user-liz@example.com.
- The group example@googlegroups.com would be group-example@googlegroups.com.
- To refer to all members of the G Suite for Business domain example.com, the entity would be domain-example.com.
role: RoleThe access permission for the entity.
email: Option<String>The email address associated with the entity, if any.
entity_id: Option<String>The ID for the entity, if any.
domain: Option<String>The domain associated with the entity, if any.
project_team: Option<ProjectTeam>The project team associated with the entity, if any.
etag: StringHTTP 1.1 Entity tag for the access-control entry.
bucket: StringThe bucket this resource belongs to.
Implementations§
Source§impl DefaultObjectAccessControl
impl DefaultObjectAccessControl
Sourcepub fn create(
bucket: &str,
new_acl: &NewDefaultObjectAccessControl,
) -> Result<Self, Error>
pub fn create( bucket: &str, new_acl: &NewDefaultObjectAccessControl, ) -> Result<Self, Error>
Create a new DefaultObjectAccessControl entry on the specified bucket.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy and Bucket::set_iam_policy to
control access instead.
§Example
use cloud_storage::default_object_access_control::{
DefaultObjectAccessControl, NewDefaultObjectAccessControl, Role, Entity,
};
let new_acl = NewDefaultObjectAccessControl {
entity: Entity::AllAuthenticatedUsers,
role: Role::Reader,
};
let default_acl = DefaultObjectAccessControl::create("mybucket", &new_acl)?;Sourcepub fn list(bucket: &str) -> Result<Vec<Self>, Error>
pub fn list(bucket: &str) -> Result<Vec<Self>, Error>
Retrieves default object ACL entries on the specified bucket.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy and Bucket::set_iam_policy to
control access instead.
§Example
use cloud_storage::default_object_access_control::DefaultObjectAccessControl;
let default_acls = DefaultObjectAccessControl::list("mybucket")?;Sourcepub fn read(bucket: &str, entity: &Entity) -> Result<Self, Error>
pub fn read(bucket: &str, entity: &Entity) -> Result<Self, Error>
Read a single DefaultObjectAccessControl.
The bucket argument is the name of the bucket whose DefaultObjectAccessControl is to be
read, and the entity argument is the entity holding the permission. Options are
Can be “user-userId”, “user-email_address”, “group-group_id”, “group-email_address”,
“allUsers”, or “allAuthenticatedUsers”.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy and Bucket::set_iam_policy to
control access instead.
§Example
use cloud_storage::default_object_access_control::{DefaultObjectAccessControl, Entity};
let default_acl = DefaultObjectAccessControl::read("mybucket", &Entity::AllUsers)?;Sourcepub fn update(&self) -> Result<Self, Error>
pub fn update(&self) -> Result<Self, Error>
Update the current DefaultObjectAccessControl.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy and Bucket::set_iam_policy to
control access instead.
§Example
use cloud_storage::default_object_access_control::{DefaultObjectAccessControl, Entity};
let mut default_acl = DefaultObjectAccessControl::read("my_bucket", &Entity::AllUsers)?;
default_acl.entity = Entity::AllAuthenticatedUsers;
default_acl.update()?;Sourcepub fn delete(self) -> Result<(), Error>
pub fn delete(self) -> Result<(), Error>
Delete this ’DefaultObjectAccessControl`.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy and Bucket::set_iam_policy to
control access instead.
§Example
use cloud_storage::default_object_access_control::{DefaultObjectAccessControl, Entity};
let mut default_acl = DefaultObjectAccessControl::read("my_bucket", &Entity::AllUsers)?;
default_acl.delete()?;