1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
#[allow(unused_imports)]
use serde_json::Value;

#[derive(Debug, Serialize, Deserialize)]
pub struct SmbShareExtended {
    /// Only enumerate files and folders the requesting user has access to.
    #[serde(rename = "access_based_enumeration")]
    pub access_based_enumeration: Option<bool>,
    /// Access-based enumeration on only the root directory of the share.
    #[serde(rename = "access_based_enumeration_root_only")]
    pub access_based_enumeration_root_only: Option<bool>,
    /// Allow deletion of read-only files in the share.
    #[serde(rename = "allow_delete_readonly")]
    pub allow_delete_readonly: Option<bool>,
    /// Allows users to execute files they have read rights for.
    #[serde(rename = "allow_execute_always")]
    pub allow_execute_always: Option<bool>,
    /// Allow automatic expansion of variables for home directories.
    #[serde(rename = "allow_variable_expansion")]
    pub allow_variable_expansion: Option<bool>,
    /// Automatically create home directories.
    #[serde(rename = "auto_create_directory")]
    pub auto_create_directory: Option<bool>,
    /// Share is visible in net view and the browse list.
    #[serde(rename = "browsable")]
    pub browsable: Option<bool>,
    /// Persistent open timeout for the share.
    #[serde(rename = "ca_timeout")]
    pub ca_timeout: Option<i32>,
    /// Specify the level of write-integrity on continuously available shares.
    #[serde(rename = "ca_write_integrity")]
    pub ca_write_integrity: Option<String>,
    /// Level of change notification alerts on the share.
    #[serde(rename = "change_notify")]
    pub change_notify: Option<String>,
    /// Specify if persistent opens are allowed on the share.
    #[serde(rename = "continuously_available")]
    pub continuously_available: Option<bool>,
    /// Create permissions for new files and directories in share.
    #[serde(rename = "create_permissions")]
    pub create_permissions: Option<String>,
    /// Client-side caching policy for the shares.
    #[serde(rename = "csc_policy")]
    pub csc_policy: Option<String>,
    /// Description for this SMB share.
    #[serde(rename = "description")]
    pub description: Option<String>,
    /// Directory create mask bits.
    #[serde(rename = "directory_create_mask")]
    pub directory_create_mask: Option<i32>,
    /// Directory create mode bits.
    #[serde(rename = "directory_create_mode")]
    pub directory_create_mode: Option<i32>,
    /// File create mask bits.
    #[serde(rename = "file_create_mask")]
    pub file_create_mask: Option<i32>,
    /// File create mode bits.
    #[serde(rename = "file_create_mode")]
    pub file_create_mode: Option<i32>,
    /// Specifies the list of file extensions.
    #[serde(rename = "file_filter_extensions")]
    pub file_filter_extensions: Option<Vec<String>>,
    /// Specifies if filter list is for deny or allow. Default is deny.
    #[serde(rename = "file_filter_type")]
    pub file_filter_type: Option<String>,
    /// Enables file filtering on this zone.
    #[serde(rename = "file_filtering_enabled")]
    pub file_filtering_enabled: Option<bool>,
    /// Hide files and directories that begin with a period '.'.
    #[serde(rename = "hide_dot_files")]
    pub hide_dot_files: Option<bool>,
    /// An ACL expressing which hosts are allowed access. A deny clause must be the final entry.
    #[serde(rename = "host_acl")]
    pub host_acl: Option<Vec<String>>,
    /// Share ID.
    #[serde(rename = "id")]
    pub id: Option<String>,
    /// Specify the condition in which user access is done as the guest account.
    #[serde(rename = "impersonate_guest")]
    pub impersonate_guest: Option<String>,
    /// User account to be used as guest account.
    #[serde(rename = "impersonate_user")]
    pub impersonate_user: Option<String>,
    /// Set the inheritable ACL on the share path.
    #[serde(rename = "inheritable_path_acl")]
    pub inheritable_path_acl: Option<bool>,
    /// Specifies the wchar_t starting point for automatic byte mangling.
    #[serde(rename = "mangle_byte_start")]
    pub mangle_byte_start: Option<i32>,
    /// Character mangle map.
    #[serde(rename = "mangle_map")]
    pub mangle_map: Option<Vec<String>>,
    /// Share name.
    #[serde(rename = "name")]
    pub name: Option<String>,
    /// Support NTFS ACLs on files and directories.
    #[serde(rename = "ntfs_acl_support")]
    pub ntfs_acl_support: Option<bool>,
    /// Support oplocks.
    #[serde(rename = "oplocks")]
    pub oplocks: Option<bool>,
    /// Path of share within /ifs.
    #[serde(rename = "path")]
    pub path: Option<String>,
    /// Specifies an ordered list of permission modifications.
    #[serde(rename = "permissions")]
    pub permissions: Option<Vec <crate::models::SmbSharePermission>>,
    /// Allow account to run as root.
    #[serde(rename = "run_as_root")]
    pub run_as_root: Option<Vec <crate::models::AuthAccessAccessItemFileGroup>>,
    /// Specifies if persistent opens would do strict lockout on the share.
    #[serde(rename = "strict_ca_lockout")]
    pub strict_ca_lockout: Option<bool>,
    /// Handle SMB flush operations.
    #[serde(rename = "strict_flush")]
    pub strict_flush: Option<bool>,
    /// Specifies whether byte range locks contend against SMB I/O.
    #[serde(rename = "strict_locking")]
    pub strict_locking: Option<bool>,
    /// Numeric ID of the access zone which contains this SMB share
    #[serde(rename = "zid")]
    pub zid: i32,
}