isilon/models/
settings_acls_acl_policy_settings.rs

1#[allow(unused_imports)]
2use serde_json::Value;
3
4#[derive(Debug, Serialize, Deserialize)]
5pub struct SettingsAclsAclPolicySettings {
6    /// Access checks (chmod, chown).
7    #[serde(rename = "access")]
8    pub access: Option<String>,
9    /// Displayed mode bits.
10    #[serde(rename = "calcmode")]
11    pub calcmode: Option<String>,
12    /// Approximate group mode bits when ACL exists.
13    #[serde(rename = "calcmode_group")]
14    pub calcmode_group: Option<String>,
15    /// Approximate owner mode bits when ACL exists.
16    #[serde(rename = "calcmode_owner")]
17    pub calcmode_owner: Option<String>,
18    /// chmod on files with existing ACLs.
19    #[serde(rename = "chmod")]
20    pub chmod: Option<String>,
21    /// chmod (007) on files with existing ACLs.
22    #[serde(rename = "chmod_007")]
23    pub chmod_007: Option<String>,
24    /// ACLs created on directories by UNIX chmod.
25    #[serde(rename = "chmod_inheritable")]
26    pub chmod_inheritable: Option<String>,
27    /// chown/chgrp on files with existing ACLs.
28    #[serde(rename = "chown")]
29    pub chown: Option<String>,
30    /// ACL creation over SMB.
31    #[serde(rename = "create_over_smb")]
32    pub create_over_smb: Option<String>,
33    ///  Read only DOS attribute.
34    #[serde(rename = "dos_attr")]
35    pub dos_attr: Option<String>,
36    /// Group owner inheritance.
37    #[serde(rename = "group_owner_inheritance")]
38    pub group_owner_inheritance: Option<String>,
39    /// Treatment of 'rwx' permissions.
40    #[serde(rename = "rwx")]
41    pub rwx: Option<String>,
42    /// Synthetic 'deny' ACEs.
43    #[serde(rename = "synthetic_denies")]
44    pub synthetic_denies: Option<String>,
45    /// Access check (utimes)
46    #[serde(rename = "utimes")]
47    pub utimes: Option<String>,
48}