pub struct BucketAccessControlClient<'a>(/* private fields */);
Expand description
Operations on BucketAccessControl
s.
Implementations§
Source§impl<'a> BucketAccessControlClient<'a>
impl<'a> BucketAccessControlClient<'a>
Sourcepub fn create(
&self,
bucket: &str,
new_bucket_access_control: &NewBucketAccessControl,
) -> Result<BucketAccessControl>
pub fn create( &self, bucket: &str, new_bucket_access_control: &NewBucketAccessControl, ) -> Result<BucketAccessControl>
Create a new BucketAccessControl
using the provided NewBucketAccessControl
, related to
the Bucket
provided by the bucket_name
argument.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
§Example
use cloud_storage::sync::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, NewBucketAccessControl};
use cloud_storage::bucket_access_control::{Role, Entity};
let client = Client::new()?;
let new_bucket_access_control = NewBucketAccessControl {
entity: Entity::AllUsers,
role: Role::Reader,
};
client.bucket_access_control().create("mybucket", &new_bucket_access_control)?;
Sourcepub fn list(&self, bucket: &str) -> Result<Vec<BucketAccessControl>>
pub fn list(&self, bucket: &str) -> Result<Vec<BucketAccessControl>>
Returns all BucketAccessControl
s related to this bucket.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
§Example
use cloud_storage::sync::Client;
use cloud_storage::bucket_access_control::BucketAccessControl;
let client = Client::new()?;
let acls = client.bucket_access_control().list("mybucket")?;
Sourcepub fn read(&self, bucket: &str, entity: &Entity) -> Result<BucketAccessControl>
pub fn read(&self, bucket: &str, entity: &Entity) -> Result<BucketAccessControl>
Returns the ACL entry for the specified entity on the specified bucket.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
§Example
use cloud_storage::sync::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, Entity};
let client = Client::new()?;
let controls = client.bucket_access_control().read("mybucket", &Entity::AllUsers)?;
Sourcepub fn update(
&self,
bucket_access_control: &BucketAccessControl,
) -> Result<BucketAccessControl>
pub fn update( &self, bucket_access_control: &BucketAccessControl, ) -> Result<BucketAccessControl>
Update this BucketAccessControl
.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
§Example
use cloud_storage::sync::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, Entity};
let client = Client::new()?;
let mut acl = client.bucket_access_control().read("mybucket", &Entity::AllUsers)?;
acl.entity = Entity::AllAuthenticatedUsers;
client.bucket_access_control().update(&acl)?;
Sourcepub fn delete(&self, bucket_access_control: BucketAccessControl) -> Result<()>
pub fn delete(&self, bucket_access_control: BucketAccessControl) -> Result<()>
Permanently deletes the ACL entry for the specified entity on the specified bucket.
§Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
§Example
use cloud_storage::sync::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, Entity};
let client = Client::new()?;
let controls = client.bucket_access_control().read("mybucket", &Entity::AllUsers)?;
client.bucket_access_control().delete(controls)?;