Struct cloud_storage::client::BucketAccessControlClient
source · pub struct BucketAccessControlClient<'a>(/* private fields */);
Expand description
Operations on BucketAccessControl
s.
Implementations§
source§impl<'a> BucketAccessControlClient<'a>
impl<'a> BucketAccessControlClient<'a>
sourcepub async fn create(
&self,
bucket: &str,
new_bucket_access_control: &NewBucketAccessControl
) -> Result<BucketAccessControl>
pub async fn create( &self, bucket: &str, new_bucket_access_control: &NewBucketAccessControl ) -> Result<BucketAccessControl>
Create a new BucketAccessControl
using the provided NewBucketAccessControl
, related to
the Bucket
provided by the bucket_name
argument.
Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
Example
use cloud_storage::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, NewBucketAccessControl};
use cloud_storage::bucket_access_control::{Role, Entity};
let client = Client::default();
let new_bucket_access_control = NewBucketAccessControl {
entity: Entity::AllUsers,
role: Role::Reader,
};
client.bucket_access_control().create("mybucket", &new_bucket_access_control).await?;
sourcepub async fn list(&self, bucket: &str) -> Result<Vec<BucketAccessControl>>
pub async fn list(&self, bucket: &str) -> Result<Vec<BucketAccessControl>>
Returns all BucketAccessControl
s related to this bucket.
Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
Example
use cloud_storage::Client;
use cloud_storage::bucket_access_control::BucketAccessControl;
let client = Client::default();
let acls = client.bucket_access_control().list("mybucket").await?;
sourcepub async fn read(
&self,
bucket: &str,
entity: &Entity
) -> Result<BucketAccessControl>
pub async fn read( &self, bucket: &str, entity: &Entity ) -> Result<BucketAccessControl>
Returns the ACL entry for the specified entity on the specified bucket.
Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
Example
use cloud_storage::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, Entity};
let client = Client::default();
let controls = client.bucket_access_control().read("mybucket", &Entity::AllUsers).await?;
sourcepub async fn update(
&self,
bucket_access_control: &BucketAccessControl
) -> Result<BucketAccessControl>
pub async fn update( &self, bucket_access_control: &BucketAccessControl ) -> Result<BucketAccessControl>
Update this BucketAccessControl
.
Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
Example
use cloud_storage::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, Entity};
let client = Client::default();
let mut acl = client.bucket_access_control().read("mybucket", &Entity::AllUsers).await?;
acl.entity = Entity::AllAuthenticatedUsers;
client.bucket_access_control().update(&acl).await?;
sourcepub async fn delete(
&self,
bucket_access_control: BucketAccessControl
) -> Result<()>
pub async fn delete( &self, bucket_access_control: BucketAccessControl ) -> Result<()>
Permanently deletes the ACL entry for the specified entity on the specified bucket.
Important
Important: This method fails with a 400 Bad Request response for buckets with uniform
bucket-level access enabled. Use Bucket::get_iam_policy
and Bucket::set_iam_policy
to
control access instead.
Example
use cloud_storage::Client;
use cloud_storage::bucket_access_control::{BucketAccessControl, Entity};
let client = Client::default();
let controls = client.bucket_access_control().read("mybucket", &Entity::AllUsers).await?;
client.bucket_access_control().delete(controls).await?;