NfsAccessRuleArgs

data class NfsAccessRuleArgs(val access: Output<Either<String, NfsAccessRuleAccess>>, val anonymousGID: Output<String>? = null, val anonymousUID: Output<String>? = null, val filter: Output<String>? = null, val rootSquash: Output<Boolean>? = null, val scope: Output<Either<String, NfsAccessRuleScope>>, val submountAccess: Output<Boolean>? = null, val suid: Output<Boolean>? = null) : ConvertibleToJava<NfsAccessRuleArgs>

Rule to place restrictions on portions of the cache namespace being presented to clients.

Constructors

Link copied to clipboard
constructor(access: Output<Either<String, NfsAccessRuleAccess>>, anonymousGID: Output<String>? = null, anonymousUID: Output<String>? = null, filter: Output<String>? = null, rootSquash: Output<Boolean>? = null, scope: Output<Either<String, NfsAccessRuleScope>>, submountAccess: Output<Boolean>? = null, suid: Output<Boolean>? = null)

Properties

Link copied to clipboard
val access: Output<Either<String, NfsAccessRuleAccess>>

Access allowed by this rule.

Link copied to clipboard
val anonymousGID: Output<String>? = null

GID value that replaces 0 when rootSquash is true. This will use the value of anonymousUID if not provided.

Link copied to clipboard
val anonymousUID: Output<String>? = null

UID value that replaces 0 when rootSquash is true. 65534 will be used if not provided.

Link copied to clipboard
val filter: Output<String>? = null

Filter applied to the scope for this rule. The filter's format depends on its scope. 'default' scope matches all clients and has no filter value. 'network' scope takes a filter in CIDR format (for example, 10.99.1.0/24). 'host' takes an IP address or fully qualified domain name as filter. If a client does not match any filter rule and there is no default rule, access is denied.

Link copied to clipboard
val rootSquash: Output<Boolean>? = null

Map root accesses to anonymousUID and anonymousGID.

Link copied to clipboard
val scope: Output<Either<String, NfsAccessRuleScope>>

Scope for this rule. The scope and filter determine which clients match the rule.

Link copied to clipboard
val submountAccess: Output<Boolean>? = null

For the default policy, allow access to subdirectories under the root export. If this is set to no, clients can only mount the path '/'. If set to yes, clients can mount a deeper path, like '/a/b'.

Link copied to clipboard
val suid: Output<Boolean>? = null

Allow SUID semantics.

Functions

Link copied to clipboard
open override fun toJava(): NfsAccessRuleArgs