All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azure.hpc.inputs.CacheAccessPolicyAccessRuleArgs Maven / Gradle / Ivy

Go to download

A Pulumi package for creating and managing Microsoft Azure cloud resources, based on the Terraform azurerm provider. We recommend using the [Azure Native provider](https://github.com/pulumi/pulumi-azure-native) to provision Azure infrastructure. Azure Native provides complete coverage of Azure resources and same-day access to new resources and resource updates.

There is a newer version: 6.10.0-alpha.1731737215
Show newest version
// *** WARNING: this file was generated by pulumi-java-gen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***

package com.pulumi.azure.hpc.inputs;

import com.pulumi.core.Output;
import com.pulumi.core.annotations.Import;
import com.pulumi.exceptions.MissingRequiredPropertyException;
import java.lang.Boolean;
import java.lang.Integer;
import java.lang.String;
import java.util.Objects;
import java.util.Optional;
import javax.annotation.Nullable;


public final class CacheAccessPolicyAccessRuleArgs extends com.pulumi.resources.ResourceArgs {

    public static final CacheAccessPolicyAccessRuleArgs Empty = new CacheAccessPolicyAccessRuleArgs();

    /**
     * The access level for this rule. Possible values are: `rw`, `ro`, `no`.
     * 
     */
    @Import(name="access", required=true)
    private Output access;

    /**
     * @return The access level for this rule. Possible values are: `rw`, `ro`, `no`.
     * 
     */
    public Output access() {
        return this.access;
    }

    /**
     * The anonymous GID used when `root_squash_enabled` is `true`.
     * 
     */
    @Import(name="anonymousGid")
    private @Nullable Output anonymousGid;

    /**
     * @return The anonymous GID used when `root_squash_enabled` is `true`.
     * 
     */
    public Optional> anonymousGid() {
        return Optional.ofNullable(this.anonymousGid);
    }

    /**
     * The anonymous UID used when `root_squash_enabled` is `true`.
     * 
     */
    @Import(name="anonymousUid")
    private @Nullable Output anonymousUid;

    /**
     * @return The anonymous UID used when `root_squash_enabled` is `true`.
     * 
     */
    public Optional> anonymousUid() {
        return Optional.ofNullable(this.anonymousUid);
    }

    /**
     * The filter applied to the `scope` for this rule. The filter's format depends on its scope: `default` scope matches all clients and has no filter value; `network` scope takes a CIDR format; `host` takes an IP address or fully qualified domain name. If a client does not match any filter rule and there is no default rule, access is denied.
     * 
     */
    @Import(name="filter")
    private @Nullable Output filter;

    /**
     * @return The filter applied to the `scope` for this rule. The filter's format depends on its scope: `default` scope matches all clients and has no filter value; `network` scope takes a CIDR format; `host` takes an IP address or fully qualified domain name. If a client does not match any filter rule and there is no default rule, access is denied.
     * 
     */
    public Optional> filter() {
        return Optional.ofNullable(this.filter);
    }

    /**
     * Whether to enable [root squash](https://docs.microsoft.com/azure/hpc-cache/access-policies#root-squash)?
     * 
     */
    @Import(name="rootSquashEnabled")
    private @Nullable Output rootSquashEnabled;

    /**
     * @return Whether to enable [root squash](https://docs.microsoft.com/azure/hpc-cache/access-policies#root-squash)?
     * 
     */
    public Optional> rootSquashEnabled() {
        return Optional.ofNullable(this.rootSquashEnabled);
    }

    /**
     * The scope of this rule. The `scope` and (potentially) the `filter` determine which clients match the rule. Possible values are: `default`, `network`, `host`.
     * 
     * > **NOTE:** Each `access_rule` should set a unique `scope`.
     * 
     */
    @Import(name="scope", required=true)
    private Output scope;

    /**
     * @return The scope of this rule. The `scope` and (potentially) the `filter` determine which clients match the rule. Possible values are: `default`, `network`, `host`.
     * 
     * > **NOTE:** Each `access_rule` should set a unique `scope`.
     * 
     */
    public Output scope() {
        return this.scope;
    }

    /**
     * Whether allow access to subdirectories under the root export?
     * 
     */
    @Import(name="submountAccessEnabled")
    private @Nullable Output submountAccessEnabled;

    /**
     * @return Whether allow access to subdirectories under the root export?
     * 
     */
    public Optional> submountAccessEnabled() {
        return Optional.ofNullable(this.submountAccessEnabled);
    }

    /**
     * Whether [SUID](https://docs.microsoft.com/azure/hpc-cache/access-policies#suid) is allowed?
     * 
     */
    @Import(name="suidEnabled")
    private @Nullable Output suidEnabled;

    /**
     * @return Whether [SUID](https://docs.microsoft.com/azure/hpc-cache/access-policies#suid) is allowed?
     * 
     */
    public Optional> suidEnabled() {
        return Optional.ofNullable(this.suidEnabled);
    }

    private CacheAccessPolicyAccessRuleArgs() {}

    private CacheAccessPolicyAccessRuleArgs(CacheAccessPolicyAccessRuleArgs $) {
        this.access = $.access;
        this.anonymousGid = $.anonymousGid;
        this.anonymousUid = $.anonymousUid;
        this.filter = $.filter;
        this.rootSquashEnabled = $.rootSquashEnabled;
        this.scope = $.scope;
        this.submountAccessEnabled = $.submountAccessEnabled;
        this.suidEnabled = $.suidEnabled;
    }

    public static Builder builder() {
        return new Builder();
    }
    public static Builder builder(CacheAccessPolicyAccessRuleArgs defaults) {
        return new Builder(defaults);
    }

    public static final class Builder {
        private CacheAccessPolicyAccessRuleArgs $;

        public Builder() {
            $ = new CacheAccessPolicyAccessRuleArgs();
        }

        public Builder(CacheAccessPolicyAccessRuleArgs defaults) {
            $ = new CacheAccessPolicyAccessRuleArgs(Objects.requireNonNull(defaults));
        }

        /**
         * @param access The access level for this rule. Possible values are: `rw`, `ro`, `no`.
         * 
         * @return builder
         * 
         */
        public Builder access(Output access) {
            $.access = access;
            return this;
        }

        /**
         * @param access The access level for this rule. Possible values are: `rw`, `ro`, `no`.
         * 
         * @return builder
         * 
         */
        public Builder access(String access) {
            return access(Output.of(access));
        }

        /**
         * @param anonymousGid The anonymous GID used when `root_squash_enabled` is `true`.
         * 
         * @return builder
         * 
         */
        public Builder anonymousGid(@Nullable Output anonymousGid) {
            $.anonymousGid = anonymousGid;
            return this;
        }

        /**
         * @param anonymousGid The anonymous GID used when `root_squash_enabled` is `true`.
         * 
         * @return builder
         * 
         */
        public Builder anonymousGid(Integer anonymousGid) {
            return anonymousGid(Output.of(anonymousGid));
        }

        /**
         * @param anonymousUid The anonymous UID used when `root_squash_enabled` is `true`.
         * 
         * @return builder
         * 
         */
        public Builder anonymousUid(@Nullable Output anonymousUid) {
            $.anonymousUid = anonymousUid;
            return this;
        }

        /**
         * @param anonymousUid The anonymous UID used when `root_squash_enabled` is `true`.
         * 
         * @return builder
         * 
         */
        public Builder anonymousUid(Integer anonymousUid) {
            return anonymousUid(Output.of(anonymousUid));
        }

        /**
         * @param filter The filter applied to the `scope` for this rule. The filter's format depends on its scope: `default` scope matches all clients and has no filter value; `network` scope takes a CIDR format; `host` takes an IP address or fully qualified domain name. If a client does not match any filter rule and there is no default rule, access is denied.
         * 
         * @return builder
         * 
         */
        public Builder filter(@Nullable Output filter) {
            $.filter = filter;
            return this;
        }

        /**
         * @param filter The filter applied to the `scope` for this rule. The filter's format depends on its scope: `default` scope matches all clients and has no filter value; `network` scope takes a CIDR format; `host` takes an IP address or fully qualified domain name. If a client does not match any filter rule and there is no default rule, access is denied.
         * 
         * @return builder
         * 
         */
        public Builder filter(String filter) {
            return filter(Output.of(filter));
        }

        /**
         * @param rootSquashEnabled Whether to enable [root squash](https://docs.microsoft.com/azure/hpc-cache/access-policies#root-squash)?
         * 
         * @return builder
         * 
         */
        public Builder rootSquashEnabled(@Nullable Output rootSquashEnabled) {
            $.rootSquashEnabled = rootSquashEnabled;
            return this;
        }

        /**
         * @param rootSquashEnabled Whether to enable [root squash](https://docs.microsoft.com/azure/hpc-cache/access-policies#root-squash)?
         * 
         * @return builder
         * 
         */
        public Builder rootSquashEnabled(Boolean rootSquashEnabled) {
            return rootSquashEnabled(Output.of(rootSquashEnabled));
        }

        /**
         * @param scope The scope of this rule. The `scope` and (potentially) the `filter` determine which clients match the rule. Possible values are: `default`, `network`, `host`.
         * 
         * > **NOTE:** Each `access_rule` should set a unique `scope`.
         * 
         * @return builder
         * 
         */
        public Builder scope(Output scope) {
            $.scope = scope;
            return this;
        }

        /**
         * @param scope The scope of this rule. The `scope` and (potentially) the `filter` determine which clients match the rule. Possible values are: `default`, `network`, `host`.
         * 
         * > **NOTE:** Each `access_rule` should set a unique `scope`.
         * 
         * @return builder
         * 
         */
        public Builder scope(String scope) {
            return scope(Output.of(scope));
        }

        /**
         * @param submountAccessEnabled Whether allow access to subdirectories under the root export?
         * 
         * @return builder
         * 
         */
        public Builder submountAccessEnabled(@Nullable Output submountAccessEnabled) {
            $.submountAccessEnabled = submountAccessEnabled;
            return this;
        }

        /**
         * @param submountAccessEnabled Whether allow access to subdirectories under the root export?
         * 
         * @return builder
         * 
         */
        public Builder submountAccessEnabled(Boolean submountAccessEnabled) {
            return submountAccessEnabled(Output.of(submountAccessEnabled));
        }

        /**
         * @param suidEnabled Whether [SUID](https://docs.microsoft.com/azure/hpc-cache/access-policies#suid) is allowed?
         * 
         * @return builder
         * 
         */
        public Builder suidEnabled(@Nullable Output suidEnabled) {
            $.suidEnabled = suidEnabled;
            return this;
        }

        /**
         * @param suidEnabled Whether [SUID](https://docs.microsoft.com/azure/hpc-cache/access-policies#suid) is allowed?
         * 
         * @return builder
         * 
         */
        public Builder suidEnabled(Boolean suidEnabled) {
            return suidEnabled(Output.of(suidEnabled));
        }

        public CacheAccessPolicyAccessRuleArgs build() {
            if ($.access == null) {
                throw new MissingRequiredPropertyException("CacheAccessPolicyAccessRuleArgs", "access");
            }
            if ($.scope == null) {
                throw new MissingRequiredPropertyException("CacheAccessPolicyAccessRuleArgs", "scope");
            }
            return $;
        }
    }

}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy