Interface NetappVolumeExportPolicyRules

  • All Superinterfaces:
    software.amazon.jsii.JsiiSerializable
    All Known Implementing Classes:
    NetappVolumeExportPolicyRules.Jsii$Proxy

    @Generated(value="jsii-pacmak/1.102.0 (build e354887)",
               date="2024-08-31T03:59:22.019Z")
    @Stability(Stable)
    public interface NetappVolumeExportPolicyRules
    extends software.amazon.jsii.JsiiSerializable
    • Method Detail

      • getAccessType

        @Stability(Stable)
        @Nullable
        default String getAccessType()
        Defines the access type for clients matching the 'allowedClients' specification. Possible values: ["READ_ONLY", "READ_WRITE", "READ_NONE"].

        Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#access_type NetappVolume#access_type}

      • getAllowedClients

        @Stability(Stable)
        @Nullable
        default String getAllowedClients()
        Defines the client ingress specification (allowed clients) as a comma seperated list with IPv4 CIDRs or IPv4 host addresses.

        Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#allowed_clients NetappVolume#allowed_clients}

      • getHasRootAccess

        @Stability(Stable)
        @Nullable
        default String getHasRootAccess()
        If enabled, the root user (UID = 0) of the specified clients doesn't get mapped to nobody (UID = 65534).

        This is also known as no_root_squash. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#has_root_access NetappVolume#has_root_access}

      • getKerberos5IReadOnly

        @Stability(Stable)
        @Nullable
        default Object getKerberos5IReadOnly()
        If enabled (true) the rule defines a read only access for clients matching the 'allowedClients' specification.

        It enables nfs clients to mount using 'integrity' kerberos security mode. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#kerberos5i_read_only NetappVolume#kerberos5i_read_only}

      • getKerberos5IReadWrite

        @Stability(Stable)
        @Nullable
        default Object getKerberos5IReadWrite()
        If enabled (true) the rule defines read and write access for clients matching the 'allowedClients' specification.

        It enables nfs clients to mount using 'integrity' kerberos security mode. The 'kerberos5iReadOnly' value is ignored if this is enabled. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#kerberos5i_read_write NetappVolume#kerberos5i_read_write}

      • getKerberos5PReadOnly

        @Stability(Stable)
        @Nullable
        default Object getKerberos5PReadOnly()
        If enabled (true) the rule defines a read only access for clients matching the 'allowedClients' specification.

        It enables nfs clients to mount using 'privacy' kerberos security mode. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#kerberos5p_read_only NetappVolume#kerberos5p_read_only}

      • getKerberos5PReadWrite

        @Stability(Stable)
        @Nullable
        default Object getKerberos5PReadWrite()
        If enabled (true) the rule defines read and write access for clients matching the 'allowedClients' specification.

        It enables nfs clients to mount using 'privacy' kerberos security mode. The 'kerberos5pReadOnly' value is ignored if this is enabled. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#kerberos5p_read_write NetappVolume#kerberos5p_read_write}

      • getKerberos5ReadOnly

        @Stability(Stable)
        @Nullable
        default Object getKerberos5ReadOnly()
        If enabled (true) the rule defines a read only access for clients matching the 'allowedClients' specification.

        It enables nfs clients to mount using 'authentication' kerberos security mode. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#kerberos5_read_only NetappVolume#kerberos5_read_only}

      • getKerberos5ReadWrite

        @Stability(Stable)
        @Nullable
        default Object getKerberos5ReadWrite()
        If enabled (true) the rule defines read and write access for clients matching the 'allowedClients' specification.

        It enables nfs clients to mount using 'authentication' kerberos security mode. The 'kerberos5ReadOnly' value is ignored if this is enabled. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#kerberos5_read_write NetappVolume#kerberos5_read_write}

      • getNfsv3

        @Stability(Stable)
        @Nullable
        default Object getNfsv3()
        Enable to apply the export rule to NFSV3 clients.

        Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#nfsv3 NetappVolume#nfsv3}

      • getNfsv4

        @Stability(Stable)
        @Nullable
        default Object getNfsv4()
        Enable to apply the export rule to NFSV4.1 clients.

        Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/netapp_volume#nfsv4 NetappVolume#nfsv4}