public static interface ServicePerimeterConfig.IngressSourceOrBuilder extends MessageOrBuilderImplements
MessageOrBuilderMethods
getAccessLevel()
public abstract String getAccessLevel() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Type | Description |
| String | The accessLevel. |
getAccessLevelBytes()
public abstract ByteString getAccessLevelBytes() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Type | Description |
| ByteString | The bytes for accessLevel. |
getResource()
public abstract String getResource() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Type | Description |
| String | The resource. |
getResourceBytes()
public abstract ByteString getResourceBytes() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Type | Description |
| ByteString | The bytes for resource. |
getSourceCase()
public abstract ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()| Type | Description |
| ServicePerimeterConfig.IngressSource.SourceCase |
hasAccessLevel()
public abstract boolean hasAccessLevel() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Type | Description |
| boolean | Whether the accessLevel field is set. |
hasResource()
public abstract boolean hasResource() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Type | Description |
| boolean | Whether the resource field is set. |