- 1.79.0 (latest)
- 1.77.0
- 1.76.0
- 1.75.0
- 1.74.0
- 1.73.0
- 1.71.0
- 1.69.0
- 1.68.0
- 1.65.0
- 1.64.0
- 1.63.0
- 1.61.0
- 1.60.0
- 1.59.0
- 1.58.0
- 1.57.0
- 1.56.0
- 1.55.0
- 1.54.0
- 1.53.0
- 1.52.0
- 1.50.0
- 1.49.0
- 1.48.0
- 1.47.0
- 1.46.0
- 1.45.0
- 1.44.0
- 1.43.0
- 1.42.0
- 1.41.0
- 1.40.0
- 1.38.0
- 1.37.0
- 1.36.0
- 1.35.0
- 1.34.0
- 1.33.0
- 1.32.0
- 1.31.0
- 1.30.0
- 1.29.0
- 1.28.0
- 1.25.0
- 1.24.0
- 1.23.0
- 1.22.0
- 1.21.0
- 1.20.0
- 1.19.0
- 1.18.0
- 1.17.0
- 1.16.0
- 1.15.0
- 1.14.0
- 1.13.0
- 1.12.0
- 1.11.0
- 1.10.0
- 1.9.0
- 1.8.0
- 1.7.0
- 1.6.0
- 1.5.0
- 1.4.5
- 1.3.1
- 1.2.10
public static interface ServicePerimeterConfig.IngressSourceOrBuilder extends MessageOrBuilderImplements
MessageOrBuilderMethods
getAccessLevel()
public abstract String getAccessLevel() An [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] resource
 name that allow resources within the [ServicePerimeters]
 [google.identity.accesscontextmanager.v1.ServicePerimeter] to be
 accessed from the internet. [AccessLevels]
 [google.identity.accesscontextmanager.v1.AccessLevel] listed must
 be in the same policy as this [ServicePerimeter]
 [google.identity.accesscontextmanager.v1.ServicePerimeter].
 Referencing a nonexistent [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] will cause
 an error. If no [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] names are
 listed, resources within the perimeter can only be accessed via Google
 Cloud calls with request origins within the perimeter. Example:
 accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
 specified for access_level, then all [IngressSources]
 [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
 will be allowed.
 string access_level = 1;
| Type | Description | 
| String | The accessLevel. | 
getAccessLevelBytes()
public abstract ByteString getAccessLevelBytes() An [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] resource
 name that allow resources within the [ServicePerimeters]
 [google.identity.accesscontextmanager.v1.ServicePerimeter] to be
 accessed from the internet. [AccessLevels]
 [google.identity.accesscontextmanager.v1.AccessLevel] listed must
 be in the same policy as this [ServicePerimeter]
 [google.identity.accesscontextmanager.v1.ServicePerimeter].
 Referencing a nonexistent [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] will cause
 an error. If no [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] names are
 listed, resources within the perimeter can only be accessed via Google
 Cloud calls with request origins within the perimeter. Example:
 accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
 specified for access_level, then all [IngressSources]
 [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
 will be allowed.
 string access_level = 1;
| Type | Description | 
| ByteString | The bytes for accessLevel. | 
getResource()
public abstract String getResource() A Google Cloud resource that is allowed to ingress the perimeter.
 Requests from these resources will be allowed to access perimeter data.
 Currently only projects are allowed.
 Format: projects/{project_number}
 The project may be in any Google Cloud organization, not just the
 organization that the perimeter is defined in. * is not allowed, the
 case of allowing all Google Cloud resources only is not supported.
 string resource = 2;
| Type | Description | 
| String | The resource. | 
getResourceBytes()
public abstract ByteString getResourceBytes() A Google Cloud resource that is allowed to ingress the perimeter.
 Requests from these resources will be allowed to access perimeter data.
 Currently only projects are allowed.
 Format: projects/{project_number}
 The project may be in any Google Cloud organization, not just the
 organization that the perimeter is defined in. * is not allowed, the
 case of allowing all Google Cloud resources only is not supported.
 string resource = 2;
| Type | Description | 
| ByteString | The bytes for resource. | 
getSourceCase()
public abstract ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()| Type | Description | 
| ServicePerimeterConfig.IngressSource.SourceCase | 
hasAccessLevel()
public abstract boolean hasAccessLevel() An [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] resource
 name that allow resources within the [ServicePerimeters]
 [google.identity.accesscontextmanager.v1.ServicePerimeter] to be
 accessed from the internet. [AccessLevels]
 [google.identity.accesscontextmanager.v1.AccessLevel] listed must
 be in the same policy as this [ServicePerimeter]
 [google.identity.accesscontextmanager.v1.ServicePerimeter].
 Referencing a nonexistent [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] will cause
 an error. If no [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] names are
 listed, resources within the perimeter can only be accessed via Google
 Cloud calls with request origins within the perimeter. Example:
 accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
 specified for access_level, then all [IngressSources]
 [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
 will be allowed.
 string access_level = 1;
| Type | Description | 
| boolean | Whether the accessLevel field is set. | 
hasResource()
public abstract boolean hasResource() A Google Cloud resource that is allowed to ingress the perimeter.
 Requests from these resources will be allowed to access perimeter data.
 Currently only projects are allowed.
 Format: projects/{project_number}
 The project may be in any Google Cloud organization, not just the
 organization that the perimeter is defined in. * is not allowed, the
 case of allowing all Google Cloud resources only is not supported.
 string resource = 2;
| Type | Description | 
| boolean | Whether the resource field is set. |