- 1.79.0 (latest)
 - 1.77.0
 - 1.76.0
 - 1.75.0
 - 1.74.0
 - 1.73.0
 - 1.71.0
 - 1.69.0
 - 1.68.0
 - 1.65.0
 - 1.64.0
 - 1.63.0
 - 1.61.0
 - 1.60.0
 - 1.59.0
 - 1.58.0
 - 1.57.0
 - 1.56.0
 - 1.55.0
 - 1.54.0
 - 1.53.0
 - 1.52.0
 - 1.50.0
 - 1.49.0
 - 1.48.0
 - 1.47.0
 - 1.46.0
 - 1.45.0
 - 1.44.0
 - 1.43.0
 - 1.42.0
 - 1.41.0
 - 1.40.0
 - 1.38.0
 - 1.37.0
 - 1.36.0
 - 1.35.0
 - 1.34.0
 - 1.33.0
 - 1.32.0
 - 1.31.0
 - 1.30.0
 - 1.29.0
 - 1.28.0
 - 1.25.0
 - 1.24.0
 - 1.23.0
 - 1.22.0
 - 1.21.0
 - 1.20.0
 - 1.19.0
 - 1.18.0
 - 1.17.0
 - 1.16.0
 - 1.15.0
 - 1.14.0
 - 1.13.0
 - 1.12.0
 - 1.11.0
 - 1.10.0
 - 1.9.0
 - 1.8.0
 - 1.7.0
 - 1.6.0
 - 1.5.0
 - 1.4.5
 - 1.3.1
 - 1.2.10
 
public static interface ServicePerimeterConfig.IngressSourceOrBuilder extends MessageOrBuilderImplements
MessageOrBuilderMethods
getAccessLevel()
public abstract String getAccessLevel() An [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] resource
 name that allow resources within the [ServicePerimeters]
 [google.identity.accesscontextmanager.v1.ServicePerimeter] to be
 accessed from the internet. [AccessLevels]
 [google.identity.accesscontextmanager.v1.AccessLevel] listed must
 be in the same policy as this [ServicePerimeter]
 [google.identity.accesscontextmanager.v1.ServicePerimeter].
 Referencing a nonexistent [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] will cause
 an error. If no [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] names are
 listed, resources within the perimeter can only be accessed via Google
 Cloud calls with request origins within the perimeter. Example:
 accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
 specified for access_level, then all [IngressSources]
 [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
 will be allowed.
 string access_level = 1;
| Returns | |
|---|---|
| Type | Description | 
String | 
        The accessLevel.  | 
      
getAccessLevelBytes()
public abstract ByteString getAccessLevelBytes() An [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] resource
 name that allow resources within the [ServicePerimeters]
 [google.identity.accesscontextmanager.v1.ServicePerimeter] to be
 accessed from the internet. [AccessLevels]
 [google.identity.accesscontextmanager.v1.AccessLevel] listed must
 be in the same policy as this [ServicePerimeter]
 [google.identity.accesscontextmanager.v1.ServicePerimeter].
 Referencing a nonexistent [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] will cause
 an error. If no [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] names are
 listed, resources within the perimeter can only be accessed via Google
 Cloud calls with request origins within the perimeter. Example:
 accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
 specified for access_level, then all [IngressSources]
 [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
 will be allowed.
 string access_level = 1;
| Returns | |
|---|---|
| Type | Description | 
ByteString | 
        The bytes for accessLevel.  | 
      
getResource()
public abstract String getResource() A Google Cloud resource that is allowed to ingress the perimeter.
 Requests from these resources will be allowed to access perimeter data.
 Currently only projects are allowed.
 Format: projects/{project_number}
 The project may be in any Google Cloud organization, not just the
 organization that the perimeter is defined in. * is not allowed, the
 case of allowing all Google Cloud resources only is not supported.
 string resource = 2;
| Returns | |
|---|---|
| Type | Description | 
String | 
        The resource.  | 
      
getResourceBytes()
public abstract ByteString getResourceBytes() A Google Cloud resource that is allowed to ingress the perimeter.
 Requests from these resources will be allowed to access perimeter data.
 Currently only projects are allowed.
 Format: projects/{project_number}
 The project may be in any Google Cloud organization, not just the
 organization that the perimeter is defined in. * is not allowed, the
 case of allowing all Google Cloud resources only is not supported.
 string resource = 2;
| Returns | |
|---|---|
| Type | Description | 
ByteString | 
        The bytes for resource.  | 
      
getSourceCase()
public abstract ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()| Returns | |
|---|---|
| Type | Description | 
ServicePerimeterConfig.IngressSource.SourceCase | 
        |
hasAccessLevel()
public abstract boolean hasAccessLevel() An [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] resource
 name that allow resources within the [ServicePerimeters]
 [google.identity.accesscontextmanager.v1.ServicePerimeter] to be
 accessed from the internet. [AccessLevels]
 [google.identity.accesscontextmanager.v1.AccessLevel] listed must
 be in the same policy as this [ServicePerimeter]
 [google.identity.accesscontextmanager.v1.ServicePerimeter].
 Referencing a nonexistent [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] will cause
 an error. If no [AccessLevel]
 [google.identity.accesscontextmanager.v1.AccessLevel] names are
 listed, resources within the perimeter can only be accessed via Google
 Cloud calls with request origins within the perimeter. Example:
 accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
 specified for access_level, then all [IngressSources]
 [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
 will be allowed.
 string access_level = 1;
| Returns | |
|---|---|
| Type | Description | 
boolean | 
        Whether the accessLevel field is set.  | 
      
hasResource()
public abstract boolean hasResource() A Google Cloud resource that is allowed to ingress the perimeter.
 Requests from these resources will be allowed to access perimeter data.
 Currently only projects are allowed.
 Format: projects/{project_number}
 The project may be in any Google Cloud organization, not just the
 organization that the perimeter is defined in. * is not allowed, the
 case of allowing all Google Cloud resources only is not supported.
 string resource = 2;
| Returns | |
|---|---|
| Type | Description | 
boolean | 
        Whether the resource field is set.  |