public static final class ServicePerimeterConfig.IngressSource.Builder extends GeneratedMessage.Builder<ServicePerimeterConfig.IngressSource.Builder> implements ServicePerimeterConfig.IngressSourceOrBuilderThe source that [IngressPolicy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] authorizes access from.
Protobuf type
google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource
Inheritance
java.lang.Object > AbstractMessageLite.Builder<MessageType,BuilderType> > AbstractMessage.Builder<BuilderType> > GeneratedMessage.Builder > ServicePerimeterConfig.IngressSource.BuilderStatic Methods
getDescriptor()
public static final Descriptors.Descriptor getDescriptor()| Returns | |
|---|---|
| Type | Description |
Descriptor |
|
Methods
build()
public ServicePerimeterConfig.IngressSource build()| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource |
|
buildPartial()
public ServicePerimeterConfig.IngressSource buildPartial()| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource |
|
clear()
public ServicePerimeterConfig.IngressSource.Builder clear()| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
|
clearAccessLevel()
public ServicePerimeterConfig.IngressSource.Builder clearAccessLevel() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
This builder for chaining. |
clearResource()
public ServicePerimeterConfig.IngressSource.Builder clearResource() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
This builder for chaining. |
clearSource()
public ServicePerimeterConfig.IngressSource.Builder clearSource()| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
|
getAccessLevel()
public String getAccessLevel() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Returns | |
|---|---|
| Type | Description |
String |
The accessLevel. |
getAccessLevelBytes()
public ByteString getAccessLevelBytes() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Returns | |
|---|---|
| Type | Description |
ByteString |
The bytes for accessLevel. |
getDefaultInstanceForType()
public ServicePerimeterConfig.IngressSource getDefaultInstanceForType()| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource |
|
getDescriptorForType()
public Descriptors.Descriptor getDescriptorForType()| Returns | |
|---|---|
| Type | Description |
Descriptor |
|
getResource()
public String getResource() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Returns | |
|---|---|
| Type | Description |
String |
The resource. |
getResourceBytes()
public ByteString getResourceBytes() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Returns | |
|---|---|
| Type | Description |
ByteString |
The bytes for resource. |
getSourceCase()
public ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.SourceCase |
|
hasAccessLevel()
public boolean hasAccessLevel() An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Returns | |
|---|---|
| Type | Description |
boolean |
Whether the accessLevel field is set. |
hasResource()
public boolean hasResource() A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Returns | |
|---|---|
| Type | Description |
boolean |
Whether the resource field is set. |
internalGetFieldAccessorTable()
protected GeneratedMessage.FieldAccessorTable internalGetFieldAccessorTable()| Returns | |
|---|---|
| Type | Description |
FieldAccessorTable |
|
isInitialized()
public final boolean isInitialized()| Returns | |
|---|---|
| Type | Description |
boolean |
|
mergeFrom(ServicePerimeterConfig.IngressSource other)
public ServicePerimeterConfig.IngressSource.Builder mergeFrom(ServicePerimeterConfig.IngressSource other)| Parameter | |
|---|---|
| Name | Description |
other |
ServicePerimeterConfig.IngressSource |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
|
mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
public ServicePerimeterConfig.IngressSource.Builder mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)| Parameters | |
|---|---|
| Name | Description |
input |
CodedInputStream |
extensionRegistry |
ExtensionRegistryLite |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
|
| Exceptions | |
|---|---|
| Type | Description |
IOException |
|
mergeFrom(Message other)
public ServicePerimeterConfig.IngressSource.Builder mergeFrom(Message other)| Parameter | |
|---|---|
| Name | Description |
other |
Message |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
|
setAccessLevel(String value)
public ServicePerimeterConfig.IngressSource.Builder setAccessLevel(String value) An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Parameter | |
|---|---|
| Name | Description |
value |
StringThe accessLevel to set. |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
This builder for chaining. |
setAccessLevelBytes(ByteString value)
public ServicePerimeterConfig.IngressSource.Builder setAccessLevelBytes(ByteString value) An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
| Parameter | |
|---|---|
| Name | Description |
value |
ByteStringThe bytes for accessLevel to set. |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
This builder for chaining. |
setResource(String value)
public ServicePerimeterConfig.IngressSource.Builder setResource(String value) A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Parameter | |
|---|---|
| Name | Description |
value |
StringThe resource to set. |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
This builder for chaining. |
setResourceBytes(ByteString value)
public ServicePerimeterConfig.IngressSource.Builder setResourceBytes(ByteString value) A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
| Parameter | |
|---|---|
| Name | Description |
value |
ByteStringThe bytes for resource to set. |
| Returns | |
|---|---|
| Type | Description |
ServicePerimeterConfig.IngressSource.Builder |
This builder for chaining. |