A stub to allow clients to do synchronous rpc calls to service Firewall.
Firewall resources are used to define a collection of access control rules
for an Application. Each rule is defined with a position which specifies
the rule's order in the sequence of rules, an IP range to be matched against
requests, and an action to take upon matching requests.
Every request is evaluated against the Firewall rules in priority order.
Processesing stops at the first rule which matches the request's IP address.
A final rule always specifies an action that applies to all remaining
IP addresses. The default final rule for a newly-created application will be
set to "allow" if not otherwise specified by the user.
Inherited Members
io.grpc.stub.AbstractBlockingStub.<T>newStub(io.grpc.stub.AbstractStub.StubFactory<T>,io.grpc.Channel)
io.grpc.stub.AbstractBlockingStub.<T>newStub(io.grpc.stub.AbstractStub.StubFactory<T>,io.grpc.Channel,io.grpc.CallOptions)
io.grpc.stub.AbstractStub.<T>withOption(io.grpc.CallOptions.Key<T>,T)
io.grpc.stub.AbstractStub.build(io.grpc.Channel,io.grpc.CallOptions)
io.grpc.stub.AbstractStub.getCallOptions()
io.grpc.stub.AbstractStub.getChannel()
io.grpc.stub.AbstractStub.withCallCredentials(io.grpc.CallCredentials)
io.grpc.stub.AbstractStub.withChannel(io.grpc.Channel)
io.grpc.stub.AbstractStub.withCompression(java.lang.String)
io.grpc.stub.AbstractStub.withDeadline(io.grpc.Deadline)
io.grpc.stub.AbstractStub.withDeadlineAfter(java.time.Duration)
io.grpc.stub.AbstractStub.withDeadlineAfter(long,java.util.concurrent.TimeUnit)
io.grpc.stub.AbstractStub.withExecutor(java.util.concurrent.Executor)
io.grpc.stub.AbstractStub.withInterceptors(io.grpc.ClientInterceptor...)
io.grpc.stub.AbstractStub.withMaxInboundMessageSize(int)
io.grpc.stub.AbstractStub.withMaxOutboundMessageSize(int)
io.grpc.stub.AbstractStub.withOnReadyThreshold(int)
io.grpc.stub.AbstractStub.withWaitForReady()
Replaces the entire firewall ruleset in one bulk operation. This overrides
and replaces the rules of an existing firewall with the new rules.
If the final rule does not match traffic with the '*' wildcard IP range,
then an "allow all" rule is explicitly added to the end of the list.