Interface ServicePerimeterConfig.IngressSourceOrBuilder (1.4.0)

public static interface ServicePerimeterConfig.IngressSourceOrBuilder extends MessageOrBuilder

Implements

MessageOrBuilder

Methods

getAccessLevel()

public abstract String getAccessLevel()

An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is specified for access_level, then all [IngressSources] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource] will be allowed.

string access_level = 1;

Returns
TypeDescription
String

The accessLevel.

getAccessLevelBytes()

public abstract ByteString getAccessLevelBytes()

An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is specified for access_level, then all [IngressSources] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource] will be allowed.

string access_level = 1;

Returns
TypeDescription
ByteString

The bytes for accessLevel.

getResource()

public abstract String getResource()

A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: projects/{project_number} The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.

string resource = 2;

Returns
TypeDescription
String

The resource.

getResourceBytes()

public abstract ByteString getResourceBytes()

A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: projects/{project_number} The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.

string resource = 2;

Returns
TypeDescription
ByteString

The bytes for resource.

getSourceCase()

public abstract ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()
Returns
TypeDescription
ServicePerimeterConfig.IngressSource.SourceCase

hasAccessLevel()

public abstract boolean hasAccessLevel()

An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is specified for access_level, then all [IngressSources] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource] will be allowed.

string access_level = 1;

Returns
TypeDescription
boolean

Whether the accessLevel field is set.

hasResource()

public abstract boolean hasResource()

A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: projects/{project_number} The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.

string resource = 2;

Returns
TypeDescription
boolean

Whether the resource field is set.