- 1.56.0 (latest)
- 1.55.0
- 1.54.0
- 1.53.0
- 1.52.0
- 1.50.0
- 1.49.0
- 1.48.0
- 1.47.0
- 1.46.0
- 1.45.0
- 1.44.0
- 1.43.0
- 1.42.0
- 1.41.0
- 1.40.0
- 1.38.0
- 1.37.0
- 1.36.0
- 1.35.0
- 1.34.0
- 1.33.0
- 1.32.0
- 1.31.0
- 1.30.0
- 1.29.0
- 1.28.0
- 1.25.0
- 1.24.0
- 1.23.0
- 1.22.0
- 1.21.0
- 1.20.0
- 1.19.0
- 1.18.0
- 1.17.0
- 1.16.0
- 1.15.0
- 1.14.0
- 1.13.0
- 1.12.0
- 1.11.0
- 1.10.0
- 1.9.0
- 1.8.0
- 1.7.0
- 1.6.0
- 1.5.0
- 1.4.5
- 1.3.1
- 1.2.10
public static interface ServicePerimeterConfig.IngressSourceOrBuilder extends MessageOrBuilder
Implements
MessageOrBuilderMethods
getAccessLevel()
public abstract String getAccessLevel()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Returns | |
---|---|
Type | Description |
String |
The accessLevel. |
getAccessLevelBytes()
public abstract ByteString getAccessLevelBytes()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Returns | |
---|---|
Type | Description |
ByteString |
The bytes for accessLevel. |
getResource()
public abstract String getResource()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Returns | |
---|---|
Type | Description |
String |
The resource. |
getResourceBytes()
public abstract ByteString getResourceBytes()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Returns | |
---|---|
Type | Description |
ByteString |
The bytes for resource. |
getSourceCase()
public abstract ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()
Returns | |
---|---|
Type | Description |
ServicePerimeterConfig.IngressSource.SourceCase |
hasAccessLevel()
public abstract boolean hasAccessLevel()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Returns | |
---|---|
Type | Description |
boolean |
Whether the accessLevel field is set. |
hasResource()
public abstract boolean hasResource()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Returns | |
---|---|
Type | Description |
boolean |
Whether the resource field is set. |