Reference documentation and code samples for the Access Context Manager V1 Client class IngressSource.
The source that [IngressPolicy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] authorizes access from.
Generated from protobuf message google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource
Methods
__construct
Constructor.
Parameters | |
---|---|
Name | Description |
data |
array
Optional. Data for populating the Message object. |
↳ access_level |
string
An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: |
↳ resource |
string
A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: |
getAccessLevel
An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
Returns | |
---|---|
Type | Description |
string |
hasAccessLevel
setAccessLevel
An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getResource
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
Returns | |
---|---|
Type | Description |
string |
hasResource
setResource
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getSource
Returns | |
---|---|
Type | Description |
string |