Reference documentation and code samples for the Access Context Manager V1 Client class IngressSource.
The source that IngressPolicy authorizes access from.
Generated from protobuf message google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource
Namespace
Google \ Identity \ AccessContextManager \ V1 \ ServicePerimeterConfigMethods
__construct
Constructor.
Parameters | |
---|---|
Name | Description |
data |
array
Optional. Data for populating the Message object. |
↳ access_level |
string
An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: |
↳ resource |
string
A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: |
getAccessLevel
An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter.
Referencing a nonexistent AccessLevel will cause
an error. If no AccessLevel names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all IngressSources
will be allowed.
Returns | |
---|---|
Type | Description |
string |
hasAccessLevel
setAccessLevel
An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter.
Referencing a nonexistent AccessLevel will cause
an error. If no AccessLevel names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all IngressSources
will be allowed.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getResource
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
Returns | |
---|---|
Type | Description |
string |
hasResource
setResource
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
Parameter | |
---|---|
Name | Description |
var |
string
|
Returns | |
---|---|
Type | Description |
$this |
getSource
Returns | |
---|---|
Type | Description |
string |