Class: Google::Identity::AccessContextManager::V1::ServicePerimeterConfig::IngressSource

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb

Overview

The source that [IngressPolicy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] authorizes access from.

Instance Attribute Summary collapse

Instance Attribute Details

#access_level::String

Returns An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is specified for access_level, then all [IngressSources] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource] will be allowed.

Returns:

  • (::String)

    An [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] resource name that allow resources within the [ServicePerimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] to be accessed from the internet. [AccessLevels] [google.identity.accesscontextmanager.v1.AccessLevel] listed must be in the same policy as this [ServicePerimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. Referencing a nonexistent [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] will cause an error. If no [AccessLevel] [google.identity.accesscontextmanager.v1.AccessLevel] names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is specified for access_level, then all [IngressSources] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource] will be allowed.



252
253
254
255
# File 'proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb', line 252

class IngressSource
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods
end

#resource::String

Returns A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: projects/{project_number} The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.

Returns:

  • (::String)

    A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format: projects/{project_number} The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.



252
253
254
255
# File 'proto_docs/google/identity/accesscontextmanager/v1/service_perimeter.rb', line 252

class IngressSource
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods
end