Class AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.Builder
- java.lang.Object
-
- com.hashicorp.cdktf.providers.google.access_context_manager_service_perimeter.AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.Builder
-
- All Implemented Interfaces:
software.amazon.jsii.Builder<AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources>
- Enclosing interface:
- AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources
@Stability(Stable) public static final class AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.Builder extends Object implements software.amazon.jsii.Builder<AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources>
-
-
Constructor Summary
Constructors Constructor Description Builder()
-
Method Summary
All Methods Instance Methods Concrete Methods Modifier and Type Method Description AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.BuilderaccessLevel(String accessLevel)AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSourcesbuild()Builds the configured instance.AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.Builderresource(String resource)
-
-
-
Method Detail
-
accessLevel
@Stability(Stable) public AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.Builder accessLevel(String accessLevel)
Sets the value ofAccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.getAccessLevel()- Parameters:
accessLevel- An 'AccessLevel' resource name that allow resources within the 'ServicePerimeters' to be accessed from the internet. 'AccessLevels' listed must be in the same policy as this 'ServicePerimeter'. Referencing a nonexistent 'AccessLevel' will cause an error. If no 'AccessLevel' names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example 'accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.' If * is specified, then all IngressSources will be allowed. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter#access_level AccessContextManagerServicePerimeter#access_level}- Returns:
this
-
resource
@Stability(Stable) public AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.Builder resource(String resource)
Sets the value ofAccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources.getResource()- Parameters:
resource- A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format 'projects/{project_number}' The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. '*' is not allowed, the case of allowing all Google Cloud resources only is not supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter#resource AccessContextManagerServicePerimeter#resource}- Returns:
this
-
build
@Stability(Stable) public AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources build()
Builds the configured instance.- Specified by:
buildin interfacesoftware.amazon.jsii.Builder<AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources>- Returns:
- a new instance of
AccessContextManagerServicePerimeterSpecIngressPoliciesIngressFromSources - Throws:
NullPointerException- if any required attribute was not provided
-
-