Class AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.Builder
- java.lang.Object
-
- com.hashicorp.cdktf.providers.google.access_context_manager_service_perimeter.AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.Builder
-
- All Implemented Interfaces:
software.amazon.jsii.Builder<AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources>
- Enclosing interface:
- AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources
@Stability(Stable) public static final class AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.Builder extends Object implements software.amazon.jsii.Builder<AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources>
-
-
Constructor Summary
Constructors Constructor Description Builder()
-
Method Summary
All Methods Instance Methods Concrete Methods Modifier and Type Method Description AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.BuilderaccessLevel(String accessLevel)AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSourcesbuild()Builds the configured instance.AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.Builderresource(String resource)
-
-
-
Method Detail
-
accessLevel
@Stability(Stable) public AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.Builder accessLevel(String accessLevel)
Sets the value ofAccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.getAccessLevel()- Parameters:
accessLevel- An 'AccessLevel' resource name that allow resources within the 'ServicePerimeters' to be accessed from the internet. 'AccessLevels' listed must be in the same policy as this 'ServicePerimeter'. Referencing a nonexistent 'AccessLevel' will cause an error. If no 'AccessLevel' names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example 'accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.' If * is specified, then all IngressSources will be allowed. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter#access_level AccessContextManagerServicePerimeter#access_level}- Returns:
this
-
resource
@Stability(Stable) public AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.Builder resource(String resource)
Sets the value ofAccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources.getResource()- Parameters:
resource- A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project format: 'projects/{projectNumber}' VPC network format: '//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}'. The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. '*' is not allowed, the case of allowing all Google Cloud resources only is not supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter#resource AccessContextManagerServicePerimeter#resource}- Returns:
this
-
build
@Stability(Stable) public AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources build()
Builds the configured instance.- Specified by:
buildin interfacesoftware.amazon.jsii.Builder<AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources>- Returns:
- a new instance of
AccessContextManagerServicePerimeterStatusIngressPoliciesIngressFromSources - Throws:
NullPointerException- if any required attribute was not provided
-
-