Interface AccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources
-
- All Superinterfaces:
software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
AccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources.Jsii$Proxy
@Generated(value="jsii-pacmak/1.102.0 (build e354887)", date="2024-08-31T03:59:17.179Z") @Stability(Stable) public interface AccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources extends software.amazon.jsii.JsiiSerializable
-
-
Nested Class Summary
Nested Classes Modifier and Type Interface Description static classAccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources.Builderstatic classAccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources.Jsii$ProxyAn implementation forAccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources
-
Method Summary
All Methods Static Methods Instance Methods Default Methods Modifier and Type Method Description static AccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources.Builderbuilder()default StringgetAccessLevel()An 'AccessLevel' resource name that allow resources within the 'ServicePerimeters' to be accessed from the internet.default StringgetResource()A Google Cloud resource that is allowed to ingress the perimeter.
-
-
-
Method Detail
-
getAccessLevel
@Stability(Stable) @Nullable default String getAccessLevel()
An 'AccessLevel' resource name that allow resources within the 'ServicePerimeters' to be accessed from the internet.'AccessLevels' listed must be in the same policy as this 'ServicePerimeter'. Referencing a nonexistent 'AccessLevel' will cause an error. If no 'AccessLevel' names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example 'accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.' If * is specified, then all IngressSources will be allowed. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_dry_run_ingress_policy#access_level AccessContextManagerServicePerimeterDryRunIngressPolicy#access_level}
-
getResource
@Stability(Stable) @Nullable default String getResource()
A Google Cloud resource that is allowed to ingress the perimeter.Requests from these resources will be allowed to access perimeter data. Currently only projects are allowed. Format 'projects/{project_number}' The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. '*' is not allowed, the case of allowing all Google Cloud resources only is not supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_dry_run_ingress_policy#resource AccessContextManagerServicePerimeterDryRunIngressPolicy#resource}
-
builder
@Stability(Stable) static AccessContextManagerServicePerimeterDryRunIngressPolicyIngressFromSources.Builder builder()
-
-