Interface AccessContextManagerServicePerimeterEgressPolicyEgressFrom
-
- All Superinterfaces:
software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
AccessContextManagerServicePerimeterEgressPolicyEgressFrom.Jsii$Proxy
@Generated(value="jsii-pacmak/1.102.0 (build e354887)", date="2024-08-31T03:59:17.191Z") @Stability(Stable) public interface AccessContextManagerServicePerimeterEgressPolicyEgressFrom extends software.amazon.jsii.JsiiSerializable
-
-
Nested Class Summary
Nested Classes Modifier and Type Interface Description static classAccessContextManagerServicePerimeterEgressPolicyEgressFrom.Builderstatic classAccessContextManagerServicePerimeterEgressPolicyEgressFrom.Jsii$ProxyAn implementation forAccessContextManagerServicePerimeterEgressPolicyEgressFrom
-
Method Summary
All Methods Static Methods Instance Methods Default Methods Modifier and Type Method Description static AccessContextManagerServicePerimeterEgressPolicyEgressFrom.Builderbuilder()default List<String>getIdentities()A list of identities that are allowed access through this 'EgressPolicy'.default StringgetIdentityType()Specifies the type of identities that are allowed access to outside the perimeter.default StringgetSourceRestriction()Whether to enforce traffic restrictions based on 'sources' field.default ObjectgetSources()sources block.
-
-
-
Method Detail
-
getIdentities
@Stability(Stable) @Nullable default List<String> getIdentities()
A list of identities that are allowed access through this 'EgressPolicy'.Should be in the format of email address. The email address should represent individual user or service account only. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_egress_policy#identities AccessContextManagerServicePerimeterEgressPolicy#identities}
-
getIdentityType
@Stability(Stable) @Nullable default String getIdentityType()
Specifies the type of identities that are allowed access to outside the perimeter.If left unspecified, then members of 'identities' field will be allowed access. Possible values: ["ANY_IDENTITY", "ANY_USER_ACCOUNT", "ANY_SERVICE_ACCOUNT"] Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_egress_policy#identity_type AccessContextManagerServicePerimeterEgressPolicy#identity_type}
-
getSourceRestriction
@Stability(Stable) @Nullable default String getSourceRestriction()
Whether to enforce traffic restrictions based on 'sources' field.If the 'sources' field is non-empty, then this field must be set to 'SOURCE_RESTRICTION_ENABLED'. Possible values: ["SOURCE_RESTRICTION_UNSPECIFIED", "SOURCE_RESTRICTION_ENABLED", "SOURCE_RESTRICTION_DISABLED"] Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_egress_policy#source_restriction AccessContextManagerServicePerimeterEgressPolicy#source_restriction}
-
getSources
@Stability(Stable) @Nullable default Object getSources()
sources block.Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_egress_policy#sources AccessContextManagerServicePerimeterEgressPolicy#sources}
-
builder
@Stability(Stable) static AccessContextManagerServicePerimeterEgressPolicyEgressFrom.Builder builder()
-
-