Package com.hashicorp.cdktf.providers.google.access_context_manager_service_perimeter_ingress_policy
Class AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.Builder
- java.lang.Object
-
- com.hashicorp.cdktf.providers.google.access_context_manager_service_perimeter_ingress_policy.AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.Builder
-
- All Implemented Interfaces:
software.amazon.jsii.Builder<AccessContextManagerServicePerimeterIngressPolicyIngressFromSources>
- Enclosing interface:
- AccessContextManagerServicePerimeterIngressPolicyIngressFromSources
@Stability(Stable) public static final class AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.Builder extends Object implements software.amazon.jsii.Builder<AccessContextManagerServicePerimeterIngressPolicyIngressFromSources>
-
-
Constructor Summary
Constructors Constructor Description Builder()
-
Method Summary
All Methods Instance Methods Concrete Methods Modifier and Type Method Description AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.BuilderaccessLevel(String accessLevel)AccessContextManagerServicePerimeterIngressPolicyIngressFromSourcesbuild()Builds the configured instance.AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.Builderresource(String resource)
-
-
-
Method Detail
-
accessLevel
@Stability(Stable) public AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.Builder accessLevel(String accessLevel)
Sets the value ofAccessContextManagerServicePerimeterIngressPolicyIngressFromSources.getAccessLevel()- Parameters:
accessLevel- An 'AccessLevel' resource name that allow resources within the 'ServicePerimeters' to be accessed from the internet. 'AccessLevels' listed must be in the same policy as this 'ServicePerimeter'. Referencing a nonexistent 'AccessLevel' will cause an error. If no 'AccessLevel' names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example 'accessPolicies/MY_POLICY/accessLevels/MY_LEVEL.' If * is specified, then all IngressSources will be allowed. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_ingress_policy#access_level AccessContextManagerServicePerimeterIngressPolicy#access_level}- Returns:
this
-
resource
@Stability(Stable) public AccessContextManagerServicePerimeterIngressPolicyIngressFromSources.Builder resource(String resource)
- Parameters:
resource- A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project format: 'projects/{projectNumber}' VPC network format: '//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}'. The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. '*' is not allowed, the case of allowing all Google Cloud resources only is not supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/access_context_manager_service_perimeter_ingress_policy#resource AccessContextManagerServicePerimeterIngressPolicy#resource}- Returns:
this
-
build
@Stability(Stable) public AccessContextManagerServicePerimeterIngressPolicyIngressFromSources build()
Builds the configured instance.- Specified by:
buildin interfacesoftware.amazon.jsii.Builder<AccessContextManagerServicePerimeterIngressPolicyIngressFromSources>- Returns:
- a new instance of
AccessContextManagerServicePerimeterIngressPolicyIngressFromSources - Throws:
NullPointerException- if any required attribute was not provided
-
-