Reference documentation and code samples for the Access Context Manager V1 Client class ServicePerimeterConfig.
ServicePerimeterConfig
specifies a set of Google Cloud resources that
describe specific Service Perimeter configuration.
Generated from protobuf message google.identity.accesscontextmanager.v1.ServicePerimeterConfig
Namespace
Google \ Identity \ AccessContextManager \ V1Methods
__construct
Constructor.
data
array
Optional. Data for populating the Message object.
↳ resources
array
A list of Google Cloud resources that are inside of the service perimeter. Currently only projects are allowed. Format: projects/{project_number}
↳ access_levels
array
A list of AccessLevel
resource names that allow resources within the ServicePerimeter
to be accessed from the internet. AccessLevels
listed must be in the same policy as this ServicePerimeter
. Referencing a nonexistent AccessLevel
is a syntax error. If no AccessLevel
names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: "accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"
. For Service Perimeter Bridge, must be empty.
↳ restricted_services
array
Google Cloud services that are subject to the Service Perimeter restrictions. For example, if storage.googleapis.com
is specified, access to the storage buckets inside the perimeter must meet the perimeter's access restrictions.
↳ vpc_accessible_services
↳ ingress_policies
array< ServicePerimeterConfig\IngressPolicy
>
List of [IngressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] to apply to the perimeter. A perimeter may have multiple [IngressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy], each of which is evaluated separately. Access is granted if any [Ingress Policy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] grants it. Must be empty for a perimeter bridge.
↳ egress_policies
array< ServicePerimeterConfig\EgressPolicy
>
List of [EgressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy] to apply to the perimeter. A perimeter may have multiple [EgressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy], each of which is evaluated separately. Access is granted if any [EgressPolicy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy] grants it. Must be empty for a perimeter bridge.
getResources
A list of Google Cloud resources that are inside of the service perimeter.
Currently only projects are allowed. Format: projects/{project_number}
setResources
A list of Google Cloud resources that are inside of the service perimeter.
Currently only projects are allowed. Format: projects/{project_number}
var
string[]
$this
getAccessLevels
A list of AccessLevel
resource names that allow resources within the ServicePerimeter
to be accessed from the internet. AccessLevels
listed
must be in the same policy as this ServicePerimeter
. Referencing a
nonexistent AccessLevel
is a syntax error. If no AccessLevel
names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example: "accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"
.
For Service Perimeter Bridge, must be empty.
setAccessLevels
A list of AccessLevel
resource names that allow resources within the ServicePerimeter
to be accessed from the internet. AccessLevels
listed
must be in the same policy as this ServicePerimeter
. Referencing a
nonexistent AccessLevel
is a syntax error. If no AccessLevel
names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example: "accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"
.
For Service Perimeter Bridge, must be empty.
var
string[]
$this
getRestrictedServices
Google Cloud services that are subject to the Service Perimeter
restrictions. For example, if storage.googleapis.com
is specified, access
to the storage buckets inside the perimeter must meet the perimeter's
access restrictions.
setRestrictedServices
Google Cloud services that are subject to the Service Perimeter
restrictions. For example, if storage.googleapis.com
is specified, access
to the storage buckets inside the perimeter must meet the perimeter's
access restrictions.
var
string[]
$this
getVpcAccessibleServices
Configuration for APIs allowed within Perimeter.
hasVpcAccessibleServices
clearVpcAccessibleServices
setVpcAccessibleServices
Configuration for APIs allowed within Perimeter.
$this
getIngressPolicies
List of IngressPolicies to apply to the perimeter. A perimeter may have multiple IngressPolicies , each of which is evaluated separately. Access is granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
setIngressPolicies
List of IngressPolicies to apply to the perimeter. A perimeter may have multiple IngressPolicies , each of which is evaluated separately. Access is granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
$this
getEgressPolicies
List of EgressPolicies to apply to the perimeter. A perimeter may have multiple EgressPolicies , each of which is evaluated separately. Access is granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
setEgressPolicies
List of EgressPolicies to apply to the perimeter. A perimeter may have multiple EgressPolicies , each of which is evaluated separately. Access is granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
$this