public static final class ServicePerimeterConfig.IngressSource.Builder extends GeneratedMessageV3.Builder<ServicePerimeterConfig.IngressSource.Builder> implements ServicePerimeterConfig.IngressSourceOrBuilder
The source that [IngressPolicy]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy]
authorizes access from.
Protobuf type
google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource
Inherited Members
com.google.protobuf.GeneratedMessageV3.Builder.getUnknownFieldSetBuilder()
com.google.protobuf.GeneratedMessageV3.Builder.mergeUnknownLengthDelimitedField(int,com.google.protobuf.ByteString)
com.google.protobuf.GeneratedMessageV3.Builder.mergeUnknownVarintField(int,int)
com.google.protobuf.GeneratedMessageV3.Builder.parseUnknownField(com.google.protobuf.CodedInputStream,com.google.protobuf.ExtensionRegistryLite,int)
com.google.protobuf.GeneratedMessageV3.Builder.setUnknownFieldSetBuilder(com.google.protobuf.UnknownFieldSet.Builder)
Static Methods
getDescriptor()
public static final Descriptors.Descriptor getDescriptor()
Methods
addRepeatedField(Descriptors.FieldDescriptor field, Object value)
public ServicePerimeterConfig.IngressSource.Builder addRepeatedField(Descriptors.FieldDescriptor field, Object value)
Overrides
build()
public ServicePerimeterConfig.IngressSource build()
buildPartial()
public ServicePerimeterConfig.IngressSource buildPartial()
clear()
public ServicePerimeterConfig.IngressSource.Builder clear()
Overrides
clearAccessLevel()
public ServicePerimeterConfig.IngressSource.Builder clearAccessLevel()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
clearField(Descriptors.FieldDescriptor field)
public ServicePerimeterConfig.IngressSource.Builder clearField(Descriptors.FieldDescriptor field)
Overrides
clearOneof(Descriptors.OneofDescriptor oneof)
public ServicePerimeterConfig.IngressSource.Builder clearOneof(Descriptors.OneofDescriptor oneof)
Overrides
clearResource()
public ServicePerimeterConfig.IngressSource.Builder clearResource()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
clearSource()
public ServicePerimeterConfig.IngressSource.Builder clearSource()
clone()
public ServicePerimeterConfig.IngressSource.Builder clone()
Overrides
getAccessLevel()
public String getAccessLevel()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Returns |
---|
Type | Description |
String | The accessLevel.
|
getAccessLevelBytes()
public ByteString getAccessLevelBytes()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Returns |
---|
Type | Description |
ByteString | The bytes for accessLevel.
|
getDefaultInstanceForType()
public ServicePerimeterConfig.IngressSource getDefaultInstanceForType()
getDescriptorForType()
public Descriptors.Descriptor getDescriptorForType()
Overrides
getResource()
public String getResource()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Returns |
---|
Type | Description |
String | The resource.
|
getResourceBytes()
public ByteString getResourceBytes()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Returns |
---|
Type | Description |
ByteString | The bytes for resource.
|
getSourceCase()
public ServicePerimeterConfig.IngressSource.SourceCase getSourceCase()
hasAccessLevel()
public boolean hasAccessLevel()
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Returns |
---|
Type | Description |
boolean | Whether the accessLevel field is set.
|
hasResource()
public boolean hasResource()
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Returns |
---|
Type | Description |
boolean | Whether the resource field is set.
|
internalGetFieldAccessorTable()
protected GeneratedMessageV3.FieldAccessorTable internalGetFieldAccessorTable()
Overrides
isInitialized()
public final boolean isInitialized()
Overrides
mergeFrom(ServicePerimeterConfig.IngressSource other)
public ServicePerimeterConfig.IngressSource.Builder mergeFrom(ServicePerimeterConfig.IngressSource other)
mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
public ServicePerimeterConfig.IngressSource.Builder mergeFrom(CodedInputStream input, ExtensionRegistryLite extensionRegistry)
Overrides
mergeFrom(Message other)
public ServicePerimeterConfig.IngressSource.Builder mergeFrom(Message other)
Parameter |
---|
Name | Description |
other | Message
|
Overrides
mergeUnknownFields(UnknownFieldSet unknownFields)
public final ServicePerimeterConfig.IngressSource.Builder mergeUnknownFields(UnknownFieldSet unknownFields)
Overrides
setAccessLevel(String value)
public ServicePerimeterConfig.IngressSource.Builder setAccessLevel(String value)
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Parameter |
---|
Name | Description |
value | String
The accessLevel to set.
|
setAccessLevelBytes(ByteString value)
public ServicePerimeterConfig.IngressSource.Builder setAccessLevelBytes(ByteString value)
An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL
. If a single *
is
specified for access_level
, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
string access_level = 1;
Parameter |
---|
Name | Description |
value | ByteString
The bytes for accessLevel to set.
|
setField(Descriptors.FieldDescriptor field, Object value)
public ServicePerimeterConfig.IngressSource.Builder setField(Descriptors.FieldDescriptor field, Object value)
Overrides
setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
public ServicePerimeterConfig.IngressSource.Builder setRepeatedField(Descriptors.FieldDescriptor field, int index, Object value)
Overrides
setResource(String value)
public ServicePerimeterConfig.IngressSource.Builder setResource(String value)
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Parameter |
---|
Name | Description |
value | String
The resource to set.
|
setResourceBytes(ByteString value)
public ServicePerimeterConfig.IngressSource.Builder setResourceBytes(ByteString value)
A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. *
is not allowed, the
case of allowing all Google Cloud resources only is not supported.
string resource = 2;
Parameter |
---|
Name | Description |
value | ByteString
The bytes for resource to set.
|
setUnknownFields(UnknownFieldSet unknownFields)
public final ServicePerimeterConfig.IngressSource.Builder setUnknownFields(UnknownFieldSet unknownFields)
Overrides