pub struct GoogleIdentityAccesscontextmanagerV1EgressSource {
pub access_level: Option<String>,
pub resource: Option<String>,
}Expand description
The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
This type is not used in any activity, and only used as part of another schema.
Fields§
§access_level: Option<String>An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is specified for access_level, then all EgressSources will be allowed.
resource: Option<String>A Google Cloud resource from the service perimeter that you want to allow to access data outside the perimeter. This field supports only projects. The project format is projects/{project_number}. You can’t use * in this field to allow all Google Cloud resources.
Trait Implementations§
Source§impl Clone for GoogleIdentityAccesscontextmanagerV1EgressSource
impl Clone for GoogleIdentityAccesscontextmanagerV1EgressSource
Source§fn clone(&self) -> GoogleIdentityAccesscontextmanagerV1EgressSource
fn clone(&self) -> GoogleIdentityAccesscontextmanagerV1EgressSource
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more