Struct google_accesscontextmanager1::api::Condition [−][src]
A condition necessary for an AccessLevel
to be granted. The Condition is an AND over its fields. So a Condition is true if: 1) the request IP is from one of the listed subnetworks AND 2) the originating device complies with the listed device policy AND 3) all listed access levels are granted AND 4) the request was sent at a time allowed by the DateTimeRestriction.
This type is not used in any activity, and only used as part of another schema.
Fields
device_policy: Option<DevicePolicy>
Device specific restrictions, all restrictions must hold for the Condition to be true. If not specified, all devices are allowed.
ip_subnetworks: Option<Vec<String>>
CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, “192.0.2.0/24” is accepted but “192.0.2.1/24” is not. Similarly, for IPv6, “2001:db8::/32” is accepted whereas “2001:db8::1/32” is not. The originating IP of a request must be in one of the listed subnets in order for this Condition to be true. If empty, all IP addresses are allowed.
members: Option<Vec<String>>
The request must be made by one of the provided user or service accounts. Groups are not supported. Syntax: user:{emailid}
serviceAccount:{emailid}
If not specified, a request may come from any user.
negate: Option<bool>
Whether to negate the Condition. If true, the Condition becomes a NAND over its non-empty fields, each field must be false for the Condition overall to be satisfied. Defaults to false.
regions: Option<Vec<String>>
The request must originate from one of the provided countries/regions. Must be valid ISO 3166-1 alpha-2 codes.
required_access_levels: Option<Vec<String>>
A list of other access levels defined in the same Policy
, referenced by resource name. Referencing an AccessLevel
which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: “accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"
Trait Implementations
impl Clone for Condition
[src]
impl Debug for Condition
[src]
impl Default for Condition
[src]
impl<'de> Deserialize<'de> for Condition
[src]
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
[src]
__D: Deserializer<'de>,
impl Part for Condition
[src]
impl Serialize for Condition
[src]
Auto Trait Implementations
impl RefUnwindSafe for Condition
impl Send for Condition
impl Sync for Condition
impl Unpin for Condition
impl UnwindSafe for Condition
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> DeserializeOwned for T where
T: for<'de> Deserialize<'de>,
[src]
T: for<'de> Deserialize<'de>,
impl<T> From<T> for T
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,