[][src]Struct google_accesscontextmanager1_beta::ServicePerimeterConfig

pub struct ServicePerimeterConfig {
    pub ingress_service_restriction: Option<IngressServiceRestriction>,
    pub restricted_services: Option<Vec<String>>,
    pub unrestricted_services: Option<Vec<String>>,
    pub vpc_service_restriction: Option<VpcServiceRestriction>,
    pub resources: Option<Vec<String>>,
    pub bridge_service_restriction: Option<BridgeServiceRestriction>,
    pub access_levels: Option<Vec<String>>,
}

ServicePerimeterConfig specifies a set of GCP resources that describe specific Service Perimeter configuration.

This type is not used in any activity, and only used as part of another schema.

Fields

ingress_service_restriction: Option<IngressServiceRestriction>

Alpha. Configuration for which services may be used with Access Levels.

restricted_services: Option<Vec<String>>

GCP services that are subject to the Service Perimeter restrictions. Must contain a list of services. For example, if storage.googleapis.com is specified, access to the storage buckets inside the perimeter must meet the perimeter's access restrictions.

unrestricted_services: Option<Vec<String>>

GCP services that are not subject to the Service Perimeter restrictions. Deprecated. Must be set to a single wildcard "*".

The wildcard means that unless explicitly specified by "restricted_services" list, any service is treated as unrestricted.

vpc_service_restriction: Option<VpcServiceRestriction>

Alpha. Configuration for within Perimeter allowed APIs.

resources: Option<Vec<String>>

A list of GCP resources that are inside of the service perimeter. Currently only projects are allowed. Format: projects/{project_number}

bridge_service_restriction: Option<BridgeServiceRestriction>

Alpha. Configuration for what services are accessible via the Bridge Perimeter. Must be empty for non-Bridge Perimeters.

access_levels: Option<Vec<String>>

A list of AccessLevel resource names that allow resources within the ServicePerimeter to be accessed from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel is a syntax error. If no AccessLevel names are listed, resources within the perimeter can only be accessed via GCP calls with request origins within the perimeter. Example: "accessPolicies/MY_POLICY/accessLevels/MY_LEVEL". For Service Perimeter Bridge, must be empty.

Trait Implementations

impl Part for ServicePerimeterConfig[src]

impl Default for ServicePerimeterConfig[src]

impl Clone for ServicePerimeterConfig[src]

fn clone_from(&mut self, source: &Self)1.0.0[src]

Performs copy-assignment from source. Read more

impl Debug for ServicePerimeterConfig[src]

impl Serialize for ServicePerimeterConfig[src]

impl<'de> Deserialize<'de> for ServicePerimeterConfig[src]

Auto Trait Implementations

Blanket Implementations

impl<T> ToOwned for T where
    T: Clone
[src]

type Owned = T

The resulting type after obtaining ownership.

impl<T> From<T> for T[src]

impl<T, U> Into<U> for T where
    U: From<T>, 
[src]

impl<T, U> TryFrom<U> for T where
    U: Into<T>, 
[src]

type Error = Infallible

The type returned in the event of a conversion error.

impl<T, U> TryInto<U> for T where
    U: TryFrom<T>, 
[src]

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.

impl<T> BorrowMut<T> for T where
    T: ?Sized
[src]

impl<T> Borrow<T> for T where
    T: ?Sized
[src]

impl<T> Any for T where
    T: 'static + ?Sized
[src]

impl<T> Typeable for T where
    T: Any

fn get_type(&self) -> TypeId

Get the TypeId of this object.

impl<T> DeserializeOwned for T where
    T: Deserialize<'de>, 
[src]