#[non_exhaustive]pub struct ServicePerimeterConfig {
pub resources: Vec<String>,
pub access_levels: Vec<String>,
pub restricted_services: Vec<String>,
pub vpc_accessible_services: Option<VpcAccessibleServices>,
pub ingress_policies: Vec<IngressPolicy>,
pub egress_policies: Vec<EgressPolicy>,
/* private fields */
}Expand description
ServicePerimeterConfig specifies a set of Google Cloud resources that
describe specific Service Perimeter configuration.
Fields (Non-exhaustive)§
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.resources: Vec<String>A list of Google Cloud resources that are inside of the service perimeter.
Currently only projects are allowed. Format: projects/{project_number}
access_levels: Vec<String>A list of AccessLevel resource names that allow resources within the
ServicePerimeter to be accessed from the internet. AccessLevels listed
must be in the same policy as this ServicePerimeter. Referencing a
nonexistent AccessLevel is a syntax error. If no AccessLevel names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL".
For Service Perimeter Bridge, must be empty.
restricted_services: Vec<String>Google Cloud services that are subject to the Service Perimeter
restrictions. For example, if storage.googleapis.com is specified, access
to the storage buckets inside the perimeter must meet the perimeter’s
access restrictions.
vpc_accessible_services: Option<VpcAccessibleServices>Configuration for APIs allowed within Perimeter.
ingress_policies: Vec<IngressPolicy>List of [IngressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] to apply to the perimeter. A perimeter may have multiple [IngressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy], each of which is evaluated separately. Access is granted if any [Ingress Policy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] grants it. Must be empty for a perimeter bridge.
egress_policies: Vec<EgressPolicy>List of [EgressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy] to apply to the perimeter. A perimeter may have multiple [EgressPolicies] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy], each of which is evaluated separately. Access is granted if any [EgressPolicy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy] grants it. Must be empty for a perimeter bridge.
Implementations§
Source§impl ServicePerimeterConfig
impl ServicePerimeterConfig
pub fn new() -> Self
Sourcepub fn set_resources<T, V>(self, v: T) -> Self
pub fn set_resources<T, V>(self, v: T) -> Self
Sets the value of resources.
Sourcepub fn set_access_levels<T, V>(self, v: T) -> Self
pub fn set_access_levels<T, V>(self, v: T) -> Self
Sets the value of access_levels.
Sourcepub fn set_restricted_services<T, V>(self, v: T) -> Self
pub fn set_restricted_services<T, V>(self, v: T) -> Self
Sets the value of restricted_services.
Sourcepub fn set_vpc_accessible_services<T>(self, v: T) -> Selfwhere
T: Into<VpcAccessibleServices>,
pub fn set_vpc_accessible_services<T>(self, v: T) -> Selfwhere
T: Into<VpcAccessibleServices>,
Sets the value of vpc_accessible_services.
Sourcepub fn set_or_clear_vpc_accessible_services<T>(self, v: Option<T>) -> Selfwhere
T: Into<VpcAccessibleServices>,
pub fn set_or_clear_vpc_accessible_services<T>(self, v: Option<T>) -> Selfwhere
T: Into<VpcAccessibleServices>,
Sets or clears the value of vpc_accessible_services.
Sourcepub fn set_ingress_policies<T, V>(self, v: T) -> Self
pub fn set_ingress_policies<T, V>(self, v: T) -> Self
Sets the value of ingress_policies.
Sourcepub fn set_egress_policies<T, V>(self, v: T) -> Self
pub fn set_egress_policies<T, V>(self, v: T) -> Self
Sets the value of egress_policies.
Trait Implementations§
Source§impl Clone for ServicePerimeterConfig
impl Clone for ServicePerimeterConfig
Source§fn clone(&self) -> ServicePerimeterConfig
fn clone(&self) -> ServicePerimeterConfig
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read more