gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy
Explore with Pulumi AI
Manage a single EgressPolicy in the spec (dry-run) configuration for a service perimeter. EgressPolicies match requests based on egressFrom and egressTo stanzas. For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).
Note: By default, updates to this resource will remove the EgressPolicy from the from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy is added before the old one is removed, add a
lifecycleblock withcreate_before_destroy = trueto this resource. Note: If this resource is used alongside agcp.accesscontextmanager.ServicePerimeterresource, the service perimeter resource must have alifecycleblock withignore_changes = [spec[0].egress_policies]so they don’t fight over which egress rules should be in the policy.
To get more information about ServicePerimeterDryRunEgressPolicy, see:
- API documentation
- How-to Guides
Example Usage
Create ServicePerimeterDryRunEgressPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ServicePerimeterDryRunEgressPolicy(name: string, args: ServicePerimeterDryRunEgressPolicyArgs, opts?: CustomResourceOptions);@overload
def ServicePerimeterDryRunEgressPolicy(resource_name: str,
args: ServicePerimeterDryRunEgressPolicyArgs,
opts: Optional[ResourceOptions] = None)
@overload
def ServicePerimeterDryRunEgressPolicy(resource_name: str,
opts: Optional[ResourceOptions] = None,
perimeter: Optional[str] = None,
egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None,
title: Optional[str] = None)func NewServicePerimeterDryRunEgressPolicy(ctx *Context, name string, args ServicePerimeterDryRunEgressPolicyArgs, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)public ServicePerimeterDryRunEgressPolicy(string name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions? opts = null)
public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args)
public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions options)
type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ServicePerimeterDryRunEgressPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ServicePerimeterDryRunEgressPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ServicePerimeterDryRunEgressPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ServicePerimeterDryRunEgressPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ServicePerimeterDryRunEgressPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var servicePerimeterDryRunEgressPolicyResource = new Gcp.AccessContextManager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", new()
{
Perimeter = "string",
EgressFrom = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromArgs
{
Identities = new[]
{
"string",
},
IdentityType = "string",
SourceRestriction = "string",
Sources = new[]
{
new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs
{
AccessLevel = "string",
Resource = "string",
},
},
},
EgressTo = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToArgs
{
ExternalResources = new[]
{
"string",
},
Operations = new[]
{
new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs
{
MethodSelectors = new[]
{
new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs
{
Method = "string",
Permission = "string",
},
},
ServiceName = "string",
},
},
Resources = new[]
{
"string",
},
Roles = new[]
{
"string",
},
},
Title = "string",
});
example, err := accesscontextmanager.NewServicePerimeterDryRunEgressPolicy(ctx, "servicePerimeterDryRunEgressPolicyResource", &accesscontextmanager.ServicePerimeterDryRunEgressPolicyArgs{
Perimeter: pulumi.String("string"),
EgressFrom: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromArgs{
Identities: pulumi.StringArray{
pulumi.String("string"),
},
IdentityType: pulumi.String("string"),
SourceRestriction: pulumi.String("string"),
Sources: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArray{
&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs{
AccessLevel: pulumi.String("string"),
Resource: pulumi.String("string"),
},
},
},
EgressTo: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToArgs{
ExternalResources: pulumi.StringArray{
pulumi.String("string"),
},
Operations: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArray{
&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs{
MethodSelectors: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArray{
&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs{
Method: pulumi.String("string"),
Permission: pulumi.String("string"),
},
},
ServiceName: pulumi.String("string"),
},
},
Resources: pulumi.StringArray{
pulumi.String("string"),
},
Roles: pulumi.StringArray{
pulumi.String("string"),
},
},
Title: pulumi.String("string"),
})
var servicePerimeterDryRunEgressPolicyResource = new ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", ServicePerimeterDryRunEgressPolicyArgs.builder()
.perimeter("string")
.egressFrom(ServicePerimeterDryRunEgressPolicyEgressFromArgs.builder()
.identities("string")
.identityType("string")
.sourceRestriction("string")
.sources(ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs.builder()
.accessLevel("string")
.resource("string")
.build())
.build())
.egressTo(ServicePerimeterDryRunEgressPolicyEgressToArgs.builder()
.externalResources("string")
.operations(ServicePerimeterDryRunEgressPolicyEgressToOperationArgs.builder()
.methodSelectors(ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs.builder()
.method("string")
.permission("string")
.build())
.serviceName("string")
.build())
.resources("string")
.roles("string")
.build())
.title("string")
.build());
service_perimeter_dry_run_egress_policy_resource = gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource",
perimeter="string",
egress_from={
"identities": ["string"],
"identity_type": "string",
"source_restriction": "string",
"sources": [{
"access_level": "string",
"resource": "string",
}],
},
egress_to={
"external_resources": ["string"],
"operations": [{
"method_selectors": [{
"method": "string",
"permission": "string",
}],
"service_name": "string",
}],
"resources": ["string"],
"roles": ["string"],
},
title="string")
const servicePerimeterDryRunEgressPolicyResource = new gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", {
perimeter: "string",
egressFrom: {
identities: ["string"],
identityType: "string",
sourceRestriction: "string",
sources: [{
accessLevel: "string",
resource: "string",
}],
},
egressTo: {
externalResources: ["string"],
operations: [{
methodSelectors: [{
method: "string",
permission: "string",
}],
serviceName: "string",
}],
resources: ["string"],
roles: ["string"],
},
title: "string",
});
type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
properties:
egressFrom:
identities:
- string
identityType: string
sourceRestriction: string
sources:
- accessLevel: string
resource: string
egressTo:
externalResources:
- string
operations:
- methodSelectors:
- method: string
permission: string
serviceName: string
resources:
- string
roles:
- string
perimeter: string
title: string
ServicePerimeterDryRunEgressPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ServicePerimeterDryRunEgressPolicy resource accepts the following input properties:
- Perimeter string
- The name of the Service Perimeter to add this resource to.
- Egress
From ServicePerimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - Title string
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- Perimeter string
- The name of the Service Perimeter to add this resource to.
- Egress
From ServicePerimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - Title string
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter String
- The name of the Service Perimeter to add this resource to.
- egress
From ServicePerimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - title String
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter string
- The name of the Service Perimeter to add this resource to.
- egress
From ServicePerimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - title string
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter str
- The name of the Service Perimeter to add this resource to.
- egress_
from ServicePerimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress_
to ServicePerimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - title str
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter String
- The name of the Service Perimeter to add this resource to.
- egress
From Property Map - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress
To Property Map - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - title String
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
Outputs
All input properties are implicitly available as output properties. Additionally, the ServicePerimeterDryRunEgressPolicy resource produces the following output properties:
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Id string
- The provider-assigned unique ID for this managed resource.
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Id string
- The provider-assigned unique ID for this managed resource.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id String
- The provider-assigned unique ID for this managed resource.
- access
Policy stringId - The name of the Access Policy this resource belongs to.
- etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id string
- The provider-assigned unique ID for this managed resource.
- access_
policy_ strid - The name of the Access Policy this resource belongs to.
- etag str
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id str
- The provider-assigned unique ID for this managed resource.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ServicePerimeterDryRunEgressPolicy Resource
Get an existing ServicePerimeterDryRunEgressPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ServicePerimeterDryRunEgressPolicyState, opts?: CustomResourceOptions): ServicePerimeterDryRunEgressPolicy@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_policy_id: Optional[str] = None,
egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None,
etag: Optional[str] = None,
perimeter: Optional[str] = None,
title: Optional[str] = None) -> ServicePerimeterDryRunEgressPolicyfunc GetServicePerimeterDryRunEgressPolicy(ctx *Context, name string, id IDInput, state *ServicePerimeterDryRunEgressPolicyState, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)public static ServicePerimeterDryRunEgressPolicy Get(string name, Input<string> id, ServicePerimeterDryRunEgressPolicyState? state, CustomResourceOptions? opts = null)public static ServicePerimeterDryRunEgressPolicy get(String name, Output<String> id, ServicePerimeterDryRunEgressPolicyState state, CustomResourceOptions options)resources: _: type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Egress
From ServicePerimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Perimeter string
- The name of the Service Perimeter to add this resource to.
- Title string
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Egress
From ServicePerimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Perimeter string
- The name of the Service Perimeter to add this resource to.
- Title string
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- egress
From ServicePerimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter String
- The name of the Service Perimeter to add this resource to.
- title String
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access
Policy stringId - The name of the Access Policy this resource belongs to.
- egress
From ServicePerimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter string
- The name of the Service Perimeter to add this resource to.
- title string
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access_
policy_ strid - The name of the Access Policy this resource belongs to.
- egress_
from ServicePerimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress_
to ServicePerimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - etag str
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter str
- The name of the Service Perimeter to add this resource to.
- title str
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- egress
From Property Map - Defines conditions on the source of a request causing this
EgressPolicyto apply. Structure is documented below. - egress
To Property Map - Defines the conditions on the
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter String
- The name of the Service Perimeter to add this resource to.
- title String
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
Supporting Types
ServicePerimeterDryRunEgressPolicyEgressFrom, ServicePerimeterDryRunEgressPolicyEgressFromArgs
- Identities List<string>
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- Identity
Type string - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - Source
Restriction string - Whether to enforce traffic restrictions based on
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - Sources
List<Service
Perimeter Dry Run Egress Policy Egress From Source> - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- Identities []string
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- Identity
Type string - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - Source
Restriction string - Whether to enforce traffic restrictions based on
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - Sources
[]Service
Perimeter Dry Run Egress Policy Egress From Source - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities List<String>
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity
Type String - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source
Restriction String - Whether to enforce traffic restrictions based on
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources
List<Service
Perimeter Dry Run Egress Policy Egress From Source> - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities string[]
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity
Type string - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source
Restriction string - Whether to enforce traffic restrictions based on
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources
Service
Perimeter Dry Run Egress Policy Egress From Source[] - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities Sequence[str]
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity_
type str - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source_
restriction str - Whether to enforce traffic restrictions based on
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources
Sequence[Service
Perimeter Dry Run Egress Policy Egress From Source] - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities List<String>
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity
Type String - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source
Restriction String - Whether to enforce traffic restrictions based on
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources List<Property Map>
- Sources that this EgressPolicy authorizes access from. Structure is documented below.
ServicePerimeterDryRunEgressPolicyEgressFromSource, ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs
- Access
Level string - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- Resource string
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*is not allowed, the case of allowing all Google Cloud resources only is not supported.
- Access
Level string - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- Resource string
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access
Level String - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource String
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access
Level string - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource string
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access_
level str - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource str
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access
Level String - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource String
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*is not allowed, the case of allowing all Google Cloud resources only is not supported.
ServicePerimeterDryRunEgressPolicyEgressTo, ServicePerimeterDryRunEgressPolicyEgressToArgs
- External
Resources List<string> - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- Operations
List<Service
Perimeter Dry Run Egress Policy Egress To Operation> - A list of
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - Resources List<string>
- A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. - Roles List<string>
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFromare allowed to perform.
- External
Resources []string - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- Operations
[]Service
Perimeter Dry Run Egress Policy Egress To Operation - A list of
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - Resources []string
- A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. - Roles []string
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFromare allowed to perform.
- external
Resources List<String> - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
List<Service
Perimeter Dry Run Egress Policy Egress To Operation> - A list of
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources List<String>
- A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. - roles List<String>
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFromare allowed to perform.
- external
Resources string[] - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
Service
Perimeter Dry Run Egress Policy Egress To Operation[] - A list of
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources string[]
- A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. - roles string[]
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFromare allowed to perform.
- external_
resources Sequence[str] - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
Sequence[Service
Perimeter Dry Run Egress Policy Egress To Operation] - A list of
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources Sequence[str]
- A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. - roles Sequence[str]
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFromare allowed to perform.
- external
Resources List<String> - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations List<Property Map>
- A list of
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources List<String>
- A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. - roles List<String>
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFromare allowed to perform.
ServicePerimeterDryRunEgressPolicyEgressToOperation, ServicePerimeterDryRunEgressPolicyEgressToOperationArgs
- Method
Selectors List<ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector> - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - Service
Name string - The name of the API whose methods or permissions the
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services.
- Method
Selectors []ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - Service
Name string - The name of the API whose methods or permissions the
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services.
- method
Selectors List<ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector> - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service
Name String - The name of the API whose methods or permissions the
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services.
- method
Selectors ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector[] - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service
Name string - The name of the API whose methods or permissions the
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services.
- method_
selectors Sequence[ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector] - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service_
name str - The name of the API whose methods or permissions the
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services.
- method
Selectors List<Property Map> - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service
Name String - The name of the API whose methods or permissions the
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services.
ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector, ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs
- Method string
- Value for
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - Permission string
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceNameinApiOperation.
- Method string
- Value for
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - Permission string
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceNameinApiOperation.
- method String
- Value for
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission String
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceNameinApiOperation.
- method string
- Value for
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission string
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceNameinApiOperation.
- method str
- Value for
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission str
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceNameinApiOperation.
- method String
- Value for
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission String
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceNameinApiOperation.
Package Details
- Repository
- Google Cloud (GCP) Classic pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-betaTerraform Provider.