ServicePerimeterConfig
import type { ServicePerimeterConfig } from "https://googleapis.deno.dev/v1/accesscontextmanager:v1.ts";ServicePerimeterConfig specifies a set of Google Cloud resources that
describe specific Service Perimeter configuration.
§Properties
A list of AccessLevel resource names that allow resources within the
ServicePerimeter to be accessed from the internet. AccessLevels listed
must be in the same policy as this ServicePerimeter. Referencing a
nonexistent AccessLevel is a syntax error. If no AccessLevel names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL". For Service Perimeter
Bridge, must be empty.
List of EgressPolicies to apply to the perimeter. A perimeter may have multiple EgressPolicies, each of which is evaluated separately. Access is granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
List of IngressPolicies to apply to the perimeter. A perimeter may have multiple IngressPolicies, each of which is evaluated separately. Access is granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
A list of Google Cloud resources that are inside of the service perimeter.
Currently only projects and VPCs are allowed. Project format:
projects/{project_number} VPC network format:
//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}.
Google Cloud services that are subject to the Service Perimeter
restrictions. For example, if storage.googleapis.com is specified, access
to the storage buckets inside the perimeter must meet the perimeter's
access restrictions.
Configuration for APIs allowed within Perimeter.