ServicePerimeterConfig
import type { ServicePerimeterConfig } from "https://googleapis.deno.dev/v1/accesscontextmanager:v1.ts";
ServicePerimeterConfig
specifies a set of Google Cloud resources that
describe specific Service Perimeter configuration.
§Properties
A list of AccessLevel
resource names that allow resources within the
ServicePerimeter
to be accessed from the internet. AccessLevels
listed
must be in the same policy as this ServicePerimeter
. Referencing a
nonexistent AccessLevel
is a syntax error. If no AccessLevel
names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"
. For Service Perimeter
Bridge, must be empty.
List of EgressPolicies to apply to the perimeter. A perimeter may have multiple EgressPolicies, each of which is evaluated separately. Access is granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
List of IngressPolicies to apply to the perimeter. A perimeter may have multiple IngressPolicies, each of which is evaluated separately. Access is granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
A list of Google Cloud resources that are inside of the service perimeter.
Currently only projects and VPCs are allowed. Project format:
projects/{project_number}
VPC network format:
//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}
.
Google Cloud services that are subject to the Service Perimeter
restrictions. For example, if storage.googleapis.com
is specified, access
to the storage buckets inside the perimeter must meet the perimeter's
access restrictions.
Configuration for APIs allowed within Perimeter.