You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: mmv1/products/accesscontextmanager/ServicePerimeter.yaml
+18
Original file line number
Diff line number
Diff line change
@@ -384,6 +384,15 @@ properties:
384
384
- name: 'accessLevel'
385
385
type: String
386
386
description: 'An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.'
387
+
- name: 'resource'
388
+
type: String
389
+
description: |
390
+
A Google Cloud resource that is allowed to egress the perimeter.
391
+
Requests from these resources are allowed to access data outside the perimeter.
392
+
Currently only projects are allowed. Project format: `projects/{project_number}`.
393
+
The resource may be in any Google Cloud organization, not just the
394
+
organization that the perimeter is defined in. `*` is not allowed, the
395
+
case of allowing all Google Cloud resources only is not supported.
387
396
- name: 'sourceRestriction'
388
397
type: Enum
389
398
description: 'Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.'
@@ -693,6 +702,15 @@ properties:
693
702
- name: 'accessLevel'
694
703
type: String
695
704
description: 'An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.'
705
+
- name: 'resource'
706
+
type: String
707
+
description: |
708
+
A Google Cloud resource that is allowed to egress the perimeter.
709
+
Requests from these resources are allowed to access data outside the perimeter.
710
+
Currently only projects are allowed. Project format: `projects/{project_number}`.
711
+
The resource may be in any Google Cloud organization, not just the
712
+
organization that the perimeter is defined in. `*` is not allowed, the
713
+
case of allowing all Google Cloud resources only is not supported.
696
714
- name: 'sourceRestriction'
697
715
type: Enum
698
716
description: 'Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.'
Copy file name to clipboardExpand all lines: mmv1/products/accesscontextmanager/ServicePerimeterDryRunEgressPolicy.yaml
+9
Original file line number
Diff line number
Diff line change
@@ -128,6 +128,15 @@ properties:
128
128
- name: 'accessLevel'
129
129
type: String
130
130
description: 'An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.'
131
+
- name: 'resource'
132
+
type: String
133
+
description: |
134
+
A Google Cloud resource that is allowed to egress the perimeter.
135
+
Requests from these resources are allowed to access data outside the perimeter.
136
+
Currently only projects are allowed. Project format: `projects/{project_number}`.
137
+
The resource may be in any Google Cloud organization, not just the
138
+
organization that the perimeter is defined in. `*` is not allowed, the
139
+
case of allowing all Google Cloud resources only is not supported.
131
140
- name: 'sourceRestriction'
132
141
type: Enum
133
142
description: 'Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.'
Copy file name to clipboardExpand all lines: mmv1/products/accesscontextmanager/ServicePerimeterEgressPolicy.yaml
+9
Original file line number
Diff line number
Diff line change
@@ -125,6 +125,15 @@ properties:
125
125
- name: 'accessLevel'
126
126
type: String
127
127
description: 'An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.'
128
+
- name: 'resource'
129
+
type: String
130
+
description: |
131
+
A Google Cloud resource that is allowed to egress the perimeter.
132
+
Requests from these resources are allowed to access data outside the perimeter.
133
+
Currently only projects are allowed. Project format: `projects/{project_number}`.
134
+
The resource may be in any Google Cloud organization, not just the
135
+
organization that the perimeter is defined in. `*` is not allowed, the
136
+
case of allowing all Google Cloud resources only is not supported.
128
137
- name: 'sourceRestriction'
129
138
type: Enum
130
139
description: 'Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.'
Copy file name to clipboardExpand all lines: mmv1/products/accesscontextmanager/ServicePerimeters.yaml
+18
Original file line number
Diff line number
Diff line change
@@ -373,6 +373,15 @@ properties:
373
373
- name: 'accessLevel'
374
374
type: String
375
375
description: 'An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.'
376
+
- name: 'resource'
377
+
type: String
378
+
description: |
379
+
A Google Cloud resource that is allowed to egress the perimeter.
380
+
Requests from these resources are allowed to access data outside the perimeter.
381
+
Currently only projects are allowed. Project format: `projects/{project_number}`.
382
+
The resource may be in any Google Cloud organization, not just the
383
+
organization that the perimeter is defined in. `*` is not allowed, the
384
+
case of allowing all Google Cloud resources only is not supported.
376
385
- name: 'sourceRestriction'
377
386
type: Enum
378
387
description: 'Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.'
@@ -674,6 +683,15 @@ properties:
674
683
- name: 'accessLevel'
675
684
type: String
676
685
description: 'An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.'
686
+
- name: 'resource'
687
+
type: String
688
+
description: |
689
+
A Google Cloud resource that is allowed to egress the perimeter.
690
+
Requests from these resources are allowed to access data outside the perimeter.
691
+
Currently only projects are allowed. Project format: `projects/{project_number}`.
692
+
The resource may be in any Google Cloud organization, not just the
693
+
organization that the perimeter is defined in. `*` is not allowed, the
694
+
case of allowing all Google Cloud resources only is not supported.
677
695
- name: 'sourceRestriction'
678
696
type: Enum
679
697
description: 'Whether to enforce traffic restrictions based on `sources` field. If the `sources` field is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.'
Copy file name to clipboardExpand all lines: mmv1/third_party/terraform/services/accesscontextmanager/resource_access_context_manager_service_perimeter_dry_run_egress_policy_test.go
Copy file name to clipboardExpand all lines: mmv1/third_party/terraform/services/accesscontextmanager/resource_access_context_manager_service_perimeter_egress_policy_test.go
Copy file name to clipboardExpand all lines: mmv1/third_party/terraform/services/accesscontextmanager/resource_access_context_manager_service_perimeter_test.go.tmpl
Copy file name to clipboardExpand all lines: mmv1/third_party/terraform/services/accesscontextmanager/resource_access_context_manager_services_perimeters_test.go
+20-3
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,7 @@ import (
16
16
// can exist, they need to be run serially. See AccessPolicy for the test runner.
0 commit comments