1. Packages
  2. Google Cloud (GCP) Classic
  3. API Docs
  4. accesscontextmanager
  5. ServicePerimeterDryRunEgressPolicy
Google Cloud Classic v8.9.3 published on Monday, Nov 18, 2024 by Pulumi

gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy

Explore with Pulumi AI

gcp logo
Google Cloud Classic v8.9.3 published on Monday, Nov 18, 2024 by Pulumi

    Manage a single EgressPolicy in the spec (dry-run) configuration for a service perimeter. EgressPolicies match requests based on egressFrom and egressTo stanzas. For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).

    Note: By default, updates to this resource will remove the EgressPolicy from the from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy is added before the old one is removed, add a lifecycle block with create_before_destroy = true to this resource.

    To get more information about ServicePerimeterDryRunEgressPolicy, see:

    Example Usage

    Create ServicePerimeterDryRunEgressPolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ServicePerimeterDryRunEgressPolicy(name: string, args: ServicePerimeterDryRunEgressPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def ServicePerimeterDryRunEgressPolicy(resource_name: str,
                                           args: ServicePerimeterDryRunEgressPolicyArgs,
                                           opts: Optional[ResourceOptions] = None)
    
    @overload
    def ServicePerimeterDryRunEgressPolicy(resource_name: str,
                                           opts: Optional[ResourceOptions] = None,
                                           perimeter: Optional[str] = None,
                                           egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
                                           egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None)
    func NewServicePerimeterDryRunEgressPolicy(ctx *Context, name string, args ServicePerimeterDryRunEgressPolicyArgs, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)
    public ServicePerimeterDryRunEgressPolicy(string name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions? opts = null)
    public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args)
    public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions options)
    
    type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ServicePerimeterDryRunEgressPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ServicePerimeterDryRunEgressPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ServicePerimeterDryRunEgressPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ServicePerimeterDryRunEgressPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ServicePerimeterDryRunEgressPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var servicePerimeterDryRunEgressPolicyResource = new Gcp.AccessContextManager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", new()
    {
        Perimeter = "string",
        EgressFrom = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromArgs
        {
            Identities = new[]
            {
                "string",
            },
            IdentityType = "string",
            SourceRestriction = "string",
            Sources = new[]
            {
                new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs
                {
                    AccessLevel = "string",
                },
            },
        },
        EgressTo = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToArgs
        {
            ExternalResources = new[]
            {
                "string",
            },
            Operations = new[]
            {
                new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs
                {
                    MethodSelectors = new[]
                    {
                        new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs
                        {
                            Method = "string",
                            Permission = "string",
                        },
                    },
                    ServiceName = "string",
                },
            },
            Resources = new[]
            {
                "string",
            },
        },
    });
    
    example, err := accesscontextmanager.NewServicePerimeterDryRunEgressPolicy(ctx, "servicePerimeterDryRunEgressPolicyResource", &accesscontextmanager.ServicePerimeterDryRunEgressPolicyArgs{
    	Perimeter: pulumi.String("string"),
    	EgressFrom: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromArgs{
    		Identities: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		IdentityType:      pulumi.String("string"),
    		SourceRestriction: pulumi.String("string"),
    		Sources: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArray{
    			&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs{
    				AccessLevel: pulumi.String("string"),
    			},
    		},
    	},
    	EgressTo: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToArgs{
    		ExternalResources: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Operations: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArray{
    			&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs{
    				MethodSelectors: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArray{
    					&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs{
    						Method:     pulumi.String("string"),
    						Permission: pulumi.String("string"),
    					},
    				},
    				ServiceName: pulumi.String("string"),
    			},
    		},
    		Resources: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    })
    
    var servicePerimeterDryRunEgressPolicyResource = new ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", ServicePerimeterDryRunEgressPolicyArgs.builder()
        .perimeter("string")
        .egressFrom(ServicePerimeterDryRunEgressPolicyEgressFromArgs.builder()
            .identities("string")
            .identityType("string")
            .sourceRestriction("string")
            .sources(ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs.builder()
                .accessLevel("string")
                .build())
            .build())
        .egressTo(ServicePerimeterDryRunEgressPolicyEgressToArgs.builder()
            .externalResources("string")
            .operations(ServicePerimeterDryRunEgressPolicyEgressToOperationArgs.builder()
                .methodSelectors(ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs.builder()
                    .method("string")
                    .permission("string")
                    .build())
                .serviceName("string")
                .build())
            .resources("string")
            .build())
        .build());
    
    service_perimeter_dry_run_egress_policy_resource = gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource",
        perimeter="string",
        egress_from={
            "identities": ["string"],
            "identity_type": "string",
            "source_restriction": "string",
            "sources": [{
                "access_level": "string",
            }],
        },
        egress_to={
            "external_resources": ["string"],
            "operations": [{
                "method_selectors": [{
                    "method": "string",
                    "permission": "string",
                }],
                "service_name": "string",
            }],
            "resources": ["string"],
        })
    
    const servicePerimeterDryRunEgressPolicyResource = new gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", {
        perimeter: "string",
        egressFrom: {
            identities: ["string"],
            identityType: "string",
            sourceRestriction: "string",
            sources: [{
                accessLevel: "string",
            }],
        },
        egressTo: {
            externalResources: ["string"],
            operations: [{
                methodSelectors: [{
                    method: "string",
                    permission: "string",
                }],
                serviceName: "string",
            }],
            resources: ["string"],
        },
    });
    
    type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
    properties:
        egressFrom:
            identities:
                - string
            identityType: string
            sourceRestriction: string
            sources:
                - accessLevel: string
        egressTo:
            externalResources:
                - string
            operations:
                - methodSelectors:
                    - method: string
                      permission: string
                  serviceName: string
            resources:
                - string
        perimeter: string
    

    ServicePerimeterDryRunEgressPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ServicePerimeterDryRunEgressPolicy resource accepts the following input properties:

    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterDryRunEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterDryRunEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterDryRunEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterDryRunEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterDryRunEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterDryRunEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter string
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterDryRunEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterDryRunEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter str
    The name of the Service Perimeter to add this resource to.


    egress_from ServicePerimeterDryRunEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egress_to ServicePerimeterDryRunEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom Property Map
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo Property Map
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ServicePerimeterDryRunEgressPolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ServicePerimeterDryRunEgressPolicy Resource

    Get an existing ServicePerimeterDryRunEgressPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ServicePerimeterDryRunEgressPolicyState, opts?: CustomResourceOptions): ServicePerimeterDryRunEgressPolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
            egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None,
            perimeter: Optional[str] = None) -> ServicePerimeterDryRunEgressPolicy
    func GetServicePerimeterDryRunEgressPolicy(ctx *Context, name string, id IDInput, state *ServicePerimeterDryRunEgressPolicyState, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)
    public static ServicePerimeterDryRunEgressPolicy Get(string name, Input<string> id, ServicePerimeterDryRunEgressPolicyState? state, CustomResourceOptions? opts = null)
    public static ServicePerimeterDryRunEgressPolicy get(String name, Output<String> id, ServicePerimeterDryRunEgressPolicyState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    EgressFrom ServicePerimeterDryRunEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterDryRunEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterDryRunEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterDryRunEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterDryRunEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterDryRunEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterDryRunEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterDryRunEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter string
    The name of the Service Perimeter to add this resource to.


    egress_from ServicePerimeterDryRunEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egress_to ServicePerimeterDryRunEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter str
    The name of the Service Perimeter to add this resource to.


    egressFrom Property Map
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo Property Map
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    Supporting Types

    ServicePerimeterDryRunEgressPolicyEgressFrom, ServicePerimeterDryRunEgressPolicyEgressFromArgs

    Identities List<string>
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    IdentityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    SourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    Sources List<ServicePerimeterDryRunEgressPolicyEgressFromSource>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    Identities []string
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    IdentityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    SourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    Sources []ServicePerimeterDryRunEgressPolicyEgressFromSource
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities List<String>
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identityType String
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction String
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources List<ServicePerimeterDryRunEgressPolicyEgressFromSource>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities string[]
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources ServicePerimeterDryRunEgressPolicyEgressFromSource[]
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities Sequence[str]
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identity_type str
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    source_restriction str
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources Sequence[ServicePerimeterDryRunEgressPolicyEgressFromSource]
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities List<String>
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identityType String
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction String
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources List<Property Map>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.

    ServicePerimeterDryRunEgressPolicyEgressFromSource, ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs

    AccessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    AccessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    accessLevel String
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    accessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    access_level str
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    accessLevel String
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.

    ServicePerimeterDryRunEgressPolicyEgressTo, ServicePerimeterDryRunEgressPolicyEgressToArgs

    ExternalResources List<string>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    Operations List<ServicePerimeterDryRunEgressPolicyEgressToOperation>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    Resources List<string>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    ExternalResources []string
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    Operations []ServicePerimeterDryRunEgressPolicyEgressToOperation
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    Resources []string
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources List<String>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations List<ServicePerimeterDryRunEgressPolicyEgressToOperation>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources List<String>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources string[]
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations ServicePerimeterDryRunEgressPolicyEgressToOperation[]
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources string[]
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    external_resources Sequence[str]
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations Sequence[ServicePerimeterDryRunEgressPolicyEgressToOperation]
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources Sequence[str]
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources List<String>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations List<Property Map>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources List<String>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.

    ServicePerimeterDryRunEgressPolicyEgressToOperation, ServicePerimeterDryRunEgressPolicyEgressToOperationArgs

    MethodSelectors List<ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    ServiceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    MethodSelectors []ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    ServiceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors List<ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName String
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector[]
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    method_selectors Sequence[ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector]
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    service_name str
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors List<Property Map>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName String
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.

    ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector, ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs

    Method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    Permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    Method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    Permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method String
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission String
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method str
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission str
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method String
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission String
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.

    Package Details

    Repository
    Google Cloud (GCP) Classic pulumi/pulumi-gcp
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the google-beta Terraform Provider.
    gcp logo
    Google Cloud Classic v8.9.3 published on Monday, Nov 18, 2024 by Pulumi