gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy
Explore with Pulumi AI
Manage a single EgressPolicy in the spec (dry-run) configuration for a service perimeter. EgressPolicies match requests based on egressFrom and egressTo stanzas. For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).
Note: By default, updates to this resource will remove the EgressPolicy from the from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy is added before the old one is removed, add a
lifecycle
block withcreate_before_destroy = true
to this resource. Note: If this resource is used alongside agcp.accesscontextmanager.ServicePerimeter
resource, the service perimeter resource must have alifecycle
block withignore_changes = [spec[0].egress_policies]
so they don’t fight over which egress rules should be in the policy.
To get more information about ServicePerimeterDryRunEgressPolicy, see:
- API documentation
- How-to Guides
Example Usage
Create ServicePerimeterDryRunEgressPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ServicePerimeterDryRunEgressPolicy(name: string, args: ServicePerimeterDryRunEgressPolicyArgs, opts?: CustomResourceOptions);
@overload
def ServicePerimeterDryRunEgressPolicy(resource_name: str,
args: ServicePerimeterDryRunEgressPolicyArgs,
opts: Optional[ResourceOptions] = None)
@overload
def ServicePerimeterDryRunEgressPolicy(resource_name: str,
opts: Optional[ResourceOptions] = None,
perimeter: Optional[str] = None,
egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None,
title: Optional[str] = None)
func NewServicePerimeterDryRunEgressPolicy(ctx *Context, name string, args ServicePerimeterDryRunEgressPolicyArgs, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)
public ServicePerimeterDryRunEgressPolicy(string name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions? opts = null)
public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args)
public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions options)
type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name
This property is required. string - The unique name of the resource.
- args
This property is required. ServicePerimeterDryRunEgressPolicyArgs - The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name
This property is required. str - The unique name of the resource.
- args
This property is required. ServicePerimeterDryRunEgressPolicyArgs - The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name
This property is required. string - The unique name of the resource.
- args
This property is required. ServicePerimeterDryRunEgressPolicyArgs - The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name
This property is required. string - The unique name of the resource.
- args
This property is required. ServicePerimeterDryRunEgressPolicyArgs - The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name
This property is required. String - The unique name of the resource.
- args
This property is required. ServicePerimeterDryRunEgressPolicyArgs - The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var servicePerimeterDryRunEgressPolicyResource = new Gcp.AccessContextManager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", new()
{
Perimeter = "string",
EgressFrom = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromArgs
{
Identities = new[]
{
"string",
},
IdentityType = "string",
SourceRestriction = "string",
Sources = new[]
{
new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs
{
AccessLevel = "string",
Resource = "string",
},
},
},
EgressTo = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToArgs
{
ExternalResources = new[]
{
"string",
},
Operations = new[]
{
new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs
{
MethodSelectors = new[]
{
new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs
{
Method = "string",
Permission = "string",
},
},
ServiceName = "string",
},
},
Resources = new[]
{
"string",
},
Roles = new[]
{
"string",
},
},
Title = "string",
});
example, err := accesscontextmanager.NewServicePerimeterDryRunEgressPolicy(ctx, "servicePerimeterDryRunEgressPolicyResource", &accesscontextmanager.ServicePerimeterDryRunEgressPolicyArgs{
Perimeter: pulumi.String("string"),
EgressFrom: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromArgs{
Identities: pulumi.StringArray{
pulumi.String("string"),
},
IdentityType: pulumi.String("string"),
SourceRestriction: pulumi.String("string"),
Sources: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArray{
&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs{
AccessLevel: pulumi.String("string"),
Resource: pulumi.String("string"),
},
},
},
EgressTo: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToArgs{
ExternalResources: pulumi.StringArray{
pulumi.String("string"),
},
Operations: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArray{
&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs{
MethodSelectors: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArray{
&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs{
Method: pulumi.String("string"),
Permission: pulumi.String("string"),
},
},
ServiceName: pulumi.String("string"),
},
},
Resources: pulumi.StringArray{
pulumi.String("string"),
},
Roles: pulumi.StringArray{
pulumi.String("string"),
},
},
Title: pulumi.String("string"),
})
var servicePerimeterDryRunEgressPolicyResource = new ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", ServicePerimeterDryRunEgressPolicyArgs.builder()
.perimeter("string")
.egressFrom(ServicePerimeterDryRunEgressPolicyEgressFromArgs.builder()
.identities("string")
.identityType("string")
.sourceRestriction("string")
.sources(ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs.builder()
.accessLevel("string")
.resource("string")
.build())
.build())
.egressTo(ServicePerimeterDryRunEgressPolicyEgressToArgs.builder()
.externalResources("string")
.operations(ServicePerimeterDryRunEgressPolicyEgressToOperationArgs.builder()
.methodSelectors(ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs.builder()
.method("string")
.permission("string")
.build())
.serviceName("string")
.build())
.resources("string")
.roles("string")
.build())
.title("string")
.build());
service_perimeter_dry_run_egress_policy_resource = gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource",
perimeter="string",
egress_from={
"identities": ["string"],
"identity_type": "string",
"source_restriction": "string",
"sources": [{
"access_level": "string",
"resource": "string",
}],
},
egress_to={
"external_resources": ["string"],
"operations": [{
"method_selectors": [{
"method": "string",
"permission": "string",
}],
"service_name": "string",
}],
"resources": ["string"],
"roles": ["string"],
},
title="string")
const servicePerimeterDryRunEgressPolicyResource = new gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", {
perimeter: "string",
egressFrom: {
identities: ["string"],
identityType: "string",
sourceRestriction: "string",
sources: [{
accessLevel: "string",
resource: "string",
}],
},
egressTo: {
externalResources: ["string"],
operations: [{
methodSelectors: [{
method: "string",
permission: "string",
}],
serviceName: "string",
}],
resources: ["string"],
roles: ["string"],
},
title: "string",
});
type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
properties:
egressFrom:
identities:
- string
identityType: string
sourceRestriction: string
sources:
- accessLevel: string
resource: string
egressTo:
externalResources:
- string
operations:
- methodSelectors:
- method: string
permission: string
serviceName: string
resources:
- string
roles:
- string
perimeter: string
title: string
ServicePerimeterDryRunEgressPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ServicePerimeterDryRunEgressPolicy resource accepts the following input properties:
- Perimeter
This property is required. Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- Egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - Egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - Title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- Perimeter
This property is required. Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- Egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - Egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - Title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter
This property is required. Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter
This property is required. Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter
This property is required. Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- egress_
from Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress_
to Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- perimeter
This property is required. Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- egress
From Changes to this property will trigger replacement.
- Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress
To Changes to this property will trigger replacement.
- Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
Outputs
All input properties are implicitly available as output properties. Additionally, the ServicePerimeterDryRunEgressPolicy resource produces the following output properties:
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Id string
- The provider-assigned unique ID for this managed resource.
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Id string
- The provider-assigned unique ID for this managed resource.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id String
- The provider-assigned unique ID for this managed resource.
- access
Policy stringId - The name of the Access Policy this resource belongs to.
- etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id string
- The provider-assigned unique ID for this managed resource.
- access_
policy_ strid - The name of the Access Policy this resource belongs to.
- etag str
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id str
- The provider-assigned unique ID for this managed resource.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ServicePerimeterDryRunEgressPolicy Resource
Get an existing ServicePerimeterDryRunEgressPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ServicePerimeterDryRunEgressPolicyState, opts?: CustomResourceOptions): ServicePerimeterDryRunEgressPolicy
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_policy_id: Optional[str] = None,
egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None,
etag: Optional[str] = None,
perimeter: Optional[str] = None,
title: Optional[str] = None) -> ServicePerimeterDryRunEgressPolicy
func GetServicePerimeterDryRunEgressPolicy(ctx *Context, name string, id IDInput, state *ServicePerimeterDryRunEgressPolicyState, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)
public static ServicePerimeterDryRunEgressPolicy Get(string name, Input<string> id, ServicePerimeterDryRunEgressPolicyState? state, CustomResourceOptions? opts = null)
public static ServicePerimeterDryRunEgressPolicy get(String name, Output<String> id, ServicePerimeterDryRunEgressPolicyState state, CustomResourceOptions options)
resources: _: type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy get: id: ${id}
- name
This property is required. - The unique name of the resulting resource.
- id
This property is required. - The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
This property is required. - The unique name of the resulting resource.
- id
This property is required. - The unique provider ID of the resource to lookup.
- name
This property is required. - The unique name of the resulting resource.
- id
This property is required. - The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
This property is required. - The unique name of the resulting resource.
- id
This property is required. - The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
This property is required. - The unique name of the resulting resource.
- id
This property is required. - The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - Egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Perimeter
Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- Title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- Access
Policy stringId - The name of the Access Policy this resource belongs to.
- Egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - Egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - Etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- Perimeter
Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- Title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter
Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access
Policy stringId - The name of the Access Policy this resource belongs to.
- egress
From Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress
To Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - etag string
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter
Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access_
policy_ strid - The name of the Access Policy this resource belongs to.
- egress_
from Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Args - Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress_
to Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Args - Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - etag str
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter
Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
- access
Policy StringId - The name of the Access Policy this resource belongs to.
- egress
From Changes to this property will trigger replacement.
- Defines conditions on the source of a request causing this
EgressPolicy
to apply. Structure is documented below. - egress
To Changes to this property will trigger replacement.
- Defines the conditions on the
ApiOperation
and destination resources that cause thisEgressPolicy
to apply. Structure is documented below. - etag String
- The perimeter etag is internally used to prevent overwriting the list of policies on PATCH calls. It is retrieved from the same GET perimeter API call that's used to get the current list of policies. The policy defined in this resource is added or removed from that list, and then this etag is sent with the PATCH call along with the updated policies.
- perimeter
Changes to this property will trigger replacement.
- The name of the Service Perimeter to add this resource to.
- title
Changes to this property will trigger replacement.
- Human readable title. Must be unique within the perimeter. Does not affect behavior.
Supporting Types
ServicePerimeterDryRunEgressPolicyEgressFrom, ServicePerimeterDryRunEgressPolicyEgressFromArgs
- Identities
Changes to this property will trigger replacement.
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- Identity
Type Changes to this property will trigger replacement.
- Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identities
field will be allowed access. Possible values are:ANY_IDENTITY
,ANY_USER_ACCOUNT
,ANY_SERVICE_ACCOUNT
. - Source
Restriction Changes to this property will trigger replacement.
- Whether to enforce traffic restrictions based on
sources
field. If thesources
field is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED
. Possible values are:SOURCE_RESTRICTION_ENABLED
,SOURCE_RESTRICTION_DISABLED
. - Sources
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Source> - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- Identities
Changes to this property will trigger replacement.
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- Identity
Type Changes to this property will trigger replacement.
- Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identities
field will be allowed access. Possible values are:ANY_IDENTITY
,ANY_USER_ACCOUNT
,ANY_SERVICE_ACCOUNT
. - Source
Restriction Changes to this property will trigger replacement.
- Whether to enforce traffic restrictions based on
sources
field. If thesources
field is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED
. Possible values are:SOURCE_RESTRICTION_ENABLED
,SOURCE_RESTRICTION_DISABLED
. - Sources
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Source - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities
Changes to this property will trigger replacement.
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity
Type Changes to this property will trigger replacement.
- Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identities
field will be allowed access. Possible values are:ANY_IDENTITY
,ANY_USER_ACCOUNT
,ANY_SERVICE_ACCOUNT
. - source
Restriction Changes to this property will trigger replacement.
- Whether to enforce traffic restrictions based on
sources
field. If thesources
field is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED
. Possible values are:SOURCE_RESTRICTION_ENABLED
,SOURCE_RESTRICTION_DISABLED
. - sources
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Source> - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities
Changes to this property will trigger replacement.
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity
Type Changes to this property will trigger replacement.
- Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identities
field will be allowed access. Possible values are:ANY_IDENTITY
,ANY_USER_ACCOUNT
,ANY_SERVICE_ACCOUNT
. - source
Restriction Changes to this property will trigger replacement.
- Whether to enforce traffic restrictions based on
sources
field. If thesources
field is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED
. Possible values are:SOURCE_RESTRICTION_ENABLED
,SOURCE_RESTRICTION_DISABLED
. - sources
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Source[] - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities
Changes to this property will trigger replacement.
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity_
type Changes to this property will trigger replacement.
- Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identities
field will be allowed access. Possible values are:ANY_IDENTITY
,ANY_USER_ACCOUNT
,ANY_SERVICE_ACCOUNT
. - source_
restriction Changes to this property will trigger replacement.
- Whether to enforce traffic restrictions based on
sources
field. If thesources
field is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED
. Possible values are:SOURCE_RESTRICTION_ENABLED
,SOURCE_RESTRICTION_DISABLED
. - sources
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress From Source] - Sources that this EgressPolicy authorizes access from. Structure is documented below.
- identities
Changes to this property will trigger replacement.
- Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
- identity
Type Changes to this property will trigger replacement.
- Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of
identities
field will be allowed access. Possible values are:ANY_IDENTITY
,ANY_USER_ACCOUNT
,ANY_SERVICE_ACCOUNT
. - source
Restriction Changes to this property will trigger replacement.
- Whether to enforce traffic restrictions based on
sources
field. If thesources
field is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED
. Possible values are:SOURCE_RESTRICTION_ENABLED
,SOURCE_RESTRICTION_DISABLED
. - sources
Changes to this property will trigger replacement.
- Sources that this EgressPolicy authorizes access from. Structure is documented below.
ServicePerimeterDryRunEgressPolicyEgressFromSource, ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs
- Access
Level Changes to this property will trigger replacement.
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- Resource
Changes to this property will trigger replacement.
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}
. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*
is not allowed, the case of allowing all Google Cloud resources only is not supported.
- Access
Level Changes to this property will trigger replacement.
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- Resource
Changes to this property will trigger replacement.
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}
. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*
is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access
Level Changes to this property will trigger replacement.
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource
Changes to this property will trigger replacement.
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}
. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*
is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access
Level Changes to this property will trigger replacement.
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource
Changes to this property will trigger replacement.
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}
. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*
is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access_
level Changes to this property will trigger replacement.
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource
Changes to this property will trigger replacement.
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}
. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*
is not allowed, the case of allowing all Google Cloud resources only is not supported.
- access
Level Changes to this property will trigger replacement.
- An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
- resource
Changes to this property will trigger replacement.
- A Google Cloud resource that is allowed to egress the perimeter.
Requests from these resources are allowed to access data outside the perimeter.
Currently only projects are allowed. Project format:
projects/{project_number}
. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in.*
is not allowed, the case of allowing all Google Cloud resources only is not supported.
ServicePerimeterDryRunEgressPolicyEgressTo, ServicePerimeterDryRunEgressPolicyEgressToArgs
- External
Resources Changes to this property will trigger replacement.
- A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- Operations
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation> - A list of
ApiOperations
that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - Resources
Changes to this property will trigger replacement.
- A list of resources, currently only projects in the form
projects/<projectnumber>
, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTo
rule will authorize access to all resources outside the perimeter. - Roles
Changes to this property will trigger replacement.
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFrom
are allowed to perform.
- External
Resources Changes to this property will trigger replacement.
- A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- Operations
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation - A list of
ApiOperations
that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - Resources
Changes to this property will trigger replacement.
- A list of resources, currently only projects in the form
projects/<projectnumber>
, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTo
rule will authorize access to all resources outside the perimeter. - Roles
Changes to this property will trigger replacement.
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFrom
are allowed to perform.
- external
Resources Changes to this property will trigger replacement.
- A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation> - A list of
ApiOperations
that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources
Changes to this property will trigger replacement.
- A list of resources, currently only projects in the form
projects/<projectnumber>
, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTo
rule will authorize access to all resources outside the perimeter. - roles
Changes to this property will trigger replacement.
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFrom
are allowed to perform.
- external
Resources Changes to this property will trigger replacement.
- A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation[] - A list of
ApiOperations
that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources
Changes to this property will trigger replacement.
- A list of resources, currently only projects in the form
projects/<projectnumber>
, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTo
rule will authorize access to all resources outside the perimeter. - roles
Changes to this property will trigger replacement.
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFrom
are allowed to perform.
- external_
resources Changes to this property will trigger replacement.
- A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation] - A list of
ApiOperations
that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources
Changes to this property will trigger replacement.
- A list of resources, currently only projects in the form
projects/<projectnumber>
, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTo
rule will authorize access to all resources outside the perimeter. - roles
Changes to this property will trigger replacement.
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFrom
are allowed to perform.
- external
Resources Changes to this property will trigger replacement.
- A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
- operations
Changes to this property will trigger replacement.
- A list of
ApiOperations
that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources
Changes to this property will trigger replacement.
- A list of resources, currently only projects in the form
projects/<projectnumber>
, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTo
rule will authorize access to all resources outside the perimeter. - roles
Changes to this property will trigger replacement.
- A list of IAM roles that represent the set of operations that the sources
specified in the corresponding
EgressFrom
are allowed to perform.
ServicePerimeterDryRunEgressPolicyEgressToOperation, ServicePerimeterDryRunEgressPolicyEgressToOperationArgs
- Method
Selectors Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation Method Selector> - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceName
field. A single MethodSelector entry with*
specified for themethod
field will allow all methods AND permissions for the service specified inserviceName
. Structure is documented below. - Service
Name Changes to this property will trigger replacement.
- The name of the API whose methods or permissions the
IngressPolicy
orEgressPolicy
want to allow. A singleApiOperation
with serviceName field set to*
will allow all methods AND permissions for all services.
- Method
Selectors Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation Method Selector - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceName
field. A single MethodSelector entry with*
specified for themethod
field will allow all methods AND permissions for the service specified inserviceName
. Structure is documented below. - Service
Name Changes to this property will trigger replacement.
- The name of the API whose methods or permissions the
IngressPolicy
orEgressPolicy
want to allow. A singleApiOperation
with serviceName field set to*
will allow all methods AND permissions for all services.
- method
Selectors Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation Method Selector> - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceName
field. A single MethodSelector entry with*
specified for themethod
field will allow all methods AND permissions for the service specified inserviceName
. Structure is documented below. - service
Name Changes to this property will trigger replacement.
- The name of the API whose methods or permissions the
IngressPolicy
orEgressPolicy
want to allow. A singleApiOperation
with serviceName field set to*
will allow all methods AND permissions for all services.
- method
Selectors Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation Method Selector[] - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceName
field. A single MethodSelector entry with*
specified for themethod
field will allow all methods AND permissions for the service specified inserviceName
. Structure is documented below. - service
Name Changes to this property will trigger replacement.
- The name of the API whose methods or permissions the
IngressPolicy
orEgressPolicy
want to allow. A singleApiOperation
with serviceName field set to*
will allow all methods AND permissions for all services.
- method_
selectors Changes to this property will trigger replacement.
Perimeter Dry Run Egress Policy Egress To Operation Method Selector] - API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceName
field. A single MethodSelector entry with*
specified for themethod
field will allow all methods AND permissions for the service specified inserviceName
. Structure is documented below. - service_
name Changes to this property will trigger replacement.
- The name of the API whose methods or permissions the
IngressPolicy
orEgressPolicy
want to allow. A singleApiOperation
with serviceName field set to*
will allow all methods AND permissions for all services.
- method
Selectors Changes to this property will trigger replacement.
- API methods or permissions to allow. Method or permission must belong
to the service specified by
serviceName
field. A single MethodSelector entry with*
specified for themethod
field will allow all methods AND permissions for the service specified inserviceName
. Structure is documented below. - service
Name Changes to this property will trigger replacement.
- The name of the API whose methods or permissions the
IngressPolicy
orEgressPolicy
want to allow. A singleApiOperation
with serviceName field set to*
will allow all methods AND permissions for all services.
ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector, ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs
- Method
Changes to this property will trigger replacement.
- Value for
method
should be a valid method name for the correspondingserviceName
inApiOperation
. If*
used as value for method, then ALL methods and permissions are allowed. - Permission
Changes to this property will trigger replacement.
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceName
inApiOperation
.
- Method
Changes to this property will trigger replacement.
- Value for
method
should be a valid method name for the correspondingserviceName
inApiOperation
. If*
used as value for method, then ALL methods and permissions are allowed. - Permission
Changes to this property will trigger replacement.
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceName
inApiOperation
.
- method
Changes to this property will trigger replacement.
- Value for
method
should be a valid method name for the correspondingserviceName
inApiOperation
. If*
used as value for method, then ALL methods and permissions are allowed. - permission
Changes to this property will trigger replacement.
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceName
inApiOperation
.
- method
Changes to this property will trigger replacement.
- Value for
method
should be a valid method name for the correspondingserviceName
inApiOperation
. If*
used as value for method, then ALL methods and permissions are allowed. - permission
Changes to this property will trigger replacement.
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceName
inApiOperation
.
- method
Changes to this property will trigger replacement.
- Value for
method
should be a valid method name for the correspondingserviceName
inApiOperation
. If*
used as value for method, then ALL methods and permissions are allowed. - permission
Changes to this property will trigger replacement.
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceName
inApiOperation
.
- method
Changes to this property will trigger replacement.
- Value for
method
should be a valid method name for the correspondingserviceName
inApiOperation
. If*
used as value for method, then ALL methods and permissions are allowed. - permission
Changes to this property will trigger replacement.
- Value for permission should be a valid Cloud IAM permission for the
corresponding
serviceName
inApiOperation
.
Package Details
- Repository
- Google Cloud (GCP) Classic pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-beta
Terraform Provider.