ServicePerimeterDryRunEgressPolicyEgressFromArgs

data class ServicePerimeterDryRunEgressPolicyEgressFromArgs(val identities: Output<List<String>>? = null, val identityType: Output<String>? = null, val sourceRestriction: Output<String>? = null, val sources: Output<List<ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs>>? = null) : ConvertibleToJava<ServicePerimeterDryRunEgressPolicyEgressFromArgs>

Constructors

constructor(identities: Output<List<String>>? = null, identityType: Output<String>? = null, sourceRestriction: Output<String>? = null, sources: Output<List<ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs>>? = null)

Properties

Link copied to clipboard
val identities: Output<List<String>>? = null

Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.

Link copied to clipboard
val identityType: Output<String>? = null

Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.

Link copied to clipboard
val sourceRestriction: Output<String>? = null

Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.

Link copied to clipboard

Sources that this EgressPolicy authorizes access from. Structure is documented below.

Functions

Link copied to clipboard
open override fun toJava(): ServicePerimeterDryRunEgressPolicyEgressFromArgs