com.google.api.services.accesscontextmanager.v1.model.IngressSource Maven / Gradle / Ivy
/*
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software distributed under the License
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
* or implied. See the License for the specific language governing permissions and limitations under
* the License.
*/
/*
* This code was generated by https://github.com/googleapis/google-api-java-client-services/
* Modify at your own risk.
*/
package com.google.api.services.accesscontextmanager.v1.model;
/**
* The source that IngressPolicy authorizes access from.
*
* This is the Java data model class that specifies how to parse/serialize into the JSON that is
* transmitted over HTTP when working with the Access Context Manager API. For a detailed
* explanation see:
* https://developers.google.com/api-client-library/java/google-http-java-client/json
*
*
* @author Google, Inc.
*/
@SuppressWarnings("javadoc")
public final class IngressSource extends com.google.api.client.json.GenericJson {
/**
* An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed
* from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter.
* Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed,
* resources within the perimeter can only be accessed via Google Cloud calls with request origins
* within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single
* `*` is specified for `access_level`, then all IngressSources will be allowed.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String accessLevel;
/**
* A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources
* will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project
* format: `projects/{project_number}` VPC network format:
* `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`. The project may be in
* any Google Cloud organization, not just the organization that the perimeter is defined in. `*`
* is not allowed, the case of allowing all Google Cloud resources only is not supported.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String resource;
/**
* An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed
* from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter.
* Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed,
* resources within the perimeter can only be accessed via Google Cloud calls with request origins
* within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single
* `*` is specified for `access_level`, then all IngressSources will be allowed.
* @return value or {@code null} for none
*/
public java.lang.String getAccessLevel() {
return accessLevel;
}
/**
* An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed
* from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter.
* Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed,
* resources within the perimeter can only be accessed via Google Cloud calls with request origins
* within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single
* `*` is specified for `access_level`, then all IngressSources will be allowed.
* @param accessLevel accessLevel or {@code null} for none
*/
public IngressSource setAccessLevel(java.lang.String accessLevel) {
this.accessLevel = accessLevel;
return this;
}
/**
* A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources
* will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project
* format: `projects/{project_number}` VPC network format:
* `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`. The project may be in
* any Google Cloud organization, not just the organization that the perimeter is defined in. `*`
* is not allowed, the case of allowing all Google Cloud resources only is not supported.
* @return value or {@code null} for none
*/
public java.lang.String getResource() {
return resource;
}
/**
* A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources
* will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project
* format: `projects/{project_number}` VPC network format:
* `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`. The project may be in
* any Google Cloud organization, not just the organization that the perimeter is defined in. `*`
* is not allowed, the case of allowing all Google Cloud resources only is not supported.
* @param resource resource or {@code null} for none
*/
public IngressSource setResource(java.lang.String resource) {
this.resource = resource;
return this;
}
@Override
public IngressSource set(String fieldName, Object value) {
return (IngressSource) super.set(fieldName, value);
}
@Override
public IngressSource clone() {
return (IngressSource) super.clone();
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy