You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html
+60
Original file line number
Diff line number
Diff line change
@@ -203,6 +203,9 @@ <h3>Method Details</h3>
203
203
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
204
204
"A String",
205
205
],
206
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
207
+
"A String",
208
+
],
206
209
},
207
210
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
208
211
},
@@ -236,6 +239,9 @@ <h3>Method Details</h3>
236
239
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
237
240
"A String",
238
241
],
242
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
243
+
"A String",
244
+
],
239
245
},
240
246
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
241
247
},
@@ -290,6 +296,9 @@ <h3>Method Details</h3>
290
296
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
291
297
"A String",
292
298
],
299
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
300
+
"A String",
301
+
],
293
302
},
294
303
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
295
304
},
@@ -323,6 +332,9 @@ <h3>Method Details</h3>
323
332
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
324
333
"A String",
325
334
],
335
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
336
+
"A String",
337
+
],
326
338
},
327
339
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
328
340
},
@@ -464,6 +476,9 @@ <h3>Method Details</h3>
464
476
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
465
477
"A String",
466
478
],
479
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
480
+
"A String",
481
+
],
467
482
},
468
483
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
469
484
},
@@ -497,6 +512,9 @@ <h3>Method Details</h3>
497
512
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
498
513
"A String",
499
514
],
515
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
516
+
"A String",
517
+
],
500
518
},
501
519
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
502
520
},
@@ -551,6 +569,9 @@ <h3>Method Details</h3>
551
569
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
552
570
"A String",
553
571
],
572
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
573
+
"A String",
574
+
],
554
575
},
555
576
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
556
577
},
@@ -584,6 +605,9 @@ <h3>Method Details</h3>
584
605
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
585
606
"A String",
586
607
],
608
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
609
+
"A String",
610
+
],
587
611
},
588
612
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
589
613
},
@@ -667,6 +691,9 @@ <h3>Method Details</h3>
667
691
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
668
692
"A String",
669
693
],
694
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
695
+
"A String",
696
+
],
670
697
},
671
698
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
672
699
},
@@ -700,6 +727,9 @@ <h3>Method Details</h3>
700
727
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
701
728
"A String",
702
729
],
730
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
731
+
"A String",
732
+
],
703
733
},
704
734
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
705
735
},
@@ -754,6 +784,9 @@ <h3>Method Details</h3>
754
784
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
755
785
"A String",
756
786
],
787
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
788
+
"A String",
789
+
],
757
790
},
758
791
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
759
792
},
@@ -787,6 +820,9 @@ <h3>Method Details</h3>
787
820
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
788
821
"A String",
789
822
],
823
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
824
+
"A String",
825
+
],
790
826
},
791
827
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
792
828
},
@@ -876,6 +912,9 @@ <h3>Method Details</h3>
876
912
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
877
913
"A String",
878
914
],
915
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
916
+
"A String",
917
+
],
879
918
},
880
919
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
881
920
},
@@ -909,6 +948,9 @@ <h3>Method Details</h3>
909
948
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
910
949
"A String",
911
950
],
951
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
952
+
"A String",
953
+
],
912
954
},
913
955
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
914
956
},
@@ -963,6 +1005,9 @@ <h3>Method Details</h3>
963
1005
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
964
1006
"A String",
965
1007
],
1008
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
1009
+
"A String",
1010
+
],
966
1011
},
967
1012
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
968
1013
},
@@ -996,6 +1041,9 @@ <h3>Method Details</h3>
996
1041
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
997
1042
"A String",
998
1043
],
1044
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
1045
+
"A String",
1046
+
],
999
1047
},
1000
1048
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
1001
1049
},
@@ -1101,6 +1149,9 @@ <h3>Method Details</h3>
1101
1149
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
1102
1150
"A String",
1103
1151
],
1152
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
1153
+
"A String",
1154
+
],
1104
1155
},
1105
1156
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
1106
1157
},
@@ -1134,6 +1185,9 @@ <h3>Method Details</h3>
1134
1185
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
1135
1186
"A String",
1136
1187
],
1188
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
1189
+
"A String",
1190
+
],
1137
1191
},
1138
1192
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
1139
1193
},
@@ -1188,6 +1242,9 @@ <h3>Method Details</h3>
1188
1242
"resources": [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
1189
1243
"A String",
1190
1244
],
1245
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
1246
+
"A String",
1247
+
],
1191
1248
},
1192
1249
"title": "A String", # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
1193
1250
},
@@ -1221,6 +1278,9 @@ <h3>Method Details</h3>
1221
1278
"resources": [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
1222
1279
"A String",
1223
1280
],
1281
+
"roles": [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
1282
+
"A String",
1283
+
],
1224
1284
},
1225
1285
"title": "A String", # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
"description": "IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.",
1860
+
"items": {
1861
+
"type": "string"
1862
+
},
1863
+
"type": "array"
1857
1864
}
1858
1865
},
1859
1866
"type": "object"
@@ -2051,6 +2058,13 @@
2051
2058
"type": "string"
2052
2059
},
2053
2060
"type": "array"
2061
+
},
2062
+
"roles": {
2063
+
"description": "IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.",
0 commit comments