1. Packages
  2. Google Cloud (GCP) Classic
  3. API Docs
  4. accesscontextmanager
  5. ServicePerimeterEgressPolicy
Google Cloud v8.19.1 published on Thursday, Feb 13, 2025 by Pulumi

gcp.accesscontextmanager.ServicePerimeterEgressPolicy

Explore with Pulumi AI

gcp logo
Google Cloud v8.19.1 published on Thursday, Feb 13, 2025 by Pulumi

    Manage a single EgressPolicy in the status (enforced) configuration for a service perimeter. EgressPolicies match requests based on egressFrom and egressTo stanzas. For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).

    Note: By default, updates to this resource will remove the EgressPolicy from the from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy is added before the old one is removed, add a lifecycle block with create_before_destroy = true to this resource. Note: If this resource is used alongside a gcp.accesscontextmanager.ServicePerimeter resource, the service perimeter resource must have a lifecycle block with ignore_changes = [status[0].egress_policies] so they don’t fight over which egress rules should be in the policy.

    To get more information about ServicePerimeterEgressPolicy, see:

    Example Usage

    Create ServicePerimeterEgressPolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ServicePerimeterEgressPolicy(name: string, args: ServicePerimeterEgressPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def ServicePerimeterEgressPolicy(resource_name: str,
                                     args: ServicePerimeterEgressPolicyArgs,
                                     opts: Optional[ResourceOptions] = None)
    
    @overload
    def ServicePerimeterEgressPolicy(resource_name: str,
                                     opts: Optional[ResourceOptions] = None,
                                     perimeter: Optional[str] = None,
                                     egress_from: Optional[ServicePerimeterEgressPolicyEgressFromArgs] = None,
                                     egress_to: Optional[ServicePerimeterEgressPolicyEgressToArgs] = None)
    func NewServicePerimeterEgressPolicy(ctx *Context, name string, args ServicePerimeterEgressPolicyArgs, opts ...ResourceOption) (*ServicePerimeterEgressPolicy, error)
    public ServicePerimeterEgressPolicy(string name, ServicePerimeterEgressPolicyArgs args, CustomResourceOptions? opts = null)
    public ServicePerimeterEgressPolicy(String name, ServicePerimeterEgressPolicyArgs args)
    public ServicePerimeterEgressPolicy(String name, ServicePerimeterEgressPolicyArgs args, CustomResourceOptions options)
    
    type: gcp:accesscontextmanager:ServicePerimeterEgressPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var servicePerimeterEgressPolicyResource = new Gcp.AccessContextManager.ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource", new()
    {
        Perimeter = "string",
        EgressFrom = new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressFromArgs
        {
            Identities = new[]
            {
                "string",
            },
            IdentityType = "string",
            SourceRestriction = "string",
            Sources = new[]
            {
                new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressFromSourceArgs
                {
                    AccessLevel = "string",
                    Resource = "string",
                },
            },
        },
        EgressTo = new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressToArgs
        {
            ExternalResources = new[]
            {
                "string",
            },
            Operations = new[]
            {
                new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressToOperationArgs
                {
                    MethodSelectors = new[]
                    {
                        new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs
                        {
                            Method = "string",
                            Permission = "string",
                        },
                    },
                    ServiceName = "string",
                },
            },
            Resources = new[]
            {
                "string",
            },
        },
    });
    
    example, err := accesscontextmanager.NewServicePerimeterEgressPolicy(ctx, "servicePerimeterEgressPolicyResource", &accesscontextmanager.ServicePerimeterEgressPolicyArgs{
    	Perimeter: pulumi.String("string"),
    	EgressFrom: &accesscontextmanager.ServicePerimeterEgressPolicyEgressFromArgs{
    		Identities: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		IdentityType:      pulumi.String("string"),
    		SourceRestriction: pulumi.String("string"),
    		Sources: accesscontextmanager.ServicePerimeterEgressPolicyEgressFromSourceArray{
    			&accesscontextmanager.ServicePerimeterEgressPolicyEgressFromSourceArgs{
    				AccessLevel: pulumi.String("string"),
    				Resource:    pulumi.String("string"),
    			},
    		},
    	},
    	EgressTo: &accesscontextmanager.ServicePerimeterEgressPolicyEgressToArgs{
    		ExternalResources: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Operations: accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArray{
    			&accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArgs{
    				MethodSelectors: accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArray{
    					&accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs{
    						Method:     pulumi.String("string"),
    						Permission: pulumi.String("string"),
    					},
    				},
    				ServiceName: pulumi.String("string"),
    			},
    		},
    		Resources: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    })
    
    var servicePerimeterEgressPolicyResource = new ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource", ServicePerimeterEgressPolicyArgs.builder()
        .perimeter("string")
        .egressFrom(ServicePerimeterEgressPolicyEgressFromArgs.builder()
            .identities("string")
            .identityType("string")
            .sourceRestriction("string")
            .sources(ServicePerimeterEgressPolicyEgressFromSourceArgs.builder()
                .accessLevel("string")
                .resource("string")
                .build())
            .build())
        .egressTo(ServicePerimeterEgressPolicyEgressToArgs.builder()
            .externalResources("string")
            .operations(ServicePerimeterEgressPolicyEgressToOperationArgs.builder()
                .methodSelectors(ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs.builder()
                    .method("string")
                    .permission("string")
                    .build())
                .serviceName("string")
                .build())
            .resources("string")
            .build())
        .build());
    
    service_perimeter_egress_policy_resource = gcp.accesscontextmanager.ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource",
        perimeter="string",
        egress_from={
            "identities": ["string"],
            "identity_type": "string",
            "source_restriction": "string",
            "sources": [{
                "access_level": "string",
                "resource": "string",
            }],
        },
        egress_to={
            "external_resources": ["string"],
            "operations": [{
                "method_selectors": [{
                    "method": "string",
                    "permission": "string",
                }],
                "service_name": "string",
            }],
            "resources": ["string"],
        })
    
    const servicePerimeterEgressPolicyResource = new gcp.accesscontextmanager.ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource", {
        perimeter: "string",
        egressFrom: {
            identities: ["string"],
            identityType: "string",
            sourceRestriction: "string",
            sources: [{
                accessLevel: "string",
                resource: "string",
            }],
        },
        egressTo: {
            externalResources: ["string"],
            operations: [{
                methodSelectors: [{
                    method: "string",
                    permission: "string",
                }],
                serviceName: "string",
            }],
            resources: ["string"],
        },
    });
    
    type: gcp:accesscontextmanager:ServicePerimeterEgressPolicy
    properties:
        egressFrom:
            identities:
                - string
            identityType: string
            sourceRestriction: string
            sources:
                - accessLevel: string
                  resource: string
        egressTo:
            externalResources:
                - string
            operations:
                - methodSelectors:
                    - method: string
                      permission: string
                  serviceName: string
            resources:
                - string
        perimeter: string
    

    ServicePerimeterEgressPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ServicePerimeterEgressPolicy resource accepts the following input properties:

    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter string
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter str
    The name of the Service Perimeter to add this resource to.


    egress_from ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egress_to ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom Property Map
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo Property Map
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ServicePerimeterEgressPolicy resource produces the following output properties:

    AccessPolicyId string
    The name of the Access Policy this resource belongs to.
    Id string
    The provider-assigned unique ID for this managed resource.
    AccessPolicyId string
    The name of the Access Policy this resource belongs to.
    Id string
    The provider-assigned unique ID for this managed resource.
    accessPolicyId String
    The name of the Access Policy this resource belongs to.
    id String
    The provider-assigned unique ID for this managed resource.
    accessPolicyId string
    The name of the Access Policy this resource belongs to.
    id string
    The provider-assigned unique ID for this managed resource.
    access_policy_id str
    The name of the Access Policy this resource belongs to.
    id str
    The provider-assigned unique ID for this managed resource.
    accessPolicyId String
    The name of the Access Policy this resource belongs to.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ServicePerimeterEgressPolicy Resource

    Get an existing ServicePerimeterEgressPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ServicePerimeterEgressPolicyState, opts?: CustomResourceOptions): ServicePerimeterEgressPolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_policy_id: Optional[str] = None,
            egress_from: Optional[ServicePerimeterEgressPolicyEgressFromArgs] = None,
            egress_to: Optional[ServicePerimeterEgressPolicyEgressToArgs] = None,
            perimeter: Optional[str] = None) -> ServicePerimeterEgressPolicy
    func GetServicePerimeterEgressPolicy(ctx *Context, name string, id IDInput, state *ServicePerimeterEgressPolicyState, opts ...ResourceOption) (*ServicePerimeterEgressPolicy, error)
    public static ServicePerimeterEgressPolicy Get(string name, Input<string> id, ServicePerimeterEgressPolicyState? state, CustomResourceOptions? opts = null)
    public static ServicePerimeterEgressPolicy get(String name, Output<String> id, ServicePerimeterEgressPolicyState state, CustomResourceOptions options)
    resources:  _:    type: gcp:accesscontextmanager:ServicePerimeterEgressPolicy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessPolicyId string
    The name of the Access Policy this resource belongs to.
    EgressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    AccessPolicyId string
    The name of the Access Policy this resource belongs to.
    EgressFrom ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    accessPolicyId String
    The name of the Access Policy this resource belongs to.
    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    accessPolicyId string
    The name of the Access Policy this resource belongs to.
    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter string
    The name of the Service Perimeter to add this resource to.


    access_policy_id str
    The name of the Access Policy this resource belongs to.
    egress_from ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egress_to ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter str
    The name of the Service Perimeter to add this resource to.


    accessPolicyId String
    The name of the Access Policy this resource belongs to.
    egressFrom Property Map
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo Property Map
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    Supporting Types

    ServicePerimeterEgressPolicyEgressFrom, ServicePerimeterEgressPolicyEgressFromArgs

    Identities List<string>
    Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
    IdentityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    SourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    Sources List<ServicePerimeterEgressPolicyEgressFromSource>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    Identities []string
    Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
    IdentityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    SourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    Sources []ServicePerimeterEgressPolicyEgressFromSource
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities List<String>
    Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
    identityType String
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction String
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources List<ServicePerimeterEgressPolicyEgressFromSource>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities string[]
    Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
    identityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources ServicePerimeterEgressPolicyEgressFromSource[]
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities Sequence[str]
    Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
    identity_type str
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    source_restriction str
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources Sequence[ServicePerimeterEgressPolicyEgressFromSource]
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities List<String>
    Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
    identityType String
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction String
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources List<Property Map>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.

    ServicePerimeterEgressPolicyEgressFromSource, ServicePerimeterEgressPolicyEgressFromSourceArgs

    AccessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    Resource string
    A Google Cloud resource that is allowed to egress the perimeter. Requests from these resources are allowed to access data outside the perimeter. Currently only projects are allowed. Project format: projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.
    AccessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    Resource string
    A Google Cloud resource that is allowed to egress the perimeter. Requests from these resources are allowed to access data outside the perimeter. Currently only projects are allowed. Project format: projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.
    accessLevel String
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    resource String
    A Google Cloud resource that is allowed to egress the perimeter. Requests from these resources are allowed to access data outside the perimeter. Currently only projects are allowed. Project format: projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.
    accessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    resource string
    A Google Cloud resource that is allowed to egress the perimeter. Requests from these resources are allowed to access data outside the perimeter. Currently only projects are allowed. Project format: projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.
    access_level str
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    resource str
    A Google Cloud resource that is allowed to egress the perimeter. Requests from these resources are allowed to access data outside the perimeter. Currently only projects are allowed. Project format: projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.
    accessLevel String
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    resource String
    A Google Cloud resource that is allowed to egress the perimeter. Requests from these resources are allowed to access data outside the perimeter. Currently only projects are allowed. Project format: projects/{project_number}. The resource may be in any Google Cloud organization, not just the organization that the perimeter is defined in. * is not allowed, the case of allowing all Google Cloud resources only is not supported.

    ServicePerimeterEgressPolicyEgressTo, ServicePerimeterEgressPolicyEgressToArgs

    ExternalResources List<string>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    Operations List<ServicePerimeterEgressPolicyEgressToOperation>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    Resources List<string>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    ExternalResources []string
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    Operations []ServicePerimeterEgressPolicyEgressToOperation
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    Resources []string
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources List<String>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations List<ServicePerimeterEgressPolicyEgressToOperation>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources List<String>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources string[]
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations ServicePerimeterEgressPolicyEgressToOperation[]
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources string[]
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    external_resources Sequence[str]
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations Sequence[ServicePerimeterEgressPolicyEgressToOperation]
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources Sequence[str]
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources List<String>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations List<Property Map>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources List<String>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.

    ServicePerimeterEgressPolicyEgressToOperation, ServicePerimeterEgressPolicyEgressToOperationArgs

    MethodSelectors List<ServicePerimeterEgressPolicyEgressToOperationMethodSelector>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    ServiceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    MethodSelectors []ServicePerimeterEgressPolicyEgressToOperationMethodSelector
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    ServiceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors List<ServicePerimeterEgressPolicyEgressToOperationMethodSelector>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName String
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors ServicePerimeterEgressPolicyEgressToOperationMethodSelector[]
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    method_selectors Sequence[ServicePerimeterEgressPolicyEgressToOperationMethodSelector]
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    service_name str
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors List<Property Map>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName String
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.

    ServicePerimeterEgressPolicyEgressToOperationMethodSelector, ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs

    Method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    Permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    Method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    Permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method String
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission String
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method str
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission str
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method String
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission String
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.

    Package Details

    Repository
    Google Cloud (GCP) Classic pulumi/pulumi-gcp
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the google-beta Terraform Provider.
    gcp logo
    Google Cloud v8.19.1 published on Thursday, Feb 13, 2025 by Pulumi