1. Packages
  2. Google Cloud (GCP) Classic
  3. API Docs
  4. accesscontextmanager
  5. ServicePerimeterEgressPolicy
Google Cloud Classic v7.30.2 published on Wednesday, Jul 10, 2024 by Pulumi

gcp.accesscontextmanager.ServicePerimeterEgressPolicy

Explore with Pulumi AI

gcp logo
Google Cloud Classic v7.30.2 published on Wednesday, Jul 10, 2024 by Pulumi

    EgressPolicies match requests based on egressFrom and egressTo stanzas. For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).

    Note: By default, updates to this resource will remove the EgressPolicy from the from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy is added before the old one is removed, add a lifecycle block with create_before_destroy = true to this resource.

    To get more information about ServicePerimeterEgressPolicy, see:

    Example Usage

    Create ServicePerimeterEgressPolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ServicePerimeterEgressPolicy(name: string, args: ServicePerimeterEgressPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def ServicePerimeterEgressPolicy(resource_name: str,
                                     args: ServicePerimeterEgressPolicyArgs,
                                     opts: Optional[ResourceOptions] = None)
    
    @overload
    def ServicePerimeterEgressPolicy(resource_name: str,
                                     opts: Optional[ResourceOptions] = None,
                                     perimeter: Optional[str] = None,
                                     egress_from: Optional[ServicePerimeterEgressPolicyEgressFromArgs] = None,
                                     egress_to: Optional[ServicePerimeterEgressPolicyEgressToArgs] = None)
    func NewServicePerimeterEgressPolicy(ctx *Context, name string, args ServicePerimeterEgressPolicyArgs, opts ...ResourceOption) (*ServicePerimeterEgressPolicy, error)
    public ServicePerimeterEgressPolicy(string name, ServicePerimeterEgressPolicyArgs args, CustomResourceOptions? opts = null)
    public ServicePerimeterEgressPolicy(String name, ServicePerimeterEgressPolicyArgs args)
    public ServicePerimeterEgressPolicy(String name, ServicePerimeterEgressPolicyArgs args, CustomResourceOptions options)
    
    type: gcp:accesscontextmanager:ServicePerimeterEgressPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ServicePerimeterEgressPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var servicePerimeterEgressPolicyResource = new Gcp.AccessContextManager.ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource", new()
    {
        Perimeter = "string",
        EgressFrom = new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressFromArgs
        {
            Identities = new[]
            {
                "string",
            },
            IdentityType = "string",
            SourceRestriction = "string",
            Sources = new[]
            {
                new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressFromSourceArgs
                {
                    AccessLevel = "string",
                },
            },
        },
        EgressTo = new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressToArgs
        {
            ExternalResources = new[]
            {
                "string",
            },
            Operations = new[]
            {
                new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressToOperationArgs
                {
                    MethodSelectors = new[]
                    {
                        new Gcp.AccessContextManager.Inputs.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs
                        {
                            Method = "string",
                            Permission = "string",
                        },
                    },
                    ServiceName = "string",
                },
            },
            Resources = new[]
            {
                "string",
            },
        },
    });
    
    example, err := accesscontextmanager.NewServicePerimeterEgressPolicy(ctx, "servicePerimeterEgressPolicyResource", &accesscontextmanager.ServicePerimeterEgressPolicyArgs{
    	Perimeter: pulumi.String("string"),
    	EgressFrom: &accesscontextmanager.ServicePerimeterEgressPolicyEgressFromArgs{
    		Identities: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		IdentityType:      pulumi.String("string"),
    		SourceRestriction: pulumi.String("string"),
    		Sources: accesscontextmanager.ServicePerimeterEgressPolicyEgressFromSourceArray{
    			&accesscontextmanager.ServicePerimeterEgressPolicyEgressFromSourceArgs{
    				AccessLevel: pulumi.String("string"),
    			},
    		},
    	},
    	EgressTo: &accesscontextmanager.ServicePerimeterEgressPolicyEgressToArgs{
    		ExternalResources: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Operations: accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArray{
    			&accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationArgs{
    				MethodSelectors: accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArray{
    					&accesscontextmanager.ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs{
    						Method:     pulumi.String("string"),
    						Permission: pulumi.String("string"),
    					},
    				},
    				ServiceName: pulumi.String("string"),
    			},
    		},
    		Resources: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    })
    
    var servicePerimeterEgressPolicyResource = new ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource", ServicePerimeterEgressPolicyArgs.builder()
        .perimeter("string")
        .egressFrom(ServicePerimeterEgressPolicyEgressFromArgs.builder()
            .identities("string")
            .identityType("string")
            .sourceRestriction("string")
            .sources(ServicePerimeterEgressPolicyEgressFromSourceArgs.builder()
                .accessLevel("string")
                .build())
            .build())
        .egressTo(ServicePerimeterEgressPolicyEgressToArgs.builder()
            .externalResources("string")
            .operations(ServicePerimeterEgressPolicyEgressToOperationArgs.builder()
                .methodSelectors(ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs.builder()
                    .method("string")
                    .permission("string")
                    .build())
                .serviceName("string")
                .build())
            .resources("string")
            .build())
        .build());
    
    service_perimeter_egress_policy_resource = gcp.accesscontextmanager.ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource",
        perimeter="string",
        egress_from={
            "identities": ["string"],
            "identityType": "string",
            "sourceRestriction": "string",
            "sources": [{
                "accessLevel": "string",
            }],
        },
        egress_to={
            "externalResources": ["string"],
            "operations": [{
                "methodSelectors": [{
                    "method": "string",
                    "permission": "string",
                }],
                "serviceName": "string",
            }],
            "resources": ["string"],
        })
    
    const servicePerimeterEgressPolicyResource = new gcp.accesscontextmanager.ServicePerimeterEgressPolicy("servicePerimeterEgressPolicyResource", {
        perimeter: "string",
        egressFrom: {
            identities: ["string"],
            identityType: "string",
            sourceRestriction: "string",
            sources: [{
                accessLevel: "string",
            }],
        },
        egressTo: {
            externalResources: ["string"],
            operations: [{
                methodSelectors: [{
                    method: "string",
                    permission: "string",
                }],
                serviceName: "string",
            }],
            resources: ["string"],
        },
    });
    
    type: gcp:accesscontextmanager:ServicePerimeterEgressPolicy
    properties:
        egressFrom:
            identities:
                - string
            identityType: string
            sourceRestriction: string
            sources:
                - accessLevel: string
        egressTo:
            externalResources:
                - string
            operations:
                - methodSelectors:
                    - method: string
                      permission: string
                  serviceName: string
            resources:
                - string
        perimeter: string
    

    ServicePerimeterEgressPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The ServicePerimeterEgressPolicy resource accepts the following input properties:

    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter string
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter str
    The name of the Service Perimeter to add this resource to.


    egress_from ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egress_to ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom Property Map
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo Property Map
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ServicePerimeterEgressPolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ServicePerimeterEgressPolicy Resource

    Get an existing ServicePerimeterEgressPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ServicePerimeterEgressPolicyState, opts?: CustomResourceOptions): ServicePerimeterEgressPolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            egress_from: Optional[ServicePerimeterEgressPolicyEgressFromArgs] = None,
            egress_to: Optional[ServicePerimeterEgressPolicyEgressToArgs] = None,
            perimeter: Optional[str] = None) -> ServicePerimeterEgressPolicy
    func GetServicePerimeterEgressPolicy(ctx *Context, name string, id IDInput, state *ServicePerimeterEgressPolicyState, opts ...ResourceOption) (*ServicePerimeterEgressPolicy, error)
    public static ServicePerimeterEgressPolicy Get(string name, Input<string> id, ServicePerimeterEgressPolicyState? state, CustomResourceOptions? opts = null)
    public static ServicePerimeterEgressPolicy get(String name, Output<String> id, ServicePerimeterEgressPolicyState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    EgressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    EgressFrom ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    EgressTo ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    Perimeter string
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    egressFrom ServicePerimeterEgressPolicyEgressFrom
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo ServicePerimeterEgressPolicyEgressTo
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter string
    The name of the Service Perimeter to add this resource to.


    egress_from ServicePerimeterEgressPolicyEgressFromArgs
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egress_to ServicePerimeterEgressPolicyEgressToArgs
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter str
    The name of the Service Perimeter to add this resource to.


    egressFrom Property Map
    Defines conditions on the source of a request causing this EgressPolicy to apply. Structure is documented below.
    egressTo Property Map
    Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. Structure is documented below.
    perimeter String
    The name of the Service Perimeter to add this resource to.


    Supporting Types

    ServicePerimeterEgressPolicyEgressFrom, ServicePerimeterEgressPolicyEgressFromArgs

    Identities List<string>
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    IdentityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    SourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    Sources List<ServicePerimeterEgressPolicyEgressFromSource>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    Identities []string
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    IdentityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    SourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    Sources []ServicePerimeterEgressPolicyEgressFromSource
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities List<String>
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identityType String
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction String
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources List<ServicePerimeterEgressPolicyEgressFromSource>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities string[]
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identityType string
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction string
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources ServicePerimeterEgressPolicyEgressFromSource[]
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities Sequence[str]
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identity_type str
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    source_restriction str
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources Sequence[ServicePerimeterEgressPolicyEgressFromSource]
    Sources that this EgressPolicy authorizes access from. Structure is documented below.
    identities List<String>
    A list of identities that are allowed access through this EgressPolicy. Should be in the format of email address. The email address should represent individual user or service account only.
    identityType String
    Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access. Possible values are: ANY_IDENTITY, ANY_USER_ACCOUNT, ANY_SERVICE_ACCOUNT.
    sourceRestriction String
    Whether to enforce traffic restrictions based on sources field. If the sources field is non-empty, then this field must be set to SOURCE_RESTRICTION_ENABLED. Possible values are: SOURCE_RESTRICTION_UNSPECIFIED, SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED.
    sources List<Property Map>
    Sources that this EgressPolicy authorizes access from. Structure is documented below.

    ServicePerimeterEgressPolicyEgressFromSource, ServicePerimeterEgressPolicyEgressFromSourceArgs

    AccessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    AccessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    accessLevel String
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    accessLevel string
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    access_level str
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
    accessLevel String
    An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.

    ServicePerimeterEgressPolicyEgressTo, ServicePerimeterEgressPolicyEgressToArgs

    ExternalResources List<string>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    Operations List<ServicePerimeterEgressPolicyEgressToOperation>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    Resources List<string>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    ExternalResources []string
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    Operations []ServicePerimeterEgressPolicyEgressToOperation
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    Resources []string
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources List<String>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations List<ServicePerimeterEgressPolicyEgressToOperation>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources List<String>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources string[]
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations ServicePerimeterEgressPolicyEgressToOperation[]
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources string[]
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    external_resources Sequence[str]
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations Sequence[ServicePerimeterEgressPolicyEgressToOperation]
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources Sequence[str]
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.
    externalResources List<String>
    A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
    operations List<Property Map>
    A list of ApiOperations that this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below.
    resources List<String>
    A list of resources, currently only projects in the form projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then this EgressTo rule will authorize access to all resources outside the perimeter.

    ServicePerimeterEgressPolicyEgressToOperation, ServicePerimeterEgressPolicyEgressToOperationArgs

    MethodSelectors List<ServicePerimeterEgressPolicyEgressToOperationMethodSelector>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    ServiceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    MethodSelectors []ServicePerimeterEgressPolicyEgressToOperationMethodSelector
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    ServiceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors List<ServicePerimeterEgressPolicyEgressToOperationMethodSelector>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName String
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors ServicePerimeterEgressPolicyEgressToOperationMethodSelector[]
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName string
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    method_selectors Sequence[ServicePerimeterEgressPolicyEgressToOperationMethodSelector]
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    service_name str
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.
    methodSelectors List<Property Map>
    API methods or permissions to allow. Method or permission must belong to the service specified by serviceName field. A single MethodSelector entry with * specified for the method field will allow all methods AND permissions for the service specified in serviceName. Structure is documented below.
    serviceName String
    The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with serviceName field set to * will allow all methods AND permissions for all services.

    ServicePerimeterEgressPolicyEgressToOperationMethodSelector, ServicePerimeterEgressPolicyEgressToOperationMethodSelectorArgs

    Method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    Permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    Method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    Permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method String
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission String
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method string
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission string
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method str
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission str
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.
    method String
    Value for method should be a valid method name for the corresponding serviceName in ApiOperation. If * used as value for method, then ALL methods and permissions are allowed.
    permission String
    Value for permission should be a valid Cloud IAM permission for the corresponding serviceName in ApiOperation.

    Import

    ServicePerimeterEgressPolicy can be imported using any of these accepted formats:

    • {{perimeter}}

    When using the pulumi import command, ServicePerimeterEgressPolicy can be imported using one of the formats above. For example:

    $ pulumi import gcp:accesscontextmanager/servicePerimeterEgressPolicy:ServicePerimeterEgressPolicy default {{perimeter}}
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Google Cloud (GCP) Classic pulumi/pulumi-gcp
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the google-beta Terraform Provider.
    gcp logo
    Google Cloud Classic v7.30.2 published on Wednesday, Jul 10, 2024 by Pulumi