|
10 | 10 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
11 | 11 | # See the License for the specific language governing permissions and
|
12 | 12 | # limitations under the License.
|
| 13 | + |
13 | 14 | --- !ruby/object:Api::Resource
|
14 |
| - name: 'EgressPolicy' |
15 |
| - create_url: "{{egress_policy_name}}" |
16 |
| - base_url: "" |
17 |
| - self_link: "{{egress_policy_name}}" |
18 |
| - create_verb: :PATCH |
19 |
| - delete_verb: :PATCH |
20 |
| - immutable: true |
21 |
| - update_mask: true |
22 |
| - identity: |
23 |
| - - resource |
24 |
| - nested_query: !ruby/object:Api::Resource::NestedQuery |
25 |
| - modify_by_patch: true |
26 |
| - is_list_of_ids: true |
27 |
| - keys: |
28 |
| - - status |
29 |
| - - resources |
30 |
| - references: !ruby/object:Api::Resource::ReferenceLinks |
31 |
| - api: 'https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy' |
32 |
| - description: | |
33 |
| - EgressPolicies match requests based on egressFrom and egressTo stanzas. |
34 |
| - For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. |
35 |
| - If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter |
36 |
| - boundary. For example, an EgressPolicy can be used to allow VMs on networks |
37 |
| - within the ServicePerimeter to access a defined set of projects outside the |
38 |
| - perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket |
39 |
| - or query against a BigQuery dataset). |
40 |
| - autogen_async: true |
41 |
| - exclude_validator: true |
42 |
| - # Skipping the sweeper due to the non-standard base_url and because this is fine-grained under ServicePerimeter/IngressPolicy |
43 |
| - skip_sweeper: true |
44 |
| - id_format: "{{egress_policy_name}}/{{resource}}" |
45 |
| - import_format: ["{{egress_policy_name}}/{{resource}}"] |
46 |
| - custom_code: !ruby/object:Provider::Terraform::CustomCode |
47 |
| - custom_import: templates/terraform/custom_import/access_context_manager_service_perimeter_egress_policy.go.erb |
48 |
| - parameters: |
49 |
| - - !ruby/object:Api::Type::ResourceRef |
50 |
| - name: 'egressPolicyName' |
51 |
| - resource: 'ServicePerimeter' |
52 |
| - imports: 'name' |
53 |
| - description: | |
54 |
| - The name of the Service Perimeter to add this resource to. |
55 |
| - required: true |
56 |
| - immutable: true |
57 |
| - url_param_only: true |
58 |
| - properties: |
59 |
| - - !ruby/object:Api::Type::String |
60 |
| - name: 'resource' |
61 |
| - description: | |
62 |
| - A GCP resource that is inside of the service perimeter. |
63 |
| - required: true |
64 |
| - immutable: true |
| 15 | +name: 'EgressPolicy' |
| 16 | +create_url: '{{egress_policy_name}}' |
| 17 | +base_url: '' |
| 18 | +self_link: '{{egress_policy_name}}' |
| 19 | +create_verb: :PATCH |
| 20 | +delete_verb: :PATCH |
| 21 | +immutable: true |
| 22 | +update_mask: true |
| 23 | +identity: |
| 24 | + - resource |
| 25 | +nested_query: !ruby/object:Api::Resource::NestedQuery |
| 26 | + modify_by_patch: true |
| 27 | + is_list_of_ids: true |
| 28 | + keys: |
| 29 | + - status |
| 30 | + - resources |
| 31 | +references: !ruby/object:Api::Resource::ReferenceLinks |
| 32 | + api: 'https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters#egresspolicy' |
| 33 | +description: | |
| 34 | + EgressPolicies match requests based on egressFrom and egressTo stanzas. |
| 35 | + For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. |
| 36 | + If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter |
| 37 | + boundary. For example, an EgressPolicy can be used to allow VMs on networks |
| 38 | + within the ServicePerimeter to access a defined set of projects outside the |
| 39 | + perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket |
| 40 | + or query against a BigQuery dataset). |
| 41 | +autogen_async: true |
| 42 | +exclude_validator: true |
| 43 | +# Skipping the sweeper due to the non-standard base_url and because this is fine-grained under ServicePerimeter/IngressPolicy |
| 44 | +skip_sweeper: true |
| 45 | +id_format: '{{egress_policy_name}}/{{resource}}' |
| 46 | +import_format: ['{{egress_policy_name}}/{{resource}}'] |
| 47 | +custom_code: !ruby/object:Provider::Terraform::CustomCode |
| 48 | + custom_import: templates/terraform/custom_import/access_context_manager_service_perimeter_egress_policy.go.erb |
| 49 | +parameters: |
| 50 | + - !ruby/object:Api::Type::ResourceRef |
| 51 | + name: 'egressPolicyName' |
| 52 | + resource: 'ServicePerimeter' |
| 53 | + imports: 'name' |
| 54 | + description: | |
| 55 | + The name of the Service Perimeter to add this resource to. |
| 56 | + required: true |
| 57 | + immutable: true |
| 58 | + url_param_only: true |
| 59 | +properties: |
| 60 | + - !ruby/object:Api::Type::String |
| 61 | + name: 'resource' |
| 62 | + description: | |
| 63 | + A GCP resource that is inside of the service perimeter. |
| 64 | + required: true |
| 65 | + immutable: true |
0 commit comments