gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy
Explore with Pulumi AI
Manage a single EgressPolicy in the spec (dry-run) configuration for a service perimeter. EgressPolicies match requests based on egressFrom and egressTo stanzas. For an EgressPolicy to match, both egressFrom and egressTo stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).
Note: By default, updates to this resource will remove the EgressPolicy from the from the perimeter and add it back in a non-atomic manner. To ensure that the new EgressPolicy is added before the old one is removed, add a
lifecycleblock withcreate_before_destroy = trueto this resource. Note: If this resource is used alongside agcp.accesscontextmanager.ServicePerimeterresource, the service perimeter resource must have alifecycleblock withignore_changes = [spec[0].egress_policies]so they don’t fight over which egress rules should be in the policy.
To get more information about ServicePerimeterDryRunEgressPolicy, see:
- API documentation
 - How-to Guides
 
Example Usage
Create ServicePerimeterDryRunEgressPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ServicePerimeterDryRunEgressPolicy(name: string, args: ServicePerimeterDryRunEgressPolicyArgs, opts?: CustomResourceOptions);@overload
def ServicePerimeterDryRunEgressPolicy(resource_name: str,
                                       args: ServicePerimeterDryRunEgressPolicyArgs,
                                       opts: Optional[ResourceOptions] = None)
@overload
def ServicePerimeterDryRunEgressPolicy(resource_name: str,
                                       opts: Optional[ResourceOptions] = None,
                                       perimeter: Optional[str] = None,
                                       egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
                                       egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None)func NewServicePerimeterDryRunEgressPolicy(ctx *Context, name string, args ServicePerimeterDryRunEgressPolicyArgs, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)public ServicePerimeterDryRunEgressPolicy(string name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions? opts = null)
public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args)
public ServicePerimeterDryRunEgressPolicy(String name, ServicePerimeterDryRunEgressPolicyArgs args, CustomResourceOptions options)
type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
 - The unique name of the resource.
 - args ServicePerimeterDryRunEgressPolicyArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- resource_name str
 - The unique name of the resource.
 - args ServicePerimeterDryRunEgressPolicyArgs
 - The arguments to resource properties.
 - opts ResourceOptions
 - Bag of options to control resource's behavior.
 
- ctx Context
 - Context object for the current deployment.
 - name string
 - The unique name of the resource.
 - args ServicePerimeterDryRunEgressPolicyArgs
 - The arguments to resource properties.
 - opts ResourceOption
 - Bag of options to control resource's behavior.
 
- name string
 - The unique name of the resource.
 - args ServicePerimeterDryRunEgressPolicyArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- name String
 - The unique name of the resource.
 - args ServicePerimeterDryRunEgressPolicyArgs
 - The arguments to resource properties.
 - options CustomResourceOptions
 - Bag of options to control resource's behavior.
 
Constructor example
The following reference example uses placeholder values for all input properties.
var servicePerimeterDryRunEgressPolicyResource = new Gcp.AccessContextManager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", new()
{
    Perimeter = "string",
    EgressFrom = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromArgs
    {
        Identities = new[]
        {
            "string",
        },
        IdentityType = "string",
        SourceRestriction = "string",
        Sources = new[]
        {
            new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs
            {
                AccessLevel = "string",
            },
        },
    },
    EgressTo = new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToArgs
    {
        ExternalResources = new[]
        {
            "string",
        },
        Operations = new[]
        {
            new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs
            {
                MethodSelectors = new[]
                {
                    new Gcp.AccessContextManager.Inputs.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs
                    {
                        Method = "string",
                        Permission = "string",
                    },
                },
                ServiceName = "string",
            },
        },
        Resources = new[]
        {
            "string",
        },
    },
});
example, err := accesscontextmanager.NewServicePerimeterDryRunEgressPolicy(ctx, "servicePerimeterDryRunEgressPolicyResource", &accesscontextmanager.ServicePerimeterDryRunEgressPolicyArgs{
	Perimeter: pulumi.String("string"),
	EgressFrom: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromArgs{
		Identities: pulumi.StringArray{
			pulumi.String("string"),
		},
		IdentityType:      pulumi.String("string"),
		SourceRestriction: pulumi.String("string"),
		Sources: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArray{
			&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs{
				AccessLevel: pulumi.String("string"),
			},
		},
	},
	EgressTo: &accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToArgs{
		ExternalResources: pulumi.StringArray{
			pulumi.String("string"),
		},
		Operations: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArray{
			&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationArgs{
				MethodSelectors: accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArray{
					&accesscontextmanager.ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs{
						Method:     pulumi.String("string"),
						Permission: pulumi.String("string"),
					},
				},
				ServiceName: pulumi.String("string"),
			},
		},
		Resources: pulumi.StringArray{
			pulumi.String("string"),
		},
	},
})
var servicePerimeterDryRunEgressPolicyResource = new ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", ServicePerimeterDryRunEgressPolicyArgs.builder()
    .perimeter("string")
    .egressFrom(ServicePerimeterDryRunEgressPolicyEgressFromArgs.builder()
        .identities("string")
        .identityType("string")
        .sourceRestriction("string")
        .sources(ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs.builder()
            .accessLevel("string")
            .build())
        .build())
    .egressTo(ServicePerimeterDryRunEgressPolicyEgressToArgs.builder()
        .externalResources("string")
        .operations(ServicePerimeterDryRunEgressPolicyEgressToOperationArgs.builder()
            .methodSelectors(ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs.builder()
                .method("string")
                .permission("string")
                .build())
            .serviceName("string")
            .build())
        .resources("string")
        .build())
    .build());
service_perimeter_dry_run_egress_policy_resource = gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource",
    perimeter="string",
    egress_from={
        "identities": ["string"],
        "identity_type": "string",
        "source_restriction": "string",
        "sources": [{
            "access_level": "string",
        }],
    },
    egress_to={
        "external_resources": ["string"],
        "operations": [{
            "method_selectors": [{
                "method": "string",
                "permission": "string",
            }],
            "service_name": "string",
        }],
        "resources": ["string"],
    })
const servicePerimeterDryRunEgressPolicyResource = new gcp.accesscontextmanager.ServicePerimeterDryRunEgressPolicy("servicePerimeterDryRunEgressPolicyResource", {
    perimeter: "string",
    egressFrom: {
        identities: ["string"],
        identityType: "string",
        sourceRestriction: "string",
        sources: [{
            accessLevel: "string",
        }],
    },
    egressTo: {
        externalResources: ["string"],
        operations: [{
            methodSelectors: [{
                method: "string",
                permission: "string",
            }],
            serviceName: "string",
        }],
        resources: ["string"],
    },
});
type: gcp:accesscontextmanager:ServicePerimeterDryRunEgressPolicy
properties:
    egressFrom:
        identities:
            - string
        identityType: string
        sourceRestriction: string
        sources:
            - accessLevel: string
    egressTo:
        externalResources:
            - string
        operations:
            - methodSelectors:
                - method: string
                  permission: string
              serviceName: string
        resources:
            - string
    perimeter: string
ServicePerimeterDryRunEgressPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ServicePerimeterDryRunEgressPolicy resource accepts the following input properties:
- Perimeter string
 - The name of the Service Perimeter to add this resource to.
 - Egress
From ServicePerimeter Dry Run Egress Policy Egress From  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. 
- Perimeter string
 - The name of the Service Perimeter to add this resource to.
 - Egress
From ServicePerimeter Dry Run Egress Policy Egress From Args  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To Args  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. 
- perimeter String
 - The name of the Service Perimeter to add this resource to.
 - egress
From ServicePerimeter Dry Run Egress Policy Egress From  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. 
- perimeter string
 - The name of the Service Perimeter to add this resource to.
 - egress
From ServicePerimeter Dry Run Egress Policy Egress From  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. 
- perimeter str
 - The name of the Service Perimeter to add this resource to.
 - egress_
from ServicePerimeter Dry Run Egress Policy Egress From Args  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress_
to ServicePerimeter Dry Run Egress Policy Egress To Args  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. 
- perimeter String
 - The name of the Service Perimeter to add this resource to.
 - egress
From Property Map - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress
To Property Map - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. 
Outputs
All input properties are implicitly available as output properties. Additionally, the ServicePerimeterDryRunEgressPolicy resource produces the following output properties:
- Id string
 - The provider-assigned unique ID for this managed resource.
 
- Id string
 - The provider-assigned unique ID for this managed resource.
 
- id String
 - The provider-assigned unique ID for this managed resource.
 
- id string
 - The provider-assigned unique ID for this managed resource.
 
- id str
 - The provider-assigned unique ID for this managed resource.
 
- id String
 - The provider-assigned unique ID for this managed resource.
 
Look up Existing ServicePerimeterDryRunEgressPolicy Resource
Get an existing ServicePerimeterDryRunEgressPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ServicePerimeterDryRunEgressPolicyState, opts?: CustomResourceOptions): ServicePerimeterDryRunEgressPolicy@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        egress_from: Optional[ServicePerimeterDryRunEgressPolicyEgressFromArgs] = None,
        egress_to: Optional[ServicePerimeterDryRunEgressPolicyEgressToArgs] = None,
        perimeter: Optional[str] = None) -> ServicePerimeterDryRunEgressPolicyfunc GetServicePerimeterDryRunEgressPolicy(ctx *Context, name string, id IDInput, state *ServicePerimeterDryRunEgressPolicyState, opts ...ResourceOption) (*ServicePerimeterDryRunEgressPolicy, error)public static ServicePerimeterDryRunEgressPolicy Get(string name, Input<string> id, ServicePerimeterDryRunEgressPolicyState? state, CustomResourceOptions? opts = null)public static ServicePerimeterDryRunEgressPolicy get(String name, Output<String> id, ServicePerimeterDryRunEgressPolicyState state, CustomResourceOptions options)Resource lookup is not supported in YAML- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- resource_name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- Egress
From ServicePerimeter Dry Run Egress Policy Egress From  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - Perimeter string
 - The name of the Service Perimeter to add this resource to.
 
- Egress
From ServicePerimeter Dry Run Egress Policy Egress From Args  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - Egress
To ServicePerimeter Dry Run Egress Policy Egress To Args  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - Perimeter string
 - The name of the Service Perimeter to add this resource to.
 
- egress
From ServicePerimeter Dry Run Egress Policy Egress From  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - perimeter String
 - The name of the Service Perimeter to add this resource to.
 
- egress
From ServicePerimeter Dry Run Egress Policy Egress From  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress
To ServicePerimeter Dry Run Egress Policy Egress To  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - perimeter string
 - The name of the Service Perimeter to add this resource to.
 
- egress_
from ServicePerimeter Dry Run Egress Policy Egress From Args  - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress_
to ServicePerimeter Dry Run Egress Policy Egress To Args  - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - perimeter str
 - The name of the Service Perimeter to add this resource to.
 
- egress
From Property Map - Defines conditions on the source of a request causing this 
EgressPolicyto apply. Structure is documented below. - egress
To Property Map - Defines the conditions on the 
ApiOperationand destination resources that cause thisEgressPolicyto apply. Structure is documented below. - perimeter String
 - The name of the Service Perimeter to add this resource to.
 
Supporting Types
ServicePerimeterDryRunEgressPolicyEgressFrom, ServicePerimeterDryRunEgressPolicyEgressFromArgs                
- Identities List<string>
 - Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
 - Identity
Type string - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of 
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - Source
Restriction string - Whether to enforce traffic restrictions based on 
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - Sources
List<Service
Perimeter Dry Run Egress Policy Egress From Source>  - Sources that this EgressPolicy authorizes access from. Structure is documented below.
 
- Identities []string
 - Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
 - Identity
Type string - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of 
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - Source
Restriction string - Whether to enforce traffic restrictions based on 
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - Sources
[]Service
Perimeter Dry Run Egress Policy Egress From Source  - Sources that this EgressPolicy authorizes access from. Structure is documented below.
 
- identities List<String>
 - Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
 - identity
Type String - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of 
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source
Restriction String - Whether to enforce traffic restrictions based on 
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources
List<Service
Perimeter Dry Run Egress Policy Egress From Source>  - Sources that this EgressPolicy authorizes access from. Structure is documented below.
 
- identities string[]
 - Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
 - identity
Type string - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of 
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source
Restriction string - Whether to enforce traffic restrictions based on 
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources
Service
Perimeter Dry Run Egress Policy Egress From Source[]  - Sources that this EgressPolicy authorizes access from. Structure is documented below.
 
- identities Sequence[str]
 - Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
 - identity_
type str - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of 
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source_
restriction str - Whether to enforce traffic restrictions based on 
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources
Sequence[Service
Perimeter Dry Run Egress Policy Egress From Source]  - Sources that this EgressPolicy authorizes access from. Structure is documented below.
 
- identities List<String>
 - Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported.The v1 identities that have the prefix user, group and serviceAccount in https://cloud.google.com/iam/docs/principal-identifiers#v1 are supported.
 - identity
Type String - Specifies the type of identities that are allowed access to outside the
perimeter. If left unspecified, then members of 
identitiesfield will be allowed access. Possible values are:ANY_IDENTITY,ANY_USER_ACCOUNT,ANY_SERVICE_ACCOUNT. - source
Restriction String - Whether to enforce traffic restrictions based on 
sourcesfield. If thesourcesfield is non-empty, then this field must be set toSOURCE_RESTRICTION_ENABLED. Possible values are:SOURCE_RESTRICTION_ENABLED,SOURCE_RESTRICTION_DISABLED. - sources List<Property Map>
 - Sources that this EgressPolicy authorizes access from. Structure is documented below.
 
ServicePerimeterDryRunEgressPolicyEgressFromSource, ServicePerimeterDryRunEgressPolicyEgressFromSourceArgs                  
- Access
Level string - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
 
- Access
Level string - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
 
- access
Level String - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
 
- access
Level string - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
 
- access_
level str - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
 
- access
Level String - An AccessLevel resource name that allows resources outside the ServicePerimeter to be accessed from the inside.
 
ServicePerimeterDryRunEgressPolicyEgressTo, ServicePerimeterDryRunEgressPolicyEgressToArgs                
- External
Resources List<string> - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
 - Operations
List<Service
Perimeter Dry Run Egress Policy Egress To Operation>  - A list of 
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - Resources List<string>
 - A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. 
- External
Resources []string - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
 - Operations
[]Service
Perimeter Dry Run Egress Policy Egress To Operation  - A list of 
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - Resources []string
 - A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. 
- external
Resources List<String> - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
 - operations
List<Service
Perimeter Dry Run Egress Policy Egress To Operation>  - A list of 
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources List<String>
 - A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. 
- external
Resources string[] - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
 - operations
Service
Perimeter Dry Run Egress Policy Egress To Operation[]  - A list of 
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources string[]
 - A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. 
- external_
resources Sequence[str] - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
 - operations
Sequence[Service
Perimeter Dry Run Egress Policy Egress To Operation]  - A list of 
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources Sequence[str]
 - A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. 
- external
Resources List<String> - A list of external resources that are allowed to be accessed. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
 - operations List<Property Map>
 - A list of 
ApiOperationsthat this egress rule applies to. A request matches if it contains an operation/service in this list. Structure is documented below. - resources List<String>
 - A list of resources, currently only projects in the form
projects/<projectnumber>, that match this to stanza. A request matches if it contains a resource in this list. If * is specified for resources, then thisEgressTorule will authorize access to all resources outside the perimeter. 
ServicePerimeterDryRunEgressPolicyEgressToOperation, ServicePerimeterDryRunEgressPolicyEgressToOperationArgs                  
- Method
Selectors List<ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector>  - API methods or permissions to allow. Method or permission must belong
to the service specified by 
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - Service
Name string - The name of the API whose methods or permissions the 
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services. 
- Method
Selectors []ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector  - API methods or permissions to allow. Method or permission must belong
to the service specified by 
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - Service
Name string - The name of the API whose methods or permissions the 
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services. 
- method
Selectors List<ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector>  - API methods or permissions to allow. Method or permission must belong
to the service specified by 
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service
Name String - The name of the API whose methods or permissions the 
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services. 
- method
Selectors ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector[]  - API methods or permissions to allow. Method or permission must belong
to the service specified by 
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service
Name string - The name of the API whose methods or permissions the 
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services. 
- method_
selectors Sequence[ServicePerimeter Dry Run Egress Policy Egress To Operation Method Selector]  - API methods or permissions to allow. Method or permission must belong
to the service specified by 
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service_
name str - The name of the API whose methods or permissions the 
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services. 
- method
Selectors List<Property Map> - API methods or permissions to allow. Method or permission must belong
to the service specified by 
serviceNamefield. A single MethodSelector entry with*specified for themethodfield will allow all methods AND permissions for the service specified inserviceName. Structure is documented below. - service
Name String - The name of the API whose methods or permissions the 
IngressPolicyorEgressPolicywant to allow. A singleApiOperationwith serviceName field set to*will allow all methods AND permissions for all services. 
ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelector, ServicePerimeterDryRunEgressPolicyEgressToOperationMethodSelectorArgs                      
- Method string
 - Value for 
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - Permission string
 - Value for permission should be a valid Cloud IAM permission for the
corresponding 
serviceNameinApiOperation. 
- Method string
 - Value for 
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - Permission string
 - Value for permission should be a valid Cloud IAM permission for the
corresponding 
serviceNameinApiOperation. 
- method String
 - Value for 
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission String
 - Value for permission should be a valid Cloud IAM permission for the
corresponding 
serviceNameinApiOperation. 
- method string
 - Value for 
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission string
 - Value for permission should be a valid Cloud IAM permission for the
corresponding 
serviceNameinApiOperation. 
- method str
 - Value for 
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission str
 - Value for permission should be a valid Cloud IAM permission for the
corresponding 
serviceNameinApiOperation. 
- method String
 - Value for 
methodshould be a valid method name for the correspondingserviceNameinApiOperation. If*used as value for method, then ALL methods and permissions are allowed. - permission String
 - Value for permission should be a valid Cloud IAM permission for the
corresponding 
serviceNameinApiOperation. 
Package Details
- Repository
 - Google Cloud (GCP) Classic pulumi/pulumi-gcp
 - License
 - Apache-2.0
 - Notes
 - This Pulumi package is based on the 
google-betaTerraform Provider.