Lines Matching full:allowed
127 Allowed values
164 …ServicePerimeter`, the request will be blocked. Otherwise the request is allowed. There are two ty…
167 …;: "A String", # Perimeter type indicator. A single project is allowed to be a member of…
168 …rimeter configuration without enforcing actual access restrictions. Only allowed to be set when th…
173 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
175 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
178 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
180 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
181 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
184 { # An allowed method or permission of a service specified in ApiOperation.
185 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
192 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
199 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
201 …"identities": [ # A list of identities that are allowed access through this ingress poli…
204 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
207 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
208 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
213 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
216 { # An allowed method or permission of a service specified in ApiOperation.
217 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
224 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
230 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
236 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
248 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
250 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
253 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
255 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
256 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
259 { # An allowed method or permission of a service specified in ApiOperation.
260 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
267 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
274 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
276 …"identities": [ # A list of identities that are allowed access through this ingress poli…
279 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
282 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
283 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
288 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
291 { # An allowed method or permission of a service specified in ApiOperation.
292 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
299 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
305 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
311 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
323 Allowed values
358 Allowed values
393 Allowed values
400 …ServicePerimeter`, the request will be blocked. Otherwise the request is allowed. There are two ty…
403 …;: "A String", # Perimeter type indicator. A single project is allowed to be a member of…
404 …rimeter configuration without enforcing actual access restrictions. Only allowed to be set when th…
409 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
411 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
414 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
416 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
417 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
420 { # An allowed method or permission of a service specified in ApiOperation.
421 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
428 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
435 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
437 …"identities": [ # A list of identities that are allowed access through this ingress poli…
440 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
443 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
444 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
449 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
452 { # An allowed method or permission of a service specified in ApiOperation.
453 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
460 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
466 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
472 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
484 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
486 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
489 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
491 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
492 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
495 { # An allowed method or permission of a service specified in ApiOperation.
496 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
503 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
510 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
512 …"identities": [ # A list of identities that are allowed access through this ingress poli…
515 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
518 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
519 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
524 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
527 { # An allowed method or permission of a service specified in ApiOperation.
528 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
535 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
541 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
547 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
568 Allowed values
578 …ServicePerimeter`, the request will be blocked. Otherwise the request is allowed. There are two ty…
581 …;: "A String", # Perimeter type indicator. A single project is allowed to be a member of…
582 …rimeter configuration without enforcing actual access restrictions. Only allowed to be set when th…
587 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
589 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
592 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
594 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
595 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
598 { # An allowed method or permission of a service specified in ApiOperation.
599 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
606 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
613 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
615 …"identities": [ # A list of identities that are allowed access through this ingress poli…
618 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
621 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
622 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
627 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
630 { # An allowed method or permission of a service specified in ApiOperation.
631 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
638 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
644 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
650 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
662 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
664 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
667 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
669 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
670 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
673 { # An allowed method or permission of a service specified in ApiOperation.
674 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
681 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
688 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
690 …"identities": [ # A list of identities that are allowed access through this ingress poli…
693 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
696 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
697 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
702 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
705 { # An allowed method or permission of a service specified in ApiOperation.
706 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
713 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
719 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
725 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
762 …ServicePerimeter`, the request will be blocked. Otherwise the request is allowed. There are two ty…
765 …;: "A String", # Perimeter type indicator. A single project is allowed to be a member of…
766 …rimeter configuration without enforcing actual access restrictions. Only allowed to be set when th…
771 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
773 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
776 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
778 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
779 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
782 { # An allowed method or permission of a service specified in ApiOperation.
783 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
790 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
797 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
799 …"identities": [ # A list of identities that are allowed access through this ingress poli…
802 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
805 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
806 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
811 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
814 { # An allowed method or permission of a service specified in ApiOperation.
815 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
822 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
828 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
834 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
846 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
848 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
851 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
853 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
854 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
857 { # An allowed method or permission of a service specified in ApiOperation.
858 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
865 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
872 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
874 …"identities": [ # A list of identities that are allowed access through this ingress poli…
877 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
880 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
881 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
886 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
889 { # An allowed method or permission of a service specified in ApiOperation.
890 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
897 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
903 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
909 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
922 Allowed values
962 …ServicePerimeter`, the request will be blocked. Otherwise the request is allowed. There are two ty…
965 …;: "A String", # Perimeter type indicator. A single project is allowed to be a member of…
966 …rimeter configuration without enforcing actual access restrictions. Only allowed to be set when th…
971 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
973 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
976 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
978 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
979 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
982 { # An allowed method or permission of a service specified in ApiOperation.
983 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
990 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
997 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
999 …"identities": [ # A list of identities that are allowed access through this ingress poli…
1002 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
1005 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
1006 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
1011 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
1014 { # An allowed method or permission of a service specified in ApiOperation.
1015 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
1022 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
1028 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
1034 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
1046 …as must be matched. If an EgressPolicy matches a request, the request is allowed to span the Servi…
1048 …"identities": [ # A list of identities that are allowed access through this [EgressPolic…
1051 …identities that are allowed access to outside the perimeter. If left unspecified, then members of …
1053 …he request must match `operations` AND `resources` fields in order to be allowed egress out of the…
1054 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
1057 { # An allowed method or permission of a service specified in ApiOperation.
1058 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
1065 … of resources, currently only projects in the form `projects/`, that are allowed to be accessed by…
1072 …, the request is allowed through the perimeter boundary from outside the perimeter. For example, a…
1074 …"identities": [ # A list of identities that are allowed access through this ingress poli…
1077 …dentities that are allowed access from outside the perimeter. If left unspecified, then members of…
1080 …Y_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed.
1081 …allowed to ingress the perimeter. Requests from these resources will be allowed to access perimete…
1086 …"operations": [ # A list of ApiOperations allowed to be performed by the sources specifi…
1089 { # An allowed method or permission of a service specified in ApiOperation.
1090 …` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed.
1097 …allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is spe…
1103 …es that are inside of the service perimeter. Currently only projects are allowed. Format: `project…
1109 …quot;: { # Specifies how APIs are allowed to communicate within the Service Perimeter. # Configura…
1123 Allowed values
1161 … with wildcards (such as '*' or 'storage.*') are not allowed. For more informa…
1167 Allowed values
1175 …permissions": [ # A subset of `TestPermissionsRequest.permissions` that the caller is allowed.