📂 File Browser

/AgentAI/vendor/google/apiclient-services/src/AccessContextManager
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AccessContextManagerOperationMetadata.php
▶ Open 📄 View Source
🐘 AccessLevel.php
▶ Open 📄 View Source
🐘 AccessPolicy.php
▶ Open 📄 View Source
🐘 AccessScope.php
▶ Open 📄 View Source
🐘 AccessSettings.php
▶ Open 📄 View Source
🐘 AccesscontextmanagerEmpty.php
▶ Open 📄 View Source
🐘 ApiOperation.php
▶ Open 📄 View Source
🐘 Application.php
▶ Open 📄 View Source
🐘 AuditConfig.php
▶ Open 📄 View Source
🐘 AuditLogConfig.php
▶ Open 📄 View Source
🐘 AuthorizedOrgsDesc.php
▶ Open 📄 View Source
🐘 BasicLevel.php
▶ Open 📄 View Source
🐘 Binding.php
▶ Open 📄 View Source
🐘 CancelOperationRequest.php
▶ Open 📄 View Source
🐘 ClientScope.php
▶ Open 📄 View Source
🐘 CommitServicePerimetersRequest.php
▶ Open 📄 View Source
🐘 CommitServicePerimetersResponse.php
▶ Open 📄 View Source
🐘 Condition.php
▶ Open 📄 View Source
🐘 CustomLevel.php
▶ Open 📄 View Source
🐘 DevicePolicy.php
▶ Open 📄 View Source
🐘 EgressFrom.php
▶ Open 📄 View Source
🐘 EgressPolicy.php
▶ Open 📄 View Source
🐘 EgressSource.php
▶ Open 📄 View Source
🐘 EgressTo.php
▶ Open 📄 View Source
🐘 Expr.php
▶ Open 📄 View Source
🐘 GcpUserAccessBinding.php
▶ Open 📄 View Source
🐘 GcpUserAccessBindingOperationMetadata.php
▶ Open 📄 View Source
🐘 GetIamPolicyRequest.php
▶ Open 📄 View Source
🐘 GetPolicyOptions.php
▶ Open 📄 View Source
🐘 IngressFrom.php
▶ Open 📄 View Source
🐘 IngressPolicy.php
▶ Open 📄 View Source
🐘 IngressSource.php
▶ Open 📄 View Source
🐘 IngressTo.php
▶ Open 📄 View Source
🐘 ListAccessLevelsResponse.php
▶ Open 📄 View Source
🐘 ListAccessPoliciesResponse.php
▶ Open 📄 View Source
🐘 ListAuthorizedOrgsDescsResponse.php
▶ Open 📄 View Source
🐘 ListGcpUserAccessBindingsResponse.php
▶ Open 📄 View Source
🐘 ListOperationsResponse.php
▶ Open 📄 View Source
🐘 ListServicePerimetersResponse.php
▶ Open 📄 View Source
🐘 ListSupportedPermissionsResponse.php
▶ Open 📄 View Source
🐘 ListSupportedServicesResponse.php
▶ Open 📄 View Source
🐘 MethodSelector.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 OsConstraint.php
▶ Open 📄 View Source
🐘 Policy.php
▶ Open 📄 View Source
🐘 ReauthSettings.php
▶ Open 📄 View Source
🐘 ReplaceAccessLevelsRequest.php
▶ Open 📄 View Source
🐘 ReplaceAccessLevelsResponse.php
▶ Open 📄 View Source
🐘 ReplaceServicePerimetersRequest.php
▶ Open 📄 View Source
🐘 ReplaceServicePerimetersResponse.php
▶ Open 📄 View Source
🐘 ScopedAccessSettings.php
▶ Open 📄 View Source
🐘 ServicePerimeter.php
▶ Open 📄 View Source
🐘 ServicePerimeterConfig.php
▶ Open 📄 View Source
🐘 SessionSettings.php
▶ Open 📄 View Source
🐘 SetIamPolicyRequest.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 SupportedService.php
▶ Open 📄 View Source
🐘 TestIamPermissionsRequest.php
▶ Open 📄 View Source
🐘 TestIamPermissionsResponse.php
▶ Open 📄 View Source
🐘 VpcAccessibleServices.php
▶ Open 📄 View Source
🐘 VpcNetworkSource.php
▶ Open 📄 View Source
🐘 VpcSubNetwork.php
▶ Open 📄 View Source

📄 Source: EgressFrom.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\AccessContextManager;

class EgressFrom extends \Google\Collection
{
  /**
   * No blanket identity group specified.
   */
  public const IDENTITY_TYPE_IDENTITY_TYPE_UNSPECIFIED = 'IDENTITY_TYPE_UNSPECIFIED';
  /**
   * Authorize access from all identities outside the perimeter.
   */
  public const IDENTITY_TYPE_ANY_IDENTITY = 'ANY_IDENTITY';
  /**
   * Authorize access from all human users outside the perimeter.
   */
  public const IDENTITY_TYPE_ANY_USER_ACCOUNT = 'ANY_USER_ACCOUNT';
  /**
   * Authorize access from all service accounts outside the perimeter.
   */
  public const IDENTITY_TYPE_ANY_SERVICE_ACCOUNT = 'ANY_SERVICE_ACCOUNT';
  /**
   * Enforcement preference unspecified, will not enforce traffic restrictions
   * based on `sources` in EgressFrom.
   */
  public const SOURCE_RESTRICTION_SOURCE_RESTRICTION_UNSPECIFIED = 'SOURCE_RESTRICTION_UNSPECIFIED';
  /**
   * Enforcement preference enabled, traffic restrictions will be enforced based
   * on `sources` in EgressFrom.
   */
  public const SOURCE_RESTRICTION_SOURCE_RESTRICTION_ENABLED = 'SOURCE_RESTRICTION_ENABLED';
  /**
   * Enforcement preference disabled, will not enforce traffic restrictions
   * based on `sources` in EgressFrom.
   */
  public const SOURCE_RESTRICTION_SOURCE_RESTRICTION_DISABLED = 'SOURCE_RESTRICTION_DISABLED';
  protected $collection_key = 'sources';
  /**
   * A list of identities that are allowed access through [EgressPolicy].
   * Identities can be an individual user, service account, Google group, third-
   * party identity, or agent identity. For the list of supported identity
   * types, see https://docs.cloud.google.com/vpc-service-
   * controls/docs/supported-identities.
   *
   * @var string[]
   */
  public $identities;
  /**
   * Specifies the type of identities that are allowed access to outside the
   * perimeter. If left unspecified, then members of `identities` field will be
   * allowed access.
   *
   * @var string
   */
  public $identityType;
  /**
   * Whether to enforce traffic restrictions based on `sources` field. If the
   * `sources` fields is non-empty, then this field must be set to
   * `SOURCE_RESTRICTION_ENABLED`.
   *
   * @var string
   */
  public $sourceRestriction;
  protected $sourcesType = EgressSource::class;
  protected $sourcesDataType = 'array';

  /**
   * A list of identities that are allowed access through [EgressPolicy].
   * Identities can be an individual user, service account, Google group, third-
   * party identity, or agent identity. For the list of supported identity
   * types, see https://docs.cloud.google.com/vpc-service-
   * controls/docs/supported-identities.
   *
   * @param string[] $identities
   */
  public function setIdentities($identities)
  {
    $this->identities = $identities;
  }
  /**
   * @return string[]
   */
  public function getIdentities()
  {
    return $this->identities;
  }
  /**
   * Specifies the type of identities that are allowed access to outside the
   * perimeter. If left unspecified, then members of `identities` field will be
   * allowed access.
   *
   * Accepted values: IDENTITY_TYPE_UNSPECIFIED, ANY_IDENTITY, ANY_USER_ACCOUNT,
   * ANY_SERVICE_ACCOUNT
   *
   * @param self::IDENTITY_TYPE_* $identityType
   */
  public function setIdentityType($identityType)
  {
    $this->identityType = $identityType;
  }
  /**
   * @return self::IDENTITY_TYPE_*
   */
  public function getIdentityType()
  {
    return $this->identityType;
  }
  /**
   * Whether to enforce traffic restrictions based on `sources` field. If the
   * `sources` fields is non-empty, then this field must be set to
   * `SOURCE_RESTRICTION_ENABLED`.
   *
   * Accepted values: SOURCE_RESTRICTION_UNSPECIFIED,
   * SOURCE_RESTRICTION_ENABLED, SOURCE_RESTRICTION_DISABLED
   *
   * @param self::SOURCE_RESTRICTION_* $sourceRestriction
   */
  public function setSourceRestriction($sourceRestriction)
  {
    $this->sourceRestriction = $sourceRestriction;
  }
  /**
   * @return self::SOURCE_RESTRICTION_*
   */
  public function getSourceRestriction()
  {
    return $this->sourceRestriction;
  }
  /**
   * Sources that this EgressPolicy authorizes access from. If this field is not
   * empty, then `source_restriction` must be set to
   * `SOURCE_RESTRICTION_ENABLED`.
   *
   * @param EgressSource[] $sources
   */
  public function setSources($sources)
  {
    $this->sources = $sources;
  }
  /**
   * @return EgressSource[]
   */
  public function getSources()
  {
    return $this->sources;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(EgressFrom::class, 'Google_Service_AccessContextManager_EgressFrom');
← Back