Google Cloud Ces V1 Client - Class EndpointControlPolicy (0.2.0)

Reference documentation and code samples for the Google Cloud Ces V1 Client class EndpointControlPolicy.

Defines project/location level endpoint control policy.

Generated from protobuf message google.cloud.ces.v1.EndpointControlPolicy

Namespace

Google \ Cloud \ Ces \ V1

Methods

__construct

Constructor.

Parameters
Name Description
data array

Optional. Data for populating the Message object.

↳ enforcement_scope int

Optional. The scope in which this policy's allowed_origins list is enforced.

↳ allowed_origins string[]

Optional. The allowed HTTP(s) origins that tools in the App are able to directly call. The enforcement depends on the value of enforcement_scope and the VPC-SC status of the project. If a port number is not provided, all ports will be allowed. Otherwise, the port number must match exactly. For example, "https://example.com" will match "https://example.com:443" and any other port. "https://example.com:443" will only match "https://example.com:443".

getEnforcementScope

Optional. The scope in which this policy's allowed_origins list is enforced.

Returns
Type Description
int Enum of type EnforcementScope.

setEnforcementScope

Optional. The scope in which this policy's allowed_origins list is enforced.

Parameter
Name Description
var int

Enum of type EnforcementScope.

Returns
Type Description
$this

getAllowedOrigins

Optional. The allowed HTTP(s) origins that tools in the App are able to directly call. The enforcement depends on the value of enforcement_scope and the VPC-SC status of the project.

If a port number is not provided, all ports will be allowed. Otherwise, the port number must match exactly. For example, "https://example.com" will match "https://example.com:443" and any other port. "https://example.com:443" will only match "https://example.com:443".

Returns
Type Description
Google\Protobuf\RepeatedField<string>

setAllowedOrigins

Optional. The allowed HTTP(s) origins that tools in the App are able to directly call. The enforcement depends on the value of enforcement_scope and the VPC-SC status of the project.

If a port number is not provided, all ports will be allowed. Otherwise, the port number must match exactly. For example, "https://example.com" will match "https://example.com:443" and any other port. "https://example.com:443" will only match "https://example.com:443".

Parameter
Name Description
var string[]
Returns
Type Description
$this