class SecurityRuleSpec(pb_classes.Message): (source)
Constructor: SecurityRuleSpec(initial_message, access, priority, protocol, ...)
Undocumented
| Class | __ |
Undocumented |
| Class | __ |
Undocumented |
| Class | __ |
Undocumented |
| Method | __dir__ |
Undocumented |
| Method | __init__ |
Create a wrapper around a protobuf message instance. |
| Method | access |
Undocumented |
| Method | egress |
Undocumented |
| Method | ingress |
Undocumented |
| Method | priority |
Undocumented |
| Method | protocol |
Undocumented |
| Method | type |
Undocumented |
| Constant | __PB2 |
Undocumented |
| Constant | __PY |
Undocumented |
| Class Variable | __mask |
Undocumented |
| Property | access |
Access action for the rule. Required. Determines whether matching traffic is allowed or denied. |
| Property | egress |
Undocumented |
| Property | ingress |
Undocumented |
| Property | priority |
Priority of the rule. Valid range: 0-1000. Optional. If not specified or set to 0, defaults to 500. Rules are evaluated in priority order (lower numbers first) using a first-match algorithm: only the first matching rule takes effect (ALLOW or DENY), and subsequent rules are skipped. |
| Property | protocol |
Protocol used in the rule. Supported values: ANY, TCP, UDP, ICMP. |
| Property | s |
Indicating whether the rule matches incoming or outgoing traffic. |
| Property | type |
Type of the rule (STATEFUL or STATELESS) Default value is STATEFUL |
Inherited from Message:
| Class Method | get |
Return the protobuf descriptor for this message class. |
| Class Method | is |
Return True if the field contains credentials. |
| Class Method | is |
Return True if the field is marked as sensitive. |
| Method | __repr__ |
Return a human-readable representation of the message, sanitizing sensitive fields. |
| Method | check |
Check explicit presence for a field in the protobuf message. |
| Method | get |
Build a reset mask for a full update of this message. |
| Method | get |
Return the tracked reset mask. |
| Method | is |
Return True if a field equals its default value. |
| Method | set |
Replace the tracked reset mask. |
| Method | which |
Return the set field name for a given oneof. |
| Instance Variable | __PB2 |
Protobuf message class associated with this wrapper. |
| Instance Variable | __pb2 |
Underlying protobuf message instance. |
| Method | _clear |
Clear a field and record it in the reset mask. |
| Method | _get |
Return a field value with optional wrapping and presence handling. |
| Method | _set |
Set a field value and update the reset mask. |
| Class Variable | __credentials |
Undocumented |
| Class Variable | __default |
Undocumented |
| Class Variable | __sensitive |
Undocumented |
| Instance Variable | __recorded |
Mask tracking fields cleared or set to default. |
message_1.Message | None = None, *, access: RuleAccessAction | security_rule_pb2.RuleAccessAction | None | unset.UnsetType = unset.Unset, priority: builtins.int | None | unset.UnsetType = unset.Unset, protocol: RuleProtocol | security_rule_pb2.RuleProtocol | None | unset.UnsetType = unset.Unset, ingress: RuleIngress | security_rule_pb2.RuleIngress | None | unset.UnsetType = unset.Unset, egress: RuleEgress | security_rule_pb2.RuleEgress | None | unset.UnsetType = unset.Unset, type: RuleType | security_rule_pb2.RuleType | None | unset.UnsetType = unset.Unset):
(source)
¶
Create a wrapper around a protobuf message instance.
| Raises | |
AttributeError | If the wrapper is missing required class metadata. |
def access(self, value:
RuleAccessAction | security_rule_pb2.RuleAccessAction | None):
(source)
¶
Undocumented
def egress(self, value:
RuleEgress | security_rule_pb2.RuleEgress | None):
(source)
¶
Undocumented
def ingress(self, value:
RuleIngress | security_rule_pb2.RuleIngress | None):
(source)
¶
Undocumented
def protocol(self, value:
RuleProtocol | security_rule_pb2.RuleProtocol | None):
(source)
¶
Undocumented
Undocumented
| Value |
|
Undocumented
| Value |
|
Priority of the rule. Valid range: 0-1000. Optional. If not specified or set to 0, defaults to 500. Rules are evaluated in priority order (lower numbers first) using a first-match algorithm: only the first matching rule takes effect (ALLOW or DENY), and subsequent rules are skipped.
When multiple rules share the same priority, DENY rules are evaluated before ALLOW rules. The final evaluation order is reflected in 'effective_priority' (see SecurityRuleStatus).
s_match:
__OneOfClass_s_match_ingress__ | __OneOfClass_s_match_egress__ | None =
(source)
¶
Indicating whether the rule matches incoming or outgoing traffic.