gcloud alpha access-context-manager perimeters replace-all - replace all existing service perimeters
gcloud alpha access-context-manager perimeters replace-all [POLICY] --source-file=SOURCE_FILE [--etag=ETAG] [GCLOUD_WIDE_FLAG ...]
(ALPHA) Replace all existing service perimeter in specified access policy with service perimeters specified in a file.
To replace all perimeters within a policy, using etag:
$ gcloud alpha access-context-manager perimeters replace-all \ my-policy-number \ --source-file=path-to-file-containing-all-replacement-service-pe\ rimeters.yaml --etag=optional-latest-etag-of-policy
To replace all perimeters within a policy, without using etag:
$ gcloud alpha access-context-manager perimeters replace-all \ my-policy-number \ --source-file=path-to-file-containing-all-replacement-service-pe\ rimeters.yaml
- Policy resource - The access policy that contains the perimeters you want to
replace. This represents a Cloud resource.
- [POLICY]
ID of the policy or fully qualified identifier for the policy. To set the policy attribute:
provide the argument policy on the command line;
set the property access_context_manager/policy;
automatically, if the current account belongs to an organization with exactly one access policy..
- --source-file=SOURCE_FILE
Path to a file containing a list of service perimeters.
An service perimeter file is a YAML-formatted list of service perimeters, which are YAML objects representing a Condition as described in the API reference. For example:
- name: my_perimeter title: My Perimeter description: Perimeter for foo. perimeterType: PERIMETER_TYPE_REGULAR status: resources: - projects/0123456789 accessLevels: - accessPolicies/my_policy/accessLevels/my_level restrictedServices: - storage.googleapis.com
For more information about the alpha version, see: https://cloud.google.com/access-context-manager/docs/reference/rest/v1alpha/accessPolicies.servicePerimeters For other versions, see: https://cloud.google.com/access-context-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters
- --etag=ETAG
An etag which specifies the version of the Access Policy. Only etags that represent the latest version of the Access Policy will be accepted.
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.
Run $ gcloud help for details.
This command uses the accesscontextmanager/v1alpha API. The full documentation for this API can be found at: https://cloud.google.com/access-context-manager/docs/reference/rest/
This command is currently in alpha and might change without notice. If this command fails with API permission errors despite specifying the correct project, you might be trying to access an API with an invitation-only early access allowlist. These variants are also available:
$ gcloud access-context-manager perimeters replace-all
$ gcloud beta access-context-manager perimeters replace-all