.TH "GCLOUD_ACCESS\-CONTEXT\-MANAGER_PERIMETERS_REPLACE\-ALL" 1 .SH "NAME" .HP gcloud access\-context\-manager perimeters replace\-all \- replace all existing service perimeters .SH "SYNOPSIS" .HP \f5gcloud access\-context\-manager perimeters replace\-all\fR [\fIPOLICY\fR] \fB\-\-source\-file\fR=\fISOURCE_FILE\fR [\fB\-\-etag\fR=\fIETAG\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR] .SH "DESCRIPTION" Replace all existing service perimeter in specified access policy with service perimeters specified in a file. .SH "EXAMPLES" To replace all perimeters within a policy, using etag: .RS 2m $ gcloud access\-context\-manager perimeters replace\-all \e my\-policy\-number \e \-\-source\-file=path\-to\-file\-containing\-all\-replacement\-service\-pe\e rimeters.yaml \-\-etag=optional\-latest\-etag\-of\-policy .RE To replace all perimeters within a policy, without using etag: .RS 2m $ gcloud access\-context\-manager perimeters replace\-all \e my\-policy\-number \e \-\-source\-file=path\-to\-file\-containing\-all\-replacement\-service\-pe\e rimeters.yaml .RE .SH "POSITIONAL ARGUMENTS" .RS 2m .TP 2m Policy resource \- The access policy that contains the perimeters you want to replace. This represents a Cloud resource. .TP 2m [\fIPOLICY\fR] ID of the policy or fully qualified identifier for the policy. To set the \f5policy\fR attribute: .RS 2m .IP "\(em" 2m provide the argument \f5policy\fR on the command line; .IP "\(em" 2m set the property \f5access_context_manager/policy\fR; .IP "\(em" 2m automatically, if the current account belongs to an organization with exactly one access policy.. .RE .sp .RE .sp .SH "REQUIRED FLAGS" .RS 2m .TP 2m \fB\-\-source\-file\fR=\fISOURCE_FILE\fR Path to a file containing a list of service perimeters. An service perimeter file is a YAML\-formatted list of service perimeters, which are YAML objects representing a Condition as described in the API reference. For example: .RS 2m \- name: my_perimeter title: My Perimeter description: Perimeter for foo. perimeterType: PERIMETER_TYPE_REGULAR status: resources: \- projects/0123456789 accessLevels: \- accessPolicies/my_policy/accessLevels/my_level restrictedServices: \- storage.googleapis.com .RE For more information about the alpha version, see: https://cloud.google.com/access\-context\-manager/docs/reference/rest/v1alpha/accessPolicies.servicePerimeters For other versions, see: https://cloud.google.com/access\-context\-manager/docs/reference/rest/v1/accessPolicies.servicePerimeters .RE .sp .SH "OPTIONAL FLAGS" .RS 2m .TP 2m \fB\-\-etag\fR=\fIETAG\fR An etag which specifies the version of the Access Policy. Only etags that represent the latest version of the Access Policy will be accepted. .RE .sp .SH "GCLOUD WIDE FLAGS" These flags are available to all commands: \-\-access\-token\-file, \-\-account, \-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten, \-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http, \-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled, \-\-verbosity. Run \fB$ gcloud help\fR for details. .SH "API REFERENCE" This command uses the \fBaccesscontextmanager/v1\fR API. The full documentation for this API can be found at: https://cloud.google.com/access\-context\-manager/docs/reference/rest/ .SH "NOTES" These variants are also available: .RS 2m $ gcloud alpha access\-context\-manager perimeters replace\-all .RE .RS 2m $ gcloud beta access\-context\-manager perimeters replace\-all .RE