HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/394/help/man/man1/gcloud_alpha_artifacts_vpcsc-config_deny.1
.TH "GCLOUD_ALPHA_ARTIFACTS_VPCSC\-CONFIG_DENY" 1



.SH "NAME"
.HP
gcloud alpha artifacts vpcsc\-config deny \- deny access to upstream sources outside the service perimeter for Artifact Registry remote repositories inside the perimeter



.SH "SYNOPSIS"
.HP
\f5gcloud alpha artifacts vpcsc\-config deny\fR [\fB\-\-location\fR=\fILOCATION\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR]



.SH "DESCRIPTION"

\fB(ALPHA)\fR Deny access to upstream sources outside the service perimeter for
Artifact Registry remote repositories inside the perimeter.

This command can fail for the following reasons:
.RS 2m
.IP "\(bu" 2m
Lack of permission \- "accesscontextmanager.policies.update".
.IP "\(bu" 2m
The resource could be outside of the VPC SC perimeter.
.IP "\(bu" 2m
Lack of permission \- "artifactregistry.vpcscconfigs.update"
.RE
.sp



.SH "EXAMPLES"

The following command denies access to upstream sources outside the service
perimeter for remote repositories in the project my\-project and in the region
us\-\-west1:

.RS 2m
$ gcloud alpha artifacts vpcsc\-config deny \-\-project=my\-project \e
   \-\-location=us\-west1
.RE



.SH "FLAGS"

.RS 2m
.TP 2m

Location resource \- The Artifact Registry VPC SC config to update. This
represents a Cloud resource. (NOTE) Some attributes are not given arguments in
this group but can be set in other ways.

To set the \f5project\fR attribute:
.RS 2m
.IP "\(em" 2m
provide the argument \f5\-\-location\fR on the command line with a fully
specified name;
.IP "\(em" 2m
set the property \f5artifacts/location\fR with a fully specified name;
.IP "\(em" 2m
provide the argument \f5\-\-project\fR on the command line;
.IP "\(em" 2m
set the property \f5core/project\fR.
.RE
.sp


.RS 2m
.TP 2m
\fB\-\-location\fR=\fILOCATION\fR

ID of the location or fully qualified identifier for the location.

To set the \f5location\fR attribute:
.RS 2m
.IP "\(bu" 2m
provide the argument \f5\-\-location\fR on the command line;
.IP "\(bu" 2m
set the property \f5artifacts/location\fR.
.RE
.sp


.RE
.RE
.sp

.SH "GCLOUD WIDE FLAGS"

These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.

Run \fB$ gcloud help\fR for details.



.SH "API REFERENCE"

This command uses the \fBartifactregistry/v1\fR API. The full documentation for
this API can be found at: https://cloud.google.com/artifacts/docs/



.SH "NOTES"

This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation\-only early access
allowlist. These variants are also available:

.RS 2m
$ gcloud artifacts vpcsc\-config deny
.RE

.RS 2m
$ gcloud beta artifacts vpcsc\-config deny
.RE