@swamp/gcp/accesscontextmanager
v2026.04.23.1
Google Cloud accesscontextmanager infrastructure models
Repository
https://github.com/systeminit/swamp-extensions
Labels
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure
Contents
Quality score
Verified by SwampHow well-documented and verifiable this extension is.
Grade A
- Has README or module doc2/2earned
- README has a code example1/1earned
- README is substantive1/1earned
- Most symbols documented1/1earned
- No slow types1/1earned
- Has description1/1earned
- At least one platform tag (or universal)1/1earned
- Two or more platform tags (or universal)1/1earned
- License declared1/1earned
- Verified public repository2/2earned
Install
$ swamp extension pull @swamp/gcp/accesscontextmanager@swamp/gcp/accesscontextmanager/accesspoliciesv2026.04.23.1accesspolicies.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| name | string | Instance name for this resource (used as the unique identifier in the factory pattern) |
| parent? | string | Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}` |
| scopes? | array | The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=["folders/123"]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in |
| title? | string | Required. Human readable title. Does not affect behavior. |
createCreate a accessPolicies
getGet a accessPolicies
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the accessPolicies |
updateUpdate accessPolicies attributes
deleteDelete the accessPolicies
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the accessPolicies |
syncSync accessPolicies state from GCP
Resources
state(infinite)— `AccessPolicy` is a container for `AccessLevels` (which define the necessary ...
@swamp/gcp/accesscontextmanager/accesspolicies-accesslevelsv2026.04.23.1accesspolicies_accesslevels.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| basic? | object | `BasicLevel` is an `AccessLevel` using a set of recommended features. |
| custom? | object | `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language to represent the necessary conditions for the level to apply to a request. See CEL spec at: https://github.com/google/cel-spec |
| description? | string | Description of the `AccessLevel` and its use. Does not affect behavior. |
| name? | string | Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`. |
| title? | string | Human readable title. Must be unique within the Policy. |
| parent? | string | The parent resource name (e.g., projects/my-project/locations/us-central1, organizations/123, folders/456) |
createCreate a accessLevels
getGet a accessLevels
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the accessLevels |
updateUpdate accessLevels attributes
deleteDelete the accessLevels
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the accessLevels |
syncSync accessLevels state from GCP
replace_allreplace all
| Argument | Type | Description |
|---|---|---|
| accessLevels? | any | |
| etag? | any |
Resources
state(infinite)— An `AccessLevel` is a label that can be applied to requests to Google Cloud s...
@swamp/gcp/accesscontextmanager/accesspolicies-authorizedorgsdescsv2026.04.23.1accesspolicies_authorizedorgsdescs.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| assetType? | enum | The asset type of this authorized orgs desc. Valid values are `ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`. |
| authorizationDirection? | enum | The direction of the authorization relationship between this organization and the organizations listed in the `orgs` field. The valid values for this field include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this organization to evaluate traffic in the organizations listed in the `orgs` field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `orgs` field to evaluate the traffic in this organization. For the authorization relationship to take effect, all of the organ |
| authorizationType? | enum | A granular control type for authorization levels. Valid value is `AUTHORIZATION_TYPE_TRUST`. |
| name? | string | Identifier. Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`. |
| orgs? | array | The list of organization ids in this AuthorizedOrgsDesc. Format: `organizations/` Example: `organizations/123456` |
| parent? | string | The parent resource name (e.g., projects/my-project/locations/us-central1, organizations/123, folders/456) |
createCreate a authorizedOrgsDescs
getGet a authorizedOrgsDescs
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the authorizedOrgsDescs |
updateUpdate authorizedOrgsDescs attributes
deleteDelete the authorizedOrgsDescs
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the authorizedOrgsDescs |
syncSync authorizedOrgsDescs state from GCP
Resources
state(infinite)— `AuthorizedOrgsDesc` contains data for an organization's authorization policy.
@swamp/gcp/accesscontextmanager/accesspolicies-serviceperimetersv2026.04.23.1accesspolicies_serviceperimeters.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| description? | string | Description of the `ServicePerimeter` and its use. Does not affect behavior. |
| name? | string | Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`. |
| perimeterType? | enum | Perimeter type indicator. A single project or VPC network is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty. |
| spec? | object | `ServicePerimeterConfig` specifies a set of Google Cloud resources that describe specific Service Perimeter configuration. |
| status? | object | `ServicePerimeterConfig` specifies a set of Google Cloud resources that describe specific Service Perimeter configuration. |
| title? | string | Human readable title. Must be unique within the Policy. |
| useExplicitDryRunSpec? | boolean | Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists for all Service Perimeters, and that spec is identical to the status for those Service Perimeters. When this flag is set, it inhibits the generation of the implicit spec, thereby allowing the user to explicitly provide a configuration ("spec") to use in a dry-run version of the Service Perimeter. This allows the user to test changes to the enforced config ("status") without actually enforcing them. This testing is done |
| parent? | string | The parent resource name (e.g., projects/my-project/locations/us-central1, organizations/123, folders/456) |
createCreate a servicePerimeters
getGet a servicePerimeters
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the servicePerimeters |
updateUpdate servicePerimeters attributes
deleteDelete the servicePerimeters
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the servicePerimeters |
syncSync servicePerimeters state from GCP
commitcommit
| Argument | Type | Description |
|---|---|---|
| etag? | any |
replace_allreplace all
| Argument | Type | Description |
|---|---|---|
| etag? | any | |
| servicePerimeters? | any |
Resources
state(infinite)— `ServicePerimeter` describes a set of Google Cloud resources which can freely...
@swamp/gcp/accesscontextmanager/gcpuseraccessbindingsv2026.04.23.1gcpuseraccessbindings.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| accessLevels? | array | Optional. Access level that a user must have to be granted access. Only one access level is supported, not multiple. This repeated field must have exactly one element. Example: "accessPolicies/9522/accessLevels/device_trusted" |
| dryRunAccessLevels? | array | Optional. Dry run access level that will be evaluated but will not be enforced. The access denial based on dry run policy will be logged. Only one access level is supported, not multiple. This list must have exactly one element. Example: "accessPolicies/9522/accessLevels/device_trusted" |
| groupKey? | string | Optional. Immutable. Google Group id whose users are subject to this binding\ |
| name? | string | Immutable. Assigned by the server during creation. The last segment has an arbitrary length and has only URI unreserved characters (as defined by [RFC 3986 Section 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be specified by the client during creation. Example: "organizations/256/gcpUserAccessBindings/b3-BhcX_Ud5N" |
| restrictedClientApplications? | array | Optional. A list of applications that are subject to this binding's restrictions. If the list is empty, the binding restrictions will universally apply to all applications. |
| scopedAccessSettings? | array | Optional. A list of scoped access settings that set this binding's restrictions on a subset of applications. This field cannot be set if restricted_client_applications is set. |
| sessionSettings? | object | Stores settings related to Google Cloud Session Length including session duration, the type of challenge (i.e. method) they should face when their session expires, and other related settings. |
| parent? | string | The parent resource name (e.g., projects/my-project/locations/us-central1, organizations/123, folders/456) |
createCreate a gcpUserAccessBindings
getGet a gcpUserAccessBindings
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the gcpUserAccessBindings |
updateUpdate gcpUserAccessBindings attributes
deleteDelete the gcpUserAccessBindings
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the gcpUserAccessBindings |
syncSync gcpUserAccessBindings state from GCP
Resources
state(infinite)— Restricts access to Cloud Console and Google Cloud APIs for a set of users us...
@swamp/gcp/accesscontextmanager/permissionsv2026.04.23.1permissions.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| name | string | Instance name for this resource (used as the unique identifier in the factory pattern) |
getGet a permissions
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the permissions |
syncSync permissions state from GCP
Resources
state(infinite)— Lists all supported permissions in VPCSC Granular Controls.
@swamp/gcp/accesscontextmanager/servicesv2026.04.23.1services.ts
Global Arguments
| Argument | Type | Description |
|---|---|---|
| name | string | Instance name for this resource (used as the unique identifier in the factory pattern) |
getGet a services
| Argument | Type | Description |
|---|---|---|
| identifier | string | The name of the services |
syncSync services state from GCP
Resources
state(infinite)— `SupportedService` specifies the VPC Service Controls and its properties.
2026.04.07.149.5 KBApr 7, 2026
Google Cloud accesscontextmanager infrastructure models
Release Notes
- Updated: accesspolicies_serviceperimeters
linux-x86_64linux-aarch64darwin-x86_64darwin-aarch64
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure
2026.04.04.149.4 KBApr 4, 2026
Google Cloud accesscontextmanager infrastructure models
Release Notes
- Updated: accesspolicies_accesslevels, accesspolicies_serviceperimeters, gcpuseraccessbindings
linux-x86_64linux-aarch64darwin-x86_64darwin-aarch64
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure
2026.04.03.352.6 KBApr 3, 2026
Google Cloud accesscontextmanager infrastructure models
Release Notes
- Updated: accesspolicies, accesspolicies_accesslevels, accesspolicies_authorizedorgsdescs, accesspolicies_serviceperimeters, gcpuseraccessbindings, permissions, services
linux-x86_64linux-aarch64darwin-x86_64darwin-aarch64
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure
2026.04.03.151.8 KBApr 3, 2026
Google Cloud accesscontextmanager infrastructure models
Release Notes
- Updated: accesspolicies, accesspolicies_accesslevels, accesspolicies_authorizedorgsdescs, accesspolicies_serviceperimeters, gcpuseraccessbindings, permissions, services
linux-x86_64linux-aarch64darwin-x86_64darwin-aarch64
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure
2026.04.02.251.8 KBApr 2, 2026
Google Cloud accesscontextmanager infrastructure models
Release Notes
- Updated: accesspolicies_serviceperimeters
linux-x86_64linux-aarch64darwin-x86_64darwin-aarch64
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure
2026.03.27.151.9 KBMar 27, 2026
Google Cloud accesscontextmanager infrastructure models
Release Notes
- Added: accesspolicies, accesspolicies_accesslevels, accesspolicies_authorizedorgsdescs, accesspolicies_serviceperimeters, gcpuseraccessbindings, permissions, services
linux-x86_64linux-aarch64darwin-x86_64darwin-aarch64
gcpgoogle-cloudaccesscontextmanagercloudinfrastructure