File: //snap/google-cloud-cli/394/lib/surface/kms/keyrings/add_iam_policy_binding.yaml
release_tracks: [ALPHA, BETA, GA]
help_text:
brief: Add IAM policy binding for a kms keyring.
description: |
Adds a policy binding to the IAM policy of a kms keyring. A binding consists of at least one
member, a role, and an optional condition.
examples: |
To add an IAM policy binding for the role of 'roles/editor' for the user 'test-user@gmail.com'
on the keyring fellowship with location global, run:
$ {command} fellowship --location='global' --member='user:test-user@gmail.com' --role='roles/editor'
To add an IAM policy binding which expires at the end of the year 2018 for the role of
'roles/cloudkms.signer' and the user 'test-user@gmail.com' on the keyring fellowship and
location global, run:
$ {command} fellowship --location='global' --member='user:test-user@gmail.com' --role='roles/cloudkms.signer' --condition='expression=request.time < timestamp("2019-01-01T00:00:00Z"),title=expires_end_of_2018,description=Expires at midnight on 2018-12-31'
See https://cloud.google.com/iam/docs/managing-policies for details of
policy role and member types.
request:
collection: cloudkms.projects.locations.keyRings
arguments:
resource:
help_text: The keyring to add the IAM policy binding.
spec: !REF googlecloudsdk.command_lib.kms.resources:key_ring
iam:
enable_condition: true
policy_version: 3
get_iam_policy_version_path: options_requestedPolicyVersion