HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/396/lib/surface/kms/keyrings/remove_iam_policy_binding.yaml
release_tracks: [ALPHA, BETA, GA]
help_text:
  brief: Remove IAM policy binding for a kms keyring.
  description: |
    Removes a policy binding from the IAM policy of a kms keyring. A binding consists of at least
    one member, a role, and an optional condition.

  examples: |
    To remove an IAM policy binding for the role of 'roles/cloudkms.signer' for the user
    'test-user@gmail.com' on the keyring fellowship with location global, run:

      $ {command} fellowship --location='global' --member='user:test-user@gmail.com' --role='roles/cloudkms.signer'

    To remove an IAM policy binding with a condition of
    expression='request.time < timestamp("2019-01-01T00:00:00Z")', title='expires_end_of_2018',
    and description='Expires at midnight on 2018-12-31' for the role of 'roles/cloudkms.signer'
    for the user 'test-user@gmail.com' on the keyring fellowship with location global, run:

      $ {command} fellowship --location='global' --member='user:test-user@gmail.com' --role='roles/cloudkms.signer' --condition='expression=request.time < timestamp("2019-01-01T00:00:00Z"),title=expires_end_of_2018,description=Expires at midnight on 2018-12-31'

    To remove all IAM policy bindings regardless of the condition for the role of
    'roles/cloudkms.signer' and for the user 'test-user@gmail.com' on the keyring fellowship with
    location global, run:

      $ {command} fellowship --location='global' --member='user:test-user@gmail.com' --role='roles/cloudkms.signer' --all

    See https://cloud.google.com/iam/docs/managing-policies for details of
    policy role and member types.

request:
  collection: cloudkms.projects.locations.keyRings

arguments:
  resource:
    help_text: The keyring to remove the IAM policy binding.
    spec: !REF googlecloudsdk.command_lib.kms.resources:key_ring

iam:
  enable_condition: true
  policy_version: 3
  get_iam_policy_version_path: options_requestedPolicyVersion