File: //snap/google-cloud-cli/current/lib/surface/artifacts/repositories/add_iam_policy_binding.yaml
- release_tracks: [ALPHA, BETA, GA]
help_text:
brief: |
Add an IAM policy binding to the IAM policy of an Artifact Registry repository.
description: |
*{command}* adds an IAM policy binding to the IAM policy of an Artifact Registry
repository. One binding consists of a member, a role, and an optional condition.
This command can fail for the following reasons:
* The repository specified does not exist.
* The active account does not have permission to access the given
repository's IAM policies.
examples: |
To add an IAM policy binding for the role of 'roles/editor' for the user
'test-user@gmail.com' with repository 'my-repo', run:
$ {command} my-repo --member='user:test-user@gmail.com' --role='roles/editor'
See https://cloud.google.com/iam/docs/managing-policies for details of
policy role and member types.
request: &request
api_version: v1
collection: artifactregistry.projects.locations.repositories
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.artifacts.resources:repository_without_property
help_text: |
Name of the Artifact Registry repository.
iam:
enable_condition: true