DupinRootline|system|treeLevel|useragent|userFunc|usergroup|version)([^\]]*)(\])
{{range .VisibleCommands}} {{.Name}}{{with .Aliases}}{{range .}}, {{.}}{{end}}{{end}}{{ "\t" }} {{.Description}}
{{end}}{{else}}{{range .VisibleCommands}} {{.Name}}{{with .Aliases}}{{range .}}, {{.}}{{end}}{{end}}{{ "\t" }} {{.Description}}
{{end}}{{end}}{{end}}
${COMMAND_NAME} iam authorization-policy-create Administrator,Operator --target-service-name EXAMPLE_TARGET_SERVICE --source-resource-group-id example-resource-group-id
Create an authorization policy with 'target-service-name' and 'source-resource-group-id' specified
${COMMAND_NAME} iam service-policy-update sample-service service-policy-id --roles Viewer --service-name is --attributes "instanceId=*"
Update service policy to give sample-service Viewer role for service "is" resources with attribute "instanceId" equal to "*"Generate the autocompletion script for powershell.
To load completions in your current shell session:
%[1]s completion powershell | Out-String | Invoke-Expression
To load completions for every new session, add the output of the above command
to your powershell profile.
${COMMAND_FULL_NAME} example_group b8638ceb-5c4d-4d58-ae06-7ad95a10c4d4 --roles Viewer --service-name is --attributes "instanceId=*"
Update access group policy to give example_group Viewer role for service "is" resources with attribute "instanceId" equal to "*"
${COMMAND_NAME} iam user-policy-update name@example.com user-policy-id --roles Viewer --resource-group-id dda27e49d2a1efca58083a01dfde18f6
Update user policy to give name@example.com Viewer role for members of resource group with ID dda27e49d2a1efca58083a01dfde18f6
${COMMAND_NAME} iam trusted-profile-policy-update my-profile profile-policy-id --roles Viewer --service-name is --attributes "instanceId=*"
Update trusted profile policy to give my-profile Viewer role for service "is" resources with attribute "instanceId" equal to "*"
${COMMAND_NAME} iam user-policy-update name@example.com user-policy-id --roles Administrator --service-name sample-service --api-version v2
Update user policy to give name@example.com Administrator role for all sample-service resources using Access Policy API Version 2
${COMMAND_NAME} iam service-policy-update sample-service service-policy-id --roles Viewer --resource-group-id dda27e49d2a1efca58083a01dfde18f6
Update service policy to give sample-service Viewer role for members of resource group with ID dda27e49d2a1efca58083a01dfde18f6
${COMMAND_FULL_NAME} example_group b8638ceb-5c4d-4d58-ae06-7ad95a10c4d4 --roles Viewer --resource-group-id dda27e49d2a1efca58083a01dfde18f6
Update access group policy to give example_group Viewer role for members of resource group with ID dda27e49d2a1efca58083a01dfde18f6## bluemix NAMESPACE {{.Name}}
{: #bluemix_NAMESPACE_{{.Name}}}
{{.Description}}
```
{{.Usage}}
```
Prerequisites: None
Command Options:
{{range .VisibleFlags}}
- {{.Name}}
- {{.Usage}}
{{end}}
Examples:
${COMMAND_NAME} resource service-instance-update ( NAME | ID ) [-n, --name NEW_NAME] [--service-plan-id SERVICE_PLAN_ID] [-p, --parameters @JSON_FILE | JSON_STRING ] [-g RESOURCE_GROUP] [--service-endpoints SERVICE_ENDPOINTS_TYPE] [--allow-cleanup true|false] [-f, --force] [-q, --quiet]
${COMMAND_NAME} iam service-policy-update sample-service service-policy-id --roles Administrator --service-name target-service --api-version v2
Update service policy to give sample-service Administrator role for all target-service resources using Access Policy API Version 2${COMMAND_NAME} iam trusted-profile-rule-update (PROFILE_NAME|PROFILE_ID) (RULE_NAME|RULE_ID) --name RULE_NAME --type RULE_TYPE [--realm-name REALM_NAME] --conditions [--cr-type CR_TYPE] [--expiration EXPIRATION_SEC] [-o, --output FORMAT] [-q, --quiet] [-f, --force]
${COMMAND_FULL_NAME} example_group b8638ceb-5c4d-4d58-ae06-7ad95a10c4d4 --roles Administrator --service-name sample-service --api-version v2
Update access group policy to give example_group Administrator role for all sample-service resources using Access Policy API Version 2
${COMMAND_NAME} iam user-policy-update name@example.com user-policy-id --roles Operator --resource-type resource-group --resource dda27e49d2a1efca58083a01dfde18f6
Update user policy to give name@example.com Operator role for resource group with ID dda27e49d2a1efca58083a01dfde18f6
${COMMAND_NAME} iam trusted-profile-policy-update my-profile profile-policy-id --roles Administrator --service-name target-service --api-version v2
Update trusted profile policy to give my-profile Administrator role for all target-service resources using Access Policy API Version 2
${COMMAND_NAME} iam trusted-profile-policy-update my-profile profile-policy-id --roles Viewer --resource-group-id dda27e49d2a1efca58083a01dfde18f6
Update trusted profile policy to give my-profile Viewer role for the members of resource group with ID dda27e49d2a1efca58083a01dfde18f6Specify the identifier of the entry for which you would like to add this account to the blacklist. If providing ID, this command works for all kinds (e.g., kinds: service,plan,deployment,etc.). If providing a name, this command applies only to root entries (e.g. kinds: service,iaas,geography,etc.Specify the identifier of the entry for which you would like to add this account to the blocklist. If providing ID, this command works for all kinds (e.g., kinds: service,plan,deployment,etc.). If providing a name, this command applies only to root entries (e.g. kinds: service,iaas,geography,etc.List of conditions, provided as comma separated list of triple values "claim:CLAIM,operator:OPERATOR,value:VALUE". To specify mutiple conditions, specify the flag multiple times --conditions "claim:CLAIM1,operator:OPERATOR1,value:VALUE1" --conditions "claim:CLAIM2,operator:OPERATOR2,value:VALUE2"
${COMMAND_NAME} iam service-policy-update sample-service service-policy-id --roles Operator --resource-type resource-group --resource dda27e49d2a1efca58083a01dfde18f6
Update service policy to give sample-service Operator role for resource group with ID dda27e49d2a1efca58083a01dfde18f6(?=[\w\-])(CASE|CLEARGIF|COA|COA_INT|COBJ_ARRAY|COLUMNS|CONTENT|CTABLE|EDITPANEL|FILE|FILES|FLUIDTEMPLATE|FORM|HMENU|HRULER|HTML|IMAGE|IMGTEXT|IMG_RESOURCE|LOAD_REGISTER|MEDIA|MULTIMEDIA|OTABLE|PAGE|QTOBJECT|RECORDS|RESTORE_REGISTER|SEARCHRESULT|SVG|SWFOBJECT|TEMPLATE|TEXT|USER|USER_INT)(?![\w\-])
${COMMAND_FULL_NAME} example_group b8638ceb-5c4d-4d58-ae06-7ad95a10c4d4 --roles Operator --resource-type resource-group --resource dda27e49d2a1efca58083a01dfde18f6
Update access group policy to give example_group Operator role for resource group with ID dda27e49d2a1efca58083a01dfde18f6Specify the identifier of the entry for which you would like to remove this account to the blacklist. If providing ID, this command works for all kinds (e.g., kinds: service,plan,deployment,etc.). If providing a name, this command applies only to root entries (e.g. kinds: service,iaas,geography,etc.Specify the identifier of the entry for which you would like to remove this account to the blocklist. If providing ID, this command works for all kinds (e.g., kinds: service,plan,deployment,etc.). If providing a name, this command applies only to root entries (e.g. kinds: service,iaas,geography,etc.(?:)(?\w[\w'-]*)(?(?:<<|<|«|\(|\[|\{)))(?:::|[\w':-]))+|[$@%&]+\*(?:(?!(?:)(?\w[\w'-]*)(?(?:<<|<|«|\(|\[|\{)))(?:::|[\w':-]))+)(?=(:['\w-]+(?:<<|<|«|\(|\[|\{).+?(?:>>|>|»|\)|\]|\}))?)${COMMAND_NAME} config [(get ITEM | set ITEM [VALUE] | unset ITEM | list [--help])] | ([--http-timeout TIMEOUT_IN_SECONDS] [--trace true | false | path/to/file] [--color true | false] [--locale (LOCALE | CLEAR)] [--sso-otp (manual | auto)] [--check-version (true | false)] | --list) [-o, --output FORMAT]
${COMMAND_NAME} iam trusted-profile-policy-update my-profile profile-policy-id --roles Operator --resource-type resource-group --resource dda27e49d2a1efca58083a01dfde18f6
Update trusted profile policy to give my-profile Operator role for resource group with ID dda27e49d2a1efca58083a01dfde18f6${COMMAND_NAME} iam access-group add (user | (trusted_profile|tp) | service_id) GROUP_NAME { ([--users User1-email,User2-email,...] | [--iam-ids IAM_ID1,IAM_ID2...]) | (PROFILE_NAME | PROFILE_ID) [PROFILE_NAME2 | PROFILE_ID2...] | SERVICE_ID_UUID [SERVICE_ID_UUID2...] } [-o, --output FORMAT] [-q, --quiet]${COMMAND_NAME} resource service-key-create NAME [ROLE_NAME] ( --instance-id SERVICE_INSTANCE_ID | --instance-name SERVICE_INSTANCE_NAME) [--service-id SERVICE_ID] [-p, --parameters @JSON_FILE | JSON_TEXT] [-g RESOURCE_GROUP] [--service-endpoint SERVICE_ENDPOINT_TYPE] [-o, --output FORMAT] [-f, --force] [-q, --quiet](?!(?:function|class|static|var|if|else|while|do|for|break|return|continue|extends|implements|import|switch|case|default|public|private|try|untyped|catch|new|this|throw|extern|enum|in|interface|cast|override|dynamic|typedef|package|inline|using|null|true|false|abstract)\b)(?:_*[a-z]\w*|_+[0-9]\w*|_*[A-Z]\w*|_+|\$\w+)(\.)((?!(?:function|class|static|var|if|else|while|do|for|break|return|continue|extends|implements|import|switch|case|default|public|private|try|untyped|catch|new|this|throw|extern|enum|in|interface|cast|override|dynamic|typedef|package|inline|using|null|true|false|abstract)\b)(?:_*[a-z]\w*|_+[0-9]\w*|_*[A-Z]\w*|_+|\$\w+))Generate the autocompletion script for the fish shell.
To load completions in your current shell session:
%[1]s completion fish | source
To load completions for every new session, execute once:
%[1]s completion fish > ~/.config/fish/completions/%[1]s.fish
You will need to start a new shell for this setup to take effect.
The name, ID, or CRN of the linked trusted IAM profile to be used when obtaining the IAM access token. If provided, the '--cr-token' flag, 'IBMCLOUD_CR_TOKEN' environment variable, or '--vpc-cri' flag must also be provided or set. If authenticating as a VPC VSI compute resource, only specifying a trusted profile CRN or ID is supported.(?:[a-z0-9!#$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#$%&'*+/=?^_`{|}~-]+)*|"(?:[