google_api_cloud_kms v0.6.0 API Reference
Modules
API calls for all endpoints tagged Projects
.
Handle Tesla connections for GoogleApi.CloudKMS.V1.
Helper functions for deserializing responses into models.
Request message for KeyManagementService.AsymmetricDecrypt.
Response message for KeyManagementService.AsymmetricDecrypt.
Request message for KeyManagementService.AsymmetricSign.
Response message for KeyManagementService.AsymmetricSign.
Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.
Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting foo@gmail.com from DATA_READ logging.
Associates `members` with a `role`.
Write a Cloud Audit log
A condition to be met.
Increment a streamz counter with the specified metric and field names. Metric names should start with a '/', generally be lowercase-only, and end in "_count". Field names should not contain an initial slash. The actual exported metric names will have "/iam/policy" prepended. Field names correspond to IAM request parameters and field values are their respective values. At present the only supported field names are - "iam_principal", corresponding to IAMContext.principal; - "" (empty string), resulting in one aggretated counter with no field. Examples: counter { metric: "/debug_access_count" field: "iam_principal" } ==> increment counter /iam/policy/backend_debug_access_count {iam_principal=[value of IAMContext.principal]} At this time we do not support: multiple field names (though this may be supported in the future) decrementing the counter * incrementing it by anything other than 1
A CryptoKey represents a logical key that can be used for cryptographic operations. A CryptoKey is made up of one or more versions, which represent the actual key material used in cryptographic operations.
A CryptoKeyVersion represents an individual cryptographic key, and the associated key material. An ENABLED version can be used for cryptographic operations. For security reasons, the raw cryptographic key material represented by a CryptoKeyVersion can never be viewed or exported. It can only be used to encrypt, decrypt, or sign data when an authorized user or application invokes Cloud KMS.
A CryptoKeyVersionTemplate specifies the properties to use when creating a new CryptoKeyVersion, either manually with CreateCryptoKeyVersion or automatically as a result of auto-rotation.
Write a Data Access (Gin) log
Request message for KeyManagementService.Decrypt.
Response message for KeyManagementService.Decrypt.
Request message for KeyManagementService.DestroyCryptoKeyVersion.
A Digest holds a cryptographic message digest.
Request message for KeyManagementService.Encrypt.
Response message for KeyManagementService.Encrypt.
Represents an expression text. Example: title: "User account presence" description: "Determines whether the request has a user account" expression: "size(request.user) > 0"
Contains an HSM-generated attestation about a key operation. For more information, see [Verifying attestations] (https://cloud.google.com/kms/docs/attest-key).
A KeyRing is a toplevel logical grouping of CryptoKeys.
Response message for KeyManagementService.ListCryptoKeyVersions.
Response message for KeyManagementService.ListCryptoKeys.
Response message for KeyManagementService.ListKeyRings.
The response message for Locations.ListLocations.
A resource that represents Google Cloud Platform location.
Cloud KMS metadata for the given google.cloud.location.Location.
Defines an Identity and Access Management (IAM) policy. It is used to specify access control policies for Cloud Platform resources. A `Policy` consists of a list of `bindings`. A `binding` binds a list of `members` to a `role`, where the members can be user accounts, Google groups, Google domains, and service accounts. A `role` is a named list of permissions defined by IAM. JSON Example { "bindings": [ { "role": "roles/owner", "members": [ "user:mike@example.com", "group:admins@example.com", "domain:google.com", "serviceAccount:my-other-app@appspot.gserviceaccount.com" ] }, { "role": "roles/viewer", "members": ["user:sean@example.com"] } ] } YAML Example bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-other-app@appspot.gserviceaccount.com role: roles/owner - members: - user:sean@example.com role: roles/viewer For a description of IAM and its features, see the IAM developer's guide.
The public key for a given CryptoKeyVersion. Obtained via GetPublicKey.
Request message for KeyManagementService.RestoreCryptoKeyVersion.
Request message for `SetIamPolicy` method.
Request message for `TestIamPermissions` method.
Response message for `TestIamPermissions` method.
Request message for KeyManagementService.UpdateCryptoKeyPrimaryVersion.
Helper functions for building Tesla requests.