Skip to content

Commit 28bbc7a

Browse files
feat(cloudkms): update the api
#### cloudkms:v1 The following keys were added: - resources.folders.methods.getKajPolicyConfig (Total Keys: 11) - resources.folders.methods.updateKajPolicyConfig (Total Keys: 15) - resources.organizations.methods.getKajPolicyConfig (Total Keys: 11) - resources.organizations.methods.updateKajPolicyConfig (Total Keys: 15) - resources.projects.methods.getKajPolicyConfig (Total Keys: 11) - resources.projects.methods.showEffectiveKeyAccessJustificationsEnrollmentConfig (Total Keys: 11) - resources.projects.methods.showEffectiveKeyAccessJustificationsPolicyConfig (Total Keys: 11) - resources.projects.methods.updateKajPolicyConfig (Total Keys: 15) - schemas.KeyAccessJustificationsEnrollmentConfig (Total Keys: 4) - schemas.KeyAccessJustificationsPolicyConfig (Total Keys: 4) - schemas.ShowEffectiveKeyAccessJustificationsEnrollmentConfigResponse (Total Keys: 5) - schemas.ShowEffectiveKeyAccessJustificationsPolicyConfigResponse (Total Keys: 3)
1 parent 65a64f8 commit 28bbc7a

File tree

5 files changed

+662
-2
lines changed

5 files changed

+662
-2
lines changed

docs/dyn/cloudkms_v1.folders.html

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,9 +80,15 @@ <h2>Instance Methods</h2>
8080
<p class="toc_element">
8181
<code><a href="#getAutokeyConfig">getAutokeyConfig(name, x__xgafv=None)</a></code></p>
8282
<p class="firstline">Returns the AutokeyConfig for a folder.</p>
83+
<p class="toc_element">
84+
<code><a href="#getKajPolicyConfig">getKajPolicyConfig(name, x__xgafv=None)</a></code></p>
85+
<p class="firstline">Gets the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.</p>
8386
<p class="toc_element">
8487
<code><a href="#updateAutokeyConfig">updateAutokeyConfig(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
8588
<p class="firstline">Updates the AutokeyConfig for a folder. The caller must have both `cloudkms.autokeyConfigs.update` permission on the parent folder and `cloudkms.cryptoKeys.setIamPolicy` permission on the provided key project. A KeyHandle creation in the folder's descendant projects will use this configuration to determine where to create the resulting CryptoKey.</p>
89+
<p class="toc_element">
90+
<code><a href="#updateKajPolicyConfig">updateKajPolicyConfig(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
91+
<p class="firstline">Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.</p>
8692
<h3>Method Details</h3>
8793
<div class="method">
8894
<code class="details" id="close">close()</code>
@@ -104,12 +110,37 @@ <h3>Method Details</h3>
104110
An object of the form:
105111

106112
{ # Cloud KMS Autokey configuration for a folder.
113+
&quot;etag&quot;: &quot;A String&quot;, # Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag.
107114
&quot;keyProject&quot;: &quot;A String&quot;, # Optional. Name of the key project, e.g. `projects/{PROJECT_ID}` or `projects/{PROJECT_NUMBER}`, where Cloud KMS Autokey will provision a new CryptoKey when a KeyHandle is created. On UpdateAutokeyConfig, the caller will require `cloudkms.cryptoKeys.setIamPolicy` permission on this key project. Once configured, for Cloud KMS Autokey to function properly, this key project must have the Cloud KMS API activated and the Cloud KMS Service Agent for this key project must be granted the `cloudkms.admin` role (or pertinent permissions). A request with an empty key project field will clear the configuration.
108115
&quot;name&quot;: &quot;A String&quot;, # Identifier. Name of the AutokeyConfig resource, e.g. `folders/{FOLDER_NUMBER}/autokeyConfig`.
109116
&quot;state&quot;: &quot;A String&quot;, # Output only. The state for the AutokeyConfig.
110117
}</pre>
111118
</div>
112119

120+
<div class="method">
121+
<code class="details" id="getKajPolicyConfig">getKajPolicyConfig(name, x__xgafv=None)</code>
122+
<pre>Gets the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
123+
124+
Args:
125+
name: string, Required. The name of the KeyAccessJustificationsPolicyConfig to get. (required)
126+
x__xgafv: string, V1 error format.
127+
Allowed values
128+
1 - v1 error format
129+
2 - v2 error format
130+
131+
Returns:
132+
An object of the form:
133+
134+
{ # A singleton configuration for Key Access Justifications policies.
135+
&quot;defaultKeyAccessJustificationPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
136+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
137+
&quot;A String&quot;,
138+
],
139+
},
140+
&quot;name&quot;: &quot;A String&quot;, # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;.
141+
}</pre>
142+
</div>
143+
113144
<div class="method">
114145
<code class="details" id="updateAutokeyConfig">updateAutokeyConfig(name, body=None, updateMask=None, x__xgafv=None)</code>
115146
<pre>Updates the AutokeyConfig for a folder. The caller must have both `cloudkms.autokeyConfigs.update` permission on the parent folder and `cloudkms.cryptoKeys.setIamPolicy` permission on the provided key project. A KeyHandle creation in the folder&#x27;s descendant projects will use this configuration to determine where to create the resulting CryptoKey.
@@ -120,6 +151,7 @@ <h3>Method Details</h3>
120151
The object takes the form of:
121152

122153
{ # Cloud KMS Autokey configuration for a folder.
154+
&quot;etag&quot;: &quot;A String&quot;, # Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag.
123155
&quot;keyProject&quot;: &quot;A String&quot;, # Optional. Name of the key project, e.g. `projects/{PROJECT_ID}` or `projects/{PROJECT_NUMBER}`, where Cloud KMS Autokey will provision a new CryptoKey when a KeyHandle is created. On UpdateAutokeyConfig, the caller will require `cloudkms.cryptoKeys.setIamPolicy` permission on this key project. Once configured, for Cloud KMS Autokey to function properly, this key project must have the Cloud KMS API activated and the Cloud KMS Service Agent for this key project must be granted the `cloudkms.admin` role (or pertinent permissions). A request with an empty key project field will clear the configuration.
124156
&quot;name&quot;: &quot;A String&quot;, # Identifier. Name of the AutokeyConfig resource, e.g. `folders/{FOLDER_NUMBER}/autokeyConfig`.
125157
&quot;state&quot;: &quot;A String&quot;, # Output only. The state for the AutokeyConfig.
@@ -135,10 +167,48 @@ <h3>Method Details</h3>
135167
An object of the form:
136168

137169
{ # Cloud KMS Autokey configuration for a folder.
170+
&quot;etag&quot;: &quot;A String&quot;, # Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag.
138171
&quot;keyProject&quot;: &quot;A String&quot;, # Optional. Name of the key project, e.g. `projects/{PROJECT_ID}` or `projects/{PROJECT_NUMBER}`, where Cloud KMS Autokey will provision a new CryptoKey when a KeyHandle is created. On UpdateAutokeyConfig, the caller will require `cloudkms.cryptoKeys.setIamPolicy` permission on this key project. Once configured, for Cloud KMS Autokey to function properly, this key project must have the Cloud KMS API activated and the Cloud KMS Service Agent for this key project must be granted the `cloudkms.admin` role (or pertinent permissions). A request with an empty key project field will clear the configuration.
139172
&quot;name&quot;: &quot;A String&quot;, # Identifier. Name of the AutokeyConfig resource, e.g. `folders/{FOLDER_NUMBER}/autokeyConfig`.
140173
&quot;state&quot;: &quot;A String&quot;, # Output only. The state for the AutokeyConfig.
141174
}</pre>
142175
</div>
143176

177+
<div class="method">
178+
<code class="details" id="updateKajPolicyConfig">updateKajPolicyConfig(name, body=None, updateMask=None, x__xgafv=None)</code>
179+
<pre>Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
180+
181+
Args:
182+
name: string, Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;. (required)
183+
body: object, The request body.
184+
The object takes the form of:
185+
186+
{ # A singleton configuration for Key Access Justifications policies.
187+
&quot;defaultKeyAccessJustificationPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
188+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
189+
&quot;A String&quot;,
190+
],
191+
},
192+
&quot;name&quot;: &quot;A String&quot;, # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;.
193+
}
194+
195+
updateMask: string, Optional. The list of fields to update.
196+
x__xgafv: string, V1 error format.
197+
Allowed values
198+
1 - v1 error format
199+
2 - v2 error format
200+
201+
Returns:
202+
An object of the form:
203+
204+
{ # A singleton configuration for Key Access Justifications policies.
205+
&quot;defaultKeyAccessJustificationPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
206+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
207+
&quot;A String&quot;,
208+
],
209+
},
210+
&quot;name&quot;: &quot;A String&quot;, # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;.
211+
}</pre>
212+
</div>
213+
144214
</body></html>

docs/dyn/cloudkms_v1.html

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,11 @@ <h2>Instance Methods</h2>
7979
</p>
8080
<p class="firstline">Returns the folders Resource.</p>
8181

82+
<p class="toc_element">
83+
<code><a href="cloudkms_v1.organizations.html">organizations()</a></code>
84+
</p>
85+
<p class="firstline">Returns the organizations Resource.</p>
86+
8287
<p class="toc_element">
8388
<code><a href="cloudkms_v1.projects.html">projects()</a></code>
8489
</p>
Lines changed: 153 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,153 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="cloudkms_v1.html">Cloud Key Management Service (KMS) API</a> . <a href="cloudkms_v1.organizations.html">organizations</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="#close">close()</a></code></p>
79+
<p class="firstline">Close httplib2 connections.</p>
80+
<p class="toc_element">
81+
<code><a href="#getKajPolicyConfig">getKajPolicyConfig(name, x__xgafv=None)</a></code></p>
82+
<p class="firstline">Gets the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.</p>
83+
<p class="toc_element">
84+
<code><a href="#updateKajPolicyConfig">updateKajPolicyConfig(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
85+
<p class="firstline">Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.</p>
86+
<h3>Method Details</h3>
87+
<div class="method">
88+
<code class="details" id="close">close()</code>
89+
<pre>Close httplib2 connections.</pre>
90+
</div>
91+
92+
<div class="method">
93+
<code class="details" id="getKajPolicyConfig">getKajPolicyConfig(name, x__xgafv=None)</code>
94+
<pre>Gets the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
95+
96+
Args:
97+
name: string, Required. The name of the KeyAccessJustificationsPolicyConfig to get. (required)
98+
x__xgafv: string, V1 error format.
99+
Allowed values
100+
1 - v1 error format
101+
2 - v2 error format
102+
103+
Returns:
104+
An object of the form:
105+
106+
{ # A singleton configuration for Key Access Justifications policies.
107+
&quot;defaultKeyAccessJustificationPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
108+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
109+
&quot;A String&quot;,
110+
],
111+
},
112+
&quot;name&quot;: &quot;A String&quot;, # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;.
113+
}</pre>
114+
</div>
115+
116+
<div class="method">
117+
<code class="details" id="updateKajPolicyConfig">updateKajPolicyConfig(name, body=None, updateMask=None, x__xgafv=None)</code>
118+
<pre>Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
119+
120+
Args:
121+
name: string, Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;. (required)
122+
body: object, The request body.
123+
The object takes the form of:
124+
125+
{ # A singleton configuration for Key Access Justifications policies.
126+
&quot;defaultKeyAccessJustificationPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
127+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
128+
&quot;A String&quot;,
129+
],
130+
},
131+
&quot;name&quot;: &quot;A String&quot;, # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;.
132+
}
133+
134+
updateMask: string, Optional. The list of fields to update.
135+
x__xgafv: string, V1 error format.
136+
Allowed values
137+
1 - v1 error format
138+
2 - v2 error format
139+
140+
Returns:
141+
An object of the form:
142+
143+
{ # A singleton configuration for Key Access Justifications policies.
144+
&quot;defaultKeyAccessJustificationPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
145+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
146+
&quot;A String&quot;,
147+
],
148+
},
149+
&quot;name&quot;: &quot;A String&quot;, # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of &quot;{organizations|folders|projects}/*/kajPolicyConfig&quot;.
150+
}</pre>
151+
</div>
152+
153+
</body></html>

0 commit comments

Comments
 (0)