Skip to content

Commit 223c4dc

Browse files
feat(cloudkms): update the api
#### cloudkms:v1 The following keys were added: - schemas.CryptoKey.properties.keyAccessJustificationsPolicy.$ref (Total Keys: 1) - schemas.KeyAccessJustificationsPolicy (Total Keys: 4) The following keys were changed: - endpoints (Total Keys: 1)
1 parent 6ec4b7f commit 223c4dc

File tree

2 files changed

+87
-1
lines changed

2 files changed

+87
-1
lines changed

docs/dyn/cloudkms_v1.projects.locations.keyRings.cryptoKeys.html

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,11 @@ <h3>Method Details</h3>
135135
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
136136
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
137137
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
138+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
139+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
140+
&quot;A String&quot;,
141+
],
142+
},
138143
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
139144
&quot;a_key&quot;: &quot;A String&quot;,
140145
},
@@ -198,6 +203,11 @@ <h3>Method Details</h3>
198203
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
199204
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
200205
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
206+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
207+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
208+
&quot;A String&quot;,
209+
],
210+
},
201211
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
202212
&quot;a_key&quot;: &quot;A String&quot;,
203213
},
@@ -332,6 +342,11 @@ <h3>Method Details</h3>
332342
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
333343
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
334344
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
345+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
346+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
347+
&quot;A String&quot;,
348+
],
349+
},
335350
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
336351
&quot;a_key&quot;: &quot;A String&quot;,
337352
},
@@ -458,6 +473,11 @@ <h3>Method Details</h3>
458473
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
459474
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
460475
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
476+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
477+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
478+
&quot;A String&quot;,
479+
],
480+
},
461481
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
462482
&quot;a_key&quot;: &quot;A String&quot;,
463483
},
@@ -539,6 +559,11 @@ <h3>Method Details</h3>
539559
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
540560
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
541561
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
562+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
563+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
564+
&quot;A String&quot;,
565+
],
566+
},
542567
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
543568
&quot;a_key&quot;: &quot;A String&quot;,
544569
},
@@ -601,6 +626,11 @@ <h3>Method Details</h3>
601626
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
602627
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
603628
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
629+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
630+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
631+
&quot;A String&quot;,
632+
],
633+
},
604634
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
605635
&quot;a_key&quot;: &quot;A String&quot;,
606636
},
@@ -791,6 +821,11 @@ <h3>Method Details</h3>
791821
&quot;cryptoKeyBackend&quot;: &quot;A String&quot;, # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
792822
&quot;destroyScheduledDuration&quot;: &quot;A String&quot;, # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
793823
&quot;importOnly&quot;: True or False, # Immutable. Whether this key may contain imported versions only.
824+
&quot;keyAccessJustificationsPolicy&quot;: { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
825+
&quot;allowedAccessReasons&quot;: [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
826+
&quot;A String&quot;,
827+
],
828+
},
794829
&quot;labels&quot;: { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
795830
&quot;a_key&quot;: &quot;A String&quot;,
796831
},

googleapiclient/discovery_cache/documents/cloudkms.v1.json

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,11 @@
3333
"description": "Regional Endpoint",
3434
"endpointUrl": "https://cloudkms.me-central2.rep.googleapis.com/",
3535
"location": "me-central2"
36+
},
37+
{
38+
"description": "Regional Endpoint",
39+
"endpointUrl": "https://cloudkms.us-east1.rep.googleapis.com/",
40+
"location": "us-east1"
3641
}
3742
],
3843
"fullyEncodeReservedExpansion": true,
@@ -2056,7 +2061,7 @@
20562061
}
20572062
}
20582063
},
2059-
"revision": "20240523",
2064+
"revision": "20240611",
20602065
"rootUrl": "https://cloudkms.googleapis.com/",
20612066
"schemas": {
20622067
"AsymmetricDecryptRequest": {
@@ -2381,6 +2386,10 @@
23812386
"description": "Immutable. Whether this key may contain imported versions only.",
23822387
"type": "boolean"
23832388
},
2389+
"keyAccessJustificationsPolicy": {
2390+
"$ref": "KeyAccessJustificationsPolicy",
2391+
"description": "Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed."
2392+
},
23842393
"labels": {
23852394
"additionalProperties": {
23862395
"type": "string"
@@ -3270,6 +3279,48 @@
32703279
},
32713280
"type": "object"
32723281
},
3282+
"KeyAccessJustificationsPolicy": {
3283+
"description": "A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey.",
3284+
"id": "KeyAccessJustificationsPolicy",
3285+
"properties": {
3286+
"allowedAccessReasons": {
3287+
"description": "The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.",
3288+
"items": {
3289+
"enum": [
3290+
"REASON_UNSPECIFIED",
3291+
"CUSTOMER_INITIATED_SUPPORT",
3292+
"GOOGLE_INITIATED_SERVICE",
3293+
"THIRD_PARTY_DATA_REQUEST",
3294+
"GOOGLE_INITIATED_REVIEW",
3295+
"CUSTOMER_INITIATED_ACCESS",
3296+
"GOOGLE_INITIATED_SYSTEM_OPERATION",
3297+
"REASON_NOT_EXPECTED",
3298+
"MODIFIED_CUSTOMER_INITIATED_ACCESS",
3299+
"MODIFIED_GOOGLE_INITIATED_SYSTEM_OPERATION",
3300+
"GOOGLE_RESPONSE_TO_PRODUCTION_ALERT",
3301+
"CUSTOMER_AUTHORIZED_WORKFLOW_SERVICING"
3302+
],
3303+
"enumDescriptions": [
3304+
"Unspecified access reason.",
3305+
"Customer-initiated support.",
3306+
"Google-initiated access for system management and troubleshooting.",
3307+
"Google-initiated access in response to a legal request or legal process.",
3308+
"Google-initiated access for security, fraud, abuse, or compliance purposes.",
3309+
"Customer uses their account to perform any access to their own data which their IAM policy authorizes.",
3310+
"Google systems access customer data to help optimize the structure of the data or quality for future uses by the customer.",
3311+
"No reason is expected for this key request.",
3312+
"Customer uses their account to perform any access to their own data which their IAM policy authorizes, and one of the following is true: * A Google administrator has reset the root-access account associated with the user's organization within the past 7 days. * A Google-initiated emergency access operation has interacted with a resource in the same project or folder as the currently accessed resource within the past 7 days.",
3313+
"Google systems access customer data to help optimize the structure of the data or quality for future uses by the customer, and one of the following is true: * A Google administrator has reset the root-access account associated with the user's organization within the past 7 days. * A Google-initiated emergency access operation has interacted with a resource in the same project or folder as the currently accessed resource within the past 7 days.",
3314+
"Google-initiated access to maintain system reliability.",
3315+
"One of the following operations is being executed while simultaneously encountering an internal technical issue which prevented a more precise justification code from being generated: * Your account has been used to perform any access to your own data which your IAM policy authorizes. * An automated Google system operates on encrypted customer data which your IAM policy authorizes. * Customer-initiated Google support access. * Google-initiated support access to protect system reliability."
3316+
],
3317+
"type": "string"
3318+
},
3319+
"type": "array"
3320+
}
3321+
},
3322+
"type": "object"
3323+
},
32733324
"KeyHandle": {
32743325
"description": "Resource-oriented representation of a request to Cloud KMS Autokey and the resulting provisioning of a CryptoKey.",
32753326
"id": "KeyHandle",

0 commit comments

Comments
 (0)