google-cloud-kms-inventory-v1 0.16.2 → 0.17.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 1bad08ae7db1b3f6fb3bfd780d423c56d9ca880796a5906ac31a649cb42edbce
|
|
4
|
+
data.tar.gz: b76f729496564421a1bf55f33c86101c356816f9da180628133df305f24d8092
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: d36d2ae7dd072d1427767348c09366bf9553ca30b5ae5d8140bd6f4f3b8508308969238280ead32a64ca7a62ca8b225f3760133bf08016386fad268443f766fa
|
|
7
|
+
data.tar.gz: 454efa81c7cec7999db8e576cd1facc96fab4eded104bb87830a766ce8861353530f4457a5007978908df22a7d406c7fe764e4fb64772a03b9c9dc4ecaad6a81
|
|
@@ -134,7 +134,12 @@ module Google
|
|
|
134
134
|
# if {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersions} have a
|
|
135
135
|
# {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of
|
|
136
136
|
# {::Google::Cloud::Kms::V1::ProtectionLevel::EXTERNAL_VPC EXTERNAL_VPC}, with the
|
|
137
|
-
# resource name in the format `projects/*/locations/*/ekmConnections/*`.
|
|
137
|
+
# resource name in the format `projects/*/locations/*/ekmConnections/*`. Only
|
|
138
|
+
# applicable if {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersions}
|
|
139
|
+
# have a {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of
|
|
140
|
+
# {::Google::Cloud::Kms::V1::ProtectionLevel::HSM_SINGLE_TENANT HSM_SINGLE_TENANT},
|
|
141
|
+
# with the resource name in the format
|
|
142
|
+
# `projects/*/locations/*/singleTenantHsmInstances/*`.
|
|
138
143
|
# Note, this list is non-exhaustive and may apply to additional
|
|
139
144
|
# {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevels} in the future.
|
|
140
145
|
# @!attribute [rw] key_access_justifications_policy
|
|
@@ -867,6 +872,16 @@ module Google
|
|
|
867
872
|
# Only present if the chosen
|
|
868
873
|
# {::Google::Cloud::Kms::V1::ImportJob::ImportMethod ImportMethod} is one with a
|
|
869
874
|
# protection level of {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM}.
|
|
875
|
+
# @!attribute [rw] crypto_key_backend
|
|
876
|
+
# @return [::String]
|
|
877
|
+
# Immutable. The resource name of the backend environment where the key
|
|
878
|
+
# material for the wrapping key resides and where all related cryptographic
|
|
879
|
+
# operations are performed. Currently, this field is only populated for keys
|
|
880
|
+
# stored in HSM_SINGLE_TENANT. Note, this list is non-exhaustive and may
|
|
881
|
+
# apply to additional {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevels}
|
|
882
|
+
# in the future.
|
|
883
|
+
# Supported resources:
|
|
884
|
+
# * `"projects/*/locations/*/singleTenantHsmInstances/*"`
|
|
870
885
|
class ImportJob
|
|
871
886
|
include ::Google::Protobuf::MessageExts
|
|
872
887
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
|
@@ -1018,6 +1033,9 @@ module Google
|
|
|
1018
1033
|
|
|
1019
1034
|
# Crypto operations are performed in an EKM-over-VPC backend.
|
|
1020
1035
|
EXTERNAL_VPC = 4
|
|
1036
|
+
|
|
1037
|
+
# Crypto operations are performed in a single-tenant HSM.
|
|
1038
|
+
HSM_SINGLE_TENANT = 5
|
|
1021
1039
|
end
|
|
1022
1040
|
|
|
1023
1041
|
# Describes the reason for a data access. Please refer to
|
|
@@ -1050,10 +1068,11 @@ module Google
|
|
|
1050
1068
|
# No reason is expected for this key request.
|
|
1051
1069
|
REASON_NOT_EXPECTED = 7
|
|
1052
1070
|
|
|
1053
|
-
# Deprecated: This code is no longer generated by
|
|
1054
|
-
# GOOGLE_RESPONSE_TO_PRODUCTION_ALERT justification codes
|
|
1055
|
-
# Key Access Justifications and Access Transparency logs
|
|
1056
|
-
# customer-visible signals of emergency access in more precise
|
|
1071
|
+
# Deprecated: This code is no longer generated by
|
|
1072
|
+
# Google Cloud. The GOOGLE_RESPONSE_TO_PRODUCTION_ALERT justification codes
|
|
1073
|
+
# available in both Key Access Justifications and Access Transparency logs
|
|
1074
|
+
# provide customer-visible signals of emergency access in more precise
|
|
1075
|
+
# contexts.
|
|
1057
1076
|
#
|
|
1058
1077
|
# Customer uses their account to perform any access to their own data which
|
|
1059
1078
|
# their IAM policy authorizes, and one of the following is true:
|
|
@@ -1065,10 +1084,11 @@ module Google
|
|
|
1065
1084
|
# within the past 7 days.
|
|
1066
1085
|
MODIFIED_CUSTOMER_INITIATED_ACCESS = 8
|
|
1067
1086
|
|
|
1068
|
-
# Deprecated: This code is no longer generated by
|
|
1069
|
-
# GOOGLE_RESPONSE_TO_PRODUCTION_ALERT justification codes
|
|
1070
|
-
# Key Access Justifications and Access Transparency logs
|
|
1071
|
-
# customer-visible signals of emergency access in more precise
|
|
1087
|
+
# Deprecated: This code is no longer generated by
|
|
1088
|
+
# Google Cloud. The GOOGLE_RESPONSE_TO_PRODUCTION_ALERT justification codes
|
|
1089
|
+
# available in both Key Access Justifications and Access Transparency logs
|
|
1090
|
+
# provide customer-visible signals of emergency access in more precise
|
|
1091
|
+
# contexts.
|
|
1072
1092
|
#
|
|
1073
1093
|
# Google systems access customer data to help optimize the structure of the
|
|
1074
1094
|
# data or quality for future uses by the customer, and one of the following
|