Home
last modified time | relevance | path

Searched +full:gcp +full:- +full:service +full:- +full:account (Results 1 – 25 of 390) sorted by relevance

12345678910>>...16

/aosp_15_r20/external/google-cloud-java/java-bigqueryconnection/proto-google-cloud-bigqueryconnection-v1/src/main/java/com/google/cloud/bigquery/connection/v1/
H A DCloudResourceProperties.java8 * https://www.apache.org/licenses/LICENSE-2.0
25 * Container for connection properties for delegation of access to GCP
79 * Output only. The account ID of the service created for the purpose of this
81 * The service account does not have any permissions associated with it
83 * to the service account. When the connection is used in the context of an
84 * operation in BigQuery, the service account will be used to connect to the
85 * desired resources in GCP.
86 * The account ID is in the form of:
87 * <service-1234>@gcp-sa-bigquery-cloudresource.iam.gserviceaccount.com
110 * Output only. The account ID of the service created for the purpose of this
[all …]
H A DCloudResourcePropertiesOrBuilder.java8 * https://www.apache.org/licenses/LICENSE-2.0
30 * Output only. The account ID of the service created for the purpose of this
32 * The service account does not have any permissions associated with it
34 * to the service account. When the connection is used in the context of an
35 * operation in BigQuery, the service account will be used to connect to the
36 * desired resources in GCP.
37 * The account ID is in the form of:
38 * <service-1234>@gcp-sa-bigquery-cloudresource.iam.gserviceaccount.com
50 * Output only. The account ID of the service created for the purpose of this
52 * The service account does not have any permissions associated with it
[all …]
H A DSparkProperties.java8 * https://www.apache.org/licenses/LICENSE-2.0
79 * Output only. The account ID of the service created for the purpose of this
81 * The service account does not have any permissions associated with it when
83 * service account. When the connection is used in the context of a stored
84 * procedure for Apache Spark in BigQuery, the service account will be used to
86 * The account ID is in the form of:
87 * bqcx-<projectnumber>-<uniqueid>@gcp-sa-bigquery-consp.iam.gserviceaccount.com
110 * Output only. The account ID of the service created for the purpose of this
112 * The service account does not have any permissions associated with it when
114 * service account. When the connection is used in the context of a stored
[all …]
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/
Dcloudasset_v1.savedQueries.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dfirebase_v1beta1.projects.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Ddialogflow_v3beta1.projects.locations.securitySettings.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Ddialogflow_v3.projects.locations.securitySettings.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dcloudbuild_v1alpha1.projects.workerPools.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dcloudasset_v1p4beta1.v1p4beta1.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dpubsub_v1.projects.topics.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dconnectors_v1.projects.locations.global_.providers.connectors.versions.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/xds_k8s_test_driver/framework/infrastructure/gcp/
Diam.py7 # http://www.apache.org/licenses/LICENSE-2.0
21 from framework.infrastructure import gcp
27 _HttpRequest = gcp.api.HttpRequest
30 class EtagConflict(gcp.api.Error):
42 retry_on_exceptions=(EtagConflict, gcp.api.TransportError),
52 new_binding: 'Policy.Binding') -> 'Policy':
56 …classes.replace(policy, bindings=frozenset(new_bindings)) # pylint: disable=too-many-function-args
61 """An IAM service account.
76 def from_response(cls, response: Dict[str, Any]) -> 'ServiceAccount':
86 def as_dict(self) -> Dict[str, Any]:
[all …]
/aosp_15_r20/external/sdk-platform-java/java-common-protos/proto-google-common-protos/src/main/java/com/google/cloud/audit/
H A DAuthenticationInfo.java8 * https://www.apache.org/licenses/LICENSE-2.0
82 * The email address of the authenticated user (or service account on behalf
87 * logs](https://cloud.google.com/logging/docs/audit#user-id).
110 * The email address of the authenticated user (or service account on behalf
115 * logs](https://cloud.google.com/logging/docs/audit#user-id).
255 * The name of the service account key used to create or exchange
256 * credentials for authenticating the service account making the request.
257 * This is a scheme-less URI full resource name. For example:
258 * "//iam.googleapis.com/projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}"
281 * The name of the service account key used to create or exchange
[all …]
H A DAuthenticationInfoOrBuilder.java8 * https://www.apache.org/licenses/LICENSE-2.0
30 * The email address of the authenticated user (or service account on behalf
35 * logs](https://cloud.google.com/logging/docs/audit#user-id).
47 * The email address of the authenticated user (or service account on behalf
52 * logs](https://cloud.google.com/logging/docs/audit#user-id).
136 * The name of the service account key used to create or exchange
137 * credentials for authenticating the service account making the request.
138 * This is a scheme-less URI full resource name. For example:
139 * "//iam.googleapis.com/projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}"
151 * The name of the service account key used to create or exchange
[all …]
/aosp_15_r20/external/google-auth-library-java/oauth2_http/javatests/com/google/auth/oauth2/
H A DITWorkloadIdentityFederationTest.java65 * GOOGLE_APPLICATION_CREDENTIALS to point to the same service account keys used in the setup script
66 * (workloadidentityfederation-setup). These tests call GCS to get bucket information. The bucket
71 // Copy output from workloadidentityfederation-setup.
73 …"//iam.googleapis.com/projects/1016721519174/locations/global/workloadIdentityPools/pool-1/provide…
74 private static final String AWS_ROLE_NAME = "ci-java-test";
75 private static final String AWS_ROLE_ARN = "arn:aws:iam::027472800722:role/ci-java-test";
77 private static final String AWS_AUDIENCE = AUDIENCE_PREFIX + "aws-1";
78 private static final String OIDC_AUDIENCE = AUDIENCE_PREFIX + "oidc-1";
89 * IdentityPoolCredentials (OIDC provider): Uses the service account to generate a Google ID token
90 * using the iamcredentials generateIdToken API. This will use the service account client ID as
[all …]
/aosp_15_r20/external/google-cloud-java/java-gkehub/proto-google-cloud-gkehub-v1alpha/src/main/java/com/google/cloud/gkehub/cloudauditlogging/v1alpha/
H A DFeatureSpec.java8 * https://www.apache.org/licenses/LICENSE-2.0
78 * Service account that should be allowlisted to send the audit logs; eg
79 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must
96 * Service account that should be allowlisted to send the audit logs; eg
97 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must
114 * Service account that should be allowlisted to send the audit logs; eg
115 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must
133 * Service account that should be allowlisted to send the audit logs; eg
134 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must
149 private byte memoizedIsInitialized = -1;
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/xds_k8s_test_driver/framework/test_app/runners/k8s/
Dk8s_xds_server_runner.py7 # http://www.apache.org/licenses/LICENSE-2.0
20 from framework.infrastructure import gcp
48 gcp_iam: Optional[gcp.iam.IamV1] = None
51 service: Optional[k8s.V1Service] = None variable in KubernetesServerRunner
53 def __init__( # pylint: disable=too-many-locals
62 gcp_api_manager: gcp.api.GcpApiManager,
69 service_account_template: str = 'service-account.yaml',
70 service_template: str = 'server.service.yaml',
92 # GCP Network Endpoint Group.
93 self.gcp_neg_name = neg_name or (f'{self.k8s_namespace.name}-'
[all …]
Dk8s_xds_client_runner.py7 # http://www.apache.org/licenses/LICENSE-2.0
20 from framework.infrastructure import gcp
42 gcp_iam: Optional[gcp.iam.IamV1] = None
44 def __init__( # pylint: disable=too-many-locals
53 gcp_api_manager: gcp.api.GcpApiManager,
59 service_account_template: str = 'service-account.yaml',
86 # Kubernetes service account.
89 # GCP IAM API used to grant allow workload service accounts
90 # permission to use GCP service account identity.
91 self.gcp_iam = gcp.iam.IamV1(gcp_api_manager, gcp_project)
[all …]
Dk8s_base_runner.py7 # http://www.apache.org/licenses/LICENSE-2.0
32 from framework.infrastructure import gcp
56 # pylint: disable=abstract-method
58 TEMPLATE_DIR_NAME = 'kubernetes-manifests'
103 # Maps GCP service account to Kubernetes service account
205 def get_pod_restarts(self, deployment: k8s.V1Deployment) -> int:
240 def _create_from_template(self, template_name, **kwargs) -> object:
250 # Error out on multi-document yaml
264 def _reuse_deployment(self, deployment_name) -> k8s.V1Deployment:
269 def _reuse_service(self, service_name) -> k8s.V1Service:
[all …]
/aosp_15_r20/external/tink/python/examples/envelope_aead/
H A DREADME.md4 [Envelope Encryption](https://cloud.google.com/kms/docs/envelope-encryption).
14 * kek-uri: The URI for the key to be used for envelope encryption.
15 * gcp-credential-file: Name of the file with the GCP credentials in JSON
17 * input-file: Read the input from this file.
18 * output-file: Write the result to this file.
24 This envelope encryption example uses a Cloud KMS key as a key-encryption key
29 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`.
31 * Create a service account that is allowed to encrypt and decrypt with the
47 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and
48 # my-service-account.json with your service account's credential JSON file.
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/xds_k8s_test_driver/
DREADME.md10 - [x] Replace retrying with tenacity
11 - [x] Generate namespace for each test to prevent resource name conflicts and
13 - [x] Security: run server and client in separate namespaces
14 - [ ] Make framework.infrastructure.gcp resources [first-class
15 citizen](https://en.wikipedia.org/wiki/First-class_citizen), support
17 - [x] Security: manage `roles/iam.workloadIdentityUser` role grant lifecycle for
18 dynamically-named namespaces
19 - [x] Restructure `framework.test_app` and `framework.xds_k8s*` into a module
20 containing xDS-interop-specific logic
21 - [ ] Address inline TODOs in code
[all …]
/aosp_15_r20/external/tink/java_src/examples/envelopeaead/
H A DREADME.md4 [Envelope Encryption](https://cloud.google.com/kms/docs/envelope-encryption).
14 * kek-uri: The URI for the key to be used for envelope encryption.
15 * gcp-credential-file: Name of the file with the GCP credentials in JSON
17 * input-file: Read the input from this file.
18 * output-file: Write the result to this file.
19 * [optional] associated-data: Associated data used for the encryption or
26 This envelope encryption example uses a Cloud KMS key as a key-encryption key
31 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`.
33 * Create and download a service account that is allowed to encrypt and decrypt
48 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and
[all …]
/aosp_15_r20/external/tink/java_src/examples/encryptedkeyset/
H A DREADME.md10 This example uses a Cloud KMS key as a key-encryption key (KEK) to
17 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`.
19 * Create and download a service account that is allowed to encrypt and decrypt
33 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and
34 # my-service-account.json with your service account's credential JSON file.
35 ./bazel-bin/encryptedkeyset/encrypted_keyset_example \
38 gcp-kms://<my-key-uri> \
39 my-service-account.json
47 ./bazel-bin/encryptedkeyset/encrypted_keyset_example \
50 gcp-kms://<my-key-uri> \
[all …]
/aosp_15_r20/external/google-cloud-java/.cloud/
H A DREADME.md4 same GCP project resources, required resources not existing on the GCP project, quota limits being
6 service account impersonation requirements.
9 and on-prem resources to be defined in configuration files to be versioned, reused, and shared. By
10 using Terraform to provision our GCP projects prior to running integration tests we:
13 * Prevent conflicts between concurrent integration test invocations using the same GCP project by
15 * Provide a managed lifecycle including the ability to destroy short-lived testing environments,
18 # Running `google-cloud-java` Integration Tests
20 When you need to troubleshoot integration tests in the google-cloud-java repository, follow one of
21 the supported workflows below to provision a GCP project with the required configuration.
30 …[About Cloud Billing accounts](https://cloud.google.com/billing/docs/how-to/manage-billing-account)
[all …]
/aosp_15_r20/external/tink/python/examples/encrypted_keyset/
H A DREADME.md10 This example uses a Cloud KMS key as a key-encryption key (KEK) to
17 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`.
19 * Create service account that is allowed to encrypt and decrypt with the above
33 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and
34 # my-service-account.json with your service account's credential JSON file.
35 $ ./bazel-bin/encrypted_keyset/encrypted_keyset --mode generate \
36 --keyset_path aes128_gcm_test_encrypted_keyset.json \
37 --kek_uri gcp-kms://<my-key-uri> \
38 --gcp_credential_path my-service-account.json
45 $ ./bazel-bin/encrypted_keyset/encrypted_keyset --mode encrypt \
[all …]

12345678910>>...16