/aosp_15_r20/external/google-cloud-java/java-bigqueryconnection/proto-google-cloud-bigqueryconnection-v1/src/main/java/com/google/cloud/bigquery/connection/v1/ |
H A D | CloudResourceProperties.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 25 * Container for connection properties for delegation of access to GCP 79 * Output only. The account ID of the service created for the purpose of this 81 * The service account does not have any permissions associated with it 83 * to the service account. When the connection is used in the context of an 84 * operation in BigQuery, the service account will be used to connect to the 85 * desired resources in GCP. 86 * The account ID is in the form of: 87 * <service-1234>@gcp-sa-bigquery-cloudresource.iam.gserviceaccount.com 110 * Output only. The account ID of the service created for the purpose of this [all …]
|
H A D | CloudResourcePropertiesOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 30 * Output only. The account ID of the service created for the purpose of this 32 * The service account does not have any permissions associated with it 34 * to the service account. When the connection is used in the context of an 35 * operation in BigQuery, the service account will be used to connect to the 36 * desired resources in GCP. 37 * The account ID is in the form of: 38 * <service-1234>@gcp-sa-bigquery-cloudresource.iam.gserviceaccount.com 50 * Output only. The account ID of the service created for the purpose of this 52 * The service account does not have any permissions associated with it [all …]
|
H A D | SparkProperties.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 79 * Output only. The account ID of the service created for the purpose of this 81 * The service account does not have any permissions associated with it when 83 * service account. When the connection is used in the context of a stored 84 * procedure for Apache Spark in BigQuery, the service account will be used to 86 * The account ID is in the form of: 87 * bqcx-<projectnumber>-<uniqueid>@gcp-sa-bigquery-consp.iam.gserviceaccount.com 110 * Output only. The account ID of the service created for the purpose of this 112 * The service account does not have any permissions associated with it when 114 * service account. When the connection is used in the context of a stored [all …]
|
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/ |
D | cloudasset_v1.savedQueries.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | firebase_v1beta1.projects.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | dialogflow_v3beta1.projects.locations.securitySettings.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | dialogflow_v3.projects.locations.securitySettings.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | cloudbuild_v1alpha1.projects.workerPools.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | cloudasset_v1p4beta1.v1p4beta1.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | pubsub_v1.projects.topics.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
D | connectors_v1.projects.locations.global_.providers.connectors.versions.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/xds_k8s_test_driver/framework/infrastructure/gcp/ |
D | iam.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 21 from framework.infrastructure import gcp 27 _HttpRequest = gcp.api.HttpRequest 30 class EtagConflict(gcp.api.Error): 42 retry_on_exceptions=(EtagConflict, gcp.api.TransportError), 52 new_binding: 'Policy.Binding') -> 'Policy': 56 …classes.replace(policy, bindings=frozenset(new_bindings)) # pylint: disable=too-many-function-args 61 """An IAM service account. 76 def from_response(cls, response: Dict[str, Any]) -> 'ServiceAccount': 86 def as_dict(self) -> Dict[str, Any]: [all …]
|
/aosp_15_r20/external/sdk-platform-java/java-common-protos/proto-google-common-protos/src/main/java/com/google/cloud/audit/ |
H A D | AuthenticationInfo.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 82 * The email address of the authenticated user (or service account on behalf 87 * logs](https://cloud.google.com/logging/docs/audit#user-id). 110 * The email address of the authenticated user (or service account on behalf 115 * logs](https://cloud.google.com/logging/docs/audit#user-id). 255 * The name of the service account key used to create or exchange 256 * credentials for authenticating the service account making the request. 257 * This is a scheme-less URI full resource name. For example: 258 * "//iam.googleapis.com/projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}" 281 * The name of the service account key used to create or exchange [all …]
|
H A D | AuthenticationInfoOrBuilder.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 30 * The email address of the authenticated user (or service account on behalf 35 * logs](https://cloud.google.com/logging/docs/audit#user-id). 47 * The email address of the authenticated user (or service account on behalf 52 * logs](https://cloud.google.com/logging/docs/audit#user-id). 136 * The name of the service account key used to create or exchange 137 * credentials for authenticating the service account making the request. 138 * This is a scheme-less URI full resource name. For example: 139 * "//iam.googleapis.com/projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}" 151 * The name of the service account key used to create or exchange [all …]
|
/aosp_15_r20/external/google-auth-library-java/oauth2_http/javatests/com/google/auth/oauth2/ |
H A D | ITWorkloadIdentityFederationTest.java | 65 * GOOGLE_APPLICATION_CREDENTIALS to point to the same service account keys used in the setup script 66 * (workloadidentityfederation-setup). These tests call GCS to get bucket information. The bucket 71 // Copy output from workloadidentityfederation-setup. 73 …"//iam.googleapis.com/projects/1016721519174/locations/global/workloadIdentityPools/pool-1/provide… 74 private static final String AWS_ROLE_NAME = "ci-java-test"; 75 private static final String AWS_ROLE_ARN = "arn:aws:iam::027472800722:role/ci-java-test"; 77 private static final String AWS_AUDIENCE = AUDIENCE_PREFIX + "aws-1"; 78 private static final String OIDC_AUDIENCE = AUDIENCE_PREFIX + "oidc-1"; 89 * IdentityPoolCredentials (OIDC provider): Uses the service account to generate a Google ID token 90 * using the iamcredentials generateIdToken API. This will use the service account client ID as [all …]
|
/aosp_15_r20/external/google-cloud-java/java-gkehub/proto-google-cloud-gkehub-v1alpha/src/main/java/com/google/cloud/gkehub/cloudauditlogging/v1alpha/ |
H A D | FeatureSpec.java | 8 * https://www.apache.org/licenses/LICENSE-2.0 78 * Service account that should be allowlisted to send the audit logs; eg 79 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must 96 * Service account that should be allowlisted to send the audit logs; eg 97 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must 114 * Service account that should be allowlisted to send the audit logs; eg 115 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must 133 * Service account that should be allowlisted to send the audit logs; eg 134 * cloudauditlogging@gcp-project.iam.gserviceaccount.com. These accounts must 149 private byte memoizedIsInitialized = -1; [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/xds_k8s_test_driver/framework/test_app/runners/k8s/ |
D | k8s_xds_server_runner.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 20 from framework.infrastructure import gcp 48 gcp_iam: Optional[gcp.iam.IamV1] = None 51 service: Optional[k8s.V1Service] = None variable in KubernetesServerRunner 53 def __init__( # pylint: disable=too-many-locals 62 gcp_api_manager: gcp.api.GcpApiManager, 69 service_account_template: str = 'service-account.yaml', 70 service_template: str = 'server.service.yaml', 92 # GCP Network Endpoint Group. 93 self.gcp_neg_name = neg_name or (f'{self.k8s_namespace.name}-' [all …]
|
D | k8s_xds_client_runner.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 20 from framework.infrastructure import gcp 42 gcp_iam: Optional[gcp.iam.IamV1] = None 44 def __init__( # pylint: disable=too-many-locals 53 gcp_api_manager: gcp.api.GcpApiManager, 59 service_account_template: str = 'service-account.yaml', 86 # Kubernetes service account. 89 # GCP IAM API used to grant allow workload service accounts 90 # permission to use GCP service account identity. 91 self.gcp_iam = gcp.iam.IamV1(gcp_api_manager, gcp_project) [all …]
|
D | k8s_base_runner.py | 7 # http://www.apache.org/licenses/LICENSE-2.0 32 from framework.infrastructure import gcp 56 # pylint: disable=abstract-method 58 TEMPLATE_DIR_NAME = 'kubernetes-manifests' 103 # Maps GCP service account to Kubernetes service account 205 def get_pod_restarts(self, deployment: k8s.V1Deployment) -> int: 240 def _create_from_template(self, template_name, **kwargs) -> object: 250 # Error out on multi-document yaml 264 def _reuse_deployment(self, deployment_name) -> k8s.V1Deployment: 269 def _reuse_service(self, service_name) -> k8s.V1Service: [all …]
|
/aosp_15_r20/external/tink/python/examples/envelope_aead/ |
H A D | README.md | 4 [Envelope Encryption](https://cloud.google.com/kms/docs/envelope-encryption). 14 * kek-uri: The URI for the key to be used for envelope encryption. 15 * gcp-credential-file: Name of the file with the GCP credentials in JSON 17 * input-file: Read the input from this file. 18 * output-file: Write the result to this file. 24 This envelope encryption example uses a Cloud KMS key as a key-encryption key 29 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`. 31 * Create a service account that is allowed to encrypt and decrypt with the 47 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and 48 # my-service-account.json with your service account's credential JSON file. [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/tools/run_tests/xds_k8s_test_driver/ |
D | README.md | 10 - [x] Replace retrying with tenacity 11 - [x] Generate namespace for each test to prevent resource name conflicts and 13 - [x] Security: run server and client in separate namespaces 14 - [ ] Make framework.infrastructure.gcp resources [first-class 15 citizen](https://en.wikipedia.org/wiki/First-class_citizen), support 17 - [x] Security: manage `roles/iam.workloadIdentityUser` role grant lifecycle for 18 dynamically-named namespaces 19 - [x] Restructure `framework.test_app` and `framework.xds_k8s*` into a module 20 containing xDS-interop-specific logic 21 - [ ] Address inline TODOs in code [all …]
|
/aosp_15_r20/external/tink/java_src/examples/envelopeaead/ |
H A D | README.md | 4 [Envelope Encryption](https://cloud.google.com/kms/docs/envelope-encryption). 14 * kek-uri: The URI for the key to be used for envelope encryption. 15 * gcp-credential-file: Name of the file with the GCP credentials in JSON 17 * input-file: Read the input from this file. 18 * output-file: Write the result to this file. 19 * [optional] associated-data: Associated data used for the encryption or 26 This envelope encryption example uses a Cloud KMS key as a key-encryption key 31 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`. 33 * Create and download a service account that is allowed to encrypt and decrypt 48 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and [all …]
|
/aosp_15_r20/external/tink/java_src/examples/encryptedkeyset/ |
H A D | README.md | 10 This example uses a Cloud KMS key as a key-encryption key (KEK) to 17 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`. 19 * Create and download a service account that is allowed to encrypt and decrypt 33 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and 34 # my-service-account.json with your service account's credential JSON file. 35 ./bazel-bin/encryptedkeyset/encrypted_keyset_example \ 38 gcp-kms://<my-key-uri> \ 39 my-service-account.json 47 ./bazel-bin/encryptedkeyset/encrypted_keyset_example \ 50 gcp-kms://<my-key-uri> \ [all …]
|
/aosp_15_r20/external/google-cloud-java/.cloud/ |
H A D | README.md | 4 same GCP project resources, required resources not existing on the GCP project, quota limits being 6 service account impersonation requirements. 9 and on-prem resources to be defined in configuration files to be versioned, reused, and shared. By 10 using Terraform to provision our GCP projects prior to running integration tests we: 13 * Prevent conflicts between concurrent integration test invocations using the same GCP project by 15 * Provide a managed lifecycle including the ability to destroy short-lived testing environments, 18 # Running `google-cloud-java` Integration Tests 20 When you need to troubleshoot integration tests in the google-cloud-java repository, follow one of 21 the supported workflows below to provision a GCP project with the required configuration. 30 …[About Cloud Billing accounts](https://cloud.google.com/billing/docs/how-to/manage-billing-account) [all …]
|
/aosp_15_r20/external/tink/python/examples/encrypted_keyset/ |
H A D | README.md | 10 This example uses a Cloud KMS key as a key-encryption key (KEK) to 17 `projects/<my-project>/locations/global/keyRings/<my-key-ring>/cryptoKeys/<my-key>`. 19 * Create service account that is allowed to encrypt and decrypt with the above 33 # Replace `<my-key-uri>` in `gcp-kms://<my-key-uri>` with your key URI, and 34 # my-service-account.json with your service account's credential JSON file. 35 $ ./bazel-bin/encrypted_keyset/encrypted_keyset --mode generate \ 36 --keyset_path aes128_gcm_test_encrypted_keyset.json \ 37 --kek_uri gcp-kms://<my-key-uri> \ 38 --gcp_credential_path my-service-account.json 45 $ ./bazel-bin/encrypted_keyset/encrypted_keyset --mode encrypt \ [all …]
|