xref: /aosp_15_r20/external/google-cloud-java/java-kms/.repo-metadata.json (revision 55e87721aa1bc457b326496a7ca40f3ea1a63287)
1*55e87721SMatt Gilbride{
2*55e87721SMatt Gilbride    "api_shortname": "cloudkms",
3*55e87721SMatt Gilbride    "name_pretty": "Cloud Key Management Service",
4*55e87721SMatt Gilbride    "product_documentation": "https://cloud.google.com/kms",
5*55e87721SMatt Gilbride    "client_documentation": "https://cloud.google.com/java/docs/reference/google-cloud-kms/latest/overview",
6*55e87721SMatt Gilbride    "issue_tracker": "https://issuetracker.google.com/savedsearches/5264932",
7*55e87721SMatt Gilbride    "release_level": "stable",
8*55e87721SMatt Gilbride    "repo": "googleapis/google-cloud-java",
9*55e87721SMatt Gilbride    "repo_short": "java-kms",
10*55e87721SMatt Gilbride    "distribution_name": "com.google.cloud:google-cloud-kms",
11*55e87721SMatt Gilbride    "api_id": "cloudkms.googleapis.com",
12*55e87721SMatt Gilbride    "transport": "grpc",
13*55e87721SMatt Gilbride    "requires_billing": true,
14*55e87721SMatt Gilbride    "api_description": "a cloud-hosted key management service that lets you manage cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys. Cloud KMS is integrated with Cloud IAM and Cloud Audit Logging so that you can manage permissions on individual keys and monitor how these are used. Use Cloud KMS to protect secrets and other sensitive data that you need to store in Google Cloud Platform.",
15*55e87721SMatt Gilbride    "library_type": "GAPIC_AUTO"
16*55e87721SMatt Gilbride}
17