22 stable releases (5 major)
6.0.0+20240621 | Oct 15, 2024 |
---|---|
5.0.5+20240621 | Jun 27, 2024 |
5.0.4+20240219 | Mar 5, 2024 |
5.0.3+20230106 | Aug 23, 2023 |
1.0.6+20170919 | Sep 27, 2017 |
#36 in Web programming
931 downloads per month
Used in 2 crates
1MB
15K
SLoC
The google-cloudkms1
library allows access to all features of the Google Cloud KMS service.
This documentation was generated from Cloud KMS crate version 6.0.0+20240621, where 20240621 is the exact revision of the cloudkms:v1 schema built by the mako code generator v6.0.0.
Everything else about the Cloud KMS v1 API can be found at the official documentation site.
Features
Handle the following Resources with ease from the central hub ...
- folders
- get autokey config and update autokey config
- projects
- locations ekm config get iam policy, locations ekm config set iam policy, locations ekm config test iam permissions, locations ekm connections create, locations ekm connections get, locations ekm connections get iam policy, locations ekm connections list, locations ekm connections patch, locations ekm connections set iam policy, locations ekm connections test iam permissions, locations ekm connections verify connectivity, locations generate random bytes, locations get, locations get ekm config, locations key handles create, locations key handles get, locations key handles list, locations key rings create, locations key rings crypto keys create, locations key rings crypto keys crypto key versions asymmetric decrypt, locations key rings crypto keys crypto key versions asymmetric sign, locations key rings crypto keys crypto key versions create, locations key rings crypto keys crypto key versions destroy, locations key rings crypto keys crypto key versions get, locations key rings crypto keys crypto key versions get public key, locations key rings crypto keys crypto key versions import, locations key rings crypto keys crypto key versions list, locations key rings crypto keys crypto key versions mac sign, locations key rings crypto keys crypto key versions mac verify, locations key rings crypto keys crypto key versions patch, locations key rings crypto keys crypto key versions raw decrypt, locations key rings crypto keys crypto key versions raw encrypt, locations key rings crypto keys crypto key versions restore, locations key rings crypto keys decrypt, locations key rings crypto keys encrypt, locations key rings crypto keys get, locations key rings crypto keys get iam policy, locations key rings crypto keys list, locations key rings crypto keys patch, locations key rings crypto keys set iam policy, locations key rings crypto keys test iam permissions, locations key rings crypto keys update primary version, locations key rings get, locations key rings get iam policy, locations key rings import jobs create, locations key rings import jobs get, locations key rings import jobs get iam policy, locations key rings import jobs list, locations key rings import jobs set iam policy, locations key rings import jobs test iam permissions, locations key rings list, locations key rings set iam policy, locations key rings test iam permissions, locations list, locations operations get, locations update ekm config and show effective autokey config
Structure of this Library
The API is structured into the following primary items:
- Hub
- a central object to maintain state and allow accessing all Activities
- creates Method Builders which in turn allow access to individual Call Builders
- Resources
- primary types that you can apply Activities to
- a collection of properties and Parts
- Parts
- a collection of properties
- never directly used in Activities
- Activities
- operations to apply to Resources
All structures are marked with applicable traits to further categorize them and ease browsing.
Generally speaking, you can invoke Activities like this:
let r = hub.resource().activity(...).doit().await
Or specifically ...
let r = hub.projects().locations_ekm_config_get_iam_policy(...).doit().await
let r = hub.projects().locations_ekm_config_set_iam_policy(...).doit().await
let r = hub.projects().locations_ekm_connections_get_iam_policy(...).doit().await
let r = hub.projects().locations_ekm_connections_set_iam_policy(...).doit().await
let r = hub.projects().locations_key_rings_crypto_keys_get_iam_policy(...).doit().await
let r = hub.projects().locations_key_rings_crypto_keys_set_iam_policy(...).doit().await
let r = hub.projects().locations_key_rings_import_jobs_get_iam_policy(...).doit().await
let r = hub.projects().locations_key_rings_import_jobs_set_iam_policy(...).doit().await
let r = hub.projects().locations_key_rings_get_iam_policy(...).doit().await
let r = hub.projects().locations_key_rings_set_iam_policy(...).doit().await
The resource()
and activity(...)
calls create builders. The second one dealing with Activities
supports various methods to configure the impending operation (not shown here). It is made such that all required arguments have to be
specified right away (i.e. (...)
), whereas all optional ones can be build up as desired.
The doit()
method performs the actual communication with the server and returns the respective result.
Usage
Setting up your Project
To use this library, you would put the following lines into your Cargo.toml
file:
[dependencies]
google-cloudkms1 = "*"
serde = "1"
serde_json = "1"
A complete example
extern crate hyper;
extern crate hyper_rustls;
extern crate google_cloudkms1 as cloudkms1;
use cloudkms1::{Result, Error};
use cloudkms1::{CloudKMS, FieldMask, hyper_rustls, hyper_util, yup_oauth2};
// Get an ApplicationSecret instance by some means. It contains the `client_id` and
// `client_secret`, among other things.
let secret: yup_oauth2::ApplicationSecret = Default::default();
// Instantiate the authenticator. It will choose a suitable authentication flow for you,
// unless you replace `None` with the desired Flow.
// Provide your own `AuthenticatorDelegate` to adjust the way it operates and get feedback about
// what's going on. You probably want to bring in your own `TokenStorage` to persist tokens and
// retrieve them from storage.
let auth = yup_oauth2::InstalledFlowAuthenticator::builder(
secret,
yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
).build().await.unwrap();
let client = hyper_util::client::legacy::Client::builder(
hyper_util::rt::TokioExecutor::new()
)
.build(
hyper_rustls::HttpsConnectorBuilder::new()
.with_native_roots()
.unwrap()
.https_or_http()
.enable_http1()
.build()
);
let mut hub = CloudKMS::new(client, auth);
// You can configure optional parameters by calling the respective setters at will, and
// execute the final call using `doit()`.
// Values shown here are possibly random and not representative !
let result = hub.projects().locations_ekm_config_get_iam_policy("resource")
.options_requested_policy_version(-33)
.doit().await;
match result {
Err(e) => match e {
// The Error enum provides details about what exactly happened.
// You can also just use its `Debug`, `Display` or `Error` traits
Error::HttpError(_)
|Error::Io(_)
|Error::MissingAPIKey
|Error::MissingToken(_)
|Error::Cancelled
|Error::UploadSizeLimitExceeded(_, _)
|Error::Failure(_)
|Error::BadRequest(_)
|Error::FieldClash(_)
|Error::JsonDecodeError(_, _) => println!("{}", e),
},
Ok(res) => println!("Success: {:?}", res),
}
Handling Errors
All errors produced by the system are provided either as Result enumeration as return value of the doit() methods, or handed as possibly intermediate results to either the Hub Delegate, or the Authenticator Delegate.
When delegates handle errors or intermediate values, they may have a chance to instruct the system to retry. This makes the system potentially resilient to all kinds of errors.
Uploads and Downloads
If a method supports downloads, the response body, which is part of the Result, should be
read by you to obtain the media.
If such a method also supports a Response Result, it will return that by default.
You can see it as meta-data for the actual media. To trigger a media download, you will have to set up the builder by making
this call: .param("alt", "media")
.
Methods supporting uploads can do so using up to 2 different protocols:
simple and resumable. The distinctiveness of each is represented by customized
doit(...)
methods, which are then named upload(...)
and upload_resumable(...)
respectively.
Customization and Callbacks
You may alter the way an doit()
method is called by providing a delegate to the
Method Builder before making the final doit()
call.
Respective methods will be called to provide progress information, as well as determine whether the system should
retry on failure.
The delegate trait is default-implemented, allowing you to customize it with minimal effort.
Optional Parts in Server-Requests
All structures provided by this library are made to be encodable and decodable via json. Optionals are used to indicate that partial requests are responses are valid. Most optionals are are considered Parts which are identifiable by name, which will be sent to the server to indicate either the set parts of the request or the desired parts in the response.
Builder Arguments
Using method builders, you are able to prepare an action call by repeatedly calling it's methods. These will always take a single argument, for which the following statements are true.
- PODs are handed by copy
- strings are passed as
&str
- request values are moved
Arguments will always be copied or cloned into the builder, to make them independent of their original life times.
Cargo Features
utoipa
- Add support for utoipa and deriveutoipa::ToSchema
on all the types. You'll have to import and register the required types in#[openapi(schemas(...))]
, otherwise the generatedopenapi
spec would be invalid.
License
The cloudkms1 library was generated by Sebastian Thiel, and is placed under the MIT license. You can read the full text at the repository's license file.
Dependencies
~20–31MB
~567K SLoC