2022-09-22
▼ ▲ cloudkms.projects.locations.ekmConfig.testIamPermissions
Flat Path : v1/projects/{projectsId}/locations/{locationsId}/ekmConfig:testIamPermissions
Scopes :
Path : v1/{+resource}:testIamPermissions
Description : Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning.
Parameters :
resource
Type : string
Required : Yes
Location : path
Pattern : ^projects/[^/]+/locations/[^/]+/ekmConfig$
Description : REQUIRED: The resource for which the policy detail is being requested. See [Resource names](https://cloud.google.com/apis/design/resource_names) for the appropriate value for this field.
HTTP Method : POST
Parameter Order : resource
▼ ▲ cloudkms.projects.locations.ekmConfig.getIamPolicy
Path : v1/{+resource}:getIamPolicy
Flat Path : v1/projects/{projectsId}/locations/{locationsId}/ekmConfig:getIamPolicy
Parameter Order : resource
HTTP Method : GET
Parameters :
resource
Type : string
Pattern : ^projects/[^/]+/locations/[^/]+/ekmConfig$
Location : path
Description : REQUIRED: The resource for which the policy is being requested. See [Resource names](https://cloud.google.com/apis/design/resource_names) for the appropriate value for this field.
Required : Yes
options.requestedPolicyVersion
Format : int32
Location : query
Description : Optional. The maximum policy version that will be used to format the policy. Valid values are 0, 1, and 3. Requests specifying an invalid value will be rejected. Requests for policies with any conditional role bindings must specify version 3. Policies with no conditional role bindings may specify any valid value or leave the field unset. The policy in the response might use the policy version that you specified, or it might use a lower policy version. For example, if you specify version 3, but the policy has no conditional role bindings, the response uses version 1. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
Type : integer
Description : Gets the access control policy for a resource. Returns an empty policy if the resource exists and does not have a policy set.
Scopes :
▼ ▲ cloudkms.projects.locations.ekmConfig.setIamPolicy
Path : v1/{+resource}:setIamPolicy
Parameter Order : resource
Flat Path : v1/projects/{projectsId}/locations/{locationsId}/ekmConfig:setIamPolicy
HTTP Method : POST
Description : Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors.
Parameters :
resource
Type : string
Description : REQUIRED: The resource for which the policy is being specified. See [Resource names](https://cloud.google.com/apis/design/resource_names) for the appropriate value for this field.
Location : path
Required : Yes
Pattern : ^projects/[^/]+/locations/[^/]+/ekmConfig$
Scopes :