#google-cloud #google #google-api #cloudkms

app google-cloudkms1-cli

A complete library to interact with Cloud KMS (protocol v1)

13 stable releases (4 major)

6.0.0+20240621 Oct 15, 2024
5.0.4+20240219 Mar 5, 2024
3.1.0+20220225 Apr 26, 2022
2.0.4+20210318 Apr 15, 2021
1.0.6+20170919 Sep 27, 2017

#2823 in Web programming

MIT license

1.5MB
26K SLoC

The cloudkms1 command-line interface (CLI) allows to use most features of the Google Cloud KMS service from the comfort of your terminal.

By default all output is printed to standard out, but flags can be set to direct it into a file independent of your shell's capabilities. Errors will be printed to standard error, and cause the program's exit code to be non-zero.

If data-structures are requested, these will be returned as pretty-printed JSON, to be useful as input to other tools.

Everything else about the Cloud KMS API can be found at the official documentation site.

Installation and Source Code

Install the command-line interface with cargo using:

cargo install google-cloudkms1-cli

Find the source code on github.

Usage

This documentation was generated from the Cloud KMS API at revision 20240621. The CLI is at version 6.0.0.

cloudkms1 [options]
        folders
                get-autokey-config <name> [-p <v>]... [-o <out>]
                update-autokey-config <name> (-r <kv>)... [-p <v>]... [-o <out>]
        projects
                locations-ekm-config-get-iam-policy <resource> [-p <v>]... [-o <out>]
                locations-ekm-config-set-iam-policy <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-ekm-config-test-iam-permissions <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-ekm-connections-create <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-ekm-connections-get <name> [-p <v>]... [-o <out>]
                locations-ekm-connections-get-iam-policy <resource> [-p <v>]... [-o <out>]
                locations-ekm-connections-list <parent> [-p <v>]... [-o <out>]
                locations-ekm-connections-patch <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-ekm-connections-set-iam-policy <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-ekm-connections-test-iam-permissions <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-ekm-connections-verify-connectivity <name> [-p <v>]... [-o <out>]
                locations-generate-random-bytes <location> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-get <name> [-p <v>]... [-o <out>]
                locations-get-ekm-config <name> [-p <v>]... [-o <out>]
                locations-key-handles-create <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-handles-get <name> [-p <v>]... [-o <out>]
                locations-key-handles-list <parent> [-p <v>]... [-o <out>]
                locations-key-rings-create <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-create <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-asymmetric-decrypt <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-asymmetric-sign <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-create <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-destroy <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-get <name> [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-get-public-key <name> [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-import <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-list <parent> [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-mac-sign <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-mac-verify <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-patch <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-raw-decrypt <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-raw-encrypt <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-crypto-key-versions-restore <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-decrypt <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-encrypt <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-get <name> [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-get-iam-policy <resource> [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-list <parent> [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-patch <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-set-iam-policy <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-test-iam-permissions <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-crypto-keys-update-primary-version <name> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-get <name> [-p <v>]... [-o <out>]
                locations-key-rings-get-iam-policy <resource> [-p <v>]... [-o <out>]
                locations-key-rings-import-jobs-create <parent> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-import-jobs-get <name> [-p <v>]... [-o <out>]
                locations-key-rings-import-jobs-get-iam-policy <resource> [-p <v>]... [-o <out>]
                locations-key-rings-import-jobs-list <parent> [-p <v>]... [-o <out>]
                locations-key-rings-import-jobs-set-iam-policy <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-import-jobs-test-iam-permissions <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-list <parent> [-p <v>]... [-o <out>]
                locations-key-rings-set-iam-policy <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-key-rings-test-iam-permissions <resource> (-r <kv>)... [-p <v>]... [-o <out>]
                locations-list <name> [-p <v>]... [-o <out>]
                locations-operations-get <name> [-p <v>]... [-o <out>]
                locations-update-ekm-config <name> (-r <kv>)... [-p <v>]... [-o <out>]
                show-effective-autokey-config <parent> [-p <v>]... [-o <out>]
  cloudkms1 --help

Configuration:
  [--scope <url>]...
            Specify the authentication a method should be executed in. Each scope
            requires the user to grant this application permission to use it.
            If unset, it defaults to the shortest scope url for a particular method.
  --config-dir <folder>
            A directory into which we will store our persistent data. Defaults to
            a user-writable directory that we will create during the first invocation.
            [default: ~/.google-service-cli]

Configuration

The program will store all persistent data in the ~/.google-service-cli directory in JSON files prefixed with cloudkms1-. You can change the directory used to store configuration with the --config-dir flag on a per-invocation basis.

More information about the various kinds of persistent data are given in the following paragraphs.

Authentication

Most APIs require a user to authenticate any request. If this is the case, the scope determines the set of permissions granted. The granularity of these is usually no more than read-only or full-access.

If not set, the system will automatically select the smallest feasible scope, e.g. when invoking a method that is read-only, it will ask only for a read-only scope. You may use the --scope flag to specify a scope directly. All applicable scopes are documented in the respective method's CLI documentation.

The first time a scope is used, the user is asked for permission. Follow the instructions given by the CLI to grant permissions, or to decline.

If a scope was authenticated by the user, the respective information will be stored as JSON in the configuration directory, e.g. ~/.google-service-cli/cloudkms1-token-<scope-hash>.json. No manual management of these tokens is necessary.

To revoke granted authentication, please refer to the official documentation.

Application Secrets

In order to allow any application to use Google services, it will need to be registered using the Google Developer Console. APIs the application may use are then enabled for it one by one. Most APIs can be used for free and have a daily quota.

To allow more comfortable usage of the CLI without forcing anyone to register an own application, the CLI comes with a default application secret that is configured accordingly. This also means that heavy usage all around the world may deplete the daily quota.

You can workaround this limitation by putting your own secrets file at this location: ~/.google-service-cli/cloudkms1-secret.json, assuming that the required cloudkms API was enabled for it. Such a secret file can be downloaded in the Google Developer Console at APIs & auth -> Credentials -> Download JSON and used as is.

Learn more about how to setup Google projects and enable APIs using the official documentation.

Debugging

Even though the CLI does its best to provide usable error messages, sometimes it might be desirable to know what exactly led to a particular issue. This is done by allowing all client-server communication to be output to standard error as-is.

The --debug flag will print errors using the Debug representation to standard error.

You may consider redirecting standard error into a file for ease of use, e.g. cloudkms1 --debug <resource> <method> [options] 2>debug.txt.

Dependencies

~22–33MB
~600K SLoC