Struct cloud_storage::hmac_key::HmacKey [−][src]
Expand description
The HmacKey resource represents an HMAC key within Cloud Storage. The resource consists of a
secret and HmacMeta. HMAC keys can be used as credentials for service accounts. For more
information, see HMAC Keys.
Note that the HmacKey resource is only returned when you use HmacKey::create. Other
methods, such as HmacKey::read, return the metadata portion of the HMAC key resource.
Fields
kind: StringThe kind of item this is. For HMAC keys, this is always storage#hmacKey.
metadata: HmacMetaHMAC key metadata.
secret: StringHMAC secret key material.
Implementations
impl HmacKey[src]
impl HmacKey[src]pub async fn create() -> Result<Self>[src]
pub async fn create() -> Result<Self>[src]Creates a new HMAC key for the specified service account.
The authenticated user must have storage.hmacKeys.create permission for the project in
which the key will be created.
For general information about HMAC keys in Cloud Storage, see HMAC Keys.
Example
use cloud_storage::hmac_key::HmacKey; let hmac_key = HmacKey::create().await?;
pub fn create_sync() -> Result<Self>[src]
pub fn create_sync() -> Result<Self>[src]The synchronous equivalent of HmacKey::create.
Features
This function requires that the feature flag sync is enabled in Cargo.toml.
pub async fn list() -> Result<Vec<HmacMeta>>[src]
pub async fn list() -> Result<Vec<HmacMeta>>[src]Retrieves a list of HMAC keys matching the criteria. Since the HmacKey is secret, this does
not return a HmacKey, but a HmacMeta. This is a redacted version of a HmacKey, but
with the secret data omitted.
The authenticated user must have storage.hmacKeys.list permission for the project in which
the key exists.
For general information about HMAC keys in Cloud Storage, see HMAC Keys.
Example
use cloud_storage::hmac_key::HmacKey; let all_hmac_keys = HmacKey::list().await?;
pub fn list_sync() -> Result<Vec<HmacMeta>>[src]
pub fn list_sync() -> Result<Vec<HmacMeta>>[src]The synchronous equivalent of HmacKey::list.
Features
This function requires that the feature flag sync is enabled in Cargo.toml.
pub async fn read(access_id: &str) -> Result<HmacMeta>[src]
pub async fn read(access_id: &str) -> Result<HmacMeta>[src]Retrieves an HMAC key’s metadata. Since the HmacKey is secret, this does not return a
HmacKey, but a HmacMeta. This is a redacted version of a HmacKey, but with the secret
data omitted.
The authenticated user must have storage.hmacKeys.get permission for the project in which
the key exists.
For general information about HMAC keys in Cloud Storage, see HMAC Keys.
Example
use cloud_storage::hmac_key::HmacKey; let key = HmacKey::read("some identifier").await?;
pub fn read_sync(access_id: &str) -> Result<HmacMeta>[src]
pub fn read_sync(access_id: &str) -> Result<HmacMeta>[src]The synchronous equivalent of HmacKey::read.
Features
This function requires that the feature flag sync is enabled in Cargo.toml.
pub async fn update(access_id: &str, state: HmacState) -> Result<HmacMeta>[src]
pub async fn update(access_id: &str, state: HmacState) -> Result<HmacMeta>[src]Updates the state of an HMAC key. See the HMAC Key resource descriptor for valid states.
Since the HmacKey is secret, this does not return a HmacKey, but a HmacMeta. This is a
redacted version of a HmacKey, but with the secret data omitted.
The authenticated user must have storage.hmacKeys.update permission for the project in
which the key exists.
For general information about HMAC keys in Cloud Storage, see HMAC Keys.
Example
use cloud_storage::hmac_key::{HmacKey, HmacState}; let key = HmacKey::update("your key", HmacState::Active).await?;
pub fn update_sync(access_id: &str, state: HmacState) -> Result<HmacMeta>[src]
pub fn update_sync(access_id: &str, state: HmacState) -> Result<HmacMeta>[src]The synchronous equivalent of HmacKey::update.
Features
This function requires that the feature flag sync is enabled in Cargo.toml.
pub async fn delete(access_id: &str) -> Result<()>[src]
pub async fn delete(access_id: &str) -> Result<()>[src]Deletes an HMAC key. Note that a key must be set to Inactive first.
The authenticated user must have storage.hmacKeys.delete permission for the project in which the key exists.
For general information about HMAC keys in Cloud Storage, see HMAC Keys.
Example
use cloud_storage::hmac_key::{HmacKey, HmacState}; let key = HmacKey::update("your key", HmacState::Inactive).await?; // this is required. HmacKey::delete(&key.access_id).await?;
pub fn delete_sync(access_id: &str) -> Result<()>[src]
pub fn delete_sync(access_id: &str) -> Result<()>[src]The synchronous equivalent of HmacKey::delete.
Trait Implementations
impl<'de> Deserialize<'de> for HmacKey[src]
impl<'de> Deserialize<'de> for HmacKey[src]fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>, [src]
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>, [src]Deserialize this value from the given Serde deserializer. Read more
impl StructuralPartialEq for HmacKey[src]
Auto Trait Implementations
impl RefUnwindSafe for HmacKey
impl Send for HmacKey
impl Sync for HmacKey
impl Unpin for HmacKey
impl UnwindSafe for HmacKey
Blanket Implementations
impl<T> BorrowMut<T> for T where
T: ?Sized, [src]
impl<T> BorrowMut<T> for T where
T: ?Sized, [src]pub fn borrow_mut(&mut self) -> &mut T[src]
pub fn borrow_mut(&mut self) -> &mut T[src]Mutably borrows from an owned value. Read more
impl<T> Instrument for T[src]
impl<T> Instrument for T[src]fn instrument(self, span: Span) -> Instrumented<Self>[src]
fn instrument(self, span: Span) -> Instrumented<Self>[src]Instruments this type with the provided Span, returning an
Instrumented wrapper. Read more
fn in_current_span(self) -> Instrumented<Self>[src]
fn in_current_span(self) -> Instrumented<Self>[src]impl<T> DeserializeOwned for T where
T: for<'de> Deserialize<'de>, [src]
T: for<'de> Deserialize<'de>,