Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 214d212

Browse files
committedJun 6, 2023
feat(iam): update the api
#### iam:v1 The following keys were added: - schemas.Oidc.properties.jwksJson.type (Total Keys: 1)
1 parent 886852c commit 214d212

File tree

4 files changed

+11
-3
lines changed

4 files changed

+11
-3
lines changed
 

‎docs/dyn/iam_v1.projects.locations.workloadIdentityPools.providers.html

+4
Original file line numberDiff line numberDiff line change
@@ -140,6 +140,7 @@ <h3>Method Details</h3>
140140
&quot;A String&quot;,
141141
],
142142
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URL. Must be an HTTPS endpoint.
143+
&quot;jwksJson&quot;: &quot;A String&quot;, # Optional. OIDC JWKs in JSON String format. For details on the definition of a JWK, see https://tools.ietf.org/html/rfc7517. If not set, the `jwks_uri` from the discovery document(fetched from the .well-known path of the `issuer_uri`) will be used. Currently, RSA and EC asymmetric keys are supported. The JWK must use following format and include only the following fields: { &quot;keys&quot;: [ { &quot;kty&quot;: &quot;RSA/EC&quot;, &quot;alg&quot;: &quot;&quot;, &quot;use&quot;: &quot;sig&quot;, &quot;kid&quot;: &quot;&quot;, &quot;n&quot;: &quot;&quot;, &quot;e&quot;: &quot;&quot;, &quot;x&quot;: &quot;&quot;, &quot;y&quot;: &quot;&quot;, &quot;crv&quot;: &quot;&quot; } ] }
143144
},
144145
&quot;saml&quot;: { # Represents an SAML 2.0 identity provider. # An SAML 2.0 identity provider.
145146
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://www.oasis-open.org/committees/download.php/56785/sstc-saml-metadata-errata-2.0-wd-05.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Upto 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at lease one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata
@@ -243,6 +244,7 @@ <h3>Method Details</h3>
243244
&quot;A String&quot;,
244245
],
245246
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URL. Must be an HTTPS endpoint.
247+
&quot;jwksJson&quot;: &quot;A String&quot;, # Optional. OIDC JWKs in JSON String format. For details on the definition of a JWK, see https://tools.ietf.org/html/rfc7517. If not set, the `jwks_uri` from the discovery document(fetched from the .well-known path of the `issuer_uri`) will be used. Currently, RSA and EC asymmetric keys are supported. The JWK must use following format and include only the following fields: { &quot;keys&quot;: [ { &quot;kty&quot;: &quot;RSA/EC&quot;, &quot;alg&quot;: &quot;&quot;, &quot;use&quot;: &quot;sig&quot;, &quot;kid&quot;: &quot;&quot;, &quot;n&quot;: &quot;&quot;, &quot;e&quot;: &quot;&quot;, &quot;x&quot;: &quot;&quot;, &quot;y&quot;: &quot;&quot;, &quot;crv&quot;: &quot;&quot; } ] }
246248
},
247249
&quot;saml&quot;: { # Represents an SAML 2.0 identity provider. # An SAML 2.0 identity provider.
248250
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://www.oasis-open.org/committees/download.php/56785/sstc-saml-metadata-errata-2.0-wd-05.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Upto 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at lease one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata
@@ -288,6 +290,7 @@ <h3>Method Details</h3>
288290
&quot;A String&quot;,
289291
],
290292
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URL. Must be an HTTPS endpoint.
293+
&quot;jwksJson&quot;: &quot;A String&quot;, # Optional. OIDC JWKs in JSON String format. For details on the definition of a JWK, see https://tools.ietf.org/html/rfc7517. If not set, the `jwks_uri` from the discovery document(fetched from the .well-known path of the `issuer_uri`) will be used. Currently, RSA and EC asymmetric keys are supported. The JWK must use following format and include only the following fields: { &quot;keys&quot;: [ { &quot;kty&quot;: &quot;RSA/EC&quot;, &quot;alg&quot;: &quot;&quot;, &quot;use&quot;: &quot;sig&quot;, &quot;kid&quot;: &quot;&quot;, &quot;n&quot;: &quot;&quot;, &quot;e&quot;: &quot;&quot;, &quot;x&quot;: &quot;&quot;, &quot;y&quot;: &quot;&quot;, &quot;crv&quot;: &quot;&quot; } ] }
291294
},
292295
&quot;saml&quot;: { # Represents an SAML 2.0 identity provider. # An SAML 2.0 identity provider.
293296
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://www.oasis-open.org/committees/download.php/56785/sstc-saml-metadata-errata-2.0-wd-05.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Upto 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at lease one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata
@@ -338,6 +341,7 @@ <h3>Method Details</h3>
338341
&quot;A String&quot;,
339342
],
340343
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URL. Must be an HTTPS endpoint.
344+
&quot;jwksJson&quot;: &quot;A String&quot;, # Optional. OIDC JWKs in JSON String format. For details on the definition of a JWK, see https://tools.ietf.org/html/rfc7517. If not set, the `jwks_uri` from the discovery document(fetched from the .well-known path of the `issuer_uri`) will be used. Currently, RSA and EC asymmetric keys are supported. The JWK must use following format and include only the following fields: { &quot;keys&quot;: [ { &quot;kty&quot;: &quot;RSA/EC&quot;, &quot;alg&quot;: &quot;&quot;, &quot;use&quot;: &quot;sig&quot;, &quot;kid&quot;: &quot;&quot;, &quot;n&quot;: &quot;&quot;, &quot;e&quot;: &quot;&quot;, &quot;x&quot;: &quot;&quot;, &quot;y&quot;: &quot;&quot;, &quot;crv&quot;: &quot;&quot; } ] }
341345
},
342346
&quot;saml&quot;: { # Represents an SAML 2.0 identity provider. # An SAML 2.0 identity provider.
343347
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://www.oasis-open.org/committees/download.php/56785/sstc-saml-metadata-errata-2.0-wd-05.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Upto 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at lease one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata

‎googleapiclient/discovery_cache/documents/iam.v1.json

+5-1
Original file line numberDiff line numberDiff line change
@@ -2751,7 +2751,7 @@
27512751
}
27522752
}
27532753
},
2754-
"revision": "20230511",
2754+
"revision": "20230530",
27552755
"rootUrl": "https://iam.googleapis.com/",
27562756
"schemas": {
27572757
"AdminAuditData": {
@@ -3413,6 +3413,10 @@
34133413
"issuerUri": {
34143414
"description": "Required. The OIDC issuer URL. Must be an HTTPS endpoint.",
34153415
"type": "string"
3416+
},
3417+
"jwksJson": {
3418+
"description": "Optional. OIDC JWKs in JSON String format. For details on the definition of a JWK, see https://tools.ietf.org/html/rfc7517. If not set, the `jwks_uri` from the discovery document(fetched from the .well-known path of the `issuer_uri`) will be used. Currently, RSA and EC asymmetric keys are supported. The JWK must use following format and include only the following fields: { \"keys\": [ { \"kty\": \"RSA/EC\", \"alg\": \"\", \"use\": \"sig\", \"kid\": \"\", \"n\": \"\", \"e\": \"\", \"x\": \"\", \"y\": \"\", \"crv\": \"\" } ] }",
3419+
"type": "string"
34163420
}
34173421
},
34183422
"type": "object"

‎googleapiclient/discovery_cache/documents/iam.v2.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -293,7 +293,7 @@
293293
}
294294
}
295295
},
296-
"revision": "20230511",
296+
"revision": "20230530",
297297
"rootUrl": "https://iam.googleapis.com/",
298298
"schemas": {
299299
"GoogleIamAdminV1AuditData": {

‎googleapiclient/discovery_cache/documents/iam.v2beta.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -293,7 +293,7 @@
293293
}
294294
}
295295
},
296-
"revision": "20230511",
296+
"revision": "20230530",
297297
"rootUrl": "https://iam.googleapis.com/",
298298
"schemas": {
299299
"GoogleIamAdminV1AuditData": {

0 commit comments

Comments
 (0)
Please sign in to comment.