File: //snap/google-cloud-cli/394/lib/surface/kms/ekm_connections/create.py
# -*- coding: utf-8 -*- #
# Copyright 2022 Google LLC. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Create a new ekm connection."""
from __future__ import absolute_import
from __future__ import division
from __future__ import unicode_literals
from googlecloudsdk.api_lib.cloudkms import base as cloudkms_base
from googlecloudsdk.calliope import base
from googlecloudsdk.calliope import exceptions
from googlecloudsdk.command_lib.kms import certs
from googlecloudsdk.command_lib.kms import flags
from googlecloudsdk.command_lib.kms import maps
from googlecloudsdk.command_lib.kms import resource_args
class Create(base.CreateCommand):
r"""Create a new ekm connection.
Creates a new connection within the given location.
## EXAMPLES
The following command creates an ekm connection named `laplace` within the
location `us-central1`:
$ {command} laplace \
--location=us-central1 \
--service-directory-service="foo" \
--endpoint-filter="foo > bar" \
--hostname="hostname.foo" \
--server-certificates-files=foo.pem,bar.pem
The following command creates an ekm connection named `laplace` within the
location `us-central1` in `cloud-kms` key management mode with the required
crypto-space-path :
$ {command} laplace \
--location=us-central1 \
--service-directory-service="foo" \
--endpoint-filter="foo > bar" \
--hostname="hostname.foo" \
--key-management-mode=cloud-kms
--crypto-space-path="foo"
--server-certificates-files=foo.pem,bar.pem
"""
@staticmethod
def Args(parser):
resource_args.AddKmsEkmConnectionResourceArgForKMS(parser, True,
'ekm_connection')
flags.AddServiceDirectoryServiceFlag(parser, True)
flags.AddEndpointFilterFlag(parser)
flags.AddHostnameFlag(parser, True)
flags.AddServerCertificatesFilesFlag(parser, True)
flags.AddKeyManagementModeFlags(parser)
parser.display_info.AddCacheUpdater(flags.EkmConnectionCompleter)
def _CreateRequest(self, args):
messages = cloudkms_base.GetMessagesModule()
ekm_connection_ref = args.CONCEPTS.ekm_connection.Parse()
parent_ref = ekm_connection_ref.Parent()
if args.key_management_mode == 'cloud-kms':
if not args.crypto_space_path:
raise exceptions.RequiredArgumentException(
'--crypto-space-path',
'Must be supplied when --key-management-mode is cloud-kms.')
certificate_list = []
for cert_file in args.server_certificates_files:
try:
certificate_list.append(
messages.Certificate(rawDer=certs.GetDerCertificate(cert_file)))
except Exception as e:
raise exceptions.BadArgumentException(
'--server-certificates-files',
'Error while attempting to read file {} : {}'.format(cert_file, e))
req = messages.CloudkmsProjectsLocationsEkmConnectionsCreateRequest(
parent=parent_ref.RelativeName(),
ekmConnectionId=ekm_connection_ref.Name(),
ekmConnection=messages.EkmConnection(
keyManagementMode=maps.KEY_MANAGEMENT_MODE_MAPPER.GetEnumForChoice(
args.key_management_mode),
cryptoSpacePath=args.crypto_space_path,
serviceResolvers=[
messages.ServiceResolver(
serviceDirectoryService=args.service_directory_service,
endpointFilter=args.endpoint_filter,
hostname=args.hostname,
serverCertificates=certificate_list)
]))
return req
def Run(self, args):
client = cloudkms_base.GetClientInstance()
return client.projects_locations_ekmConnections.Create(
self._CreateRequest(args))