google-cloud-kms-v1 0.15.0 → 0.17.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,64 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2023 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "gapic/rest"
20
+ require "gapic/config"
21
+ require "gapic/config/method"
22
+
23
+ require "google/cloud/kms/v1/version"
24
+ require "google/cloud/kms/v1/bindings_override"
25
+
26
+ require "google/cloud/kms/v1/key_management_service/credentials"
27
+ require "google/cloud/kms/v1/key_management_service/paths"
28
+ require "google/cloud/kms/v1/key_management_service/rest/client"
29
+
30
+ module Google
31
+ module Cloud
32
+ module Kms
33
+ module V1
34
+ ##
35
+ # Google Cloud Key Management Service
36
+ #
37
+ # Manages cryptographic keys and operations using those keys. Implements a REST
38
+ # model with the following objects:
39
+ #
40
+ # * {::Google::Cloud::Kms::V1::KeyRing KeyRing}
41
+ # * {::Google::Cloud::Kms::V1::CryptoKey CryptoKey}
42
+ # * {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}
43
+ # * {::Google::Cloud::Kms::V1::ImportJob ImportJob}
44
+ #
45
+ # If you are using manual gRPC libraries, see
46
+ # [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc).
47
+ #
48
+ # To load this service and instantiate a REST client:
49
+ #
50
+ # require "google/cloud/kms/v1/key_management_service/rest"
51
+ # client = ::Google::Cloud::Kms::V1::KeyManagementService::Rest::Client.new
52
+ #
53
+ module KeyManagementService
54
+ # Client for the REST transport
55
+ module Rest
56
+ end
57
+ end
58
+ end
59
+ end
60
+ end
61
+ end
62
+
63
+ helper_path = ::File.join __dir__, "rest", "helpers.rb"
64
+ require "google/cloud/kms/v1/key_management_service/rest/helpers" if ::File.file? helper_path
@@ -25,6 +25,7 @@ require "google/cloud/kms/v1/version"
25
25
  require "google/cloud/kms/v1/key_management_service/credentials"
26
26
  require "google/cloud/kms/v1/key_management_service/paths"
27
27
  require "google/cloud/kms/v1/key_management_service/client"
28
+ require "google/cloud/kms/v1/key_management_service/rest"
28
29
 
29
30
  module Google
30
31
  module Cloud
@@ -44,11 +45,16 @@ module Google
44
45
  # If you are using manual gRPC libraries, see
45
46
  # [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc).
46
47
  #
47
- # To load this service and instantiate a client:
48
+ # @example Load this service and instantiate a gRPC client
48
49
  #
49
50
  # require "google/cloud/kms/v1/key_management_service"
50
51
  # client = ::Google::Cloud::Kms::V1::KeyManagementService::Client.new
51
52
  #
53
+ # @example Load this service and instantiate a REST client
54
+ #
55
+ # require "google/cloud/kms/v1/key_management_service/rest"
56
+ # client = ::Google::Cloud::Kms::V1::KeyManagementService::Rest::Client.new
57
+ #
52
58
  module KeyManagementService
53
59
  end
54
60
  end
@@ -143,6 +143,10 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
143
143
  value :IMPORT_METHOD_UNSPECIFIED, 0
144
144
  value :RSA_OAEP_3072_SHA1_AES_256, 1
145
145
  value :RSA_OAEP_4096_SHA1_AES_256, 2
146
+ value :RSA_OAEP_3072_SHA256_AES_256, 3
147
+ value :RSA_OAEP_4096_SHA256_AES_256, 4
148
+ value :RSA_OAEP_3072_SHA256, 5
149
+ value :RSA_OAEP_4096_SHA256, 6
146
150
  end
147
151
  add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
148
152
  value :IMPORT_JOB_STATE_UNSPECIFIED, 0
@@ -0,0 +1,39 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2023 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "google/cloud/kms/v1/ekm_service/rest"
20
+ require "google/cloud/kms/v1/key_management_service/rest"
21
+ require "google/cloud/kms/v1/bindings_override"
22
+ require "google/cloud/kms/v1/version"
23
+
24
+ module Google
25
+ module Cloud
26
+ module Kms
27
+ ##
28
+ # To load just the REST part of this package, including all its services, and instantiate a REST client:
29
+ #
30
+ # @example
31
+ #
32
+ # require "google/cloud/kms/v1/rest"
33
+ # client = ::Google::Cloud::Kms::V1::EkmService::Rest::Client.new
34
+ #
35
+ module V1
36
+ end
37
+ end
38
+ end
39
+ end
@@ -98,6 +98,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
98
98
  optional :crypto_key_version, :string, 6
99
99
  optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
100
100
  optional :import_job, :string, 4
101
+ optional :wrapped_key, :bytes, 8
101
102
  oneof :wrapped_key_material do
102
103
  optional :rsa_aes_wrapped_key, :bytes, 5
103
104
  end
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module Kms
23
23
  module V1
24
- VERSION = "0.15.0"
24
+ VERSION = "0.17.0"
25
25
  end
26
26
  end
27
27
  end
@@ -24,13 +24,18 @@ module Google
24
24
  module Cloud
25
25
  module Kms
26
26
  ##
27
- # To load this package, including all its services, and instantiate a client:
27
+ # API client module.
28
28
  #
29
- # @example
29
+ # @example Load this package, including all its services, and instantiate a gRPC client
30
30
  #
31
31
  # require "google/cloud/kms/v1"
32
32
  # client = ::Google::Cloud::Kms::V1::EkmService::Client.new
33
33
  #
34
+ # @example Load this package, including all its services, and instantiate a REST client
35
+ #
36
+ # require "google/cloud/kms/v1"
37
+ # client = ::Google::Cloud::Kms::V1::EkmService::Rest::Client.new
38
+ #
34
39
  module V1
35
40
  end
36
41
  end
@@ -21,7 +21,8 @@ module Google
21
21
  module Cloud
22
22
  module Kms
23
23
  module V1
24
- # Request message for [KeyManagementService.ListEkmConnections][].
24
+ # Request message for
25
+ # {::Google::Cloud::Kms::V1::EkmService::Client#list_ekm_connections EkmService.ListEkmConnections}.
25
26
  # @!attribute [rw] parent
26
27
  # @return [::String]
27
28
  # Required. The resource name of the location associated with the
@@ -57,7 +58,8 @@ module Google
57
58
  extend ::Google::Protobuf::MessageExts::ClassMethods
58
59
  end
59
60
 
60
- # Response message for [KeyManagementService.ListEkmConnections][].
61
+ # Response message for
62
+ # {::Google::Cloud::Kms::V1::EkmService::Client#list_ekm_connections EkmService.ListEkmConnections}.
61
63
  # @!attribute [rw] ekm_connections
62
64
  # @return [::Array<::Google::Cloud::Kms::V1::EkmConnection>]
63
65
  # The list of {::Google::Cloud::Kms::V1::EkmConnection EkmConnections}.
@@ -75,7 +77,8 @@ module Google
75
77
  extend ::Google::Protobuf::MessageExts::ClassMethods
76
78
  end
77
79
 
78
- # Request message for [KeyManagementService.GetEkmConnection][].
80
+ # Request message for
81
+ # {::Google::Cloud::Kms::V1::EkmService::Client#get_ekm_connection EkmService.GetEkmConnection}.
79
82
  # @!attribute [rw] name
80
83
  # @return [::String]
81
84
  # Required. The {::Google::Cloud::Kms::V1::EkmConnection#name name} of the
@@ -85,7 +88,8 @@ module Google
85
88
  extend ::Google::Protobuf::MessageExts::ClassMethods
86
89
  end
87
90
 
88
- # Request message for [KeyManagementService.CreateEkmConnection][].
91
+ # Request message for
92
+ # {::Google::Cloud::Kms::V1::EkmService::Client#create_ekm_connection EkmService.CreateEkmConnection}.
89
93
  # @!attribute [rw] parent
90
94
  # @return [::String]
91
95
  # Required. The resource name of the location associated with the
@@ -104,7 +108,8 @@ module Google
104
108
  extend ::Google::Protobuf::MessageExts::ClassMethods
105
109
  end
106
110
 
107
- # Request message for [KeyManagementService.UpdateEkmConnection][].
111
+ # Request message for
112
+ # {::Google::Cloud::Kms::V1::EkmService::Client#update_ekm_connection EkmService.UpdateEkmConnection}.
108
113
  # @!attribute [rw] ekm_connection
109
114
  # @return [::Google::Cloud::Kms::V1::EkmConnection]
110
115
  # Required. {::Google::Cloud::Kms::V1::EkmConnection EkmConnection} with updated
@@ -185,9 +190,8 @@ module Google
185
190
  # supported.
186
191
  # @!attribute [rw] etag
187
192
  # @return [::String]
188
- # This checksum is computed by the server based on the value of other fields,
189
- # and may be sent on update requests to ensure the client has an up-to-date
190
- # value before proceeding.
193
+ # Optional. Etag of the currently stored
194
+ # {::Google::Cloud::Kms::V1::EkmConnection EkmConnection}.
191
195
  class EkmConnection
192
196
  include ::Google::Protobuf::MessageExts
193
197
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -214,7 +218,8 @@ module Google
214
218
  # @!attribute [rw] server_certificates
215
219
  # @return [::Array<::Google::Cloud::Kms::V1::Certificate>]
216
220
  # Required. A list of leaf server certificates used to authenticate HTTPS
217
- # connections to the EKM replica.
221
+ # connections to the EKM replica. Currently, a maximum of 10
222
+ # {::Google::Cloud::Kms::V1::Certificate Certificate} is supported.
218
223
  class ServiceResolver
219
224
  include ::Google::Protobuf::MessageExts
220
225
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -254,6 +254,9 @@ module Google
254
254
 
255
255
  # Cavium HSM attestation compressed with gzip. Note that this format is
256
256
  # defined by Cavium and subject to change at any time.
257
+ #
258
+ # See
259
+ # https://www.marvell.com/products/security-solutions/nitrox-hs-adapters/software-key-attestation.html.
257
260
  CAVIUM_V1_COMPRESSED = 3
258
261
 
259
262
  # Cavium HSM attestation V2 compressed with gzip. This is a new format
@@ -736,6 +739,34 @@ module Google
736
739
  # [RSA AES key wrap
737
740
  # mechanism](http://docs.oasis-open.org/pkcs11/pkcs11-curr/v2.40/cos01/pkcs11-curr-v2.40-cos01.html#_Toc408226908).
738
741
  RSA_OAEP_4096_SHA1_AES_256 = 2
742
+
743
+ # This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping
744
+ # scheme defined in the PKCS #11 standard. In summary, this involves
745
+ # wrapping the raw key with an ephemeral AES key, and wrapping the
746
+ # ephemeral AES key with a 3072 bit RSA key. For more details, see
747
+ # [RSA AES key wrap
748
+ # mechanism](http://docs.oasis-open.org/pkcs11/pkcs11-curr/v2.40/cos01/pkcs11-curr-v2.40-cos01.html#_Toc408226908).
749
+ RSA_OAEP_3072_SHA256_AES_256 = 3
750
+
751
+ # This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping
752
+ # scheme defined in the PKCS #11 standard. In summary, this involves
753
+ # wrapping the raw key with an ephemeral AES key, and wrapping the
754
+ # ephemeral AES key with a 4096 bit RSA key. For more details, see
755
+ # [RSA AES key wrap
756
+ # mechanism](http://docs.oasis-open.org/pkcs11/pkcs11-curr/v2.40/cos01/pkcs11-curr-v2.40-cos01.html#_Toc408226908).
757
+ RSA_OAEP_4096_SHA256_AES_256 = 4
758
+
759
+ # This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The
760
+ # key material to be imported is wrapped directly with the RSA key. Due
761
+ # to technical limitations of RSA wrapping, this method cannot be used to
762
+ # wrap RSA keys for import.
763
+ RSA_OAEP_3072_SHA256 = 5
764
+
765
+ # This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The
766
+ # key material to be imported is wrapped directly with the RSA key. Due
767
+ # to technical limitations of RSA wrapping, this method cannot be used to
768
+ # wrap RSA keys for import.
769
+ RSA_OAEP_4096_SHA256 = 6
739
770
  end
740
771
 
741
772
  # The state of the {::Google::Cloud::Kms::V1::ImportJob ImportJob}, indicating if
@@ -413,32 +413,53 @@ module Google
413
413
  # Required. The {::Google::Cloud::Kms::V1::ImportJob#name name} of the
414
414
  # {::Google::Cloud::Kms::V1::ImportJob ImportJob} that was used to wrap this key
415
415
  # material.
416
- # @!attribute [rw] rsa_aes_wrapped_key
416
+ # @!attribute [rw] wrapped_key
417
417
  # @return [::String]
418
- # Wrapped key material produced with
419
- # {::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_3072_SHA1_AES_256 RSA_OAEP_3072_SHA1_AES_256}
418
+ # Optional. The wrapped key material to import.
419
+ #
420
+ # Before wrapping, key material must be formatted. If importing symmetric key
421
+ # material, the expected key material format is plain bytes. If importing
422
+ # asymmetric key material, the expected key material format is PKCS#8-encoded
423
+ # DER (the PrivateKeyInfo structure from RFC 5208).
424
+ #
425
+ # When wrapping with import methods
426
+ # ({::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_3072_SHA1_AES_256 RSA_OAEP_3072_SHA1_AES_256}
420
427
  # or
421
- # {::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_4096_SHA1_AES_256 RSA_OAEP_4096_SHA1_AES_256}.
428
+ # {::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_4096_SHA1_AES_256 RSA_OAEP_4096_SHA1_AES_256}
429
+ # or
430
+ # {::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_3072_SHA256_AES_256 RSA_OAEP_3072_SHA256_AES_256}
431
+ # or
432
+ # {::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_4096_SHA256_AES_256 RSA_OAEP_4096_SHA256_AES_256}),
422
433
  #
423
- # This field contains the concatenation of two wrapped keys:
434
+ # this field must contain the concatenation of:
424
435
  # <ol>
425
436
  # <li>An ephemeral AES-256 wrapping key wrapped with the
426
437
  # {::Google::Cloud::Kms::V1::ImportJob#public_key public_key} using
427
- # RSAES-OAEP with SHA-1/SHA-256, MGF1 with SHA-1/SHA-256, and an
428
- # empty label.
438
+ # RSAES-OAEP with SHA-1/SHA-256, MGF1 with SHA-1/SHA-256, and an empty
439
+ # label.
429
440
  # </li>
430
- # <li>The key to be imported, wrapped with the ephemeral AES-256 key
431
- # using AES-KWP (RFC 5649).
441
+ # <li>The formatted key to be imported, wrapped with the ephemeral AES-256
442
+ # key using AES-KWP (RFC 5649).
432
443
  # </li>
433
444
  # </ol>
434
445
  #
435
- # If importing symmetric key material, it is expected that the unwrapped
436
- # key contains plain bytes. If importing asymmetric key material, it is
437
- # expected that the unwrapped key is in PKCS#8-encoded DER format (the
438
- # PrivateKeyInfo structure from RFC 5208).
439
- #
440
446
  # This format is the same as the format produced by PKCS#11 mechanism
441
447
  # CKM_RSA_AES_KEY_WRAP.
448
+ #
449
+ # When wrapping with import methods
450
+ # ({::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_3072_SHA256 RSA_OAEP_3072_SHA256}
451
+ # or
452
+ # {::Google::Cloud::Kms::V1::ImportJob::ImportMethod::RSA_OAEP_4096_SHA256 RSA_OAEP_4096_SHA256}),
453
+ #
454
+ # this field must contain the formatted key to be imported, wrapped with the
455
+ # {::Google::Cloud::Kms::V1::ImportJob#public_key public_key} using RSAES-OAEP
456
+ # with SHA-256, MGF1 with SHA-256, and an empty label.
457
+ # @!attribute [rw] rsa_aes_wrapped_key
458
+ # @return [::String]
459
+ # Optional. This field has the same meaning as
460
+ # {::Google::Cloud::Kms::V1::ImportCryptoKeyVersionRequest#wrapped_key wrapped_key}.
461
+ # Prefer to use that field in new work. Either that field or this field
462
+ # (but not both) must be specified.
442
463
  class ImportCryptoKeyVersionRequest
443
464
  include ::Google::Protobuf::MessageExts
444
465
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -545,7 +566,9 @@ module Google
545
566
  #
546
567
  # The maximum size depends on the key version's
547
568
  # {::Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level}.
548
- # For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE} keys, the
569
+ # For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE},
570
+ # {::Google::Cloud::Kms::V1::ProtectionLevel::EXTERNAL EXTERNAL}, and
571
+ # {::Google::Cloud::Kms::V1::ProtectionLevel::EXTERNAL_VPC EXTERNAL_VPC} keys, the
549
572
  # plaintext must be no larger than 64KiB. For
550
573
  # {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM} keys, the combined length of
551
574
  # the plaintext and additional_authenticated_data fields must be no larger
@@ -558,8 +581,10 @@ module Google
558
581
  #
559
582
  # The maximum size depends on the key version's
560
583
  # {::Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level}.
561
- # For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE} keys, the AAD
562
- # must be no larger than 64KiB. For
584
+ # For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE},
585
+ # {::Google::Cloud::Kms::V1::ProtectionLevel::EXTERNAL EXTERNAL}, and
586
+ # {::Google::Cloud::Kms::V1::ProtectionLevel::EXTERNAL_VPC EXTERNAL_VPC} keys the
587
+ # AAD must be no larger than 64KiB. For
563
588
  # {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM} keys, the combined length of
564
589
  # the plaintext and additional_authenticated_data fields must be no larger
565
590
  # than 8KiB.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-kms-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.15.0
4
+ version: 0.17.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-11-16 00:00:00.000000000 Z
11
+ date: 2023-02-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '0.12'
19
+ version: 0.17.1
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '0.12'
29
+ version: 0.17.1
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a
@@ -50,7 +50,7 @@ dependencies:
50
50
  requirements:
51
51
  - - ">="
52
52
  - !ruby/object:Gem::Version
53
- version: '0.0'
53
+ version: '0.4'
54
54
  - - "<"
55
55
  - !ruby/object:Gem::Version
56
56
  version: 2.a
@@ -60,7 +60,7 @@ dependencies:
60
60
  requirements:
61
61
  - - ">="
62
62
  - !ruby/object:Gem::Version
63
- version: '0.0'
63
+ version: '0.4'
64
64
  - - "<"
65
65
  - !ruby/object:Gem::Version
66
66
  version: 2.a
@@ -70,7 +70,7 @@ dependencies:
70
70
  requirements:
71
71
  - - ">="
72
72
  - !ruby/object:Gem::Version
73
- version: '0.0'
73
+ version: '0.4'
74
74
  - - "<"
75
75
  - !ruby/object:Gem::Version
76
76
  version: 2.a
@@ -80,7 +80,7 @@ dependencies:
80
80
  requirements:
81
81
  - - ">="
82
82
  - !ruby/object:Gem::Version
83
- version: '0.0'
83
+ version: '0.4'
84
84
  - - "<"
85
85
  - !ruby/object:Gem::Version
86
86
  version: 2.a
@@ -90,14 +90,14 @@ dependencies:
90
90
  requirements:
91
91
  - - "~>"
92
92
  - !ruby/object:Gem::Version
93
- version: 1.26.1
93
+ version: 1.26.3
94
94
  type: :development
95
95
  prerelease: false
96
96
  version_requirements: !ruby/object:Gem::Requirement
97
97
  requirements:
98
98
  - - "~>"
99
99
  - !ruby/object:Gem::Version
100
- version: 1.26.1
100
+ version: 1.26.3
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: minitest
103
103
  requirement: !ruby/object:Gem::Requirement
@@ -212,10 +212,14 @@ files:
212
212
  - lib/google-cloud-kms-v1.rb
213
213
  - lib/google/cloud/kms/v1.rb
214
214
  - lib/google/cloud/kms/v1/_helpers.rb
215
+ - lib/google/cloud/kms/v1/bindings_override.rb
215
216
  - lib/google/cloud/kms/v1/ekm_service.rb
216
217
  - lib/google/cloud/kms/v1/ekm_service/client.rb
217
218
  - lib/google/cloud/kms/v1/ekm_service/credentials.rb
218
219
  - lib/google/cloud/kms/v1/ekm_service/paths.rb
220
+ - lib/google/cloud/kms/v1/ekm_service/rest.rb
221
+ - lib/google/cloud/kms/v1/ekm_service/rest/client.rb
222
+ - lib/google/cloud/kms/v1/ekm_service/rest/service_stub.rb
219
223
  - lib/google/cloud/kms/v1/ekm_service_pb.rb
220
224
  - lib/google/cloud/kms/v1/ekm_service_services_pb.rb
221
225
  - lib/google/cloud/kms/v1/iam_policy.rb
@@ -225,7 +229,11 @@ files:
225
229
  - lib/google/cloud/kms/v1/key_management_service/client.rb
226
230
  - lib/google/cloud/kms/v1/key_management_service/credentials.rb
227
231
  - lib/google/cloud/kms/v1/key_management_service/paths.rb
232
+ - lib/google/cloud/kms/v1/key_management_service/rest.rb
233
+ - lib/google/cloud/kms/v1/key_management_service/rest/client.rb
234
+ - lib/google/cloud/kms/v1/key_management_service/rest/service_stub.rb
228
235
  - lib/google/cloud/kms/v1/resources_pb.rb
236
+ - lib/google/cloud/kms/v1/rest.rb
229
237
  - lib/google/cloud/kms/v1/service_pb.rb
230
238
  - lib/google/cloud/kms/v1/service_services_pb.rb
231
239
  - lib/google/cloud/kms/v1/version.rb
@@ -262,7 +270,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
262
270
  - !ruby/object:Gem::Version
263
271
  version: '0'
264
272
  requirements: []
265
- rubygems_version: 3.3.14
273
+ rubygems_version: 3.4.2
266
274
  signing_key:
267
275
  specification_version: 4
268
276
  summary: API Client library for the Cloud Key Management Service (KMS) V1 API