google-cloud-kms-v1 0.18.1 → 0.20.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/kms/v1/ekm_service/client.rb +101 -2
- data/lib/google/cloud/kms/v1/ekm_service/rest/client.rb +78 -2
- data/lib/google/cloud/kms/v1/ekm_service/rest/service_stub.rb +65 -6
- data/lib/google/cloud/kms/v1/ekm_service_pb.rb +28 -66
- data/lib/google/cloud/kms/v1/ekm_service_services_pb.rb +6 -0
- data/lib/google/cloud/kms/v1/key_management_service/client.rb +4 -2
- data/lib/google/cloud/kms/v1/key_management_service/rest/client.rb +4 -2
- data/lib/google/cloud/kms/v1/key_management_service/rest/service_stub.rb +26 -26
- data/lib/google/cloud/kms/v1/resources_pb.rb +27 -160
- data/lib/google/cloud/kms/v1/service_pb.rb +27 -215
- data/lib/google/cloud/kms/v1/version.rb +1 -1
- data/proto_docs/google/api/client.rb +10 -1
- data/proto_docs/google/cloud/kms/v1/ekm_service.rb +18 -0
- data/proto_docs/google/protobuf/any.rb +7 -4
- data/proto_docs/google/protobuf/timestamp.rb +1 -3
- metadata +4 -4
@@ -59,7 +59,7 @@ module Google
|
|
59
59
|
|
60
60
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_key_rings_request request_pb
|
61
61
|
query_string_params = if query_string_params.any?
|
62
|
-
query_string_params.to_h { |p| p.split
|
62
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
63
63
|
else
|
64
64
|
{}
|
65
65
|
end
|
@@ -97,7 +97,7 @@ module Google
|
|
97
97
|
|
98
98
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_keys_request request_pb
|
99
99
|
query_string_params = if query_string_params.any?
|
100
|
-
query_string_params.to_h { |p| p.split
|
100
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
101
101
|
else
|
102
102
|
{}
|
103
103
|
end
|
@@ -135,7 +135,7 @@ module Google
|
|
135
135
|
|
136
136
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_key_versions_request request_pb
|
137
137
|
query_string_params = if query_string_params.any?
|
138
|
-
query_string_params.to_h { |p| p.split
|
138
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
139
139
|
else
|
140
140
|
{}
|
141
141
|
end
|
@@ -173,7 +173,7 @@ module Google
|
|
173
173
|
|
174
174
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_import_jobs_request request_pb
|
175
175
|
query_string_params = if query_string_params.any?
|
176
|
-
query_string_params.to_h { |p| p.split
|
176
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
177
177
|
else
|
178
178
|
{}
|
179
179
|
end
|
@@ -211,7 +211,7 @@ module Google
|
|
211
211
|
|
212
212
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_key_ring_request request_pb
|
213
213
|
query_string_params = if query_string_params.any?
|
214
|
-
query_string_params.to_h { |p| p.split
|
214
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
215
215
|
else
|
216
216
|
{}
|
217
217
|
end
|
@@ -249,7 +249,7 @@ module Google
|
|
249
249
|
|
250
250
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_request request_pb
|
251
251
|
query_string_params = if query_string_params.any?
|
252
|
-
query_string_params.to_h { |p| p.split
|
252
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
253
253
|
else
|
254
254
|
{}
|
255
255
|
end
|
@@ -287,7 +287,7 @@ module Google
|
|
287
287
|
|
288
288
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_version_request request_pb
|
289
289
|
query_string_params = if query_string_params.any?
|
290
|
-
query_string_params.to_h { |p| p.split
|
290
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
291
291
|
else
|
292
292
|
{}
|
293
293
|
end
|
@@ -325,7 +325,7 @@ module Google
|
|
325
325
|
|
326
326
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_public_key_request request_pb
|
327
327
|
query_string_params = if query_string_params.any?
|
328
|
-
query_string_params.to_h { |p| p.split
|
328
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
329
329
|
else
|
330
330
|
{}
|
331
331
|
end
|
@@ -363,7 +363,7 @@ module Google
|
|
363
363
|
|
364
364
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_import_job_request request_pb
|
365
365
|
query_string_params = if query_string_params.any?
|
366
|
-
query_string_params.to_h { |p| p.split
|
366
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
367
367
|
else
|
368
368
|
{}
|
369
369
|
end
|
@@ -401,7 +401,7 @@ module Google
|
|
401
401
|
|
402
402
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_key_ring_request request_pb
|
403
403
|
query_string_params = if query_string_params.any?
|
404
|
-
query_string_params.to_h { |p| p.split
|
404
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
405
405
|
else
|
406
406
|
{}
|
407
407
|
end
|
@@ -439,7 +439,7 @@ module Google
|
|
439
439
|
|
440
440
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_request request_pb
|
441
441
|
query_string_params = if query_string_params.any?
|
442
|
-
query_string_params.to_h { |p| p.split
|
442
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
443
443
|
else
|
444
444
|
{}
|
445
445
|
end
|
@@ -477,7 +477,7 @@ module Google
|
|
477
477
|
|
478
478
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_version_request request_pb
|
479
479
|
query_string_params = if query_string_params.any?
|
480
|
-
query_string_params.to_h { |p| p.split
|
480
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
481
481
|
else
|
482
482
|
{}
|
483
483
|
end
|
@@ -515,7 +515,7 @@ module Google
|
|
515
515
|
|
516
516
|
verb, uri, query_string_params, body = ServiceStub.transcode_import_crypto_key_version_request request_pb
|
517
517
|
query_string_params = if query_string_params.any?
|
518
|
-
query_string_params.to_h { |p| p.split
|
518
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
519
519
|
else
|
520
520
|
{}
|
521
521
|
end
|
@@ -553,7 +553,7 @@ module Google
|
|
553
553
|
|
554
554
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_import_job_request request_pb
|
555
555
|
query_string_params = if query_string_params.any?
|
556
|
-
query_string_params.to_h { |p| p.split
|
556
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
557
557
|
else
|
558
558
|
{}
|
559
559
|
end
|
@@ -591,7 +591,7 @@ module Google
|
|
591
591
|
|
592
592
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_request request_pb
|
593
593
|
query_string_params = if query_string_params.any?
|
594
|
-
query_string_params.to_h { |p| p.split
|
594
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
595
595
|
else
|
596
596
|
{}
|
597
597
|
end
|
@@ -629,7 +629,7 @@ module Google
|
|
629
629
|
|
630
630
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_version_request request_pb
|
631
631
|
query_string_params = if query_string_params.any?
|
632
|
-
query_string_params.to_h { |p| p.split
|
632
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
633
633
|
else
|
634
634
|
{}
|
635
635
|
end
|
@@ -667,7 +667,7 @@ module Google
|
|
667
667
|
|
668
668
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_primary_version_request request_pb
|
669
669
|
query_string_params = if query_string_params.any?
|
670
|
-
query_string_params.to_h { |p| p.split
|
670
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
671
671
|
else
|
672
672
|
{}
|
673
673
|
end
|
@@ -705,7 +705,7 @@ module Google
|
|
705
705
|
|
706
706
|
verb, uri, query_string_params, body = ServiceStub.transcode_destroy_crypto_key_version_request request_pb
|
707
707
|
query_string_params = if query_string_params.any?
|
708
|
-
query_string_params.to_h { |p| p.split
|
708
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
709
709
|
else
|
710
710
|
{}
|
711
711
|
end
|
@@ -743,7 +743,7 @@ module Google
|
|
743
743
|
|
744
744
|
verb, uri, query_string_params, body = ServiceStub.transcode_restore_crypto_key_version_request request_pb
|
745
745
|
query_string_params = if query_string_params.any?
|
746
|
-
query_string_params.to_h { |p| p.split
|
746
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
747
747
|
else
|
748
748
|
{}
|
749
749
|
end
|
@@ -781,7 +781,7 @@ module Google
|
|
781
781
|
|
782
782
|
verb, uri, query_string_params, body = ServiceStub.transcode_encrypt_request request_pb
|
783
783
|
query_string_params = if query_string_params.any?
|
784
|
-
query_string_params.to_h { |p| p.split
|
784
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
785
785
|
else
|
786
786
|
{}
|
787
787
|
end
|
@@ -819,7 +819,7 @@ module Google
|
|
819
819
|
|
820
820
|
verb, uri, query_string_params, body = ServiceStub.transcode_decrypt_request request_pb
|
821
821
|
query_string_params = if query_string_params.any?
|
822
|
-
query_string_params.to_h { |p| p.split
|
822
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
823
823
|
else
|
824
824
|
{}
|
825
825
|
end
|
@@ -857,7 +857,7 @@ module Google
|
|
857
857
|
|
858
858
|
verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_sign_request request_pb
|
859
859
|
query_string_params = if query_string_params.any?
|
860
|
-
query_string_params.to_h { |p| p.split
|
860
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
861
861
|
else
|
862
862
|
{}
|
863
863
|
end
|
@@ -895,7 +895,7 @@ module Google
|
|
895
895
|
|
896
896
|
verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_decrypt_request request_pb
|
897
897
|
query_string_params = if query_string_params.any?
|
898
|
-
query_string_params.to_h { |p| p.split
|
898
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
899
899
|
else
|
900
900
|
{}
|
901
901
|
end
|
@@ -933,7 +933,7 @@ module Google
|
|
933
933
|
|
934
934
|
verb, uri, query_string_params, body = ServiceStub.transcode_mac_sign_request request_pb
|
935
935
|
query_string_params = if query_string_params.any?
|
936
|
-
query_string_params.to_h { |p| p.split
|
936
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
937
937
|
else
|
938
938
|
{}
|
939
939
|
end
|
@@ -971,7 +971,7 @@ module Google
|
|
971
971
|
|
972
972
|
verb, uri, query_string_params, body = ServiceStub.transcode_mac_verify_request request_pb
|
973
973
|
query_string_params = if query_string_params.any?
|
974
|
-
query_string_params.to_h { |p| p.split
|
974
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
975
975
|
else
|
976
976
|
{}
|
977
977
|
end
|
@@ -1009,7 +1009,7 @@ module Google
|
|
1009
1009
|
|
1010
1010
|
verb, uri, query_string_params, body = ServiceStub.transcode_generate_random_bytes_request request_pb
|
1011
1011
|
query_string_params = if query_string_params.any?
|
1012
|
-
query_string_params.to_h { |p| p.split
|
1012
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
1013
1013
|
else
|
1014
1014
|
{}
|
1015
1015
|
end
|
@@ -1,3 +1,4 @@
|
|
1
|
+
# frozen_string_literal: true
|
1
2
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
3
|
# source: google/cloud/kms/v1/resources.proto
|
3
4
|
|
@@ -9,168 +10,34 @@ require 'google/protobuf/duration_pb'
|
|
9
10
|
require 'google/protobuf/timestamp_pb'
|
10
11
|
require 'google/protobuf/wrappers_pb'
|
11
12
|
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
value :ASYMMETRIC_SIGN, 5
|
37
|
-
value :ASYMMETRIC_DECRYPT, 6
|
38
|
-
value :MAC, 9
|
39
|
-
end
|
40
|
-
add_message "google.cloud.kms.v1.CryptoKeyVersionTemplate" do
|
41
|
-
optional :protection_level, :enum, 1, "google.cloud.kms.v1.ProtectionLevel"
|
42
|
-
optional :algorithm, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
43
|
-
end
|
44
|
-
add_message "google.cloud.kms.v1.KeyOperationAttestation" do
|
45
|
-
optional :format, :enum, 4, "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat"
|
46
|
-
optional :content, :bytes, 5
|
47
|
-
optional :cert_chains, :message, 6, "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains"
|
48
|
-
end
|
49
|
-
add_message "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains" do
|
50
|
-
repeated :cavium_certs, :string, 1
|
51
|
-
repeated :google_card_certs, :string, 2
|
52
|
-
repeated :google_partition_certs, :string, 3
|
53
|
-
end
|
54
|
-
add_enum "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat" do
|
55
|
-
value :ATTESTATION_FORMAT_UNSPECIFIED, 0
|
56
|
-
value :CAVIUM_V1_COMPRESSED, 3
|
57
|
-
value :CAVIUM_V2_COMPRESSED, 4
|
58
|
-
end
|
59
|
-
add_message "google.cloud.kms.v1.CryptoKeyVersion" do
|
60
|
-
optional :name, :string, 1
|
61
|
-
optional :state, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState"
|
62
|
-
optional :protection_level, :enum, 7, "google.cloud.kms.v1.ProtectionLevel"
|
63
|
-
optional :algorithm, :enum, 10, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
64
|
-
optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
|
65
|
-
optional :create_time, :message, 4, "google.protobuf.Timestamp"
|
66
|
-
optional :generate_time, :message, 11, "google.protobuf.Timestamp"
|
67
|
-
optional :destroy_time, :message, 5, "google.protobuf.Timestamp"
|
68
|
-
optional :destroy_event_time, :message, 6, "google.protobuf.Timestamp"
|
69
|
-
optional :import_job, :string, 14
|
70
|
-
optional :import_time, :message, 15, "google.protobuf.Timestamp"
|
71
|
-
optional :import_failure_reason, :string, 16
|
72
|
-
optional :generation_failure_reason, :string, 19
|
73
|
-
optional :external_destruction_failure_reason, :string, 20
|
74
|
-
optional :external_protection_level_options, :message, 17, "google.cloud.kms.v1.ExternalProtectionLevelOptions"
|
75
|
-
optional :reimport_eligible, :bool, 18
|
76
|
-
end
|
77
|
-
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
|
78
|
-
value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
|
79
|
-
value :GOOGLE_SYMMETRIC_ENCRYPTION, 1
|
80
|
-
value :RSA_SIGN_PSS_2048_SHA256, 2
|
81
|
-
value :RSA_SIGN_PSS_3072_SHA256, 3
|
82
|
-
value :RSA_SIGN_PSS_4096_SHA256, 4
|
83
|
-
value :RSA_SIGN_PSS_4096_SHA512, 15
|
84
|
-
value :RSA_SIGN_PKCS1_2048_SHA256, 5
|
85
|
-
value :RSA_SIGN_PKCS1_3072_SHA256, 6
|
86
|
-
value :RSA_SIGN_PKCS1_4096_SHA256, 7
|
87
|
-
value :RSA_SIGN_PKCS1_4096_SHA512, 16
|
88
|
-
value :RSA_SIGN_RAW_PKCS1_2048, 28
|
89
|
-
value :RSA_SIGN_RAW_PKCS1_3072, 29
|
90
|
-
value :RSA_SIGN_RAW_PKCS1_4096, 30
|
91
|
-
value :RSA_DECRYPT_OAEP_2048_SHA256, 8
|
92
|
-
value :RSA_DECRYPT_OAEP_3072_SHA256, 9
|
93
|
-
value :RSA_DECRYPT_OAEP_4096_SHA256, 10
|
94
|
-
value :RSA_DECRYPT_OAEP_4096_SHA512, 17
|
95
|
-
value :RSA_DECRYPT_OAEP_2048_SHA1, 37
|
96
|
-
value :RSA_DECRYPT_OAEP_3072_SHA1, 38
|
97
|
-
value :RSA_DECRYPT_OAEP_4096_SHA1, 39
|
98
|
-
value :EC_SIGN_P256_SHA256, 12
|
99
|
-
value :EC_SIGN_P384_SHA384, 13
|
100
|
-
value :EC_SIGN_SECP256K1_SHA256, 31
|
101
|
-
value :HMAC_SHA256, 32
|
102
|
-
value :HMAC_SHA1, 33
|
103
|
-
value :HMAC_SHA384, 34
|
104
|
-
value :HMAC_SHA512, 35
|
105
|
-
value :HMAC_SHA224, 36
|
106
|
-
value :EXTERNAL_SYMMETRIC_ENCRYPTION, 18
|
107
|
-
end
|
108
|
-
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState" do
|
109
|
-
value :CRYPTO_KEY_VERSION_STATE_UNSPECIFIED, 0
|
110
|
-
value :PENDING_GENERATION, 5
|
111
|
-
value :ENABLED, 1
|
112
|
-
value :DISABLED, 2
|
113
|
-
value :DESTROYED, 3
|
114
|
-
value :DESTROY_SCHEDULED, 4
|
115
|
-
value :PENDING_IMPORT, 6
|
116
|
-
value :IMPORT_FAILED, 7
|
117
|
-
value :GENERATION_FAILED, 8
|
118
|
-
value :PENDING_EXTERNAL_DESTRUCTION, 9
|
119
|
-
value :EXTERNAL_DESTRUCTION_FAILED, 10
|
120
|
-
end
|
121
|
-
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView" do
|
122
|
-
value :CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED, 0
|
123
|
-
value :FULL, 1
|
124
|
-
end
|
125
|
-
add_message "google.cloud.kms.v1.PublicKey" do
|
126
|
-
optional :pem, :string, 1
|
127
|
-
optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
128
|
-
optional :pem_crc32c, :message, 3, "google.protobuf.Int64Value"
|
129
|
-
optional :name, :string, 4
|
130
|
-
optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
|
131
|
-
end
|
132
|
-
add_message "google.cloud.kms.v1.ImportJob" do
|
133
|
-
optional :name, :string, 1
|
134
|
-
optional :import_method, :enum, 2, "google.cloud.kms.v1.ImportJob.ImportMethod"
|
135
|
-
optional :protection_level, :enum, 9, "google.cloud.kms.v1.ProtectionLevel"
|
136
|
-
optional :create_time, :message, 3, "google.protobuf.Timestamp"
|
137
|
-
optional :generate_time, :message, 4, "google.protobuf.Timestamp"
|
138
|
-
optional :expire_time, :message, 5, "google.protobuf.Timestamp"
|
139
|
-
optional :expire_event_time, :message, 10, "google.protobuf.Timestamp"
|
140
|
-
optional :state, :enum, 6, "google.cloud.kms.v1.ImportJob.ImportJobState"
|
141
|
-
optional :public_key, :message, 7, "google.cloud.kms.v1.ImportJob.WrappingPublicKey"
|
142
|
-
optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
|
143
|
-
end
|
144
|
-
add_message "google.cloud.kms.v1.ImportJob.WrappingPublicKey" do
|
145
|
-
optional :pem, :string, 1
|
146
|
-
end
|
147
|
-
add_enum "google.cloud.kms.v1.ImportJob.ImportMethod" do
|
148
|
-
value :IMPORT_METHOD_UNSPECIFIED, 0
|
149
|
-
value :RSA_OAEP_3072_SHA1_AES_256, 1
|
150
|
-
value :RSA_OAEP_4096_SHA1_AES_256, 2
|
151
|
-
value :RSA_OAEP_3072_SHA256_AES_256, 3
|
152
|
-
value :RSA_OAEP_4096_SHA256_AES_256, 4
|
153
|
-
value :RSA_OAEP_3072_SHA256, 5
|
154
|
-
value :RSA_OAEP_4096_SHA256, 6
|
155
|
-
end
|
156
|
-
add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
|
157
|
-
value :IMPORT_JOB_STATE_UNSPECIFIED, 0
|
158
|
-
value :PENDING_GENERATION, 1
|
159
|
-
value :ACTIVE, 2
|
160
|
-
value :EXPIRED, 3
|
161
|
-
end
|
162
|
-
add_message "google.cloud.kms.v1.ExternalProtectionLevelOptions" do
|
163
|
-
optional :external_key_uri, :string, 1
|
164
|
-
optional :ekm_connection_key_path, :string, 2
|
165
|
-
end
|
166
|
-
add_enum "google.cloud.kms.v1.ProtectionLevel" do
|
167
|
-
value :PROTECTION_LEVEL_UNSPECIFIED, 0
|
168
|
-
value :SOFTWARE, 1
|
169
|
-
value :HSM, 2
|
170
|
-
value :EXTERNAL, 3
|
171
|
-
value :EXTERNAL_VPC, 4
|
13
|
+
|
14
|
+
descriptor_data = "\n#google/cloud/kms/v1/resources.proto\x12\x13google.cloud.kms.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/wrappers.proto\"\xb5\x01\n\x07KeyRing\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03:a\xea\x41^\n\x1f\x63loudkms.googleapis.com/KeyRing\x12;projects/{project}/locations/{location}/keyRings/{key_ring}\"\x95\x07\n\tCryptoKey\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12;\n\x07primary\x18\x02 \x01(\x0b\x32%.google.cloud.kms.v1.CryptoKeyVersionB\x03\xe0\x41\x03\x12\x45\n\x07purpose\x18\x03 \x01(\x0e\x32/.google.cloud.kms.v1.CryptoKey.CryptoKeyPurposeB\x03\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\x12next_rotation_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x34\n\x0frotation_period\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationH\x00\x12G\n\x10version_template\x18\x0b \x01(\x0b\x32-.google.cloud.kms.v1.CryptoKeyVersionTemplate\x12:\n\x06labels\x18\n \x03(\x0b\x32*.google.cloud.kms.v1.CryptoKey.LabelsEntry\x12\x18\n\x0bimport_only\x18\r \x01(\x08\x42\x03\xe0\x41\x05\x12\x42\n\x1a\x64\x65stroy_scheduled_duration\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x05\x12%\n\x12\x63rypto_key_backend\x18\x0f \x01(\tB\t\xe0\x41\x05\xfa\x41\x03\n\x01*\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"\x81\x01\n\x10\x43ryptoKeyPurpose\x12\"\n\x1e\x43RYPTO_KEY_PURPOSE_UNSPECIFIED\x10\x00\x12\x13\n\x0f\x45NCRYPT_DECRYPT\x10\x01\x12\x13\n\x0f\x41SYMMETRIC_SIGN\x10\x05\x12\x16\n\x12\x41SYMMETRIC_DECRYPT\x10\x06\x12\x07\n\x03MAC\x10\t:{\xea\x41x\n!cloudkms.googleapis.com/CryptoKey\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}B\x13\n\x11rotation_schedule\"\xb3\x01\n\x18\x43ryptoKeyVersionTemplate\x12>\n\x10protection_level\x18\x01 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel\x12W\n\talgorithm\x18\x03 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x02\"\xb1\x03\n\x17KeyOperationAttestation\x12S\n\x06\x66ormat\x18\x04 \x01(\x0e\x32>.google.cloud.kms.v1.KeyOperationAttestation.AttestationFormatB\x03\xe0\x41\x03\x12\x14\n\x07\x63ontent\x18\x05 \x01(\x0c\x42\x03\xe0\x41\x03\x12X\n\x0b\x63\x65rt_chains\x18\x06 \x01(\x0b\x32>.google.cloud.kms.v1.KeyOperationAttestation.CertificateChainsB\x03\xe0\x41\x03\x1a\x64\n\x11\x43\x65rtificateChains\x12\x14\n\x0c\x63\x61vium_certs\x18\x01 \x03(\t\x12\x19\n\x11google_card_certs\x18\x02 \x03(\t\x12\x1e\n\x16google_partition_certs\x18\x03 \x03(\t\"k\n\x11\x41ttestationFormat\x12\"\n\x1e\x41TTESTATION_FORMAT_UNSPECIFIED\x10\x00\x12\x18\n\x14\x43\x41VIUM_V1_COMPRESSED\x10\x03\x12\x18\n\x14\x43\x41VIUM_V2_COMPRESSED\x10\x04\"\x86\x12\n\x10\x43ryptoKeyVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\x05state\x18\x03 \x01(\x0e\x32;.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState\x12\x43\n\x10protection_level\x18\x07 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x03\xe0\x41\x03\x12W\n\talgorithm\x18\n \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12;\n\x12\x64\x65stroy_event_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x17\n\nimport_job\x18\x0e \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0bimport_time\x18\x0f \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\"\n\x15import_failure_reason\x18\x10 \x01(\tB\x03\xe0\x41\x03\x12&\n\x19generation_failure_reason\x18\x13 \x01(\tB\x03\xe0\x41\x03\x12\x30\n#external_destruction_failure_reason\x18\x14 \x01(\tB\x03\xe0\x41\x03\x12^\n!external_protection_level_options\x18\x11 \x01(\x0b\x32\x33.google.cloud.kms.v1.ExternalProtectionLevelOptions\x12\x1e\n\x11reimport_eligible\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\"\xe7\x06\n\x19\x43ryptoKeyVersionAlgorithm\x12,\n(CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED\x10\x00\x12\x1f\n\x1bGOOGLE_SYMMETRIC_ENCRYPTION\x10\x01\x12\x1c\n\x18RSA_SIGN_PSS_2048_SHA256\x10\x02\x12\x1c\n\x18RSA_SIGN_PSS_3072_SHA256\x10\x03\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA256\x10\x04\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA512\x10\x0f\x12\x1e\n\x1aRSA_SIGN_PKCS1_2048_SHA256\x10\x05\x12\x1e\n\x1aRSA_SIGN_PKCS1_3072_SHA256\x10\x06\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA256\x10\x07\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA512\x10\x10\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_2048\x10\x1c\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_3072\x10\x1d\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_4096\x10\x1e\x12 \n\x1cRSA_DECRYPT_OAEP_2048_SHA256\x10\x08\x12 \n\x1cRSA_DECRYPT_OAEP_3072_SHA256\x10\t\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA256\x10\n\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA512\x10\x11\x12\x1e\n\x1aRSA_DECRYPT_OAEP_2048_SHA1\x10%\x12\x1e\n\x1aRSA_DECRYPT_OAEP_3072_SHA1\x10&\x12\x1e\n\x1aRSA_DECRYPT_OAEP_4096_SHA1\x10\'\x12\x17\n\x13\x45\x43_SIGN_P256_SHA256\x10\x0c\x12\x17\n\x13\x45\x43_SIGN_P384_SHA384\x10\r\x12\x1c\n\x18\x45\x43_SIGN_SECP256K1_SHA256\x10\x1f\x12\x0f\n\x0bHMAC_SHA256\x10 \x12\r\n\tHMAC_SHA1\x10!\x12\x0f\n\x0bHMAC_SHA384\x10\"\x12\x0f\n\x0bHMAC_SHA512\x10#\x12\x0f\n\x0bHMAC_SHA224\x10$\x12!\n\x1d\x45XTERNAL_SYMMETRIC_ENCRYPTION\x10\x12\"\x9b\x02\n\x15\x43ryptoKeyVersionState\x12(\n$CRYPTO_KEY_VERSION_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x05\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03\x12\x15\n\x11\x44\x45STROY_SCHEDULED\x10\x04\x12\x12\n\x0ePENDING_IMPORT\x10\x06\x12\x11\n\rIMPORT_FAILED\x10\x07\x12\x15\n\x11GENERATION_FAILED\x10\x08\x12 \n\x1cPENDING_EXTERNAL_DESTRUCTION\x10\t\x12\x1f\n\x1b\x45XTERNAL_DESTRUCTION_FAILED\x10\n\"I\n\x14\x43ryptoKeyVersionView\x12\'\n#CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01:\xaa\x01\xea\x41\xa6\x01\n(cloudkms.googleapis.com/CryptoKeyVersion\x12zprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}\"\x9c\x03\n\tPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\x12R\n\talgorithm\x18\x02 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm\x12/\n\npem_crc32c\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x0c\n\x04name\x18\x04 \x01(\t\x12>\n\x10protection_level\x18\x05 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel:\xae\x01\xea\x41\xaa\x01\n!cloudkms.googleapis.com/PublicKey\x12\x84\x01projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}/publicKey\"\xd4\x08\n\tImportJob\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\rimport_method\x18\x02 \x01(\x0e\x32+.google.cloud.kms.v1.ImportJob.ImportMethodB\x06\xe0\x41\x02\xe0\x41\x05\x12\x46\n\x10protection_level\x18\t \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x06\xe0\x41\x02\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12:\n\x11\x65xpire_event_time\x18\n \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x05state\x18\x06 \x01(\x0e\x32-.google.cloud.kms.v1.ImportJob.ImportJobStateB\x03\xe0\x41\x03\x12I\n\npublic_key\x18\x07 \x01(\x0b\x32\x30.google.cloud.kms.v1.ImportJob.WrappingPublicKeyB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x1a \n\x11WrappingPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\"\xe5\x01\n\x0cImportMethod\x12\x1d\n\x19IMPORT_METHOD_UNSPECIFIED\x10\x00\x12\x1e\n\x1aRSA_OAEP_3072_SHA1_AES_256\x10\x01\x12\x1e\n\x1aRSA_OAEP_4096_SHA1_AES_256\x10\x02\x12 \n\x1cRSA_OAEP_3072_SHA256_AES_256\x10\x03\x12 \n\x1cRSA_OAEP_4096_SHA256_AES_256\x10\x04\x12\x18\n\x14RSA_OAEP_3072_SHA256\x10\x05\x12\x18\n\x14RSA_OAEP_4096_SHA256\x10\x06\"c\n\x0eImportJobState\x12 \n\x1cIMPORT_JOB_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x01\x12\n\n\x06\x41\x43TIVE\x10\x02\x12\x0b\n\x07\x45XPIRED\x10\x03:{\xea\x41x\n!cloudkms.googleapis.com/ImportJob\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/importJobs/{import_job}\"[\n\x1e\x45xternalProtectionLevelOptions\x12\x18\n\x10\x65xternal_key_uri\x18\x01 \x01(\t\x12\x1f\n\x17\x65km_connection_key_path\x18\x02 \x01(\t*j\n\x0fProtectionLevel\x12 \n\x1cPROTECTION_LEVEL_UNSPECIFIED\x10\x00\x12\x0c\n\x08SOFTWARE\x10\x01\x12\x07\n\x03HSM\x10\x02\x12\x0c\n\x08\x45XTERNAL\x10\x03\x12\x10\n\x0c\x45XTERNAL_VPC\x10\x04\x42\x88\x01\n\x17\x63om.google.cloud.kms.v1B\x11KmsResourcesProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1b\x06proto3"
|
15
|
+
|
16
|
+
pool = Google::Protobuf::DescriptorPool.generated_pool
|
17
|
+
|
18
|
+
begin
|
19
|
+
pool.add_serialized_file(descriptor_data)
|
20
|
+
rescue TypeError => e
|
21
|
+
# Compatibility code: will be removed in the next major version.
|
22
|
+
require 'google/protobuf/descriptor_pb'
|
23
|
+
parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
|
24
|
+
parsed.clear_dependency
|
25
|
+
serialized = parsed.class.encode(parsed)
|
26
|
+
file = pool.add_serialized_file(serialized)
|
27
|
+
warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
|
28
|
+
imports = [
|
29
|
+
["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
|
30
|
+
["google.protobuf.Duration", "google/protobuf/duration.proto"],
|
31
|
+
["google.protobuf.Int64Value", "google/protobuf/wrappers.proto"],
|
32
|
+
]
|
33
|
+
imports.each do |type_name, expected_filename|
|
34
|
+
import_file = pool.lookup(type_name).file_descriptor
|
35
|
+
if import_file.name != expected_filename
|
36
|
+
warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
|
172
37
|
end
|
173
38
|
end
|
39
|
+
warn "Each proto file must use a consistent fully-qualified name."
|
40
|
+
warn "This will become an error in the next major version."
|
174
41
|
end
|
175
42
|
|
176
43
|
module Google
|