google-cloud-kms-v1 0.18.1 → 0.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -59,7 +59,7 @@ module Google
59
59
 
60
60
  verb, uri, query_string_params, body = ServiceStub.transcode_list_key_rings_request request_pb
61
61
  query_string_params = if query_string_params.any?
62
- query_string_params.to_h { |p| p.split("=", 2) }
62
+ query_string_params.to_h { |p| p.split "=", 2 }
63
63
  else
64
64
  {}
65
65
  end
@@ -97,7 +97,7 @@ module Google
97
97
 
98
98
  verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_keys_request request_pb
99
99
  query_string_params = if query_string_params.any?
100
- query_string_params.to_h { |p| p.split("=", 2) }
100
+ query_string_params.to_h { |p| p.split "=", 2 }
101
101
  else
102
102
  {}
103
103
  end
@@ -135,7 +135,7 @@ module Google
135
135
 
136
136
  verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_key_versions_request request_pb
137
137
  query_string_params = if query_string_params.any?
138
- query_string_params.to_h { |p| p.split("=", 2) }
138
+ query_string_params.to_h { |p| p.split "=", 2 }
139
139
  else
140
140
  {}
141
141
  end
@@ -173,7 +173,7 @@ module Google
173
173
 
174
174
  verb, uri, query_string_params, body = ServiceStub.transcode_list_import_jobs_request request_pb
175
175
  query_string_params = if query_string_params.any?
176
- query_string_params.to_h { |p| p.split("=", 2) }
176
+ query_string_params.to_h { |p| p.split "=", 2 }
177
177
  else
178
178
  {}
179
179
  end
@@ -211,7 +211,7 @@ module Google
211
211
 
212
212
  verb, uri, query_string_params, body = ServiceStub.transcode_get_key_ring_request request_pb
213
213
  query_string_params = if query_string_params.any?
214
- query_string_params.to_h { |p| p.split("=", 2) }
214
+ query_string_params.to_h { |p| p.split "=", 2 }
215
215
  else
216
216
  {}
217
217
  end
@@ -249,7 +249,7 @@ module Google
249
249
 
250
250
  verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_request request_pb
251
251
  query_string_params = if query_string_params.any?
252
- query_string_params.to_h { |p| p.split("=", 2) }
252
+ query_string_params.to_h { |p| p.split "=", 2 }
253
253
  else
254
254
  {}
255
255
  end
@@ -287,7 +287,7 @@ module Google
287
287
 
288
288
  verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_version_request request_pb
289
289
  query_string_params = if query_string_params.any?
290
- query_string_params.to_h { |p| p.split("=", 2) }
290
+ query_string_params.to_h { |p| p.split "=", 2 }
291
291
  else
292
292
  {}
293
293
  end
@@ -325,7 +325,7 @@ module Google
325
325
 
326
326
  verb, uri, query_string_params, body = ServiceStub.transcode_get_public_key_request request_pb
327
327
  query_string_params = if query_string_params.any?
328
- query_string_params.to_h { |p| p.split("=", 2) }
328
+ query_string_params.to_h { |p| p.split "=", 2 }
329
329
  else
330
330
  {}
331
331
  end
@@ -363,7 +363,7 @@ module Google
363
363
 
364
364
  verb, uri, query_string_params, body = ServiceStub.transcode_get_import_job_request request_pb
365
365
  query_string_params = if query_string_params.any?
366
- query_string_params.to_h { |p| p.split("=", 2) }
366
+ query_string_params.to_h { |p| p.split "=", 2 }
367
367
  else
368
368
  {}
369
369
  end
@@ -401,7 +401,7 @@ module Google
401
401
 
402
402
  verb, uri, query_string_params, body = ServiceStub.transcode_create_key_ring_request request_pb
403
403
  query_string_params = if query_string_params.any?
404
- query_string_params.to_h { |p| p.split("=", 2) }
404
+ query_string_params.to_h { |p| p.split "=", 2 }
405
405
  else
406
406
  {}
407
407
  end
@@ -439,7 +439,7 @@ module Google
439
439
 
440
440
  verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_request request_pb
441
441
  query_string_params = if query_string_params.any?
442
- query_string_params.to_h { |p| p.split("=", 2) }
442
+ query_string_params.to_h { |p| p.split "=", 2 }
443
443
  else
444
444
  {}
445
445
  end
@@ -477,7 +477,7 @@ module Google
477
477
 
478
478
  verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_version_request request_pb
479
479
  query_string_params = if query_string_params.any?
480
- query_string_params.to_h { |p| p.split("=", 2) }
480
+ query_string_params.to_h { |p| p.split "=", 2 }
481
481
  else
482
482
  {}
483
483
  end
@@ -515,7 +515,7 @@ module Google
515
515
 
516
516
  verb, uri, query_string_params, body = ServiceStub.transcode_import_crypto_key_version_request request_pb
517
517
  query_string_params = if query_string_params.any?
518
- query_string_params.to_h { |p| p.split("=", 2) }
518
+ query_string_params.to_h { |p| p.split "=", 2 }
519
519
  else
520
520
  {}
521
521
  end
@@ -553,7 +553,7 @@ module Google
553
553
 
554
554
  verb, uri, query_string_params, body = ServiceStub.transcode_create_import_job_request request_pb
555
555
  query_string_params = if query_string_params.any?
556
- query_string_params.to_h { |p| p.split("=", 2) }
556
+ query_string_params.to_h { |p| p.split "=", 2 }
557
557
  else
558
558
  {}
559
559
  end
@@ -591,7 +591,7 @@ module Google
591
591
 
592
592
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_request request_pb
593
593
  query_string_params = if query_string_params.any?
594
- query_string_params.to_h { |p| p.split("=", 2) }
594
+ query_string_params.to_h { |p| p.split "=", 2 }
595
595
  else
596
596
  {}
597
597
  end
@@ -629,7 +629,7 @@ module Google
629
629
 
630
630
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_version_request request_pb
631
631
  query_string_params = if query_string_params.any?
632
- query_string_params.to_h { |p| p.split("=", 2) }
632
+ query_string_params.to_h { |p| p.split "=", 2 }
633
633
  else
634
634
  {}
635
635
  end
@@ -667,7 +667,7 @@ module Google
667
667
 
668
668
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_primary_version_request request_pb
669
669
  query_string_params = if query_string_params.any?
670
- query_string_params.to_h { |p| p.split("=", 2) }
670
+ query_string_params.to_h { |p| p.split "=", 2 }
671
671
  else
672
672
  {}
673
673
  end
@@ -705,7 +705,7 @@ module Google
705
705
 
706
706
  verb, uri, query_string_params, body = ServiceStub.transcode_destroy_crypto_key_version_request request_pb
707
707
  query_string_params = if query_string_params.any?
708
- query_string_params.to_h { |p| p.split("=", 2) }
708
+ query_string_params.to_h { |p| p.split "=", 2 }
709
709
  else
710
710
  {}
711
711
  end
@@ -743,7 +743,7 @@ module Google
743
743
 
744
744
  verb, uri, query_string_params, body = ServiceStub.transcode_restore_crypto_key_version_request request_pb
745
745
  query_string_params = if query_string_params.any?
746
- query_string_params.to_h { |p| p.split("=", 2) }
746
+ query_string_params.to_h { |p| p.split "=", 2 }
747
747
  else
748
748
  {}
749
749
  end
@@ -781,7 +781,7 @@ module Google
781
781
 
782
782
  verb, uri, query_string_params, body = ServiceStub.transcode_encrypt_request request_pb
783
783
  query_string_params = if query_string_params.any?
784
- query_string_params.to_h { |p| p.split("=", 2) }
784
+ query_string_params.to_h { |p| p.split "=", 2 }
785
785
  else
786
786
  {}
787
787
  end
@@ -819,7 +819,7 @@ module Google
819
819
 
820
820
  verb, uri, query_string_params, body = ServiceStub.transcode_decrypt_request request_pb
821
821
  query_string_params = if query_string_params.any?
822
- query_string_params.to_h { |p| p.split("=", 2) }
822
+ query_string_params.to_h { |p| p.split "=", 2 }
823
823
  else
824
824
  {}
825
825
  end
@@ -857,7 +857,7 @@ module Google
857
857
 
858
858
  verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_sign_request request_pb
859
859
  query_string_params = if query_string_params.any?
860
- query_string_params.to_h { |p| p.split("=", 2) }
860
+ query_string_params.to_h { |p| p.split "=", 2 }
861
861
  else
862
862
  {}
863
863
  end
@@ -895,7 +895,7 @@ module Google
895
895
 
896
896
  verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_decrypt_request request_pb
897
897
  query_string_params = if query_string_params.any?
898
- query_string_params.to_h { |p| p.split("=", 2) }
898
+ query_string_params.to_h { |p| p.split "=", 2 }
899
899
  else
900
900
  {}
901
901
  end
@@ -933,7 +933,7 @@ module Google
933
933
 
934
934
  verb, uri, query_string_params, body = ServiceStub.transcode_mac_sign_request request_pb
935
935
  query_string_params = if query_string_params.any?
936
- query_string_params.to_h { |p| p.split("=", 2) }
936
+ query_string_params.to_h { |p| p.split "=", 2 }
937
937
  else
938
938
  {}
939
939
  end
@@ -971,7 +971,7 @@ module Google
971
971
 
972
972
  verb, uri, query_string_params, body = ServiceStub.transcode_mac_verify_request request_pb
973
973
  query_string_params = if query_string_params.any?
974
- query_string_params.to_h { |p| p.split("=", 2) }
974
+ query_string_params.to_h { |p| p.split "=", 2 }
975
975
  else
976
976
  {}
977
977
  end
@@ -1009,7 +1009,7 @@ module Google
1009
1009
 
1010
1010
  verb, uri, query_string_params, body = ServiceStub.transcode_generate_random_bytes_request request_pb
1011
1011
  query_string_params = if query_string_params.any?
1012
- query_string_params.to_h { |p| p.split("=", 2) }
1012
+ query_string_params.to_h { |p| p.split "=", 2 }
1013
1013
  else
1014
1014
  {}
1015
1015
  end
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/cloud/kms/v1/resources.proto
3
4
 
@@ -9,168 +10,34 @@ require 'google/protobuf/duration_pb'
9
10
  require 'google/protobuf/timestamp_pb'
10
11
  require 'google/protobuf/wrappers_pb'
11
12
 
12
- Google::Protobuf::DescriptorPool.generated_pool.build do
13
- add_file("google/cloud/kms/v1/resources.proto", :syntax => :proto3) do
14
- add_message "google.cloud.kms.v1.KeyRing" do
15
- optional :name, :string, 1
16
- optional :create_time, :message, 2, "google.protobuf.Timestamp"
17
- end
18
- add_message "google.cloud.kms.v1.CryptoKey" do
19
- optional :name, :string, 1
20
- optional :primary, :message, 2, "google.cloud.kms.v1.CryptoKeyVersion"
21
- optional :purpose, :enum, 3, "google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose"
22
- optional :create_time, :message, 5, "google.protobuf.Timestamp"
23
- optional :next_rotation_time, :message, 7, "google.protobuf.Timestamp"
24
- optional :version_template, :message, 11, "google.cloud.kms.v1.CryptoKeyVersionTemplate"
25
- map :labels, :string, :string, 10
26
- optional :import_only, :bool, 13
27
- optional :destroy_scheduled_duration, :message, 14, "google.protobuf.Duration"
28
- optional :crypto_key_backend, :string, 15
29
- oneof :rotation_schedule do
30
- optional :rotation_period, :message, 8, "google.protobuf.Duration"
31
- end
32
- end
33
- add_enum "google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose" do
34
- value :CRYPTO_KEY_PURPOSE_UNSPECIFIED, 0
35
- value :ENCRYPT_DECRYPT, 1
36
- value :ASYMMETRIC_SIGN, 5
37
- value :ASYMMETRIC_DECRYPT, 6
38
- value :MAC, 9
39
- end
40
- add_message "google.cloud.kms.v1.CryptoKeyVersionTemplate" do
41
- optional :protection_level, :enum, 1, "google.cloud.kms.v1.ProtectionLevel"
42
- optional :algorithm, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
43
- end
44
- add_message "google.cloud.kms.v1.KeyOperationAttestation" do
45
- optional :format, :enum, 4, "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat"
46
- optional :content, :bytes, 5
47
- optional :cert_chains, :message, 6, "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains"
48
- end
49
- add_message "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains" do
50
- repeated :cavium_certs, :string, 1
51
- repeated :google_card_certs, :string, 2
52
- repeated :google_partition_certs, :string, 3
53
- end
54
- add_enum "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat" do
55
- value :ATTESTATION_FORMAT_UNSPECIFIED, 0
56
- value :CAVIUM_V1_COMPRESSED, 3
57
- value :CAVIUM_V2_COMPRESSED, 4
58
- end
59
- add_message "google.cloud.kms.v1.CryptoKeyVersion" do
60
- optional :name, :string, 1
61
- optional :state, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState"
62
- optional :protection_level, :enum, 7, "google.cloud.kms.v1.ProtectionLevel"
63
- optional :algorithm, :enum, 10, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
64
- optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
65
- optional :create_time, :message, 4, "google.protobuf.Timestamp"
66
- optional :generate_time, :message, 11, "google.protobuf.Timestamp"
67
- optional :destroy_time, :message, 5, "google.protobuf.Timestamp"
68
- optional :destroy_event_time, :message, 6, "google.protobuf.Timestamp"
69
- optional :import_job, :string, 14
70
- optional :import_time, :message, 15, "google.protobuf.Timestamp"
71
- optional :import_failure_reason, :string, 16
72
- optional :generation_failure_reason, :string, 19
73
- optional :external_destruction_failure_reason, :string, 20
74
- optional :external_protection_level_options, :message, 17, "google.cloud.kms.v1.ExternalProtectionLevelOptions"
75
- optional :reimport_eligible, :bool, 18
76
- end
77
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
78
- value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
79
- value :GOOGLE_SYMMETRIC_ENCRYPTION, 1
80
- value :RSA_SIGN_PSS_2048_SHA256, 2
81
- value :RSA_SIGN_PSS_3072_SHA256, 3
82
- value :RSA_SIGN_PSS_4096_SHA256, 4
83
- value :RSA_SIGN_PSS_4096_SHA512, 15
84
- value :RSA_SIGN_PKCS1_2048_SHA256, 5
85
- value :RSA_SIGN_PKCS1_3072_SHA256, 6
86
- value :RSA_SIGN_PKCS1_4096_SHA256, 7
87
- value :RSA_SIGN_PKCS1_4096_SHA512, 16
88
- value :RSA_SIGN_RAW_PKCS1_2048, 28
89
- value :RSA_SIGN_RAW_PKCS1_3072, 29
90
- value :RSA_SIGN_RAW_PKCS1_4096, 30
91
- value :RSA_DECRYPT_OAEP_2048_SHA256, 8
92
- value :RSA_DECRYPT_OAEP_3072_SHA256, 9
93
- value :RSA_DECRYPT_OAEP_4096_SHA256, 10
94
- value :RSA_DECRYPT_OAEP_4096_SHA512, 17
95
- value :RSA_DECRYPT_OAEP_2048_SHA1, 37
96
- value :RSA_DECRYPT_OAEP_3072_SHA1, 38
97
- value :RSA_DECRYPT_OAEP_4096_SHA1, 39
98
- value :EC_SIGN_P256_SHA256, 12
99
- value :EC_SIGN_P384_SHA384, 13
100
- value :EC_SIGN_SECP256K1_SHA256, 31
101
- value :HMAC_SHA256, 32
102
- value :HMAC_SHA1, 33
103
- value :HMAC_SHA384, 34
104
- value :HMAC_SHA512, 35
105
- value :HMAC_SHA224, 36
106
- value :EXTERNAL_SYMMETRIC_ENCRYPTION, 18
107
- end
108
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState" do
109
- value :CRYPTO_KEY_VERSION_STATE_UNSPECIFIED, 0
110
- value :PENDING_GENERATION, 5
111
- value :ENABLED, 1
112
- value :DISABLED, 2
113
- value :DESTROYED, 3
114
- value :DESTROY_SCHEDULED, 4
115
- value :PENDING_IMPORT, 6
116
- value :IMPORT_FAILED, 7
117
- value :GENERATION_FAILED, 8
118
- value :PENDING_EXTERNAL_DESTRUCTION, 9
119
- value :EXTERNAL_DESTRUCTION_FAILED, 10
120
- end
121
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView" do
122
- value :CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED, 0
123
- value :FULL, 1
124
- end
125
- add_message "google.cloud.kms.v1.PublicKey" do
126
- optional :pem, :string, 1
127
- optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
128
- optional :pem_crc32c, :message, 3, "google.protobuf.Int64Value"
129
- optional :name, :string, 4
130
- optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
131
- end
132
- add_message "google.cloud.kms.v1.ImportJob" do
133
- optional :name, :string, 1
134
- optional :import_method, :enum, 2, "google.cloud.kms.v1.ImportJob.ImportMethod"
135
- optional :protection_level, :enum, 9, "google.cloud.kms.v1.ProtectionLevel"
136
- optional :create_time, :message, 3, "google.protobuf.Timestamp"
137
- optional :generate_time, :message, 4, "google.protobuf.Timestamp"
138
- optional :expire_time, :message, 5, "google.protobuf.Timestamp"
139
- optional :expire_event_time, :message, 10, "google.protobuf.Timestamp"
140
- optional :state, :enum, 6, "google.cloud.kms.v1.ImportJob.ImportJobState"
141
- optional :public_key, :message, 7, "google.cloud.kms.v1.ImportJob.WrappingPublicKey"
142
- optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
143
- end
144
- add_message "google.cloud.kms.v1.ImportJob.WrappingPublicKey" do
145
- optional :pem, :string, 1
146
- end
147
- add_enum "google.cloud.kms.v1.ImportJob.ImportMethod" do
148
- value :IMPORT_METHOD_UNSPECIFIED, 0
149
- value :RSA_OAEP_3072_SHA1_AES_256, 1
150
- value :RSA_OAEP_4096_SHA1_AES_256, 2
151
- value :RSA_OAEP_3072_SHA256_AES_256, 3
152
- value :RSA_OAEP_4096_SHA256_AES_256, 4
153
- value :RSA_OAEP_3072_SHA256, 5
154
- value :RSA_OAEP_4096_SHA256, 6
155
- end
156
- add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
157
- value :IMPORT_JOB_STATE_UNSPECIFIED, 0
158
- value :PENDING_GENERATION, 1
159
- value :ACTIVE, 2
160
- value :EXPIRED, 3
161
- end
162
- add_message "google.cloud.kms.v1.ExternalProtectionLevelOptions" do
163
- optional :external_key_uri, :string, 1
164
- optional :ekm_connection_key_path, :string, 2
165
- end
166
- add_enum "google.cloud.kms.v1.ProtectionLevel" do
167
- value :PROTECTION_LEVEL_UNSPECIFIED, 0
168
- value :SOFTWARE, 1
169
- value :HSM, 2
170
- value :EXTERNAL, 3
171
- value :EXTERNAL_VPC, 4
13
+
14
+ descriptor_data = "\n#google/cloud/kms/v1/resources.proto\x12\x13google.cloud.kms.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/wrappers.proto\"\xb5\x01\n\x07KeyRing\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03:a\xea\x41^\n\x1f\x63loudkms.googleapis.com/KeyRing\x12;projects/{project}/locations/{location}/keyRings/{key_ring}\"\x95\x07\n\tCryptoKey\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12;\n\x07primary\x18\x02 \x01(\x0b\x32%.google.cloud.kms.v1.CryptoKeyVersionB\x03\xe0\x41\x03\x12\x45\n\x07purpose\x18\x03 \x01(\x0e\x32/.google.cloud.kms.v1.CryptoKey.CryptoKeyPurposeB\x03\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\x12next_rotation_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x34\n\x0frotation_period\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationH\x00\x12G\n\x10version_template\x18\x0b \x01(\x0b\x32-.google.cloud.kms.v1.CryptoKeyVersionTemplate\x12:\n\x06labels\x18\n \x03(\x0b\x32*.google.cloud.kms.v1.CryptoKey.LabelsEntry\x12\x18\n\x0bimport_only\x18\r \x01(\x08\x42\x03\xe0\x41\x05\x12\x42\n\x1a\x64\x65stroy_scheduled_duration\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x05\x12%\n\x12\x63rypto_key_backend\x18\x0f \x01(\tB\t\xe0\x41\x05\xfa\x41\x03\n\x01*\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"\x81\x01\n\x10\x43ryptoKeyPurpose\x12\"\n\x1e\x43RYPTO_KEY_PURPOSE_UNSPECIFIED\x10\x00\x12\x13\n\x0f\x45NCRYPT_DECRYPT\x10\x01\x12\x13\n\x0f\x41SYMMETRIC_SIGN\x10\x05\x12\x16\n\x12\x41SYMMETRIC_DECRYPT\x10\x06\x12\x07\n\x03MAC\x10\t:{\xea\x41x\n!cloudkms.googleapis.com/CryptoKey\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}B\x13\n\x11rotation_schedule\"\xb3\x01\n\x18\x43ryptoKeyVersionTemplate\x12>\n\x10protection_level\x18\x01 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel\x12W\n\talgorithm\x18\x03 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x02\"\xb1\x03\n\x17KeyOperationAttestation\x12S\n\x06\x66ormat\x18\x04 \x01(\x0e\x32>.google.cloud.kms.v1.KeyOperationAttestation.AttestationFormatB\x03\xe0\x41\x03\x12\x14\n\x07\x63ontent\x18\x05 \x01(\x0c\x42\x03\xe0\x41\x03\x12X\n\x0b\x63\x65rt_chains\x18\x06 \x01(\x0b\x32>.google.cloud.kms.v1.KeyOperationAttestation.CertificateChainsB\x03\xe0\x41\x03\x1a\x64\n\x11\x43\x65rtificateChains\x12\x14\n\x0c\x63\x61vium_certs\x18\x01 \x03(\t\x12\x19\n\x11google_card_certs\x18\x02 \x03(\t\x12\x1e\n\x16google_partition_certs\x18\x03 \x03(\t\"k\n\x11\x41ttestationFormat\x12\"\n\x1e\x41TTESTATION_FORMAT_UNSPECIFIED\x10\x00\x12\x18\n\x14\x43\x41VIUM_V1_COMPRESSED\x10\x03\x12\x18\n\x14\x43\x41VIUM_V2_COMPRESSED\x10\x04\"\x86\x12\n\x10\x43ryptoKeyVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\x05state\x18\x03 \x01(\x0e\x32;.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState\x12\x43\n\x10protection_level\x18\x07 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x03\xe0\x41\x03\x12W\n\talgorithm\x18\n \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12;\n\x12\x64\x65stroy_event_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x17\n\nimport_job\x18\x0e \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0bimport_time\x18\x0f \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\"\n\x15import_failure_reason\x18\x10 \x01(\tB\x03\xe0\x41\x03\x12&\n\x19generation_failure_reason\x18\x13 \x01(\tB\x03\xe0\x41\x03\x12\x30\n#external_destruction_failure_reason\x18\x14 \x01(\tB\x03\xe0\x41\x03\x12^\n!external_protection_level_options\x18\x11 \x01(\x0b\x32\x33.google.cloud.kms.v1.ExternalProtectionLevelOptions\x12\x1e\n\x11reimport_eligible\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\"\xe7\x06\n\x19\x43ryptoKeyVersionAlgorithm\x12,\n(CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED\x10\x00\x12\x1f\n\x1bGOOGLE_SYMMETRIC_ENCRYPTION\x10\x01\x12\x1c\n\x18RSA_SIGN_PSS_2048_SHA256\x10\x02\x12\x1c\n\x18RSA_SIGN_PSS_3072_SHA256\x10\x03\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA256\x10\x04\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA512\x10\x0f\x12\x1e\n\x1aRSA_SIGN_PKCS1_2048_SHA256\x10\x05\x12\x1e\n\x1aRSA_SIGN_PKCS1_3072_SHA256\x10\x06\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA256\x10\x07\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA512\x10\x10\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_2048\x10\x1c\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_3072\x10\x1d\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_4096\x10\x1e\x12 \n\x1cRSA_DECRYPT_OAEP_2048_SHA256\x10\x08\x12 \n\x1cRSA_DECRYPT_OAEP_3072_SHA256\x10\t\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA256\x10\n\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA512\x10\x11\x12\x1e\n\x1aRSA_DECRYPT_OAEP_2048_SHA1\x10%\x12\x1e\n\x1aRSA_DECRYPT_OAEP_3072_SHA1\x10&\x12\x1e\n\x1aRSA_DECRYPT_OAEP_4096_SHA1\x10\'\x12\x17\n\x13\x45\x43_SIGN_P256_SHA256\x10\x0c\x12\x17\n\x13\x45\x43_SIGN_P384_SHA384\x10\r\x12\x1c\n\x18\x45\x43_SIGN_SECP256K1_SHA256\x10\x1f\x12\x0f\n\x0bHMAC_SHA256\x10 \x12\r\n\tHMAC_SHA1\x10!\x12\x0f\n\x0bHMAC_SHA384\x10\"\x12\x0f\n\x0bHMAC_SHA512\x10#\x12\x0f\n\x0bHMAC_SHA224\x10$\x12!\n\x1d\x45XTERNAL_SYMMETRIC_ENCRYPTION\x10\x12\"\x9b\x02\n\x15\x43ryptoKeyVersionState\x12(\n$CRYPTO_KEY_VERSION_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x05\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03\x12\x15\n\x11\x44\x45STROY_SCHEDULED\x10\x04\x12\x12\n\x0ePENDING_IMPORT\x10\x06\x12\x11\n\rIMPORT_FAILED\x10\x07\x12\x15\n\x11GENERATION_FAILED\x10\x08\x12 \n\x1cPENDING_EXTERNAL_DESTRUCTION\x10\t\x12\x1f\n\x1b\x45XTERNAL_DESTRUCTION_FAILED\x10\n\"I\n\x14\x43ryptoKeyVersionView\x12\'\n#CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01:\xaa\x01\xea\x41\xa6\x01\n(cloudkms.googleapis.com/CryptoKeyVersion\x12zprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}\"\x9c\x03\n\tPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\x12R\n\talgorithm\x18\x02 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm\x12/\n\npem_crc32c\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x0c\n\x04name\x18\x04 \x01(\t\x12>\n\x10protection_level\x18\x05 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel:\xae\x01\xea\x41\xaa\x01\n!cloudkms.googleapis.com/PublicKey\x12\x84\x01projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}/publicKey\"\xd4\x08\n\tImportJob\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\rimport_method\x18\x02 \x01(\x0e\x32+.google.cloud.kms.v1.ImportJob.ImportMethodB\x06\xe0\x41\x02\xe0\x41\x05\x12\x46\n\x10protection_level\x18\t \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x06\xe0\x41\x02\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12:\n\x11\x65xpire_event_time\x18\n \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x05state\x18\x06 \x01(\x0e\x32-.google.cloud.kms.v1.ImportJob.ImportJobStateB\x03\xe0\x41\x03\x12I\n\npublic_key\x18\x07 \x01(\x0b\x32\x30.google.cloud.kms.v1.ImportJob.WrappingPublicKeyB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x1a \n\x11WrappingPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\"\xe5\x01\n\x0cImportMethod\x12\x1d\n\x19IMPORT_METHOD_UNSPECIFIED\x10\x00\x12\x1e\n\x1aRSA_OAEP_3072_SHA1_AES_256\x10\x01\x12\x1e\n\x1aRSA_OAEP_4096_SHA1_AES_256\x10\x02\x12 \n\x1cRSA_OAEP_3072_SHA256_AES_256\x10\x03\x12 \n\x1cRSA_OAEP_4096_SHA256_AES_256\x10\x04\x12\x18\n\x14RSA_OAEP_3072_SHA256\x10\x05\x12\x18\n\x14RSA_OAEP_4096_SHA256\x10\x06\"c\n\x0eImportJobState\x12 \n\x1cIMPORT_JOB_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x01\x12\n\n\x06\x41\x43TIVE\x10\x02\x12\x0b\n\x07\x45XPIRED\x10\x03:{\xea\x41x\n!cloudkms.googleapis.com/ImportJob\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/importJobs/{import_job}\"[\n\x1e\x45xternalProtectionLevelOptions\x12\x18\n\x10\x65xternal_key_uri\x18\x01 \x01(\t\x12\x1f\n\x17\x65km_connection_key_path\x18\x02 \x01(\t*j\n\x0fProtectionLevel\x12 \n\x1cPROTECTION_LEVEL_UNSPECIFIED\x10\x00\x12\x0c\n\x08SOFTWARE\x10\x01\x12\x07\n\x03HSM\x10\x02\x12\x0c\n\x08\x45XTERNAL\x10\x03\x12\x10\n\x0c\x45XTERNAL_VPC\x10\x04\x42\x88\x01\n\x17\x63om.google.cloud.kms.v1B\x11KmsResourcesProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1b\x06proto3"
15
+
16
+ pool = Google::Protobuf::DescriptorPool.generated_pool
17
+
18
+ begin
19
+ pool.add_serialized_file(descriptor_data)
20
+ rescue TypeError => e
21
+ # Compatibility code: will be removed in the next major version.
22
+ require 'google/protobuf/descriptor_pb'
23
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
24
+ parsed.clear_dependency
25
+ serialized = parsed.class.encode(parsed)
26
+ file = pool.add_serialized_file(serialized)
27
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
28
+ imports = [
29
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
30
+ ["google.protobuf.Duration", "google/protobuf/duration.proto"],
31
+ ["google.protobuf.Int64Value", "google/protobuf/wrappers.proto"],
32
+ ]
33
+ imports.each do |type_name, expected_filename|
34
+ import_file = pool.lookup(type_name).file_descriptor
35
+ if import_file.name != expected_filename
36
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
172
37
  end
173
38
  end
39
+ warn "Each proto file must use a consistent fully-qualified name."
40
+ warn "This will become an error in the next major version."
174
41
  end
175
42
 
176
43
  module Google