google-cloud-kms-v1 0.19.0 → 0.21.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/kms/v1/ekm_service/client.rb +4 -2
- data/lib/google/cloud/kms/v1/ekm_service/rest/client.rb +4 -2
- data/lib/google/cloud/kms/v1/ekm_service/rest/service_stub.rb +7 -7
- data/lib/google/cloud/kms/v1/ekm_service_pb.rb +26 -71
- data/lib/google/cloud/kms/v1/key_management_service/client.rb +344 -2
- data/lib/google/cloud/kms/v1/key_management_service/rest/client.rb +298 -2
- data/lib/google/cloud/kms/v1/key_management_service/rest/service_stub.rb +146 -26
- data/lib/google/cloud/kms/v1/resources_pb.rb +27 -160
- data/lib/google/cloud/kms/v1/service_pb.rb +31 -215
- data/lib/google/cloud/kms/v1/service_services_pb.rb +12 -0
- data/lib/google/cloud/kms/v1/version.rb +1 -1
- data/proto_docs/google/cloud/kms/v1/resources.rb +13 -0
- data/proto_docs/google/cloud/kms/v1/service.rb +360 -0
- data/proto_docs/google/protobuf/any.rb +7 -4
- data/proto_docs/google/protobuf/timestamp.rb +1 -3
- metadata +4 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 359686bf360890c730516a1ad6df0583f2624726d0d13e0f6e7ab07ecbf48ebc
|
4
|
+
data.tar.gz: 9eeeb7594661333b65d6842cb3e65b8868c1c7b6a97222ed92a079bae3b4d20a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cd0305ad53291b43543b5b2b552c16b23099373684224367a6677573700b001a5d641f63b0c60a4f4bf96de4fba6dd91b3ad884eca5fcf723d3cfce8b0b0886e
|
7
|
+
data.tar.gz: b7cdc2bed32747a46d54bd95ee62953f5e2b1b7bd88d1f46da148c78629cb202117e8f2242a927a5c9e2790d44244a9f0cda9d79eb97c0aad0a98f77823aaa45
|
@@ -149,7 +149,7 @@ module Google
|
|
149
149
|
credentials = @config.credentials
|
150
150
|
# Use self-signed JWT if the endpoint is unchanged from default,
|
151
151
|
# but only if the default endpoint does not have a region prefix.
|
152
|
-
enable_self_signed_jwt = @config.endpoint ==
|
152
|
+
enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
|
153
153
|
!@config.endpoint.split(".").first.include?("-")
|
154
154
|
credentials ||= Credentials.default scope: @config.scope,
|
155
155
|
enable_self_signed_jwt: enable_self_signed_jwt
|
@@ -925,7 +925,9 @@ module Google
|
|
925
925
|
class Configuration
|
926
926
|
extend ::Gapic::Config
|
927
927
|
|
928
|
-
|
928
|
+
DEFAULT_ENDPOINT = "cloudkms.googleapis.com"
|
929
|
+
|
930
|
+
config_attr :endpoint, DEFAULT_ENDPOINT, ::String
|
929
931
|
config_attr :credentials, nil do |value|
|
930
932
|
allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
|
931
933
|
allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
|
@@ -145,7 +145,7 @@ module Google
|
|
145
145
|
credentials = @config.credentials
|
146
146
|
# Use self-signed JWT if the endpoint is unchanged from default,
|
147
147
|
# but only if the default endpoint does not have a region prefix.
|
148
|
-
enable_self_signed_jwt = @config.endpoint ==
|
148
|
+
enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
|
149
149
|
!@config.endpoint.split(".").first.include?("-")
|
150
150
|
credentials ||= Credentials.default scope: @config.scope,
|
151
151
|
enable_self_signed_jwt: enable_self_signed_jwt
|
@@ -744,7 +744,9 @@ module Google
|
|
744
744
|
class Configuration
|
745
745
|
extend ::Gapic::Config
|
746
746
|
|
747
|
-
|
747
|
+
DEFAULT_ENDPOINT = "cloudkms.googleapis.com"
|
748
|
+
|
749
|
+
config_attr :endpoint, DEFAULT_ENDPOINT, ::String
|
748
750
|
config_attr :credentials, nil do |value|
|
749
751
|
allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
|
750
752
|
allowed.any? { |klass| klass === value }
|
@@ -59,7 +59,7 @@ module Google
|
|
59
59
|
|
60
60
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_ekm_connections_request request_pb
|
61
61
|
query_string_params = if query_string_params.any?
|
62
|
-
query_string_params.to_h { |p| p.split
|
62
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
63
63
|
else
|
64
64
|
{}
|
65
65
|
end
|
@@ -97,7 +97,7 @@ module Google
|
|
97
97
|
|
98
98
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_ekm_connection_request request_pb
|
99
99
|
query_string_params = if query_string_params.any?
|
100
|
-
query_string_params.to_h { |p| p.split
|
100
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
101
101
|
else
|
102
102
|
{}
|
103
103
|
end
|
@@ -135,7 +135,7 @@ module Google
|
|
135
135
|
|
136
136
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_ekm_connection_request request_pb
|
137
137
|
query_string_params = if query_string_params.any?
|
138
|
-
query_string_params.to_h { |p| p.split
|
138
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
139
139
|
else
|
140
140
|
{}
|
141
141
|
end
|
@@ -173,7 +173,7 @@ module Google
|
|
173
173
|
|
174
174
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_ekm_connection_request request_pb
|
175
175
|
query_string_params = if query_string_params.any?
|
176
|
-
query_string_params.to_h { |p| p.split
|
176
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
177
177
|
else
|
178
178
|
{}
|
179
179
|
end
|
@@ -211,7 +211,7 @@ module Google
|
|
211
211
|
|
212
212
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_ekm_config_request request_pb
|
213
213
|
query_string_params = if query_string_params.any?
|
214
|
-
query_string_params.to_h { |p| p.split
|
214
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
215
215
|
else
|
216
216
|
{}
|
217
217
|
end
|
@@ -249,7 +249,7 @@ module Google
|
|
249
249
|
|
250
250
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_ekm_config_request request_pb
|
251
251
|
query_string_params = if query_string_params.any?
|
252
|
-
query_string_params.to_h { |p| p.split
|
252
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
253
253
|
else
|
254
254
|
{}
|
255
255
|
end
|
@@ -287,7 +287,7 @@ module Google
|
|
287
287
|
|
288
288
|
verb, uri, query_string_params, body = ServiceStub.transcode_verify_connectivity_request request_pb
|
289
289
|
query_string_params = if query_string_params.any?
|
290
|
-
query_string_params.to_h { |p| p.split
|
290
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
291
291
|
else
|
292
292
|
{}
|
293
293
|
end
|
@@ -1,3 +1,4 @@
|
|
1
|
+
# frozen_string_literal: true
|
1
2
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
3
|
# source: google/cloud/kms/v1/ekm_service.proto
|
3
4
|
|
@@ -10,79 +11,33 @@ require 'google/api/resource_pb'
|
|
10
11
|
require 'google/protobuf/field_mask_pb'
|
11
12
|
require 'google/protobuf/timestamp_pb'
|
12
13
|
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
optional :ekm_connection, :message, 1, "google.cloud.kms.v1.EkmConnection"
|
37
|
-
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
38
|
-
end
|
39
|
-
add_message "google.cloud.kms.v1.GetEkmConfigRequest" do
|
40
|
-
optional :name, :string, 1
|
41
|
-
end
|
42
|
-
add_message "google.cloud.kms.v1.UpdateEkmConfigRequest" do
|
43
|
-
optional :ekm_config, :message, 1, "google.cloud.kms.v1.EkmConfig"
|
44
|
-
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
45
|
-
end
|
46
|
-
add_message "google.cloud.kms.v1.Certificate" do
|
47
|
-
optional :raw_der, :bytes, 1
|
48
|
-
optional :parsed, :bool, 2
|
49
|
-
optional :issuer, :string, 3
|
50
|
-
optional :subject, :string, 4
|
51
|
-
repeated :subject_alternative_dns_names, :string, 5
|
52
|
-
optional :not_before_time, :message, 6, "google.protobuf.Timestamp"
|
53
|
-
optional :not_after_time, :message, 7, "google.protobuf.Timestamp"
|
54
|
-
optional :serial_number, :string, 8
|
55
|
-
optional :sha256_fingerprint, :string, 9
|
56
|
-
end
|
57
|
-
add_message "google.cloud.kms.v1.EkmConnection" do
|
58
|
-
optional :name, :string, 1
|
59
|
-
optional :create_time, :message, 2, "google.protobuf.Timestamp"
|
60
|
-
repeated :service_resolvers, :message, 3, "google.cloud.kms.v1.EkmConnection.ServiceResolver"
|
61
|
-
optional :etag, :string, 5
|
62
|
-
optional :key_management_mode, :enum, 6, "google.cloud.kms.v1.EkmConnection.KeyManagementMode"
|
63
|
-
optional :crypto_space_path, :string, 7
|
64
|
-
end
|
65
|
-
add_message "google.cloud.kms.v1.EkmConnection.ServiceResolver" do
|
66
|
-
optional :service_directory_service, :string, 1
|
67
|
-
optional :endpoint_filter, :string, 2
|
68
|
-
optional :hostname, :string, 3
|
69
|
-
repeated :server_certificates, :message, 4, "google.cloud.kms.v1.Certificate"
|
70
|
-
end
|
71
|
-
add_enum "google.cloud.kms.v1.EkmConnection.KeyManagementMode" do
|
72
|
-
value :KEY_MANAGEMENT_MODE_UNSPECIFIED, 0
|
73
|
-
value :MANUAL, 1
|
74
|
-
value :CLOUD_KMS, 2
|
75
|
-
end
|
76
|
-
add_message "google.cloud.kms.v1.EkmConfig" do
|
77
|
-
optional :name, :string, 1
|
78
|
-
optional :default_ekm_connection, :string, 2
|
79
|
-
end
|
80
|
-
add_message "google.cloud.kms.v1.VerifyConnectivityRequest" do
|
81
|
-
optional :name, :string, 1
|
82
|
-
end
|
83
|
-
add_message "google.cloud.kms.v1.VerifyConnectivityResponse" do
|
14
|
+
|
15
|
+
descriptor_data = "\n%google/cloud/kms/v1/ekm_service.proto\x12\x13google.cloud.kms.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a google/protobuf/field_mask.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xb3\x01\n\x19ListEkmConnectionsRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\x12\x15\n\x08order_by\x18\x05 \x01(\tB\x03\xe0\x41\x01\"\x86\x01\n\x1aListEkmConnectionsResponse\x12;\n\x0f\x65km_connections\x18\x01 \x03(\x0b\x32\".google.cloud.kms.v1.EkmConnection\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"V\n\x17GetEkmConnectionRequest\x12;\n\x04name\x18\x01 \x01(\tB-\xe0\x41\x02\xfa\x41\'\n%cloudkms.googleapis.com/EkmConnection\"\xb8\x01\n\x1a\x43reateEkmConnectionRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12\x1e\n\x11\x65km_connection_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12?\n\x0e\x65km_connection\x18\x03 \x01(\x0b\x32\".google.cloud.kms.v1.EkmConnectionB\x03\xe0\x41\x02\"\x93\x01\n\x1aUpdateEkmConnectionRequest\x12?\n\x0e\x65km_connection\x18\x01 \x01(\x0b\x32\".google.cloud.kms.v1.EkmConnectionB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"N\n\x13GetEkmConfigRequest\x12\x37\n\x04name\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!cloudkms.googleapis.com/EkmConfig\"\x87\x01\n\x16UpdateEkmConfigRequest\x12\x37\n\nekm_config\x18\x01 \x01(\x0b\x32\x1e.google.cloud.kms.v1.EkmConfigB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"\xbf\x02\n\x0b\x43\x65rtificate\x12\x14\n\x07raw_der\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x02\x12\x13\n\x06parsed\x18\x02 \x01(\x08\x42\x03\xe0\x41\x03\x12\x13\n\x06issuer\x18\x03 \x01(\tB\x03\xe0\x41\x03\x12\x14\n\x07subject\x18\x04 \x01(\tB\x03\xe0\x41\x03\x12*\n\x1dsubject_alternative_dns_names\x18\x05 \x03(\tB\x03\xe0\x41\x03\x12\x38\n\x0fnot_before_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x37\n\x0enot_after_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x1a\n\rserial_number\x18\x08 \x01(\tB\x03\xe0\x41\x03\x12\x1f\n\x12sha256_fingerprint\x18\t \x01(\tB\x03\xe0\x41\x03\"\xdd\x05\n\rEkmConnection\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12M\n\x11service_resolvers\x18\x03 \x03(\x0b\x32\x32.google.cloud.kms.v1.EkmConnection.ServiceResolver\x12\x11\n\x04\x65tag\x18\x05 \x01(\tB\x03\xe0\x41\x01\x12V\n\x13key_management_mode\x18\x06 \x01(\x0e\x32\x34.google.cloud.kms.v1.EkmConnection.KeyManagementModeB\x03\xe0\x41\x01\x12\x1e\n\x11\x63rypto_space_path\x18\x07 \x01(\tB\x03\xe0\x41\x01\x1a\xde\x01\n\x0fServiceResolver\x12R\n\x19service_directory_service\x18\x01 \x01(\tB/\xe0\x41\x02\xfa\x41)\n\'servicedirectory.googleapis.com/Service\x12\x1c\n\x0f\x65ndpoint_filter\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12\x15\n\x08hostname\x18\x03 \x01(\tB\x03\xe0\x41\x02\x12\x42\n\x13server_certificates\x18\x04 \x03(\x0b\x32 .google.cloud.kms.v1.CertificateB\x03\xe0\x41\x02\"S\n\x11KeyManagementMode\x12#\n\x1fKEY_MANAGEMENT_MODE_UNSPECIFIED\x10\x00\x12\n\n\x06MANUAL\x10\x01\x12\r\n\tCLOUD_KMS\x10\x02:s\xea\x41p\n%cloudkms.googleapis.com/EkmConnection\x12Gprojects/{project}/locations/{location}/ekmConnections/{ekm_connection}\"\xc8\x01\n\tEkmConfig\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12M\n\x16\x64\x65\x66\x61ult_ekm_connection\x18\x02 \x01(\tB-\xe0\x41\x01\xfa\x41\'\n%cloudkms.googleapis.com/EkmConnection:Y\xea\x41V\n!cloudkms.googleapis.com/EkmConfig\x12\x31projects/{project}/locations/{location}/ekmConfig\"X\n\x19VerifyConnectivityRequest\x12;\n\x04name\x18\x01 \x01(\tB-\xe0\x41\x02\xfa\x41\'\n%cloudkms.googleapis.com/EkmConnection\"\x1c\n\x1aVerifyConnectivityResponse2\xdc\x0b\n\nEkmService\x12\xba\x01\n\x12ListEkmConnections\x12..google.cloud.kms.v1.ListEkmConnectionsRequest\x1a/.google.cloud.kms.v1.ListEkmConnectionsResponse\"C\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{parent=projects/*/locations/*}/ekmConnections\xda\x41\x06parent\x12\xa7\x01\n\x10GetEkmConnection\x12,.google.cloud.kms.v1.GetEkmConnectionRequest\x1a\".google.cloud.kms.v1.EkmConnection\"A\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{name=projects/*/locations/*/ekmConnections/*}\xda\x41\x04name\x12\xe0\x01\n\x13\x43reateEkmConnection\x12/.google.cloud.kms.v1.CreateEkmConnectionRequest\x1a\".google.cloud.kms.v1.EkmConnection\"t\x82\xd3\xe4\x93\x02\x44\"2/v1/{parent=projects/*/locations/*}/ekmConnections:\x0e\x65km_connection\xda\x41\'parent,ekm_connection_id,ekm_connection\x12\xe2\x01\n\x13UpdateEkmConnection\x12/.google.cloud.kms.v1.UpdateEkmConnectionRequest\x1a\".google.cloud.kms.v1.EkmConnection\"v\x82\xd3\xe4\x93\x02S2A/v1/{ekm_connection.name=projects/*/locations/*/ekmConnections/*}:\x0e\x65km_connection\xda\x41\x1a\x65km_connection,update_mask\x12\x94\x01\n\x0cGetEkmConfig\x12(.google.cloud.kms.v1.GetEkmConfigRequest\x1a\x1e.google.cloud.kms.v1.EkmConfig\":\x82\xd3\xe4\x93\x02-\x12+/v1/{name=projects/*/locations/*/ekmConfig}\xda\x41\x04name\x12\xc3\x01\n\x0fUpdateEkmConfig\x12+.google.cloud.kms.v1.UpdateEkmConfigRequest\x1a\x1e.google.cloud.kms.v1.EkmConfig\"c\x82\xd3\xe4\x93\x02\x44\x32\x36/v1/{ekm_config.name=projects/*/locations/*/ekmConfig}:\nekm_config\xda\x41\x16\x65km_config,update_mask\x12\xcb\x01\n\x12VerifyConnectivity\x12..google.cloud.kms.v1.VerifyConnectivityRequest\x1a/.google.cloud.kms.v1.VerifyConnectivityResponse\"T\x82\xd3\xe4\x93\x02G\x12\x45/v1/{name=projects/*/locations/*/ekmConnections/*}:verifyConnectivity\xda\x41\x04name\x1at\xca\x41\x17\x63loudkms.googleapis.com\xd2\x41Whttps://www.googleapis.com/auth/cloud-platform,https://www.googleapis.com/auth/cloudkmsB\x85\x02\n\x17\x63om.google.cloud.kms.v1B\x0f\x45kmServiceProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1\xea\x41|\n\'servicedirectory.googleapis.com/Service\x12Qprojects/{project}/locations/{location}/namespaces/{namespace}/services/{service}b\x06proto3"
|
16
|
+
|
17
|
+
pool = Google::Protobuf::DescriptorPool.generated_pool
|
18
|
+
|
19
|
+
begin
|
20
|
+
pool.add_serialized_file(descriptor_data)
|
21
|
+
rescue TypeError => e
|
22
|
+
# Compatibility code: will be removed in the next major version.
|
23
|
+
require 'google/protobuf/descriptor_pb'
|
24
|
+
parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
|
25
|
+
parsed.clear_dependency
|
26
|
+
serialized = parsed.class.encode(parsed)
|
27
|
+
file = pool.add_serialized_file(serialized)
|
28
|
+
warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
|
29
|
+
imports = [
|
30
|
+
["google.protobuf.FieldMask", "google/protobuf/field_mask.proto"],
|
31
|
+
["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
|
32
|
+
]
|
33
|
+
imports.each do |type_name, expected_filename|
|
34
|
+
import_file = pool.lookup(type_name).file_descriptor
|
35
|
+
if import_file.name != expected_filename
|
36
|
+
warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
|
84
37
|
end
|
85
38
|
end
|
39
|
+
warn "Each proto file must use a consistent fully-qualified name."
|
40
|
+
warn "This will become an error in the next major version."
|
86
41
|
end
|
87
42
|
|
88
43
|
module Google
|
@@ -260,7 +260,7 @@ module Google
|
|
260
260
|
credentials = @config.credentials
|
261
261
|
# Use self-signed JWT if the endpoint is unchanged from default,
|
262
262
|
# but only if the default endpoint does not have a region prefix.
|
263
|
-
enable_self_signed_jwt = @config.endpoint ==
|
263
|
+
enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
|
264
264
|
!@config.endpoint.split(".").first.include?("-")
|
265
265
|
credentials ||= Credentials.default scope: @config.scope,
|
266
266
|
enable_self_signed_jwt: enable_self_signed_jwt
|
@@ -2539,6 +2539,332 @@ module Google
|
|
2539
2539
|
raise ::Google::Cloud::Error.from_error(e)
|
2540
2540
|
end
|
2541
2541
|
|
2542
|
+
##
|
2543
|
+
# Encrypts data using portable cryptographic primitives. Most users should
|
2544
|
+
# choose {::Google::Cloud::Kms::V1::KeyManagementService::Client#encrypt Encrypt} and
|
2545
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client#decrypt Decrypt} rather than
|
2546
|
+
# their raw counterparts. The
|
2547
|
+
# {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose} must be
|
2548
|
+
# {::Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::RAW_ENCRYPT_DECRYPT RAW_ENCRYPT_DECRYPT}.
|
2549
|
+
#
|
2550
|
+
# @overload raw_encrypt(request, options = nil)
|
2551
|
+
# Pass arguments to `raw_encrypt` via a request object, either of type
|
2552
|
+
# {::Google::Cloud::Kms::V1::RawEncryptRequest} or an equivalent Hash.
|
2553
|
+
#
|
2554
|
+
# @param request [::Google::Cloud::Kms::V1::RawEncryptRequest, ::Hash]
|
2555
|
+
# A request object representing the call parameters. Required. To specify no
|
2556
|
+
# parameters, or to keep all the default parameter values, pass an empty Hash.
|
2557
|
+
# @param options [::Gapic::CallOptions, ::Hash]
|
2558
|
+
# Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
|
2559
|
+
#
|
2560
|
+
# @overload raw_encrypt(name: nil, plaintext: nil, additional_authenticated_data: nil, plaintext_crc32c: nil, additional_authenticated_data_crc32c: nil, initialization_vector: nil, initialization_vector_crc32c: nil)
|
2561
|
+
# Pass arguments to `raw_encrypt` via keyword arguments. Note that at
|
2562
|
+
# least one keyword argument is required. To specify no parameters, or to keep all
|
2563
|
+
# the default parameter values, pass an empty Hash as a request object (see above).
|
2564
|
+
#
|
2565
|
+
# @param name [::String]
|
2566
|
+
# Required. The resource name of the
|
2567
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for
|
2568
|
+
# encryption.
|
2569
|
+
# @param plaintext [::String]
|
2570
|
+
# Required. The data to encrypt. Must be no larger than 64KiB.
|
2571
|
+
#
|
2572
|
+
# The maximum size depends on the key version's
|
2573
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level}.
|
2574
|
+
# For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE} keys, the
|
2575
|
+
# plaintext must be no larger than 64KiB. For
|
2576
|
+
# {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM} keys, the combined length of
|
2577
|
+
# the plaintext and additional_authenticated_data fields must be no larger
|
2578
|
+
# than 8KiB.
|
2579
|
+
# @param additional_authenticated_data [::String]
|
2580
|
+
# Optional. Optional data that, if specified, must also be provided during
|
2581
|
+
# decryption through
|
2582
|
+
# {::Google::Cloud::Kms::V1::RawDecryptRequest#additional_authenticated_data RawDecryptRequest.additional_authenticated_data}.
|
2583
|
+
#
|
2584
|
+
# This field may only be used in conjunction with an
|
2585
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion#algorithm algorithm} that accepts
|
2586
|
+
# additional authenticated data (for example, AES-GCM).
|
2587
|
+
#
|
2588
|
+
# The maximum size depends on the key version's
|
2589
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level}.
|
2590
|
+
# For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE} keys, the
|
2591
|
+
# plaintext must be no larger than 64KiB. For
|
2592
|
+
# {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM} keys, the combined length of
|
2593
|
+
# the plaintext and additional_authenticated_data fields must be no larger
|
2594
|
+
# than 8KiB.
|
2595
|
+
# @param plaintext_crc32c [::Google::Protobuf::Int64Value, ::Hash]
|
2596
|
+
# Optional. An optional CRC32C checksum of the
|
2597
|
+
# {::Google::Cloud::Kms::V1::RawEncryptRequest#plaintext RawEncryptRequest.plaintext}.
|
2598
|
+
# If specified,
|
2599
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2600
|
+
# verify the integrity of the received plaintext using this checksum.
|
2601
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2602
|
+
# report an error if the checksum verification fails. If you receive a
|
2603
|
+
# checksum error, your client should verify that CRC32C(plaintext) is equal
|
2604
|
+
# to plaintext_crc32c, and if so, perform a limited number of retries. A
|
2605
|
+
# persistent mismatch may indicate an issue in your computation of the CRC32C
|
2606
|
+
# checksum. Note: This field is defined as int64 for reasons of compatibility
|
2607
|
+
# across different languages. However, it is a non-negative integer, which
|
2608
|
+
# will never exceed 2^32-1, and can be safely downconverted to uint32 in
|
2609
|
+
# languages that support this type.
|
2610
|
+
# @param additional_authenticated_data_crc32c [::Google::Protobuf::Int64Value, ::Hash]
|
2611
|
+
# Optional. An optional CRC32C checksum of the
|
2612
|
+
# {::Google::Cloud::Kms::V1::RawEncryptRequest#additional_authenticated_data RawEncryptRequest.additional_authenticated_data}.
|
2613
|
+
# If specified,
|
2614
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2615
|
+
# verify the integrity of the received additional_authenticated_data using
|
2616
|
+
# this checksum.
|
2617
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2618
|
+
# report an error if the checksum verification fails. If you receive a
|
2619
|
+
# checksum error, your client should verify that
|
2620
|
+
# CRC32C(additional_authenticated_data) is equal to
|
2621
|
+
# additional_authenticated_data_crc32c, and if so, perform
|
2622
|
+
# a limited number of retries. A persistent mismatch may indicate an issue in
|
2623
|
+
# your computation of the CRC32C checksum.
|
2624
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
2625
|
+
# different languages. However, it is a non-negative integer, which will
|
2626
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
2627
|
+
# that support this type.
|
2628
|
+
# @param initialization_vector [::String]
|
2629
|
+
# Optional. A customer-supplied initialization vector that will be used for
|
2630
|
+
# encryption. If it is not provided for AES-CBC and AES-CTR, one will be
|
2631
|
+
# generated. It will be returned in
|
2632
|
+
# {::Google::Cloud::Kms::V1::RawEncryptResponse#initialization_vector RawEncryptResponse.initialization_vector}.
|
2633
|
+
# @param initialization_vector_crc32c [::Google::Protobuf::Int64Value, ::Hash]
|
2634
|
+
# Optional. An optional CRC32C checksum of the
|
2635
|
+
# {::Google::Cloud::Kms::V1::RawEncryptRequest#initialization_vector RawEncryptRequest.initialization_vector}.
|
2636
|
+
# If specified,
|
2637
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2638
|
+
# verify the integrity of the received initialization_vector using this
|
2639
|
+
# checksum. {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}
|
2640
|
+
# will report an error if the checksum verification fails. If you receive a
|
2641
|
+
# checksum error, your client should verify that
|
2642
|
+
# CRC32C(initialization_vector) is equal to
|
2643
|
+
# initialization_vector_crc32c, and if so, perform
|
2644
|
+
# a limited number of retries. A persistent mismatch may indicate an issue in
|
2645
|
+
# your computation of the CRC32C checksum.
|
2646
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
2647
|
+
# different languages. However, it is a non-negative integer, which will
|
2648
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
2649
|
+
# that support this type.
|
2650
|
+
#
|
2651
|
+
# @yield [response, operation] Access the result along with the RPC operation
|
2652
|
+
# @yieldparam response [::Google::Cloud::Kms::V1::RawEncryptResponse]
|
2653
|
+
# @yieldparam operation [::GRPC::ActiveCall::Operation]
|
2654
|
+
#
|
2655
|
+
# @return [::Google::Cloud::Kms::V1::RawEncryptResponse]
|
2656
|
+
#
|
2657
|
+
# @raise [::Google::Cloud::Error] if the RPC is aborted.
|
2658
|
+
#
|
2659
|
+
# @example Basic example
|
2660
|
+
# require "google/cloud/kms/v1"
|
2661
|
+
#
|
2662
|
+
# # Create a client object. The client can be reused for multiple calls.
|
2663
|
+
# client = Google::Cloud::Kms::V1::KeyManagementService::Client.new
|
2664
|
+
#
|
2665
|
+
# # Create a request. To set request fields, pass in keyword arguments.
|
2666
|
+
# request = Google::Cloud::Kms::V1::RawEncryptRequest.new
|
2667
|
+
#
|
2668
|
+
# # Call the raw_encrypt method.
|
2669
|
+
# result = client.raw_encrypt request
|
2670
|
+
#
|
2671
|
+
# # The returned object is of type Google::Cloud::Kms::V1::RawEncryptResponse.
|
2672
|
+
# p result
|
2673
|
+
#
|
2674
|
+
def raw_encrypt request, options = nil
|
2675
|
+
raise ::ArgumentError, "request must be provided" if request.nil?
|
2676
|
+
|
2677
|
+
request = ::Gapic::Protobuf.coerce request, to: ::Google::Cloud::Kms::V1::RawEncryptRequest
|
2678
|
+
|
2679
|
+
# Converts hash and nil to an options object
|
2680
|
+
options = ::Gapic::CallOptions.new(**options.to_h) if options.respond_to? :to_h
|
2681
|
+
|
2682
|
+
# Customize the options with defaults
|
2683
|
+
metadata = @config.rpcs.raw_encrypt.metadata.to_h
|
2684
|
+
|
2685
|
+
# Set x-goog-api-client and x-goog-user-project headers
|
2686
|
+
metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
2687
|
+
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
2688
|
+
gapic_version: ::Google::Cloud::Kms::V1::VERSION
|
2689
|
+
metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
2690
|
+
|
2691
|
+
header_params = {}
|
2692
|
+
if request.name
|
2693
|
+
header_params["name"] = request.name
|
2694
|
+
end
|
2695
|
+
|
2696
|
+
request_params_header = header_params.map { |k, v| "#{k}=#{v}" }.join("&")
|
2697
|
+
metadata[:"x-goog-request-params"] ||= request_params_header
|
2698
|
+
|
2699
|
+
options.apply_defaults timeout: @config.rpcs.raw_encrypt.timeout,
|
2700
|
+
metadata: metadata,
|
2701
|
+
retry_policy: @config.rpcs.raw_encrypt.retry_policy
|
2702
|
+
|
2703
|
+
options.apply_defaults timeout: @config.timeout,
|
2704
|
+
metadata: @config.metadata,
|
2705
|
+
retry_policy: @config.retry_policy
|
2706
|
+
|
2707
|
+
@key_management_service_stub.call_rpc :raw_encrypt, request, options: options do |response, operation|
|
2708
|
+
yield response, operation if block_given?
|
2709
|
+
return response
|
2710
|
+
end
|
2711
|
+
rescue ::GRPC::BadStatus => e
|
2712
|
+
raise ::Google::Cloud::Error.from_error(e)
|
2713
|
+
end
|
2714
|
+
|
2715
|
+
##
|
2716
|
+
# Decrypts data that was originally encrypted using a raw cryptographic
|
2717
|
+
# mechanism. The {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose}
|
2718
|
+
# must be
|
2719
|
+
# {::Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::RAW_ENCRYPT_DECRYPT RAW_ENCRYPT_DECRYPT}.
|
2720
|
+
#
|
2721
|
+
# @overload raw_decrypt(request, options = nil)
|
2722
|
+
# Pass arguments to `raw_decrypt` via a request object, either of type
|
2723
|
+
# {::Google::Cloud::Kms::V1::RawDecryptRequest} or an equivalent Hash.
|
2724
|
+
#
|
2725
|
+
# @param request [::Google::Cloud::Kms::V1::RawDecryptRequest, ::Hash]
|
2726
|
+
# A request object representing the call parameters. Required. To specify no
|
2727
|
+
# parameters, or to keep all the default parameter values, pass an empty Hash.
|
2728
|
+
# @param options [::Gapic::CallOptions, ::Hash]
|
2729
|
+
# Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
|
2730
|
+
#
|
2731
|
+
# @overload raw_decrypt(name: nil, ciphertext: nil, additional_authenticated_data: nil, initialization_vector: nil, tag_length: nil, ciphertext_crc32c: nil, additional_authenticated_data_crc32c: nil, initialization_vector_crc32c: nil)
|
2732
|
+
# Pass arguments to `raw_decrypt` via keyword arguments. Note that at
|
2733
|
+
# least one keyword argument is required. To specify no parameters, or to keep all
|
2734
|
+
# the default parameter values, pass an empty Hash as a request object (see above).
|
2735
|
+
#
|
2736
|
+
# @param name [::String]
|
2737
|
+
# Required. The resource name of the
|
2738
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for
|
2739
|
+
# decryption.
|
2740
|
+
# @param ciphertext [::String]
|
2741
|
+
# Required. The encrypted data originally returned in
|
2742
|
+
# {::Google::Cloud::Kms::V1::RawEncryptResponse#ciphertext RawEncryptResponse.ciphertext}.
|
2743
|
+
# @param additional_authenticated_data [::String]
|
2744
|
+
# Optional. Optional data that must match the data originally supplied in
|
2745
|
+
# {::Google::Cloud::Kms::V1::RawEncryptRequest#additional_authenticated_data RawEncryptRequest.additional_authenticated_data}.
|
2746
|
+
# @param initialization_vector [::String]
|
2747
|
+
# Required. The initialization vector (IV) used during encryption, which must
|
2748
|
+
# match the data originally provided in
|
2749
|
+
# {::Google::Cloud::Kms::V1::RawEncryptResponse#initialization_vector RawEncryptResponse.initialization_vector}.
|
2750
|
+
# @param tag_length [::Integer]
|
2751
|
+
# The length of the authentication tag that is appended to the end of
|
2752
|
+
# the ciphertext. If unspecified (0), the default value for the key's
|
2753
|
+
# algorithm will be used (for AES-GCM, the default value is 16).
|
2754
|
+
# @param ciphertext_crc32c [::Google::Protobuf::Int64Value, ::Hash]
|
2755
|
+
# Optional. An optional CRC32C checksum of the
|
2756
|
+
# {::Google::Cloud::Kms::V1::RawDecryptRequest#ciphertext RawDecryptRequest.ciphertext}.
|
2757
|
+
# If specified,
|
2758
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2759
|
+
# verify the integrity of the received ciphertext using this checksum.
|
2760
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2761
|
+
# report an error if the checksum verification fails. If you receive a
|
2762
|
+
# checksum error, your client should verify that CRC32C(ciphertext) is equal
|
2763
|
+
# to ciphertext_crc32c, and if so, perform a limited number of retries. A
|
2764
|
+
# persistent mismatch may indicate an issue in your computation of the CRC32C
|
2765
|
+
# checksum. Note: This field is defined as int64 for reasons of compatibility
|
2766
|
+
# across different languages. However, it is a non-negative integer, which
|
2767
|
+
# will never exceed 2^32-1, and can be safely downconverted to uint32 in
|
2768
|
+
# languages that support this type.
|
2769
|
+
# @param additional_authenticated_data_crc32c [::Google::Protobuf::Int64Value, ::Hash]
|
2770
|
+
# Optional. An optional CRC32C checksum of the
|
2771
|
+
# {::Google::Cloud::Kms::V1::RawDecryptRequest#additional_authenticated_data RawDecryptRequest.additional_authenticated_data}.
|
2772
|
+
# If specified,
|
2773
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2774
|
+
# verify the integrity of the received additional_authenticated_data using
|
2775
|
+
# this checksum.
|
2776
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2777
|
+
# report an error if the checksum verification fails. If you receive a
|
2778
|
+
# checksum error, your client should verify that
|
2779
|
+
# CRC32C(additional_authenticated_data) is equal to
|
2780
|
+
# additional_authenticated_data_crc32c, and if so, perform
|
2781
|
+
# a limited number of retries. A persistent mismatch may indicate an issue in
|
2782
|
+
# your computation of the CRC32C checksum.
|
2783
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
2784
|
+
# different languages. However, it is a non-negative integer, which will
|
2785
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
2786
|
+
# that support this type.
|
2787
|
+
# @param initialization_vector_crc32c [::Google::Protobuf::Int64Value, ::Hash]
|
2788
|
+
# Optional. An optional CRC32C checksum of the
|
2789
|
+
# {::Google::Cloud::Kms::V1::RawDecryptRequest#initialization_vector RawDecryptRequest.initialization_vector}.
|
2790
|
+
# If specified,
|
2791
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
|
2792
|
+
# verify the integrity of the received initialization_vector using this
|
2793
|
+
# checksum. {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}
|
2794
|
+
# will report an error if the checksum verification fails. If you receive a
|
2795
|
+
# checksum error, your client should verify that
|
2796
|
+
# CRC32C(initialization_vector) is equal to initialization_vector_crc32c, and
|
2797
|
+
# if so, perform a limited number of retries. A persistent mismatch may
|
2798
|
+
# indicate an issue in your computation of the CRC32C checksum.
|
2799
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
2800
|
+
# different languages. However, it is a non-negative integer, which will
|
2801
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
2802
|
+
# that support this type.
|
2803
|
+
#
|
2804
|
+
# @yield [response, operation] Access the result along with the RPC operation
|
2805
|
+
# @yieldparam response [::Google::Cloud::Kms::V1::RawDecryptResponse]
|
2806
|
+
# @yieldparam operation [::GRPC::ActiveCall::Operation]
|
2807
|
+
#
|
2808
|
+
# @return [::Google::Cloud::Kms::V1::RawDecryptResponse]
|
2809
|
+
#
|
2810
|
+
# @raise [::Google::Cloud::Error] if the RPC is aborted.
|
2811
|
+
#
|
2812
|
+
# @example Basic example
|
2813
|
+
# require "google/cloud/kms/v1"
|
2814
|
+
#
|
2815
|
+
# # Create a client object. The client can be reused for multiple calls.
|
2816
|
+
# client = Google::Cloud::Kms::V1::KeyManagementService::Client.new
|
2817
|
+
#
|
2818
|
+
# # Create a request. To set request fields, pass in keyword arguments.
|
2819
|
+
# request = Google::Cloud::Kms::V1::RawDecryptRequest.new
|
2820
|
+
#
|
2821
|
+
# # Call the raw_decrypt method.
|
2822
|
+
# result = client.raw_decrypt request
|
2823
|
+
#
|
2824
|
+
# # The returned object is of type Google::Cloud::Kms::V1::RawDecryptResponse.
|
2825
|
+
# p result
|
2826
|
+
#
|
2827
|
+
def raw_decrypt request, options = nil
|
2828
|
+
raise ::ArgumentError, "request must be provided" if request.nil?
|
2829
|
+
|
2830
|
+
request = ::Gapic::Protobuf.coerce request, to: ::Google::Cloud::Kms::V1::RawDecryptRequest
|
2831
|
+
|
2832
|
+
# Converts hash and nil to an options object
|
2833
|
+
options = ::Gapic::CallOptions.new(**options.to_h) if options.respond_to? :to_h
|
2834
|
+
|
2835
|
+
# Customize the options with defaults
|
2836
|
+
metadata = @config.rpcs.raw_decrypt.metadata.to_h
|
2837
|
+
|
2838
|
+
# Set x-goog-api-client and x-goog-user-project headers
|
2839
|
+
metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
2840
|
+
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
2841
|
+
gapic_version: ::Google::Cloud::Kms::V1::VERSION
|
2842
|
+
metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
2843
|
+
|
2844
|
+
header_params = {}
|
2845
|
+
if request.name
|
2846
|
+
header_params["name"] = request.name
|
2847
|
+
end
|
2848
|
+
|
2849
|
+
request_params_header = header_params.map { |k, v| "#{k}=#{v}" }.join("&")
|
2850
|
+
metadata[:"x-goog-request-params"] ||= request_params_header
|
2851
|
+
|
2852
|
+
options.apply_defaults timeout: @config.rpcs.raw_decrypt.timeout,
|
2853
|
+
metadata: metadata,
|
2854
|
+
retry_policy: @config.rpcs.raw_decrypt.retry_policy
|
2855
|
+
|
2856
|
+
options.apply_defaults timeout: @config.timeout,
|
2857
|
+
metadata: @config.metadata,
|
2858
|
+
retry_policy: @config.retry_policy
|
2859
|
+
|
2860
|
+
@key_management_service_stub.call_rpc :raw_decrypt, request, options: options do |response, operation|
|
2861
|
+
yield response, operation if block_given?
|
2862
|
+
return response
|
2863
|
+
end
|
2864
|
+
rescue ::GRPC::BadStatus => e
|
2865
|
+
raise ::Google::Cloud::Error.from_error(e)
|
2866
|
+
end
|
2867
|
+
|
2542
2868
|
##
|
2543
2869
|
# Signs data using a {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}
|
2544
2870
|
# with {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose}
|
@@ -3217,7 +3543,9 @@ module Google
|
|
3217
3543
|
class Configuration
|
3218
3544
|
extend ::Gapic::Config
|
3219
3545
|
|
3220
|
-
|
3546
|
+
DEFAULT_ENDPOINT = "cloudkms.googleapis.com"
|
3547
|
+
|
3548
|
+
config_attr :endpoint, DEFAULT_ENDPOINT, ::String
|
3221
3549
|
config_attr :credentials, nil do |value|
|
3222
3550
|
allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
|
3223
3551
|
allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
|
@@ -3376,6 +3704,16 @@ module Google
|
|
3376
3704
|
#
|
3377
3705
|
attr_reader :decrypt
|
3378
3706
|
##
|
3707
|
+
# RPC-specific configuration for `raw_encrypt`
|
3708
|
+
# @return [::Gapic::Config::Method]
|
3709
|
+
#
|
3710
|
+
attr_reader :raw_encrypt
|
3711
|
+
##
|
3712
|
+
# RPC-specific configuration for `raw_decrypt`
|
3713
|
+
# @return [::Gapic::Config::Method]
|
3714
|
+
#
|
3715
|
+
attr_reader :raw_decrypt
|
3716
|
+
##
|
3379
3717
|
# RPC-specific configuration for `asymmetric_sign`
|
3380
3718
|
# @return [::Gapic::Config::Method]
|
3381
3719
|
#
|
@@ -3445,6 +3783,10 @@ module Google
|
|
3445
3783
|
@encrypt = ::Gapic::Config::Method.new encrypt_config
|
3446
3784
|
decrypt_config = parent_rpcs.decrypt if parent_rpcs.respond_to? :decrypt
|
3447
3785
|
@decrypt = ::Gapic::Config::Method.new decrypt_config
|
3786
|
+
raw_encrypt_config = parent_rpcs.raw_encrypt if parent_rpcs.respond_to? :raw_encrypt
|
3787
|
+
@raw_encrypt = ::Gapic::Config::Method.new raw_encrypt_config
|
3788
|
+
raw_decrypt_config = parent_rpcs.raw_decrypt if parent_rpcs.respond_to? :raw_decrypt
|
3789
|
+
@raw_decrypt = ::Gapic::Config::Method.new raw_decrypt_config
|
3448
3790
|
asymmetric_sign_config = parent_rpcs.asymmetric_sign if parent_rpcs.respond_to? :asymmetric_sign
|
3449
3791
|
@asymmetric_sign = ::Gapic::Config::Method.new asymmetric_sign_config
|
3450
3792
|
asymmetric_decrypt_config = parent_rpcs.asymmetric_decrypt if parent_rpcs.respond_to? :asymmetric_decrypt
|