google-cloud-kms-v1 0.19.0 → 0.21.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 69001e1b6b9a0e268ff0e9ddaf3ef9535c8e25428334d9d58fc59fdc3b21fb8c
4
- data.tar.gz: 11fc0213ab299c96b8636a164e9ad5ffe536d9f3fa43b6d60d892d5f91005f01
3
+ metadata.gz: 359686bf360890c730516a1ad6df0583f2624726d0d13e0f6e7ab07ecbf48ebc
4
+ data.tar.gz: 9eeeb7594661333b65d6842cb3e65b8868c1c7b6a97222ed92a079bae3b4d20a
5
5
  SHA512:
6
- metadata.gz: 4ba06d5d132693b236e02f44d4d752c742e336668f19fb0b8381af3e8931278ddeb0572cb4586d0c47249768ed6e3847b14bce5c0281862ac2425f57d0f801f1
7
- data.tar.gz: 3005fd1d7e72bad8c8877453764a8974cc27538615958eb74b12ef4aac502b1dff059b355313558658144bd43486aa2e4a3435c9f4f03672ca84d15c37c1548a
6
+ metadata.gz: cd0305ad53291b43543b5b2b552c16b23099373684224367a6677573700b001a5d641f63b0c60a4f4bf96de4fba6dd91b3ad884eca5fcf723d3cfce8b0b0886e
7
+ data.tar.gz: b7cdc2bed32747a46d54bd95ee62953f5e2b1b7bd88d1f46da148c78629cb202117e8f2242a927a5c9e2790d44244a9f0cda9d79eb97c0aad0a98f77823aaa45
@@ -149,7 +149,7 @@ module Google
149
149
  credentials = @config.credentials
150
150
  # Use self-signed JWT if the endpoint is unchanged from default,
151
151
  # but only if the default endpoint does not have a region prefix.
152
- enable_self_signed_jwt = @config.endpoint == Client.configure.endpoint &&
152
+ enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
153
153
  !@config.endpoint.split(".").first.include?("-")
154
154
  credentials ||= Credentials.default scope: @config.scope,
155
155
  enable_self_signed_jwt: enable_self_signed_jwt
@@ -925,7 +925,9 @@ module Google
925
925
  class Configuration
926
926
  extend ::Gapic::Config
927
927
 
928
- config_attr :endpoint, "cloudkms.googleapis.com", ::String
928
+ DEFAULT_ENDPOINT = "cloudkms.googleapis.com"
929
+
930
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
929
931
  config_attr :credentials, nil do |value|
930
932
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
931
933
  allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
@@ -145,7 +145,7 @@ module Google
145
145
  credentials = @config.credentials
146
146
  # Use self-signed JWT if the endpoint is unchanged from default,
147
147
  # but only if the default endpoint does not have a region prefix.
148
- enable_self_signed_jwt = @config.endpoint == Client.configure.endpoint &&
148
+ enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
149
149
  !@config.endpoint.split(".").first.include?("-")
150
150
  credentials ||= Credentials.default scope: @config.scope,
151
151
  enable_self_signed_jwt: enable_self_signed_jwt
@@ -744,7 +744,9 @@ module Google
744
744
  class Configuration
745
745
  extend ::Gapic::Config
746
746
 
747
- config_attr :endpoint, "cloudkms.googleapis.com", ::String
747
+ DEFAULT_ENDPOINT = "cloudkms.googleapis.com"
748
+
749
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
748
750
  config_attr :credentials, nil do |value|
749
751
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
750
752
  allowed.any? { |klass| klass === value }
@@ -59,7 +59,7 @@ module Google
59
59
 
60
60
  verb, uri, query_string_params, body = ServiceStub.transcode_list_ekm_connections_request request_pb
61
61
  query_string_params = if query_string_params.any?
62
- query_string_params.to_h { |p| p.split("=", 2) }
62
+ query_string_params.to_h { |p| p.split "=", 2 }
63
63
  else
64
64
  {}
65
65
  end
@@ -97,7 +97,7 @@ module Google
97
97
 
98
98
  verb, uri, query_string_params, body = ServiceStub.transcode_get_ekm_connection_request request_pb
99
99
  query_string_params = if query_string_params.any?
100
- query_string_params.to_h { |p| p.split("=", 2) }
100
+ query_string_params.to_h { |p| p.split "=", 2 }
101
101
  else
102
102
  {}
103
103
  end
@@ -135,7 +135,7 @@ module Google
135
135
 
136
136
  verb, uri, query_string_params, body = ServiceStub.transcode_create_ekm_connection_request request_pb
137
137
  query_string_params = if query_string_params.any?
138
- query_string_params.to_h { |p| p.split("=", 2) }
138
+ query_string_params.to_h { |p| p.split "=", 2 }
139
139
  else
140
140
  {}
141
141
  end
@@ -173,7 +173,7 @@ module Google
173
173
 
174
174
  verb, uri, query_string_params, body = ServiceStub.transcode_update_ekm_connection_request request_pb
175
175
  query_string_params = if query_string_params.any?
176
- query_string_params.to_h { |p| p.split("=", 2) }
176
+ query_string_params.to_h { |p| p.split "=", 2 }
177
177
  else
178
178
  {}
179
179
  end
@@ -211,7 +211,7 @@ module Google
211
211
 
212
212
  verb, uri, query_string_params, body = ServiceStub.transcode_get_ekm_config_request request_pb
213
213
  query_string_params = if query_string_params.any?
214
- query_string_params.to_h { |p| p.split("=", 2) }
214
+ query_string_params.to_h { |p| p.split "=", 2 }
215
215
  else
216
216
  {}
217
217
  end
@@ -249,7 +249,7 @@ module Google
249
249
 
250
250
  verb, uri, query_string_params, body = ServiceStub.transcode_update_ekm_config_request request_pb
251
251
  query_string_params = if query_string_params.any?
252
- query_string_params.to_h { |p| p.split("=", 2) }
252
+ query_string_params.to_h { |p| p.split "=", 2 }
253
253
  else
254
254
  {}
255
255
  end
@@ -287,7 +287,7 @@ module Google
287
287
 
288
288
  verb, uri, query_string_params, body = ServiceStub.transcode_verify_connectivity_request request_pb
289
289
  query_string_params = if query_string_params.any?
290
- query_string_params.to_h { |p| p.split("=", 2) }
290
+ query_string_params.to_h { |p| p.split "=", 2 }
291
291
  else
292
292
  {}
293
293
  end
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/cloud/kms/v1/ekm_service.proto
3
4
 
@@ -10,79 +11,33 @@ require 'google/api/resource_pb'
10
11
  require 'google/protobuf/field_mask_pb'
11
12
  require 'google/protobuf/timestamp_pb'
12
13
 
13
- Google::Protobuf::DescriptorPool.generated_pool.build do
14
- add_file("google/cloud/kms/v1/ekm_service.proto", :syntax => :proto3) do
15
- add_message "google.cloud.kms.v1.ListEkmConnectionsRequest" do
16
- optional :parent, :string, 1
17
- optional :page_size, :int32, 2
18
- optional :page_token, :string, 3
19
- optional :filter, :string, 4
20
- optional :order_by, :string, 5
21
- end
22
- add_message "google.cloud.kms.v1.ListEkmConnectionsResponse" do
23
- repeated :ekm_connections, :message, 1, "google.cloud.kms.v1.EkmConnection"
24
- optional :next_page_token, :string, 2
25
- optional :total_size, :int32, 3
26
- end
27
- add_message "google.cloud.kms.v1.GetEkmConnectionRequest" do
28
- optional :name, :string, 1
29
- end
30
- add_message "google.cloud.kms.v1.CreateEkmConnectionRequest" do
31
- optional :parent, :string, 1
32
- optional :ekm_connection_id, :string, 2
33
- optional :ekm_connection, :message, 3, "google.cloud.kms.v1.EkmConnection"
34
- end
35
- add_message "google.cloud.kms.v1.UpdateEkmConnectionRequest" do
36
- optional :ekm_connection, :message, 1, "google.cloud.kms.v1.EkmConnection"
37
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
38
- end
39
- add_message "google.cloud.kms.v1.GetEkmConfigRequest" do
40
- optional :name, :string, 1
41
- end
42
- add_message "google.cloud.kms.v1.UpdateEkmConfigRequest" do
43
- optional :ekm_config, :message, 1, "google.cloud.kms.v1.EkmConfig"
44
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
45
- end
46
- add_message "google.cloud.kms.v1.Certificate" do
47
- optional :raw_der, :bytes, 1
48
- optional :parsed, :bool, 2
49
- optional :issuer, :string, 3
50
- optional :subject, :string, 4
51
- repeated :subject_alternative_dns_names, :string, 5
52
- optional :not_before_time, :message, 6, "google.protobuf.Timestamp"
53
- optional :not_after_time, :message, 7, "google.protobuf.Timestamp"
54
- optional :serial_number, :string, 8
55
- optional :sha256_fingerprint, :string, 9
56
- end
57
- add_message "google.cloud.kms.v1.EkmConnection" do
58
- optional :name, :string, 1
59
- optional :create_time, :message, 2, "google.protobuf.Timestamp"
60
- repeated :service_resolvers, :message, 3, "google.cloud.kms.v1.EkmConnection.ServiceResolver"
61
- optional :etag, :string, 5
62
- optional :key_management_mode, :enum, 6, "google.cloud.kms.v1.EkmConnection.KeyManagementMode"
63
- optional :crypto_space_path, :string, 7
64
- end
65
- add_message "google.cloud.kms.v1.EkmConnection.ServiceResolver" do
66
- optional :service_directory_service, :string, 1
67
- optional :endpoint_filter, :string, 2
68
- optional :hostname, :string, 3
69
- repeated :server_certificates, :message, 4, "google.cloud.kms.v1.Certificate"
70
- end
71
- add_enum "google.cloud.kms.v1.EkmConnection.KeyManagementMode" do
72
- value :KEY_MANAGEMENT_MODE_UNSPECIFIED, 0
73
- value :MANUAL, 1
74
- value :CLOUD_KMS, 2
75
- end
76
- add_message "google.cloud.kms.v1.EkmConfig" do
77
- optional :name, :string, 1
78
- optional :default_ekm_connection, :string, 2
79
- end
80
- add_message "google.cloud.kms.v1.VerifyConnectivityRequest" do
81
- optional :name, :string, 1
82
- end
83
- add_message "google.cloud.kms.v1.VerifyConnectivityResponse" do
14
+
15
+ descriptor_data = "\n%google/cloud/kms/v1/ekm_service.proto\x12\x13google.cloud.kms.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a google/protobuf/field_mask.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xb3\x01\n\x19ListEkmConnectionsRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\x12\x15\n\x08order_by\x18\x05 \x01(\tB\x03\xe0\x41\x01\"\x86\x01\n\x1aListEkmConnectionsResponse\x12;\n\x0f\x65km_connections\x18\x01 \x03(\x0b\x32\".google.cloud.kms.v1.EkmConnection\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"V\n\x17GetEkmConnectionRequest\x12;\n\x04name\x18\x01 \x01(\tB-\xe0\x41\x02\xfa\x41\'\n%cloudkms.googleapis.com/EkmConnection\"\xb8\x01\n\x1a\x43reateEkmConnectionRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12\x1e\n\x11\x65km_connection_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12?\n\x0e\x65km_connection\x18\x03 \x01(\x0b\x32\".google.cloud.kms.v1.EkmConnectionB\x03\xe0\x41\x02\"\x93\x01\n\x1aUpdateEkmConnectionRequest\x12?\n\x0e\x65km_connection\x18\x01 \x01(\x0b\x32\".google.cloud.kms.v1.EkmConnectionB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"N\n\x13GetEkmConfigRequest\x12\x37\n\x04name\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!cloudkms.googleapis.com/EkmConfig\"\x87\x01\n\x16UpdateEkmConfigRequest\x12\x37\n\nekm_config\x18\x01 \x01(\x0b\x32\x1e.google.cloud.kms.v1.EkmConfigB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"\xbf\x02\n\x0b\x43\x65rtificate\x12\x14\n\x07raw_der\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x02\x12\x13\n\x06parsed\x18\x02 \x01(\x08\x42\x03\xe0\x41\x03\x12\x13\n\x06issuer\x18\x03 \x01(\tB\x03\xe0\x41\x03\x12\x14\n\x07subject\x18\x04 \x01(\tB\x03\xe0\x41\x03\x12*\n\x1dsubject_alternative_dns_names\x18\x05 \x03(\tB\x03\xe0\x41\x03\x12\x38\n\x0fnot_before_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x37\n\x0enot_after_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x1a\n\rserial_number\x18\x08 \x01(\tB\x03\xe0\x41\x03\x12\x1f\n\x12sha256_fingerprint\x18\t \x01(\tB\x03\xe0\x41\x03\"\xdd\x05\n\rEkmConnection\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12M\n\x11service_resolvers\x18\x03 \x03(\x0b\x32\x32.google.cloud.kms.v1.EkmConnection.ServiceResolver\x12\x11\n\x04\x65tag\x18\x05 \x01(\tB\x03\xe0\x41\x01\x12V\n\x13key_management_mode\x18\x06 \x01(\x0e\x32\x34.google.cloud.kms.v1.EkmConnection.KeyManagementModeB\x03\xe0\x41\x01\x12\x1e\n\x11\x63rypto_space_path\x18\x07 \x01(\tB\x03\xe0\x41\x01\x1a\xde\x01\n\x0fServiceResolver\x12R\n\x19service_directory_service\x18\x01 \x01(\tB/\xe0\x41\x02\xfa\x41)\n\'servicedirectory.googleapis.com/Service\x12\x1c\n\x0f\x65ndpoint_filter\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12\x15\n\x08hostname\x18\x03 \x01(\tB\x03\xe0\x41\x02\x12\x42\n\x13server_certificates\x18\x04 \x03(\x0b\x32 .google.cloud.kms.v1.CertificateB\x03\xe0\x41\x02\"S\n\x11KeyManagementMode\x12#\n\x1fKEY_MANAGEMENT_MODE_UNSPECIFIED\x10\x00\x12\n\n\x06MANUAL\x10\x01\x12\r\n\tCLOUD_KMS\x10\x02:s\xea\x41p\n%cloudkms.googleapis.com/EkmConnection\x12Gprojects/{project}/locations/{location}/ekmConnections/{ekm_connection}\"\xc8\x01\n\tEkmConfig\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12M\n\x16\x64\x65\x66\x61ult_ekm_connection\x18\x02 \x01(\tB-\xe0\x41\x01\xfa\x41\'\n%cloudkms.googleapis.com/EkmConnection:Y\xea\x41V\n!cloudkms.googleapis.com/EkmConfig\x12\x31projects/{project}/locations/{location}/ekmConfig\"X\n\x19VerifyConnectivityRequest\x12;\n\x04name\x18\x01 \x01(\tB-\xe0\x41\x02\xfa\x41\'\n%cloudkms.googleapis.com/EkmConnection\"\x1c\n\x1aVerifyConnectivityResponse2\xdc\x0b\n\nEkmService\x12\xba\x01\n\x12ListEkmConnections\x12..google.cloud.kms.v1.ListEkmConnectionsRequest\x1a/.google.cloud.kms.v1.ListEkmConnectionsResponse\"C\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{parent=projects/*/locations/*}/ekmConnections\xda\x41\x06parent\x12\xa7\x01\n\x10GetEkmConnection\x12,.google.cloud.kms.v1.GetEkmConnectionRequest\x1a\".google.cloud.kms.v1.EkmConnection\"A\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{name=projects/*/locations/*/ekmConnections/*}\xda\x41\x04name\x12\xe0\x01\n\x13\x43reateEkmConnection\x12/.google.cloud.kms.v1.CreateEkmConnectionRequest\x1a\".google.cloud.kms.v1.EkmConnection\"t\x82\xd3\xe4\x93\x02\x44\"2/v1/{parent=projects/*/locations/*}/ekmConnections:\x0e\x65km_connection\xda\x41\'parent,ekm_connection_id,ekm_connection\x12\xe2\x01\n\x13UpdateEkmConnection\x12/.google.cloud.kms.v1.UpdateEkmConnectionRequest\x1a\".google.cloud.kms.v1.EkmConnection\"v\x82\xd3\xe4\x93\x02S2A/v1/{ekm_connection.name=projects/*/locations/*/ekmConnections/*}:\x0e\x65km_connection\xda\x41\x1a\x65km_connection,update_mask\x12\x94\x01\n\x0cGetEkmConfig\x12(.google.cloud.kms.v1.GetEkmConfigRequest\x1a\x1e.google.cloud.kms.v1.EkmConfig\":\x82\xd3\xe4\x93\x02-\x12+/v1/{name=projects/*/locations/*/ekmConfig}\xda\x41\x04name\x12\xc3\x01\n\x0fUpdateEkmConfig\x12+.google.cloud.kms.v1.UpdateEkmConfigRequest\x1a\x1e.google.cloud.kms.v1.EkmConfig\"c\x82\xd3\xe4\x93\x02\x44\x32\x36/v1/{ekm_config.name=projects/*/locations/*/ekmConfig}:\nekm_config\xda\x41\x16\x65km_config,update_mask\x12\xcb\x01\n\x12VerifyConnectivity\x12..google.cloud.kms.v1.VerifyConnectivityRequest\x1a/.google.cloud.kms.v1.VerifyConnectivityResponse\"T\x82\xd3\xe4\x93\x02G\x12\x45/v1/{name=projects/*/locations/*/ekmConnections/*}:verifyConnectivity\xda\x41\x04name\x1at\xca\x41\x17\x63loudkms.googleapis.com\xd2\x41Whttps://www.googleapis.com/auth/cloud-platform,https://www.googleapis.com/auth/cloudkmsB\x85\x02\n\x17\x63om.google.cloud.kms.v1B\x0f\x45kmServiceProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1\xea\x41|\n\'servicedirectory.googleapis.com/Service\x12Qprojects/{project}/locations/{location}/namespaces/{namespace}/services/{service}b\x06proto3"
16
+
17
+ pool = Google::Protobuf::DescriptorPool.generated_pool
18
+
19
+ begin
20
+ pool.add_serialized_file(descriptor_data)
21
+ rescue TypeError => e
22
+ # Compatibility code: will be removed in the next major version.
23
+ require 'google/protobuf/descriptor_pb'
24
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
25
+ parsed.clear_dependency
26
+ serialized = parsed.class.encode(parsed)
27
+ file = pool.add_serialized_file(serialized)
28
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
29
+ imports = [
30
+ ["google.protobuf.FieldMask", "google/protobuf/field_mask.proto"],
31
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
32
+ ]
33
+ imports.each do |type_name, expected_filename|
34
+ import_file = pool.lookup(type_name).file_descriptor
35
+ if import_file.name != expected_filename
36
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
84
37
  end
85
38
  end
39
+ warn "Each proto file must use a consistent fully-qualified name."
40
+ warn "This will become an error in the next major version."
86
41
  end
87
42
 
88
43
  module Google
@@ -260,7 +260,7 @@ module Google
260
260
  credentials = @config.credentials
261
261
  # Use self-signed JWT if the endpoint is unchanged from default,
262
262
  # but only if the default endpoint does not have a region prefix.
263
- enable_self_signed_jwt = @config.endpoint == Client.configure.endpoint &&
263
+ enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
264
264
  !@config.endpoint.split(".").first.include?("-")
265
265
  credentials ||= Credentials.default scope: @config.scope,
266
266
  enable_self_signed_jwt: enable_self_signed_jwt
@@ -2539,6 +2539,332 @@ module Google
2539
2539
  raise ::Google::Cloud::Error.from_error(e)
2540
2540
  end
2541
2541
 
2542
+ ##
2543
+ # Encrypts data using portable cryptographic primitives. Most users should
2544
+ # choose {::Google::Cloud::Kms::V1::KeyManagementService::Client#encrypt Encrypt} and
2545
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client#decrypt Decrypt} rather than
2546
+ # their raw counterparts. The
2547
+ # {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose} must be
2548
+ # {::Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::RAW_ENCRYPT_DECRYPT RAW_ENCRYPT_DECRYPT}.
2549
+ #
2550
+ # @overload raw_encrypt(request, options = nil)
2551
+ # Pass arguments to `raw_encrypt` via a request object, either of type
2552
+ # {::Google::Cloud::Kms::V1::RawEncryptRequest} or an equivalent Hash.
2553
+ #
2554
+ # @param request [::Google::Cloud::Kms::V1::RawEncryptRequest, ::Hash]
2555
+ # A request object representing the call parameters. Required. To specify no
2556
+ # parameters, or to keep all the default parameter values, pass an empty Hash.
2557
+ # @param options [::Gapic::CallOptions, ::Hash]
2558
+ # Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
2559
+ #
2560
+ # @overload raw_encrypt(name: nil, plaintext: nil, additional_authenticated_data: nil, plaintext_crc32c: nil, additional_authenticated_data_crc32c: nil, initialization_vector: nil, initialization_vector_crc32c: nil)
2561
+ # Pass arguments to `raw_encrypt` via keyword arguments. Note that at
2562
+ # least one keyword argument is required. To specify no parameters, or to keep all
2563
+ # the default parameter values, pass an empty Hash as a request object (see above).
2564
+ #
2565
+ # @param name [::String]
2566
+ # Required. The resource name of the
2567
+ # {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for
2568
+ # encryption.
2569
+ # @param plaintext [::String]
2570
+ # Required. The data to encrypt. Must be no larger than 64KiB.
2571
+ #
2572
+ # The maximum size depends on the key version's
2573
+ # {::Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level}.
2574
+ # For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE} keys, the
2575
+ # plaintext must be no larger than 64KiB. For
2576
+ # {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM} keys, the combined length of
2577
+ # the plaintext and additional_authenticated_data fields must be no larger
2578
+ # than 8KiB.
2579
+ # @param additional_authenticated_data [::String]
2580
+ # Optional. Optional data that, if specified, must also be provided during
2581
+ # decryption through
2582
+ # {::Google::Cloud::Kms::V1::RawDecryptRequest#additional_authenticated_data RawDecryptRequest.additional_authenticated_data}.
2583
+ #
2584
+ # This field may only be used in conjunction with an
2585
+ # {::Google::Cloud::Kms::V1::CryptoKeyVersion#algorithm algorithm} that accepts
2586
+ # additional authenticated data (for example, AES-GCM).
2587
+ #
2588
+ # The maximum size depends on the key version's
2589
+ # {::Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level}.
2590
+ # For {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE} keys, the
2591
+ # plaintext must be no larger than 64KiB. For
2592
+ # {::Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM} keys, the combined length of
2593
+ # the plaintext and additional_authenticated_data fields must be no larger
2594
+ # than 8KiB.
2595
+ # @param plaintext_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2596
+ # Optional. An optional CRC32C checksum of the
2597
+ # {::Google::Cloud::Kms::V1::RawEncryptRequest#plaintext RawEncryptRequest.plaintext}.
2598
+ # If specified,
2599
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2600
+ # verify the integrity of the received plaintext using this checksum.
2601
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2602
+ # report an error if the checksum verification fails. If you receive a
2603
+ # checksum error, your client should verify that CRC32C(plaintext) is equal
2604
+ # to plaintext_crc32c, and if so, perform a limited number of retries. A
2605
+ # persistent mismatch may indicate an issue in your computation of the CRC32C
2606
+ # checksum. Note: This field is defined as int64 for reasons of compatibility
2607
+ # across different languages. However, it is a non-negative integer, which
2608
+ # will never exceed 2^32-1, and can be safely downconverted to uint32 in
2609
+ # languages that support this type.
2610
+ # @param additional_authenticated_data_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2611
+ # Optional. An optional CRC32C checksum of the
2612
+ # {::Google::Cloud::Kms::V1::RawEncryptRequest#additional_authenticated_data RawEncryptRequest.additional_authenticated_data}.
2613
+ # If specified,
2614
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2615
+ # verify the integrity of the received additional_authenticated_data using
2616
+ # this checksum.
2617
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2618
+ # report an error if the checksum verification fails. If you receive a
2619
+ # checksum error, your client should verify that
2620
+ # CRC32C(additional_authenticated_data) is equal to
2621
+ # additional_authenticated_data_crc32c, and if so, perform
2622
+ # a limited number of retries. A persistent mismatch may indicate an issue in
2623
+ # your computation of the CRC32C checksum.
2624
+ # Note: This field is defined as int64 for reasons of compatibility across
2625
+ # different languages. However, it is a non-negative integer, which will
2626
+ # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
2627
+ # that support this type.
2628
+ # @param initialization_vector [::String]
2629
+ # Optional. A customer-supplied initialization vector that will be used for
2630
+ # encryption. If it is not provided for AES-CBC and AES-CTR, one will be
2631
+ # generated. It will be returned in
2632
+ # {::Google::Cloud::Kms::V1::RawEncryptResponse#initialization_vector RawEncryptResponse.initialization_vector}.
2633
+ # @param initialization_vector_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2634
+ # Optional. An optional CRC32C checksum of the
2635
+ # {::Google::Cloud::Kms::V1::RawEncryptRequest#initialization_vector RawEncryptRequest.initialization_vector}.
2636
+ # If specified,
2637
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2638
+ # verify the integrity of the received initialization_vector using this
2639
+ # checksum. {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}
2640
+ # will report an error if the checksum verification fails. If you receive a
2641
+ # checksum error, your client should verify that
2642
+ # CRC32C(initialization_vector) is equal to
2643
+ # initialization_vector_crc32c, and if so, perform
2644
+ # a limited number of retries. A persistent mismatch may indicate an issue in
2645
+ # your computation of the CRC32C checksum.
2646
+ # Note: This field is defined as int64 for reasons of compatibility across
2647
+ # different languages. However, it is a non-negative integer, which will
2648
+ # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
2649
+ # that support this type.
2650
+ #
2651
+ # @yield [response, operation] Access the result along with the RPC operation
2652
+ # @yieldparam response [::Google::Cloud::Kms::V1::RawEncryptResponse]
2653
+ # @yieldparam operation [::GRPC::ActiveCall::Operation]
2654
+ #
2655
+ # @return [::Google::Cloud::Kms::V1::RawEncryptResponse]
2656
+ #
2657
+ # @raise [::Google::Cloud::Error] if the RPC is aborted.
2658
+ #
2659
+ # @example Basic example
2660
+ # require "google/cloud/kms/v1"
2661
+ #
2662
+ # # Create a client object. The client can be reused for multiple calls.
2663
+ # client = Google::Cloud::Kms::V1::KeyManagementService::Client.new
2664
+ #
2665
+ # # Create a request. To set request fields, pass in keyword arguments.
2666
+ # request = Google::Cloud::Kms::V1::RawEncryptRequest.new
2667
+ #
2668
+ # # Call the raw_encrypt method.
2669
+ # result = client.raw_encrypt request
2670
+ #
2671
+ # # The returned object is of type Google::Cloud::Kms::V1::RawEncryptResponse.
2672
+ # p result
2673
+ #
2674
+ def raw_encrypt request, options = nil
2675
+ raise ::ArgumentError, "request must be provided" if request.nil?
2676
+
2677
+ request = ::Gapic::Protobuf.coerce request, to: ::Google::Cloud::Kms::V1::RawEncryptRequest
2678
+
2679
+ # Converts hash and nil to an options object
2680
+ options = ::Gapic::CallOptions.new(**options.to_h) if options.respond_to? :to_h
2681
+
2682
+ # Customize the options with defaults
2683
+ metadata = @config.rpcs.raw_encrypt.metadata.to_h
2684
+
2685
+ # Set x-goog-api-client and x-goog-user-project headers
2686
+ metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
2687
+ lib_name: @config.lib_name, lib_version: @config.lib_version,
2688
+ gapic_version: ::Google::Cloud::Kms::V1::VERSION
2689
+ metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
2690
+
2691
+ header_params = {}
2692
+ if request.name
2693
+ header_params["name"] = request.name
2694
+ end
2695
+
2696
+ request_params_header = header_params.map { |k, v| "#{k}=#{v}" }.join("&")
2697
+ metadata[:"x-goog-request-params"] ||= request_params_header
2698
+
2699
+ options.apply_defaults timeout: @config.rpcs.raw_encrypt.timeout,
2700
+ metadata: metadata,
2701
+ retry_policy: @config.rpcs.raw_encrypt.retry_policy
2702
+
2703
+ options.apply_defaults timeout: @config.timeout,
2704
+ metadata: @config.metadata,
2705
+ retry_policy: @config.retry_policy
2706
+
2707
+ @key_management_service_stub.call_rpc :raw_encrypt, request, options: options do |response, operation|
2708
+ yield response, operation if block_given?
2709
+ return response
2710
+ end
2711
+ rescue ::GRPC::BadStatus => e
2712
+ raise ::Google::Cloud::Error.from_error(e)
2713
+ end
2714
+
2715
+ ##
2716
+ # Decrypts data that was originally encrypted using a raw cryptographic
2717
+ # mechanism. The {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose}
2718
+ # must be
2719
+ # {::Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::RAW_ENCRYPT_DECRYPT RAW_ENCRYPT_DECRYPT}.
2720
+ #
2721
+ # @overload raw_decrypt(request, options = nil)
2722
+ # Pass arguments to `raw_decrypt` via a request object, either of type
2723
+ # {::Google::Cloud::Kms::V1::RawDecryptRequest} or an equivalent Hash.
2724
+ #
2725
+ # @param request [::Google::Cloud::Kms::V1::RawDecryptRequest, ::Hash]
2726
+ # A request object representing the call parameters. Required. To specify no
2727
+ # parameters, or to keep all the default parameter values, pass an empty Hash.
2728
+ # @param options [::Gapic::CallOptions, ::Hash]
2729
+ # Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
2730
+ #
2731
+ # @overload raw_decrypt(name: nil, ciphertext: nil, additional_authenticated_data: nil, initialization_vector: nil, tag_length: nil, ciphertext_crc32c: nil, additional_authenticated_data_crc32c: nil, initialization_vector_crc32c: nil)
2732
+ # Pass arguments to `raw_decrypt` via keyword arguments. Note that at
2733
+ # least one keyword argument is required. To specify no parameters, or to keep all
2734
+ # the default parameter values, pass an empty Hash as a request object (see above).
2735
+ #
2736
+ # @param name [::String]
2737
+ # Required. The resource name of the
2738
+ # {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for
2739
+ # decryption.
2740
+ # @param ciphertext [::String]
2741
+ # Required. The encrypted data originally returned in
2742
+ # {::Google::Cloud::Kms::V1::RawEncryptResponse#ciphertext RawEncryptResponse.ciphertext}.
2743
+ # @param additional_authenticated_data [::String]
2744
+ # Optional. Optional data that must match the data originally supplied in
2745
+ # {::Google::Cloud::Kms::V1::RawEncryptRequest#additional_authenticated_data RawEncryptRequest.additional_authenticated_data}.
2746
+ # @param initialization_vector [::String]
2747
+ # Required. The initialization vector (IV) used during encryption, which must
2748
+ # match the data originally provided in
2749
+ # {::Google::Cloud::Kms::V1::RawEncryptResponse#initialization_vector RawEncryptResponse.initialization_vector}.
2750
+ # @param tag_length [::Integer]
2751
+ # The length of the authentication tag that is appended to the end of
2752
+ # the ciphertext. If unspecified (0), the default value for the key's
2753
+ # algorithm will be used (for AES-GCM, the default value is 16).
2754
+ # @param ciphertext_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2755
+ # Optional. An optional CRC32C checksum of the
2756
+ # {::Google::Cloud::Kms::V1::RawDecryptRequest#ciphertext RawDecryptRequest.ciphertext}.
2757
+ # If specified,
2758
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2759
+ # verify the integrity of the received ciphertext using this checksum.
2760
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2761
+ # report an error if the checksum verification fails. If you receive a
2762
+ # checksum error, your client should verify that CRC32C(ciphertext) is equal
2763
+ # to ciphertext_crc32c, and if so, perform a limited number of retries. A
2764
+ # persistent mismatch may indicate an issue in your computation of the CRC32C
2765
+ # checksum. Note: This field is defined as int64 for reasons of compatibility
2766
+ # across different languages. However, it is a non-negative integer, which
2767
+ # will never exceed 2^32-1, and can be safely downconverted to uint32 in
2768
+ # languages that support this type.
2769
+ # @param additional_authenticated_data_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2770
+ # Optional. An optional CRC32C checksum of the
2771
+ # {::Google::Cloud::Kms::V1::RawDecryptRequest#additional_authenticated_data RawDecryptRequest.additional_authenticated_data}.
2772
+ # If specified,
2773
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2774
+ # verify the integrity of the received additional_authenticated_data using
2775
+ # this checksum.
2776
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2777
+ # report an error if the checksum verification fails. If you receive a
2778
+ # checksum error, your client should verify that
2779
+ # CRC32C(additional_authenticated_data) is equal to
2780
+ # additional_authenticated_data_crc32c, and if so, perform
2781
+ # a limited number of retries. A persistent mismatch may indicate an issue in
2782
+ # your computation of the CRC32C checksum.
2783
+ # Note: This field is defined as int64 for reasons of compatibility across
2784
+ # different languages. However, it is a non-negative integer, which will
2785
+ # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
2786
+ # that support this type.
2787
+ # @param initialization_vector_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2788
+ # Optional. An optional CRC32C checksum of the
2789
+ # {::Google::Cloud::Kms::V1::RawDecryptRequest#initialization_vector RawDecryptRequest.initialization_vector}.
2790
+ # If specified,
2791
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will
2792
+ # verify the integrity of the received initialization_vector using this
2793
+ # checksum. {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}
2794
+ # will report an error if the checksum verification fails. If you receive a
2795
+ # checksum error, your client should verify that
2796
+ # CRC32C(initialization_vector) is equal to initialization_vector_crc32c, and
2797
+ # if so, perform a limited number of retries. A persistent mismatch may
2798
+ # indicate an issue in your computation of the CRC32C checksum.
2799
+ # Note: This field is defined as int64 for reasons of compatibility across
2800
+ # different languages. However, it is a non-negative integer, which will
2801
+ # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
2802
+ # that support this type.
2803
+ #
2804
+ # @yield [response, operation] Access the result along with the RPC operation
2805
+ # @yieldparam response [::Google::Cloud::Kms::V1::RawDecryptResponse]
2806
+ # @yieldparam operation [::GRPC::ActiveCall::Operation]
2807
+ #
2808
+ # @return [::Google::Cloud::Kms::V1::RawDecryptResponse]
2809
+ #
2810
+ # @raise [::Google::Cloud::Error] if the RPC is aborted.
2811
+ #
2812
+ # @example Basic example
2813
+ # require "google/cloud/kms/v1"
2814
+ #
2815
+ # # Create a client object. The client can be reused for multiple calls.
2816
+ # client = Google::Cloud::Kms::V1::KeyManagementService::Client.new
2817
+ #
2818
+ # # Create a request. To set request fields, pass in keyword arguments.
2819
+ # request = Google::Cloud::Kms::V1::RawDecryptRequest.new
2820
+ #
2821
+ # # Call the raw_decrypt method.
2822
+ # result = client.raw_decrypt request
2823
+ #
2824
+ # # The returned object is of type Google::Cloud::Kms::V1::RawDecryptResponse.
2825
+ # p result
2826
+ #
2827
+ def raw_decrypt request, options = nil
2828
+ raise ::ArgumentError, "request must be provided" if request.nil?
2829
+
2830
+ request = ::Gapic::Protobuf.coerce request, to: ::Google::Cloud::Kms::V1::RawDecryptRequest
2831
+
2832
+ # Converts hash and nil to an options object
2833
+ options = ::Gapic::CallOptions.new(**options.to_h) if options.respond_to? :to_h
2834
+
2835
+ # Customize the options with defaults
2836
+ metadata = @config.rpcs.raw_decrypt.metadata.to_h
2837
+
2838
+ # Set x-goog-api-client and x-goog-user-project headers
2839
+ metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
2840
+ lib_name: @config.lib_name, lib_version: @config.lib_version,
2841
+ gapic_version: ::Google::Cloud::Kms::V1::VERSION
2842
+ metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
2843
+
2844
+ header_params = {}
2845
+ if request.name
2846
+ header_params["name"] = request.name
2847
+ end
2848
+
2849
+ request_params_header = header_params.map { |k, v| "#{k}=#{v}" }.join("&")
2850
+ metadata[:"x-goog-request-params"] ||= request_params_header
2851
+
2852
+ options.apply_defaults timeout: @config.rpcs.raw_decrypt.timeout,
2853
+ metadata: metadata,
2854
+ retry_policy: @config.rpcs.raw_decrypt.retry_policy
2855
+
2856
+ options.apply_defaults timeout: @config.timeout,
2857
+ metadata: @config.metadata,
2858
+ retry_policy: @config.retry_policy
2859
+
2860
+ @key_management_service_stub.call_rpc :raw_decrypt, request, options: options do |response, operation|
2861
+ yield response, operation if block_given?
2862
+ return response
2863
+ end
2864
+ rescue ::GRPC::BadStatus => e
2865
+ raise ::Google::Cloud::Error.from_error(e)
2866
+ end
2867
+
2542
2868
  ##
2543
2869
  # Signs data using a {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}
2544
2870
  # with {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose}
@@ -3217,7 +3543,9 @@ module Google
3217
3543
  class Configuration
3218
3544
  extend ::Gapic::Config
3219
3545
 
3220
- config_attr :endpoint, "cloudkms.googleapis.com", ::String
3546
+ DEFAULT_ENDPOINT = "cloudkms.googleapis.com"
3547
+
3548
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
3221
3549
  config_attr :credentials, nil do |value|
3222
3550
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
3223
3551
  allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
@@ -3376,6 +3704,16 @@ module Google
3376
3704
  #
3377
3705
  attr_reader :decrypt
3378
3706
  ##
3707
+ # RPC-specific configuration for `raw_encrypt`
3708
+ # @return [::Gapic::Config::Method]
3709
+ #
3710
+ attr_reader :raw_encrypt
3711
+ ##
3712
+ # RPC-specific configuration for `raw_decrypt`
3713
+ # @return [::Gapic::Config::Method]
3714
+ #
3715
+ attr_reader :raw_decrypt
3716
+ ##
3379
3717
  # RPC-specific configuration for `asymmetric_sign`
3380
3718
  # @return [::Gapic::Config::Method]
3381
3719
  #
@@ -3445,6 +3783,10 @@ module Google
3445
3783
  @encrypt = ::Gapic::Config::Method.new encrypt_config
3446
3784
  decrypt_config = parent_rpcs.decrypt if parent_rpcs.respond_to? :decrypt
3447
3785
  @decrypt = ::Gapic::Config::Method.new decrypt_config
3786
+ raw_encrypt_config = parent_rpcs.raw_encrypt if parent_rpcs.respond_to? :raw_encrypt
3787
+ @raw_encrypt = ::Gapic::Config::Method.new raw_encrypt_config
3788
+ raw_decrypt_config = parent_rpcs.raw_decrypt if parent_rpcs.respond_to? :raw_decrypt
3789
+ @raw_decrypt = ::Gapic::Config::Method.new raw_decrypt_config
3448
3790
  asymmetric_sign_config = parent_rpcs.asymmetric_sign if parent_rpcs.respond_to? :asymmetric_sign
3449
3791
  @asymmetric_sign = ::Gapic::Config::Method.new asymmetric_sign_config
3450
3792
  asymmetric_decrypt_config = parent_rpcs.asymmetric_decrypt if parent_rpcs.respond_to? :asymmetric_decrypt