google-cloud-kms-v1 0.19.0 → 0.21.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -59,7 +59,7 @@ module Google
59
59
 
60
60
  verb, uri, query_string_params, body = ServiceStub.transcode_list_key_rings_request request_pb
61
61
  query_string_params = if query_string_params.any?
62
- query_string_params.to_h { |p| p.split("=", 2) }
62
+ query_string_params.to_h { |p| p.split "=", 2 }
63
63
  else
64
64
  {}
65
65
  end
@@ -97,7 +97,7 @@ module Google
97
97
 
98
98
  verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_keys_request request_pb
99
99
  query_string_params = if query_string_params.any?
100
- query_string_params.to_h { |p| p.split("=", 2) }
100
+ query_string_params.to_h { |p| p.split "=", 2 }
101
101
  else
102
102
  {}
103
103
  end
@@ -135,7 +135,7 @@ module Google
135
135
 
136
136
  verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_key_versions_request request_pb
137
137
  query_string_params = if query_string_params.any?
138
- query_string_params.to_h { |p| p.split("=", 2) }
138
+ query_string_params.to_h { |p| p.split "=", 2 }
139
139
  else
140
140
  {}
141
141
  end
@@ -173,7 +173,7 @@ module Google
173
173
 
174
174
  verb, uri, query_string_params, body = ServiceStub.transcode_list_import_jobs_request request_pb
175
175
  query_string_params = if query_string_params.any?
176
- query_string_params.to_h { |p| p.split("=", 2) }
176
+ query_string_params.to_h { |p| p.split "=", 2 }
177
177
  else
178
178
  {}
179
179
  end
@@ -211,7 +211,7 @@ module Google
211
211
 
212
212
  verb, uri, query_string_params, body = ServiceStub.transcode_get_key_ring_request request_pb
213
213
  query_string_params = if query_string_params.any?
214
- query_string_params.to_h { |p| p.split("=", 2) }
214
+ query_string_params.to_h { |p| p.split "=", 2 }
215
215
  else
216
216
  {}
217
217
  end
@@ -249,7 +249,7 @@ module Google
249
249
 
250
250
  verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_request request_pb
251
251
  query_string_params = if query_string_params.any?
252
- query_string_params.to_h { |p| p.split("=", 2) }
252
+ query_string_params.to_h { |p| p.split "=", 2 }
253
253
  else
254
254
  {}
255
255
  end
@@ -287,7 +287,7 @@ module Google
287
287
 
288
288
  verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_version_request request_pb
289
289
  query_string_params = if query_string_params.any?
290
- query_string_params.to_h { |p| p.split("=", 2) }
290
+ query_string_params.to_h { |p| p.split "=", 2 }
291
291
  else
292
292
  {}
293
293
  end
@@ -325,7 +325,7 @@ module Google
325
325
 
326
326
  verb, uri, query_string_params, body = ServiceStub.transcode_get_public_key_request request_pb
327
327
  query_string_params = if query_string_params.any?
328
- query_string_params.to_h { |p| p.split("=", 2) }
328
+ query_string_params.to_h { |p| p.split "=", 2 }
329
329
  else
330
330
  {}
331
331
  end
@@ -363,7 +363,7 @@ module Google
363
363
 
364
364
  verb, uri, query_string_params, body = ServiceStub.transcode_get_import_job_request request_pb
365
365
  query_string_params = if query_string_params.any?
366
- query_string_params.to_h { |p| p.split("=", 2) }
366
+ query_string_params.to_h { |p| p.split "=", 2 }
367
367
  else
368
368
  {}
369
369
  end
@@ -401,7 +401,7 @@ module Google
401
401
 
402
402
  verb, uri, query_string_params, body = ServiceStub.transcode_create_key_ring_request request_pb
403
403
  query_string_params = if query_string_params.any?
404
- query_string_params.to_h { |p| p.split("=", 2) }
404
+ query_string_params.to_h { |p| p.split "=", 2 }
405
405
  else
406
406
  {}
407
407
  end
@@ -439,7 +439,7 @@ module Google
439
439
 
440
440
  verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_request request_pb
441
441
  query_string_params = if query_string_params.any?
442
- query_string_params.to_h { |p| p.split("=", 2) }
442
+ query_string_params.to_h { |p| p.split "=", 2 }
443
443
  else
444
444
  {}
445
445
  end
@@ -477,7 +477,7 @@ module Google
477
477
 
478
478
  verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_version_request request_pb
479
479
  query_string_params = if query_string_params.any?
480
- query_string_params.to_h { |p| p.split("=", 2) }
480
+ query_string_params.to_h { |p| p.split "=", 2 }
481
481
  else
482
482
  {}
483
483
  end
@@ -515,7 +515,7 @@ module Google
515
515
 
516
516
  verb, uri, query_string_params, body = ServiceStub.transcode_import_crypto_key_version_request request_pb
517
517
  query_string_params = if query_string_params.any?
518
- query_string_params.to_h { |p| p.split("=", 2) }
518
+ query_string_params.to_h { |p| p.split "=", 2 }
519
519
  else
520
520
  {}
521
521
  end
@@ -553,7 +553,7 @@ module Google
553
553
 
554
554
  verb, uri, query_string_params, body = ServiceStub.transcode_create_import_job_request request_pb
555
555
  query_string_params = if query_string_params.any?
556
- query_string_params.to_h { |p| p.split("=", 2) }
556
+ query_string_params.to_h { |p| p.split "=", 2 }
557
557
  else
558
558
  {}
559
559
  end
@@ -591,7 +591,7 @@ module Google
591
591
 
592
592
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_request request_pb
593
593
  query_string_params = if query_string_params.any?
594
- query_string_params.to_h { |p| p.split("=", 2) }
594
+ query_string_params.to_h { |p| p.split "=", 2 }
595
595
  else
596
596
  {}
597
597
  end
@@ -629,7 +629,7 @@ module Google
629
629
 
630
630
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_version_request request_pb
631
631
  query_string_params = if query_string_params.any?
632
- query_string_params.to_h { |p| p.split("=", 2) }
632
+ query_string_params.to_h { |p| p.split "=", 2 }
633
633
  else
634
634
  {}
635
635
  end
@@ -667,7 +667,7 @@ module Google
667
667
 
668
668
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_primary_version_request request_pb
669
669
  query_string_params = if query_string_params.any?
670
- query_string_params.to_h { |p| p.split("=", 2) }
670
+ query_string_params.to_h { |p| p.split "=", 2 }
671
671
  else
672
672
  {}
673
673
  end
@@ -705,7 +705,7 @@ module Google
705
705
 
706
706
  verb, uri, query_string_params, body = ServiceStub.transcode_destroy_crypto_key_version_request request_pb
707
707
  query_string_params = if query_string_params.any?
708
- query_string_params.to_h { |p| p.split("=", 2) }
708
+ query_string_params.to_h { |p| p.split "=", 2 }
709
709
  else
710
710
  {}
711
711
  end
@@ -743,7 +743,7 @@ module Google
743
743
 
744
744
  verb, uri, query_string_params, body = ServiceStub.transcode_restore_crypto_key_version_request request_pb
745
745
  query_string_params = if query_string_params.any?
746
- query_string_params.to_h { |p| p.split("=", 2) }
746
+ query_string_params.to_h { |p| p.split "=", 2 }
747
747
  else
748
748
  {}
749
749
  end
@@ -781,7 +781,7 @@ module Google
781
781
 
782
782
  verb, uri, query_string_params, body = ServiceStub.transcode_encrypt_request request_pb
783
783
  query_string_params = if query_string_params.any?
784
- query_string_params.to_h { |p| p.split("=", 2) }
784
+ query_string_params.to_h { |p| p.split "=", 2 }
785
785
  else
786
786
  {}
787
787
  end
@@ -819,7 +819,7 @@ module Google
819
819
 
820
820
  verb, uri, query_string_params, body = ServiceStub.transcode_decrypt_request request_pb
821
821
  query_string_params = if query_string_params.any?
822
- query_string_params.to_h { |p| p.split("=", 2) }
822
+ query_string_params.to_h { |p| p.split "=", 2 }
823
823
  else
824
824
  {}
825
825
  end
@@ -838,6 +838,82 @@ module Google
838
838
  result
839
839
  end
840
840
 
841
+ ##
842
+ # Baseline implementation for the raw_encrypt REST call
843
+ #
844
+ # @param request_pb [::Google::Cloud::Kms::V1::RawEncryptRequest]
845
+ # A request object representing the call parameters. Required.
846
+ # @param options [::Gapic::CallOptions]
847
+ # Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
848
+ #
849
+ # @yield [result, operation] Access the result along with the TransportOperation object
850
+ # @yieldparam result [::Google::Cloud::Kms::V1::RawEncryptResponse]
851
+ # @yieldparam operation [::Gapic::Rest::TransportOperation]
852
+ #
853
+ # @return [::Google::Cloud::Kms::V1::RawEncryptResponse]
854
+ # A result object deserialized from the server's reply
855
+ def raw_encrypt request_pb, options = nil
856
+ raise ::ArgumentError, "request must be provided" if request_pb.nil?
857
+
858
+ verb, uri, query_string_params, body = ServiceStub.transcode_raw_encrypt_request request_pb
859
+ query_string_params = if query_string_params.any?
860
+ query_string_params.to_h { |p| p.split "=", 2 }
861
+ else
862
+ {}
863
+ end
864
+
865
+ response = @client_stub.make_http_request(
866
+ verb,
867
+ uri: uri,
868
+ body: body || "",
869
+ params: query_string_params,
870
+ options: options
871
+ )
872
+ operation = ::Gapic::Rest::TransportOperation.new response
873
+ result = ::Google::Cloud::Kms::V1::RawEncryptResponse.decode_json response.body, ignore_unknown_fields: true
874
+
875
+ yield result, operation if block_given?
876
+ result
877
+ end
878
+
879
+ ##
880
+ # Baseline implementation for the raw_decrypt REST call
881
+ #
882
+ # @param request_pb [::Google::Cloud::Kms::V1::RawDecryptRequest]
883
+ # A request object representing the call parameters. Required.
884
+ # @param options [::Gapic::CallOptions]
885
+ # Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
886
+ #
887
+ # @yield [result, operation] Access the result along with the TransportOperation object
888
+ # @yieldparam result [::Google::Cloud::Kms::V1::RawDecryptResponse]
889
+ # @yieldparam operation [::Gapic::Rest::TransportOperation]
890
+ #
891
+ # @return [::Google::Cloud::Kms::V1::RawDecryptResponse]
892
+ # A result object deserialized from the server's reply
893
+ def raw_decrypt request_pb, options = nil
894
+ raise ::ArgumentError, "request must be provided" if request_pb.nil?
895
+
896
+ verb, uri, query_string_params, body = ServiceStub.transcode_raw_decrypt_request request_pb
897
+ query_string_params = if query_string_params.any?
898
+ query_string_params.to_h { |p| p.split "=", 2 }
899
+ else
900
+ {}
901
+ end
902
+
903
+ response = @client_stub.make_http_request(
904
+ verb,
905
+ uri: uri,
906
+ body: body || "",
907
+ params: query_string_params,
908
+ options: options
909
+ )
910
+ operation = ::Gapic::Rest::TransportOperation.new response
911
+ result = ::Google::Cloud::Kms::V1::RawDecryptResponse.decode_json response.body, ignore_unknown_fields: true
912
+
913
+ yield result, operation if block_given?
914
+ result
915
+ end
916
+
841
917
  ##
842
918
  # Baseline implementation for the asymmetric_sign REST call
843
919
  #
@@ -857,7 +933,7 @@ module Google
857
933
 
858
934
  verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_sign_request request_pb
859
935
  query_string_params = if query_string_params.any?
860
- query_string_params.to_h { |p| p.split("=", 2) }
936
+ query_string_params.to_h { |p| p.split "=", 2 }
861
937
  else
862
938
  {}
863
939
  end
@@ -895,7 +971,7 @@ module Google
895
971
 
896
972
  verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_decrypt_request request_pb
897
973
  query_string_params = if query_string_params.any?
898
- query_string_params.to_h { |p| p.split("=", 2) }
974
+ query_string_params.to_h { |p| p.split "=", 2 }
899
975
  else
900
976
  {}
901
977
  end
@@ -933,7 +1009,7 @@ module Google
933
1009
 
934
1010
  verb, uri, query_string_params, body = ServiceStub.transcode_mac_sign_request request_pb
935
1011
  query_string_params = if query_string_params.any?
936
- query_string_params.to_h { |p| p.split("=", 2) }
1012
+ query_string_params.to_h { |p| p.split "=", 2 }
937
1013
  else
938
1014
  {}
939
1015
  end
@@ -971,7 +1047,7 @@ module Google
971
1047
 
972
1048
  verb, uri, query_string_params, body = ServiceStub.transcode_mac_verify_request request_pb
973
1049
  query_string_params = if query_string_params.any?
974
- query_string_params.to_h { |p| p.split("=", 2) }
1050
+ query_string_params.to_h { |p| p.split "=", 2 }
975
1051
  else
976
1052
  {}
977
1053
  end
@@ -1009,7 +1085,7 @@ module Google
1009
1085
 
1010
1086
  verb, uri, query_string_params, body = ServiceStub.transcode_generate_random_bytes_request request_pb
1011
1087
  query_string_params = if query_string_params.any?
1012
- query_string_params.to_h { |p| p.split("=", 2) }
1088
+ query_string_params.to_h { |p| p.split "=", 2 }
1013
1089
  else
1014
1090
  {}
1015
1091
  end
@@ -1481,6 +1557,50 @@ module Google
1481
1557
  transcoder.transcode request_pb
1482
1558
  end
1483
1559
 
1560
+ ##
1561
+ # @private
1562
+ #
1563
+ # GRPC transcoding helper method for the raw_encrypt REST call
1564
+ #
1565
+ # @param request_pb [::Google::Cloud::Kms::V1::RawEncryptRequest]
1566
+ # A request object representing the call parameters. Required.
1567
+ # @return [Array(String, [String, nil], Hash{String => String})]
1568
+ # Uri, Body, Query string parameters
1569
+ def self.transcode_raw_encrypt_request request_pb
1570
+ transcoder = Gapic::Rest::GrpcTranscoder.new
1571
+ .with_bindings(
1572
+ uri_method: :post,
1573
+ uri_template: "/v1/{name}:rawEncrypt",
1574
+ body: "*",
1575
+ matches: [
1576
+ ["name", %r{^projects/[^/]+/locations/[^/]+/keyRings/[^/]+/cryptoKeys/[^/]+/cryptoKeyVersions/[^/]+/?$}, false]
1577
+ ]
1578
+ )
1579
+ transcoder.transcode request_pb
1580
+ end
1581
+
1582
+ ##
1583
+ # @private
1584
+ #
1585
+ # GRPC transcoding helper method for the raw_decrypt REST call
1586
+ #
1587
+ # @param request_pb [::Google::Cloud::Kms::V1::RawDecryptRequest]
1588
+ # A request object representing the call parameters. Required.
1589
+ # @return [Array(String, [String, nil], Hash{String => String})]
1590
+ # Uri, Body, Query string parameters
1591
+ def self.transcode_raw_decrypt_request request_pb
1592
+ transcoder = Gapic::Rest::GrpcTranscoder.new
1593
+ .with_bindings(
1594
+ uri_method: :post,
1595
+ uri_template: "/v1/{name}:rawDecrypt",
1596
+ body: "*",
1597
+ matches: [
1598
+ ["name", %r{^projects/[^/]+/locations/[^/]+/keyRings/[^/]+/cryptoKeys/[^/]+/cryptoKeyVersions/[^/]+/?$}, false]
1599
+ ]
1600
+ )
1601
+ transcoder.transcode request_pb
1602
+ end
1603
+
1484
1604
  ##
1485
1605
  # @private
1486
1606
  #
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/cloud/kms/v1/resources.proto
3
4
 
@@ -9,168 +10,34 @@ require 'google/protobuf/duration_pb'
9
10
  require 'google/protobuf/timestamp_pb'
10
11
  require 'google/protobuf/wrappers_pb'
11
12
 
12
- Google::Protobuf::DescriptorPool.generated_pool.build do
13
- add_file("google/cloud/kms/v1/resources.proto", :syntax => :proto3) do
14
- add_message "google.cloud.kms.v1.KeyRing" do
15
- optional :name, :string, 1
16
- optional :create_time, :message, 2, "google.protobuf.Timestamp"
17
- end
18
- add_message "google.cloud.kms.v1.CryptoKey" do
19
- optional :name, :string, 1
20
- optional :primary, :message, 2, "google.cloud.kms.v1.CryptoKeyVersion"
21
- optional :purpose, :enum, 3, "google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose"
22
- optional :create_time, :message, 5, "google.protobuf.Timestamp"
23
- optional :next_rotation_time, :message, 7, "google.protobuf.Timestamp"
24
- optional :version_template, :message, 11, "google.cloud.kms.v1.CryptoKeyVersionTemplate"
25
- map :labels, :string, :string, 10
26
- optional :import_only, :bool, 13
27
- optional :destroy_scheduled_duration, :message, 14, "google.protobuf.Duration"
28
- optional :crypto_key_backend, :string, 15
29
- oneof :rotation_schedule do
30
- optional :rotation_period, :message, 8, "google.protobuf.Duration"
31
- end
32
- end
33
- add_enum "google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose" do
34
- value :CRYPTO_KEY_PURPOSE_UNSPECIFIED, 0
35
- value :ENCRYPT_DECRYPT, 1
36
- value :ASYMMETRIC_SIGN, 5
37
- value :ASYMMETRIC_DECRYPT, 6
38
- value :MAC, 9
39
- end
40
- add_message "google.cloud.kms.v1.CryptoKeyVersionTemplate" do
41
- optional :protection_level, :enum, 1, "google.cloud.kms.v1.ProtectionLevel"
42
- optional :algorithm, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
43
- end
44
- add_message "google.cloud.kms.v1.KeyOperationAttestation" do
45
- optional :format, :enum, 4, "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat"
46
- optional :content, :bytes, 5
47
- optional :cert_chains, :message, 6, "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains"
48
- end
49
- add_message "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains" do
50
- repeated :cavium_certs, :string, 1
51
- repeated :google_card_certs, :string, 2
52
- repeated :google_partition_certs, :string, 3
53
- end
54
- add_enum "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat" do
55
- value :ATTESTATION_FORMAT_UNSPECIFIED, 0
56
- value :CAVIUM_V1_COMPRESSED, 3
57
- value :CAVIUM_V2_COMPRESSED, 4
58
- end
59
- add_message "google.cloud.kms.v1.CryptoKeyVersion" do
60
- optional :name, :string, 1
61
- optional :state, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState"
62
- optional :protection_level, :enum, 7, "google.cloud.kms.v1.ProtectionLevel"
63
- optional :algorithm, :enum, 10, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
64
- optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
65
- optional :create_time, :message, 4, "google.protobuf.Timestamp"
66
- optional :generate_time, :message, 11, "google.protobuf.Timestamp"
67
- optional :destroy_time, :message, 5, "google.protobuf.Timestamp"
68
- optional :destroy_event_time, :message, 6, "google.protobuf.Timestamp"
69
- optional :import_job, :string, 14
70
- optional :import_time, :message, 15, "google.protobuf.Timestamp"
71
- optional :import_failure_reason, :string, 16
72
- optional :generation_failure_reason, :string, 19
73
- optional :external_destruction_failure_reason, :string, 20
74
- optional :external_protection_level_options, :message, 17, "google.cloud.kms.v1.ExternalProtectionLevelOptions"
75
- optional :reimport_eligible, :bool, 18
76
- end
77
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
78
- value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
79
- value :GOOGLE_SYMMETRIC_ENCRYPTION, 1
80
- value :RSA_SIGN_PSS_2048_SHA256, 2
81
- value :RSA_SIGN_PSS_3072_SHA256, 3
82
- value :RSA_SIGN_PSS_4096_SHA256, 4
83
- value :RSA_SIGN_PSS_4096_SHA512, 15
84
- value :RSA_SIGN_PKCS1_2048_SHA256, 5
85
- value :RSA_SIGN_PKCS1_3072_SHA256, 6
86
- value :RSA_SIGN_PKCS1_4096_SHA256, 7
87
- value :RSA_SIGN_PKCS1_4096_SHA512, 16
88
- value :RSA_SIGN_RAW_PKCS1_2048, 28
89
- value :RSA_SIGN_RAW_PKCS1_3072, 29
90
- value :RSA_SIGN_RAW_PKCS1_4096, 30
91
- value :RSA_DECRYPT_OAEP_2048_SHA256, 8
92
- value :RSA_DECRYPT_OAEP_3072_SHA256, 9
93
- value :RSA_DECRYPT_OAEP_4096_SHA256, 10
94
- value :RSA_DECRYPT_OAEP_4096_SHA512, 17
95
- value :RSA_DECRYPT_OAEP_2048_SHA1, 37
96
- value :RSA_DECRYPT_OAEP_3072_SHA1, 38
97
- value :RSA_DECRYPT_OAEP_4096_SHA1, 39
98
- value :EC_SIGN_P256_SHA256, 12
99
- value :EC_SIGN_P384_SHA384, 13
100
- value :EC_SIGN_SECP256K1_SHA256, 31
101
- value :HMAC_SHA256, 32
102
- value :HMAC_SHA1, 33
103
- value :HMAC_SHA384, 34
104
- value :HMAC_SHA512, 35
105
- value :HMAC_SHA224, 36
106
- value :EXTERNAL_SYMMETRIC_ENCRYPTION, 18
107
- end
108
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState" do
109
- value :CRYPTO_KEY_VERSION_STATE_UNSPECIFIED, 0
110
- value :PENDING_GENERATION, 5
111
- value :ENABLED, 1
112
- value :DISABLED, 2
113
- value :DESTROYED, 3
114
- value :DESTROY_SCHEDULED, 4
115
- value :PENDING_IMPORT, 6
116
- value :IMPORT_FAILED, 7
117
- value :GENERATION_FAILED, 8
118
- value :PENDING_EXTERNAL_DESTRUCTION, 9
119
- value :EXTERNAL_DESTRUCTION_FAILED, 10
120
- end
121
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView" do
122
- value :CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED, 0
123
- value :FULL, 1
124
- end
125
- add_message "google.cloud.kms.v1.PublicKey" do
126
- optional :pem, :string, 1
127
- optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
128
- optional :pem_crc32c, :message, 3, "google.protobuf.Int64Value"
129
- optional :name, :string, 4
130
- optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
131
- end
132
- add_message "google.cloud.kms.v1.ImportJob" do
133
- optional :name, :string, 1
134
- optional :import_method, :enum, 2, "google.cloud.kms.v1.ImportJob.ImportMethod"
135
- optional :protection_level, :enum, 9, "google.cloud.kms.v1.ProtectionLevel"
136
- optional :create_time, :message, 3, "google.protobuf.Timestamp"
137
- optional :generate_time, :message, 4, "google.protobuf.Timestamp"
138
- optional :expire_time, :message, 5, "google.protobuf.Timestamp"
139
- optional :expire_event_time, :message, 10, "google.protobuf.Timestamp"
140
- optional :state, :enum, 6, "google.cloud.kms.v1.ImportJob.ImportJobState"
141
- optional :public_key, :message, 7, "google.cloud.kms.v1.ImportJob.WrappingPublicKey"
142
- optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
143
- end
144
- add_message "google.cloud.kms.v1.ImportJob.WrappingPublicKey" do
145
- optional :pem, :string, 1
146
- end
147
- add_enum "google.cloud.kms.v1.ImportJob.ImportMethod" do
148
- value :IMPORT_METHOD_UNSPECIFIED, 0
149
- value :RSA_OAEP_3072_SHA1_AES_256, 1
150
- value :RSA_OAEP_4096_SHA1_AES_256, 2
151
- value :RSA_OAEP_3072_SHA256_AES_256, 3
152
- value :RSA_OAEP_4096_SHA256_AES_256, 4
153
- value :RSA_OAEP_3072_SHA256, 5
154
- value :RSA_OAEP_4096_SHA256, 6
155
- end
156
- add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
157
- value :IMPORT_JOB_STATE_UNSPECIFIED, 0
158
- value :PENDING_GENERATION, 1
159
- value :ACTIVE, 2
160
- value :EXPIRED, 3
161
- end
162
- add_message "google.cloud.kms.v1.ExternalProtectionLevelOptions" do
163
- optional :external_key_uri, :string, 1
164
- optional :ekm_connection_key_path, :string, 2
165
- end
166
- add_enum "google.cloud.kms.v1.ProtectionLevel" do
167
- value :PROTECTION_LEVEL_UNSPECIFIED, 0
168
- value :SOFTWARE, 1
169
- value :HSM, 2
170
- value :EXTERNAL, 3
171
- value :EXTERNAL_VPC, 4
13
+
14
+ descriptor_data = "\n#google/cloud/kms/v1/resources.proto\x12\x13google.cloud.kms.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/wrappers.proto\"\xb5\x01\n\x07KeyRing\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03:a\xea\x41^\n\x1f\x63loudkms.googleapis.com/KeyRing\x12;projects/{project}/locations/{location}/keyRings/{key_ring}\"\xae\x07\n\tCryptoKey\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12;\n\x07primary\x18\x02 \x01(\x0b\x32%.google.cloud.kms.v1.CryptoKeyVersionB\x03\xe0\x41\x03\x12\x45\n\x07purpose\x18\x03 \x01(\x0e\x32/.google.cloud.kms.v1.CryptoKey.CryptoKeyPurposeB\x03\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\x12next_rotation_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x34\n\x0frotation_period\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationH\x00\x12G\n\x10version_template\x18\x0b \x01(\x0b\x32-.google.cloud.kms.v1.CryptoKeyVersionTemplate\x12:\n\x06labels\x18\n \x03(\x0b\x32*.google.cloud.kms.v1.CryptoKey.LabelsEntry\x12\x18\n\x0bimport_only\x18\r \x01(\x08\x42\x03\xe0\x41\x05\x12\x42\n\x1a\x64\x65stroy_scheduled_duration\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x05\x12%\n\x12\x63rypto_key_backend\x18\x0f \x01(\tB\t\xe0\x41\x05\xfa\x41\x03\n\x01*\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"\x9a\x01\n\x10\x43ryptoKeyPurpose\x12\"\n\x1e\x43RYPTO_KEY_PURPOSE_UNSPECIFIED\x10\x00\x12\x13\n\x0f\x45NCRYPT_DECRYPT\x10\x01\x12\x13\n\x0f\x41SYMMETRIC_SIGN\x10\x05\x12\x16\n\x12\x41SYMMETRIC_DECRYPT\x10\x06\x12\x17\n\x13RAW_ENCRYPT_DECRYPT\x10\x07\x12\x07\n\x03MAC\x10\t:{\xea\x41x\n!cloudkms.googleapis.com/CryptoKey\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}B\x13\n\x11rotation_schedule\"\xb3\x01\n\x18\x43ryptoKeyVersionTemplate\x12>\n\x10protection_level\x18\x01 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel\x12W\n\talgorithm\x18\x03 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x02\"\xb1\x03\n\x17KeyOperationAttestation\x12S\n\x06\x66ormat\x18\x04 \x01(\x0e\x32>.google.cloud.kms.v1.KeyOperationAttestation.AttestationFormatB\x03\xe0\x41\x03\x12\x14\n\x07\x63ontent\x18\x05 \x01(\x0c\x42\x03\xe0\x41\x03\x12X\n\x0b\x63\x65rt_chains\x18\x06 \x01(\x0b\x32>.google.cloud.kms.v1.KeyOperationAttestation.CertificateChainsB\x03\xe0\x41\x03\x1a\x64\n\x11\x43\x65rtificateChains\x12\x14\n\x0c\x63\x61vium_certs\x18\x01 \x03(\t\x12\x19\n\x11google_card_certs\x18\x02 \x03(\t\x12\x1e\n\x16google_partition_certs\x18\x03 \x03(\t\"k\n\x11\x41ttestationFormat\x12\"\n\x1e\x41TTESTATION_FORMAT_UNSPECIFIED\x10\x00\x12\x18\n\x14\x43\x41VIUM_V1_COMPRESSED\x10\x03\x12\x18\n\x14\x43\x41VIUM_V2_COMPRESSED\x10\x04\"\xa8\x12\n\x10\x43ryptoKeyVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\x05state\x18\x03 \x01(\x0e\x32;.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState\x12\x43\n\x10protection_level\x18\x07 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x03\xe0\x41\x03\x12W\n\talgorithm\x18\n \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12;\n\x12\x64\x65stroy_event_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x17\n\nimport_job\x18\x0e \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0bimport_time\x18\x0f \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\"\n\x15import_failure_reason\x18\x10 \x01(\tB\x03\xe0\x41\x03\x12&\n\x19generation_failure_reason\x18\x13 \x01(\tB\x03\xe0\x41\x03\x12\x30\n#external_destruction_failure_reason\x18\x14 \x01(\tB\x03\xe0\x41\x03\x12^\n!external_protection_level_options\x18\x11 \x01(\x0b\x32\x33.google.cloud.kms.v1.ExternalProtectionLevelOptions\x12\x1e\n\x11reimport_eligible\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\"\x89\x07\n\x19\x43ryptoKeyVersionAlgorithm\x12,\n(CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED\x10\x00\x12\x1f\n\x1bGOOGLE_SYMMETRIC_ENCRYPTION\x10\x01\x12\x0f\n\x0b\x41\x45S_128_GCM\x10)\x12\x0f\n\x0b\x41\x45S_256_GCM\x10\x13\x12\x1c\n\x18RSA_SIGN_PSS_2048_SHA256\x10\x02\x12\x1c\n\x18RSA_SIGN_PSS_3072_SHA256\x10\x03\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA256\x10\x04\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA512\x10\x0f\x12\x1e\n\x1aRSA_SIGN_PKCS1_2048_SHA256\x10\x05\x12\x1e\n\x1aRSA_SIGN_PKCS1_3072_SHA256\x10\x06\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA256\x10\x07\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA512\x10\x10\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_2048\x10\x1c\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_3072\x10\x1d\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_4096\x10\x1e\x12 \n\x1cRSA_DECRYPT_OAEP_2048_SHA256\x10\x08\x12 \n\x1cRSA_DECRYPT_OAEP_3072_SHA256\x10\t\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA256\x10\n\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA512\x10\x11\x12\x1e\n\x1aRSA_DECRYPT_OAEP_2048_SHA1\x10%\x12\x1e\n\x1aRSA_DECRYPT_OAEP_3072_SHA1\x10&\x12\x1e\n\x1aRSA_DECRYPT_OAEP_4096_SHA1\x10\'\x12\x17\n\x13\x45\x43_SIGN_P256_SHA256\x10\x0c\x12\x17\n\x13\x45\x43_SIGN_P384_SHA384\x10\r\x12\x1c\n\x18\x45\x43_SIGN_SECP256K1_SHA256\x10\x1f\x12\x0f\n\x0bHMAC_SHA256\x10 \x12\r\n\tHMAC_SHA1\x10!\x12\x0f\n\x0bHMAC_SHA384\x10\"\x12\x0f\n\x0bHMAC_SHA512\x10#\x12\x0f\n\x0bHMAC_SHA224\x10$\x12!\n\x1d\x45XTERNAL_SYMMETRIC_ENCRYPTION\x10\x12\"\x9b\x02\n\x15\x43ryptoKeyVersionState\x12(\n$CRYPTO_KEY_VERSION_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x05\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03\x12\x15\n\x11\x44\x45STROY_SCHEDULED\x10\x04\x12\x12\n\x0ePENDING_IMPORT\x10\x06\x12\x11\n\rIMPORT_FAILED\x10\x07\x12\x15\n\x11GENERATION_FAILED\x10\x08\x12 \n\x1cPENDING_EXTERNAL_DESTRUCTION\x10\t\x12\x1f\n\x1b\x45XTERNAL_DESTRUCTION_FAILED\x10\n\"I\n\x14\x43ryptoKeyVersionView\x12\'\n#CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01:\xaa\x01\xea\x41\xa6\x01\n(cloudkms.googleapis.com/CryptoKeyVersion\x12zprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}\"\x9c\x03\n\tPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\x12R\n\talgorithm\x18\x02 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm\x12/\n\npem_crc32c\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x0c\n\x04name\x18\x04 \x01(\t\x12>\n\x10protection_level\x18\x05 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel:\xae\x01\xea\x41\xaa\x01\n!cloudkms.googleapis.com/PublicKey\x12\x84\x01projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}/publicKey\"\xd4\x08\n\tImportJob\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\rimport_method\x18\x02 \x01(\x0e\x32+.google.cloud.kms.v1.ImportJob.ImportMethodB\x06\xe0\x41\x02\xe0\x41\x05\x12\x46\n\x10protection_level\x18\t \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x06\xe0\x41\x02\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12:\n\x11\x65xpire_event_time\x18\n \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x05state\x18\x06 \x01(\x0e\x32-.google.cloud.kms.v1.ImportJob.ImportJobStateB\x03\xe0\x41\x03\x12I\n\npublic_key\x18\x07 \x01(\x0b\x32\x30.google.cloud.kms.v1.ImportJob.WrappingPublicKeyB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x1a \n\x11WrappingPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\"\xe5\x01\n\x0cImportMethod\x12\x1d\n\x19IMPORT_METHOD_UNSPECIFIED\x10\x00\x12\x1e\n\x1aRSA_OAEP_3072_SHA1_AES_256\x10\x01\x12\x1e\n\x1aRSA_OAEP_4096_SHA1_AES_256\x10\x02\x12 \n\x1cRSA_OAEP_3072_SHA256_AES_256\x10\x03\x12 \n\x1cRSA_OAEP_4096_SHA256_AES_256\x10\x04\x12\x18\n\x14RSA_OAEP_3072_SHA256\x10\x05\x12\x18\n\x14RSA_OAEP_4096_SHA256\x10\x06\"c\n\x0eImportJobState\x12 \n\x1cIMPORT_JOB_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x01\x12\n\n\x06\x41\x43TIVE\x10\x02\x12\x0b\n\x07\x45XPIRED\x10\x03:{\xea\x41x\n!cloudkms.googleapis.com/ImportJob\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/importJobs/{import_job}\"[\n\x1e\x45xternalProtectionLevelOptions\x12\x18\n\x10\x65xternal_key_uri\x18\x01 \x01(\t\x12\x1f\n\x17\x65km_connection_key_path\x18\x02 \x01(\t*j\n\x0fProtectionLevel\x12 \n\x1cPROTECTION_LEVEL_UNSPECIFIED\x10\x00\x12\x0c\n\x08SOFTWARE\x10\x01\x12\x07\n\x03HSM\x10\x02\x12\x0c\n\x08\x45XTERNAL\x10\x03\x12\x10\n\x0c\x45XTERNAL_VPC\x10\x04\x42\x88\x01\n\x17\x63om.google.cloud.kms.v1B\x11KmsResourcesProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1b\x06proto3"
15
+
16
+ pool = Google::Protobuf::DescriptorPool.generated_pool
17
+
18
+ begin
19
+ pool.add_serialized_file(descriptor_data)
20
+ rescue TypeError => e
21
+ # Compatibility code: will be removed in the next major version.
22
+ require 'google/protobuf/descriptor_pb'
23
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
24
+ parsed.clear_dependency
25
+ serialized = parsed.class.encode(parsed)
26
+ file = pool.add_serialized_file(serialized)
27
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
28
+ imports = [
29
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
30
+ ["google.protobuf.Duration", "google/protobuf/duration.proto"],
31
+ ["google.protobuf.Int64Value", "google/protobuf/wrappers.proto"],
32
+ ]
33
+ imports.each do |type_name, expected_filename|
34
+ import_file = pool.lookup(type_name).file_descriptor
35
+ if import_file.name != expected_filename
36
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
172
37
  end
173
38
  end
39
+ warn "Each proto file must use a consistent fully-qualified name."
40
+ warn "This will become an error in the next major version."
174
41
  end
175
42
 
176
43
  module Google