google-cloud-kms-v1 0.19.0 → 0.21.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -59,7 +59,7 @@ module Google
59
59
 
60
60
  verb, uri, query_string_params, body = ServiceStub.transcode_list_key_rings_request request_pb
61
61
  query_string_params = if query_string_params.any?
62
- query_string_params.to_h { |p| p.split("=", 2) }
62
+ query_string_params.to_h { |p| p.split "=", 2 }
63
63
  else
64
64
  {}
65
65
  end
@@ -97,7 +97,7 @@ module Google
97
97
 
98
98
  verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_keys_request request_pb
99
99
  query_string_params = if query_string_params.any?
100
- query_string_params.to_h { |p| p.split("=", 2) }
100
+ query_string_params.to_h { |p| p.split "=", 2 }
101
101
  else
102
102
  {}
103
103
  end
@@ -135,7 +135,7 @@ module Google
135
135
 
136
136
  verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_key_versions_request request_pb
137
137
  query_string_params = if query_string_params.any?
138
- query_string_params.to_h { |p| p.split("=", 2) }
138
+ query_string_params.to_h { |p| p.split "=", 2 }
139
139
  else
140
140
  {}
141
141
  end
@@ -173,7 +173,7 @@ module Google
173
173
 
174
174
  verb, uri, query_string_params, body = ServiceStub.transcode_list_import_jobs_request request_pb
175
175
  query_string_params = if query_string_params.any?
176
- query_string_params.to_h { |p| p.split("=", 2) }
176
+ query_string_params.to_h { |p| p.split "=", 2 }
177
177
  else
178
178
  {}
179
179
  end
@@ -211,7 +211,7 @@ module Google
211
211
 
212
212
  verb, uri, query_string_params, body = ServiceStub.transcode_get_key_ring_request request_pb
213
213
  query_string_params = if query_string_params.any?
214
- query_string_params.to_h { |p| p.split("=", 2) }
214
+ query_string_params.to_h { |p| p.split "=", 2 }
215
215
  else
216
216
  {}
217
217
  end
@@ -249,7 +249,7 @@ module Google
249
249
 
250
250
  verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_request request_pb
251
251
  query_string_params = if query_string_params.any?
252
- query_string_params.to_h { |p| p.split("=", 2) }
252
+ query_string_params.to_h { |p| p.split "=", 2 }
253
253
  else
254
254
  {}
255
255
  end
@@ -287,7 +287,7 @@ module Google
287
287
 
288
288
  verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_version_request request_pb
289
289
  query_string_params = if query_string_params.any?
290
- query_string_params.to_h { |p| p.split("=", 2) }
290
+ query_string_params.to_h { |p| p.split "=", 2 }
291
291
  else
292
292
  {}
293
293
  end
@@ -325,7 +325,7 @@ module Google
325
325
 
326
326
  verb, uri, query_string_params, body = ServiceStub.transcode_get_public_key_request request_pb
327
327
  query_string_params = if query_string_params.any?
328
- query_string_params.to_h { |p| p.split("=", 2) }
328
+ query_string_params.to_h { |p| p.split "=", 2 }
329
329
  else
330
330
  {}
331
331
  end
@@ -363,7 +363,7 @@ module Google
363
363
 
364
364
  verb, uri, query_string_params, body = ServiceStub.transcode_get_import_job_request request_pb
365
365
  query_string_params = if query_string_params.any?
366
- query_string_params.to_h { |p| p.split("=", 2) }
366
+ query_string_params.to_h { |p| p.split "=", 2 }
367
367
  else
368
368
  {}
369
369
  end
@@ -401,7 +401,7 @@ module Google
401
401
 
402
402
  verb, uri, query_string_params, body = ServiceStub.transcode_create_key_ring_request request_pb
403
403
  query_string_params = if query_string_params.any?
404
- query_string_params.to_h { |p| p.split("=", 2) }
404
+ query_string_params.to_h { |p| p.split "=", 2 }
405
405
  else
406
406
  {}
407
407
  end
@@ -439,7 +439,7 @@ module Google
439
439
 
440
440
  verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_request request_pb
441
441
  query_string_params = if query_string_params.any?
442
- query_string_params.to_h { |p| p.split("=", 2) }
442
+ query_string_params.to_h { |p| p.split "=", 2 }
443
443
  else
444
444
  {}
445
445
  end
@@ -477,7 +477,7 @@ module Google
477
477
 
478
478
  verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_version_request request_pb
479
479
  query_string_params = if query_string_params.any?
480
- query_string_params.to_h { |p| p.split("=", 2) }
480
+ query_string_params.to_h { |p| p.split "=", 2 }
481
481
  else
482
482
  {}
483
483
  end
@@ -515,7 +515,7 @@ module Google
515
515
 
516
516
  verb, uri, query_string_params, body = ServiceStub.transcode_import_crypto_key_version_request request_pb
517
517
  query_string_params = if query_string_params.any?
518
- query_string_params.to_h { |p| p.split("=", 2) }
518
+ query_string_params.to_h { |p| p.split "=", 2 }
519
519
  else
520
520
  {}
521
521
  end
@@ -553,7 +553,7 @@ module Google
553
553
 
554
554
  verb, uri, query_string_params, body = ServiceStub.transcode_create_import_job_request request_pb
555
555
  query_string_params = if query_string_params.any?
556
- query_string_params.to_h { |p| p.split("=", 2) }
556
+ query_string_params.to_h { |p| p.split "=", 2 }
557
557
  else
558
558
  {}
559
559
  end
@@ -591,7 +591,7 @@ module Google
591
591
 
592
592
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_request request_pb
593
593
  query_string_params = if query_string_params.any?
594
- query_string_params.to_h { |p| p.split("=", 2) }
594
+ query_string_params.to_h { |p| p.split "=", 2 }
595
595
  else
596
596
  {}
597
597
  end
@@ -629,7 +629,7 @@ module Google
629
629
 
630
630
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_version_request request_pb
631
631
  query_string_params = if query_string_params.any?
632
- query_string_params.to_h { |p| p.split("=", 2) }
632
+ query_string_params.to_h { |p| p.split "=", 2 }
633
633
  else
634
634
  {}
635
635
  end
@@ -667,7 +667,7 @@ module Google
667
667
 
668
668
  verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_primary_version_request request_pb
669
669
  query_string_params = if query_string_params.any?
670
- query_string_params.to_h { |p| p.split("=", 2) }
670
+ query_string_params.to_h { |p| p.split "=", 2 }
671
671
  else
672
672
  {}
673
673
  end
@@ -705,7 +705,7 @@ module Google
705
705
 
706
706
  verb, uri, query_string_params, body = ServiceStub.transcode_destroy_crypto_key_version_request request_pb
707
707
  query_string_params = if query_string_params.any?
708
- query_string_params.to_h { |p| p.split("=", 2) }
708
+ query_string_params.to_h { |p| p.split "=", 2 }
709
709
  else
710
710
  {}
711
711
  end
@@ -743,7 +743,7 @@ module Google
743
743
 
744
744
  verb, uri, query_string_params, body = ServiceStub.transcode_restore_crypto_key_version_request request_pb
745
745
  query_string_params = if query_string_params.any?
746
- query_string_params.to_h { |p| p.split("=", 2) }
746
+ query_string_params.to_h { |p| p.split "=", 2 }
747
747
  else
748
748
  {}
749
749
  end
@@ -781,7 +781,7 @@ module Google
781
781
 
782
782
  verb, uri, query_string_params, body = ServiceStub.transcode_encrypt_request request_pb
783
783
  query_string_params = if query_string_params.any?
784
- query_string_params.to_h { |p| p.split("=", 2) }
784
+ query_string_params.to_h { |p| p.split "=", 2 }
785
785
  else
786
786
  {}
787
787
  end
@@ -819,7 +819,7 @@ module Google
819
819
 
820
820
  verb, uri, query_string_params, body = ServiceStub.transcode_decrypt_request request_pb
821
821
  query_string_params = if query_string_params.any?
822
- query_string_params.to_h { |p| p.split("=", 2) }
822
+ query_string_params.to_h { |p| p.split "=", 2 }
823
823
  else
824
824
  {}
825
825
  end
@@ -838,6 +838,82 @@ module Google
838
838
  result
839
839
  end
840
840
 
841
+ ##
842
+ # Baseline implementation for the raw_encrypt REST call
843
+ #
844
+ # @param request_pb [::Google::Cloud::Kms::V1::RawEncryptRequest]
845
+ # A request object representing the call parameters. Required.
846
+ # @param options [::Gapic::CallOptions]
847
+ # Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
848
+ #
849
+ # @yield [result, operation] Access the result along with the TransportOperation object
850
+ # @yieldparam result [::Google::Cloud::Kms::V1::RawEncryptResponse]
851
+ # @yieldparam operation [::Gapic::Rest::TransportOperation]
852
+ #
853
+ # @return [::Google::Cloud::Kms::V1::RawEncryptResponse]
854
+ # A result object deserialized from the server's reply
855
+ def raw_encrypt request_pb, options = nil
856
+ raise ::ArgumentError, "request must be provided" if request_pb.nil?
857
+
858
+ verb, uri, query_string_params, body = ServiceStub.transcode_raw_encrypt_request request_pb
859
+ query_string_params = if query_string_params.any?
860
+ query_string_params.to_h { |p| p.split "=", 2 }
861
+ else
862
+ {}
863
+ end
864
+
865
+ response = @client_stub.make_http_request(
866
+ verb,
867
+ uri: uri,
868
+ body: body || "",
869
+ params: query_string_params,
870
+ options: options
871
+ )
872
+ operation = ::Gapic::Rest::TransportOperation.new response
873
+ result = ::Google::Cloud::Kms::V1::RawEncryptResponse.decode_json response.body, ignore_unknown_fields: true
874
+
875
+ yield result, operation if block_given?
876
+ result
877
+ end
878
+
879
+ ##
880
+ # Baseline implementation for the raw_decrypt REST call
881
+ #
882
+ # @param request_pb [::Google::Cloud::Kms::V1::RawDecryptRequest]
883
+ # A request object representing the call parameters. Required.
884
+ # @param options [::Gapic::CallOptions]
885
+ # Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
886
+ #
887
+ # @yield [result, operation] Access the result along with the TransportOperation object
888
+ # @yieldparam result [::Google::Cloud::Kms::V1::RawDecryptResponse]
889
+ # @yieldparam operation [::Gapic::Rest::TransportOperation]
890
+ #
891
+ # @return [::Google::Cloud::Kms::V1::RawDecryptResponse]
892
+ # A result object deserialized from the server's reply
893
+ def raw_decrypt request_pb, options = nil
894
+ raise ::ArgumentError, "request must be provided" if request_pb.nil?
895
+
896
+ verb, uri, query_string_params, body = ServiceStub.transcode_raw_decrypt_request request_pb
897
+ query_string_params = if query_string_params.any?
898
+ query_string_params.to_h { |p| p.split "=", 2 }
899
+ else
900
+ {}
901
+ end
902
+
903
+ response = @client_stub.make_http_request(
904
+ verb,
905
+ uri: uri,
906
+ body: body || "",
907
+ params: query_string_params,
908
+ options: options
909
+ )
910
+ operation = ::Gapic::Rest::TransportOperation.new response
911
+ result = ::Google::Cloud::Kms::V1::RawDecryptResponse.decode_json response.body, ignore_unknown_fields: true
912
+
913
+ yield result, operation if block_given?
914
+ result
915
+ end
916
+
841
917
  ##
842
918
  # Baseline implementation for the asymmetric_sign REST call
843
919
  #
@@ -857,7 +933,7 @@ module Google
857
933
 
858
934
  verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_sign_request request_pb
859
935
  query_string_params = if query_string_params.any?
860
- query_string_params.to_h { |p| p.split("=", 2) }
936
+ query_string_params.to_h { |p| p.split "=", 2 }
861
937
  else
862
938
  {}
863
939
  end
@@ -895,7 +971,7 @@ module Google
895
971
 
896
972
  verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_decrypt_request request_pb
897
973
  query_string_params = if query_string_params.any?
898
- query_string_params.to_h { |p| p.split("=", 2) }
974
+ query_string_params.to_h { |p| p.split "=", 2 }
899
975
  else
900
976
  {}
901
977
  end
@@ -933,7 +1009,7 @@ module Google
933
1009
 
934
1010
  verb, uri, query_string_params, body = ServiceStub.transcode_mac_sign_request request_pb
935
1011
  query_string_params = if query_string_params.any?
936
- query_string_params.to_h { |p| p.split("=", 2) }
1012
+ query_string_params.to_h { |p| p.split "=", 2 }
937
1013
  else
938
1014
  {}
939
1015
  end
@@ -971,7 +1047,7 @@ module Google
971
1047
 
972
1048
  verb, uri, query_string_params, body = ServiceStub.transcode_mac_verify_request request_pb
973
1049
  query_string_params = if query_string_params.any?
974
- query_string_params.to_h { |p| p.split("=", 2) }
1050
+ query_string_params.to_h { |p| p.split "=", 2 }
975
1051
  else
976
1052
  {}
977
1053
  end
@@ -1009,7 +1085,7 @@ module Google
1009
1085
 
1010
1086
  verb, uri, query_string_params, body = ServiceStub.transcode_generate_random_bytes_request request_pb
1011
1087
  query_string_params = if query_string_params.any?
1012
- query_string_params.to_h { |p| p.split("=", 2) }
1088
+ query_string_params.to_h { |p| p.split "=", 2 }
1013
1089
  else
1014
1090
  {}
1015
1091
  end
@@ -1481,6 +1557,50 @@ module Google
1481
1557
  transcoder.transcode request_pb
1482
1558
  end
1483
1559
 
1560
+ ##
1561
+ # @private
1562
+ #
1563
+ # GRPC transcoding helper method for the raw_encrypt REST call
1564
+ #
1565
+ # @param request_pb [::Google::Cloud::Kms::V1::RawEncryptRequest]
1566
+ # A request object representing the call parameters. Required.
1567
+ # @return [Array(String, [String, nil], Hash{String => String})]
1568
+ # Uri, Body, Query string parameters
1569
+ def self.transcode_raw_encrypt_request request_pb
1570
+ transcoder = Gapic::Rest::GrpcTranscoder.new
1571
+ .with_bindings(
1572
+ uri_method: :post,
1573
+ uri_template: "/v1/{name}:rawEncrypt",
1574
+ body: "*",
1575
+ matches: [
1576
+ ["name", %r{^projects/[^/]+/locations/[^/]+/keyRings/[^/]+/cryptoKeys/[^/]+/cryptoKeyVersions/[^/]+/?$}, false]
1577
+ ]
1578
+ )
1579
+ transcoder.transcode request_pb
1580
+ end
1581
+
1582
+ ##
1583
+ # @private
1584
+ #
1585
+ # GRPC transcoding helper method for the raw_decrypt REST call
1586
+ #
1587
+ # @param request_pb [::Google::Cloud::Kms::V1::RawDecryptRequest]
1588
+ # A request object representing the call parameters. Required.
1589
+ # @return [Array(String, [String, nil], Hash{String => String})]
1590
+ # Uri, Body, Query string parameters
1591
+ def self.transcode_raw_decrypt_request request_pb
1592
+ transcoder = Gapic::Rest::GrpcTranscoder.new
1593
+ .with_bindings(
1594
+ uri_method: :post,
1595
+ uri_template: "/v1/{name}:rawDecrypt",
1596
+ body: "*",
1597
+ matches: [
1598
+ ["name", %r{^projects/[^/]+/locations/[^/]+/keyRings/[^/]+/cryptoKeys/[^/]+/cryptoKeyVersions/[^/]+/?$}, false]
1599
+ ]
1600
+ )
1601
+ transcoder.transcode request_pb
1602
+ end
1603
+
1484
1604
  ##
1485
1605
  # @private
1486
1606
  #
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/cloud/kms/v1/resources.proto
3
4
 
@@ -9,168 +10,34 @@ require 'google/protobuf/duration_pb'
9
10
  require 'google/protobuf/timestamp_pb'
10
11
  require 'google/protobuf/wrappers_pb'
11
12
 
12
- Google::Protobuf::DescriptorPool.generated_pool.build do
13
- add_file("google/cloud/kms/v1/resources.proto", :syntax => :proto3) do
14
- add_message "google.cloud.kms.v1.KeyRing" do
15
- optional :name, :string, 1
16
- optional :create_time, :message, 2, "google.protobuf.Timestamp"
17
- end
18
- add_message "google.cloud.kms.v1.CryptoKey" do
19
- optional :name, :string, 1
20
- optional :primary, :message, 2, "google.cloud.kms.v1.CryptoKeyVersion"
21
- optional :purpose, :enum, 3, "google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose"
22
- optional :create_time, :message, 5, "google.protobuf.Timestamp"
23
- optional :next_rotation_time, :message, 7, "google.protobuf.Timestamp"
24
- optional :version_template, :message, 11, "google.cloud.kms.v1.CryptoKeyVersionTemplate"
25
- map :labels, :string, :string, 10
26
- optional :import_only, :bool, 13
27
- optional :destroy_scheduled_duration, :message, 14, "google.protobuf.Duration"
28
- optional :crypto_key_backend, :string, 15
29
- oneof :rotation_schedule do
30
- optional :rotation_period, :message, 8, "google.protobuf.Duration"
31
- end
32
- end
33
- add_enum "google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose" do
34
- value :CRYPTO_KEY_PURPOSE_UNSPECIFIED, 0
35
- value :ENCRYPT_DECRYPT, 1
36
- value :ASYMMETRIC_SIGN, 5
37
- value :ASYMMETRIC_DECRYPT, 6
38
- value :MAC, 9
39
- end
40
- add_message "google.cloud.kms.v1.CryptoKeyVersionTemplate" do
41
- optional :protection_level, :enum, 1, "google.cloud.kms.v1.ProtectionLevel"
42
- optional :algorithm, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
43
- end
44
- add_message "google.cloud.kms.v1.KeyOperationAttestation" do
45
- optional :format, :enum, 4, "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat"
46
- optional :content, :bytes, 5
47
- optional :cert_chains, :message, 6, "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains"
48
- end
49
- add_message "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains" do
50
- repeated :cavium_certs, :string, 1
51
- repeated :google_card_certs, :string, 2
52
- repeated :google_partition_certs, :string, 3
53
- end
54
- add_enum "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat" do
55
- value :ATTESTATION_FORMAT_UNSPECIFIED, 0
56
- value :CAVIUM_V1_COMPRESSED, 3
57
- value :CAVIUM_V2_COMPRESSED, 4
58
- end
59
- add_message "google.cloud.kms.v1.CryptoKeyVersion" do
60
- optional :name, :string, 1
61
- optional :state, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState"
62
- optional :protection_level, :enum, 7, "google.cloud.kms.v1.ProtectionLevel"
63
- optional :algorithm, :enum, 10, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
64
- optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
65
- optional :create_time, :message, 4, "google.protobuf.Timestamp"
66
- optional :generate_time, :message, 11, "google.protobuf.Timestamp"
67
- optional :destroy_time, :message, 5, "google.protobuf.Timestamp"
68
- optional :destroy_event_time, :message, 6, "google.protobuf.Timestamp"
69
- optional :import_job, :string, 14
70
- optional :import_time, :message, 15, "google.protobuf.Timestamp"
71
- optional :import_failure_reason, :string, 16
72
- optional :generation_failure_reason, :string, 19
73
- optional :external_destruction_failure_reason, :string, 20
74
- optional :external_protection_level_options, :message, 17, "google.cloud.kms.v1.ExternalProtectionLevelOptions"
75
- optional :reimport_eligible, :bool, 18
76
- end
77
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
78
- value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
79
- value :GOOGLE_SYMMETRIC_ENCRYPTION, 1
80
- value :RSA_SIGN_PSS_2048_SHA256, 2
81
- value :RSA_SIGN_PSS_3072_SHA256, 3
82
- value :RSA_SIGN_PSS_4096_SHA256, 4
83
- value :RSA_SIGN_PSS_4096_SHA512, 15
84
- value :RSA_SIGN_PKCS1_2048_SHA256, 5
85
- value :RSA_SIGN_PKCS1_3072_SHA256, 6
86
- value :RSA_SIGN_PKCS1_4096_SHA256, 7
87
- value :RSA_SIGN_PKCS1_4096_SHA512, 16
88
- value :RSA_SIGN_RAW_PKCS1_2048, 28
89
- value :RSA_SIGN_RAW_PKCS1_3072, 29
90
- value :RSA_SIGN_RAW_PKCS1_4096, 30
91
- value :RSA_DECRYPT_OAEP_2048_SHA256, 8
92
- value :RSA_DECRYPT_OAEP_3072_SHA256, 9
93
- value :RSA_DECRYPT_OAEP_4096_SHA256, 10
94
- value :RSA_DECRYPT_OAEP_4096_SHA512, 17
95
- value :RSA_DECRYPT_OAEP_2048_SHA1, 37
96
- value :RSA_DECRYPT_OAEP_3072_SHA1, 38
97
- value :RSA_DECRYPT_OAEP_4096_SHA1, 39
98
- value :EC_SIGN_P256_SHA256, 12
99
- value :EC_SIGN_P384_SHA384, 13
100
- value :EC_SIGN_SECP256K1_SHA256, 31
101
- value :HMAC_SHA256, 32
102
- value :HMAC_SHA1, 33
103
- value :HMAC_SHA384, 34
104
- value :HMAC_SHA512, 35
105
- value :HMAC_SHA224, 36
106
- value :EXTERNAL_SYMMETRIC_ENCRYPTION, 18
107
- end
108
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState" do
109
- value :CRYPTO_KEY_VERSION_STATE_UNSPECIFIED, 0
110
- value :PENDING_GENERATION, 5
111
- value :ENABLED, 1
112
- value :DISABLED, 2
113
- value :DESTROYED, 3
114
- value :DESTROY_SCHEDULED, 4
115
- value :PENDING_IMPORT, 6
116
- value :IMPORT_FAILED, 7
117
- value :GENERATION_FAILED, 8
118
- value :PENDING_EXTERNAL_DESTRUCTION, 9
119
- value :EXTERNAL_DESTRUCTION_FAILED, 10
120
- end
121
- add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView" do
122
- value :CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED, 0
123
- value :FULL, 1
124
- end
125
- add_message "google.cloud.kms.v1.PublicKey" do
126
- optional :pem, :string, 1
127
- optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
128
- optional :pem_crc32c, :message, 3, "google.protobuf.Int64Value"
129
- optional :name, :string, 4
130
- optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
131
- end
132
- add_message "google.cloud.kms.v1.ImportJob" do
133
- optional :name, :string, 1
134
- optional :import_method, :enum, 2, "google.cloud.kms.v1.ImportJob.ImportMethod"
135
- optional :protection_level, :enum, 9, "google.cloud.kms.v1.ProtectionLevel"
136
- optional :create_time, :message, 3, "google.protobuf.Timestamp"
137
- optional :generate_time, :message, 4, "google.protobuf.Timestamp"
138
- optional :expire_time, :message, 5, "google.protobuf.Timestamp"
139
- optional :expire_event_time, :message, 10, "google.protobuf.Timestamp"
140
- optional :state, :enum, 6, "google.cloud.kms.v1.ImportJob.ImportJobState"
141
- optional :public_key, :message, 7, "google.cloud.kms.v1.ImportJob.WrappingPublicKey"
142
- optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
143
- end
144
- add_message "google.cloud.kms.v1.ImportJob.WrappingPublicKey" do
145
- optional :pem, :string, 1
146
- end
147
- add_enum "google.cloud.kms.v1.ImportJob.ImportMethod" do
148
- value :IMPORT_METHOD_UNSPECIFIED, 0
149
- value :RSA_OAEP_3072_SHA1_AES_256, 1
150
- value :RSA_OAEP_4096_SHA1_AES_256, 2
151
- value :RSA_OAEP_3072_SHA256_AES_256, 3
152
- value :RSA_OAEP_4096_SHA256_AES_256, 4
153
- value :RSA_OAEP_3072_SHA256, 5
154
- value :RSA_OAEP_4096_SHA256, 6
155
- end
156
- add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
157
- value :IMPORT_JOB_STATE_UNSPECIFIED, 0
158
- value :PENDING_GENERATION, 1
159
- value :ACTIVE, 2
160
- value :EXPIRED, 3
161
- end
162
- add_message "google.cloud.kms.v1.ExternalProtectionLevelOptions" do
163
- optional :external_key_uri, :string, 1
164
- optional :ekm_connection_key_path, :string, 2
165
- end
166
- add_enum "google.cloud.kms.v1.ProtectionLevel" do
167
- value :PROTECTION_LEVEL_UNSPECIFIED, 0
168
- value :SOFTWARE, 1
169
- value :HSM, 2
170
- value :EXTERNAL, 3
171
- value :EXTERNAL_VPC, 4
13
+
14
+ descriptor_data = "\n#google/cloud/kms/v1/resources.proto\x12\x13google.cloud.kms.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/wrappers.proto\"\xb5\x01\n\x07KeyRing\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03:a\xea\x41^\n\x1f\x63loudkms.googleapis.com/KeyRing\x12;projects/{project}/locations/{location}/keyRings/{key_ring}\"\xae\x07\n\tCryptoKey\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12;\n\x07primary\x18\x02 \x01(\x0b\x32%.google.cloud.kms.v1.CryptoKeyVersionB\x03\xe0\x41\x03\x12\x45\n\x07purpose\x18\x03 \x01(\x0e\x32/.google.cloud.kms.v1.CryptoKey.CryptoKeyPurposeB\x03\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\x12next_rotation_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x34\n\x0frotation_period\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationH\x00\x12G\n\x10version_template\x18\x0b \x01(\x0b\x32-.google.cloud.kms.v1.CryptoKeyVersionTemplate\x12:\n\x06labels\x18\n \x03(\x0b\x32*.google.cloud.kms.v1.CryptoKey.LabelsEntry\x12\x18\n\x0bimport_only\x18\r \x01(\x08\x42\x03\xe0\x41\x05\x12\x42\n\x1a\x64\x65stroy_scheduled_duration\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x05\x12%\n\x12\x63rypto_key_backend\x18\x0f \x01(\tB\t\xe0\x41\x05\xfa\x41\x03\n\x01*\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"\x9a\x01\n\x10\x43ryptoKeyPurpose\x12\"\n\x1e\x43RYPTO_KEY_PURPOSE_UNSPECIFIED\x10\x00\x12\x13\n\x0f\x45NCRYPT_DECRYPT\x10\x01\x12\x13\n\x0f\x41SYMMETRIC_SIGN\x10\x05\x12\x16\n\x12\x41SYMMETRIC_DECRYPT\x10\x06\x12\x17\n\x13RAW_ENCRYPT_DECRYPT\x10\x07\x12\x07\n\x03MAC\x10\t:{\xea\x41x\n!cloudkms.googleapis.com/CryptoKey\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}B\x13\n\x11rotation_schedule\"\xb3\x01\n\x18\x43ryptoKeyVersionTemplate\x12>\n\x10protection_level\x18\x01 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel\x12W\n\talgorithm\x18\x03 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x02\"\xb1\x03\n\x17KeyOperationAttestation\x12S\n\x06\x66ormat\x18\x04 \x01(\x0e\x32>.google.cloud.kms.v1.KeyOperationAttestation.AttestationFormatB\x03\xe0\x41\x03\x12\x14\n\x07\x63ontent\x18\x05 \x01(\x0c\x42\x03\xe0\x41\x03\x12X\n\x0b\x63\x65rt_chains\x18\x06 \x01(\x0b\x32>.google.cloud.kms.v1.KeyOperationAttestation.CertificateChainsB\x03\xe0\x41\x03\x1a\x64\n\x11\x43\x65rtificateChains\x12\x14\n\x0c\x63\x61vium_certs\x18\x01 \x03(\t\x12\x19\n\x11google_card_certs\x18\x02 \x03(\t\x12\x1e\n\x16google_partition_certs\x18\x03 \x03(\t\"k\n\x11\x41ttestationFormat\x12\"\n\x1e\x41TTESTATION_FORMAT_UNSPECIFIED\x10\x00\x12\x18\n\x14\x43\x41VIUM_V1_COMPRESSED\x10\x03\x12\x18\n\x14\x43\x41VIUM_V2_COMPRESSED\x10\x04\"\xa8\x12\n\x10\x43ryptoKeyVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\x05state\x18\x03 \x01(\x0e\x32;.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState\x12\x43\n\x10protection_level\x18\x07 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x03\xe0\x41\x03\x12W\n\talgorithm\x18\n \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12;\n\x12\x64\x65stroy_event_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x17\n\nimport_job\x18\x0e \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0bimport_time\x18\x0f \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\"\n\x15import_failure_reason\x18\x10 \x01(\tB\x03\xe0\x41\x03\x12&\n\x19generation_failure_reason\x18\x13 \x01(\tB\x03\xe0\x41\x03\x12\x30\n#external_destruction_failure_reason\x18\x14 \x01(\tB\x03\xe0\x41\x03\x12^\n!external_protection_level_options\x18\x11 \x01(\x0b\x32\x33.google.cloud.kms.v1.ExternalProtectionLevelOptions\x12\x1e\n\x11reimport_eligible\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\"\x89\x07\n\x19\x43ryptoKeyVersionAlgorithm\x12,\n(CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED\x10\x00\x12\x1f\n\x1bGOOGLE_SYMMETRIC_ENCRYPTION\x10\x01\x12\x0f\n\x0b\x41\x45S_128_GCM\x10)\x12\x0f\n\x0b\x41\x45S_256_GCM\x10\x13\x12\x1c\n\x18RSA_SIGN_PSS_2048_SHA256\x10\x02\x12\x1c\n\x18RSA_SIGN_PSS_3072_SHA256\x10\x03\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA256\x10\x04\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA512\x10\x0f\x12\x1e\n\x1aRSA_SIGN_PKCS1_2048_SHA256\x10\x05\x12\x1e\n\x1aRSA_SIGN_PKCS1_3072_SHA256\x10\x06\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA256\x10\x07\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA512\x10\x10\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_2048\x10\x1c\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_3072\x10\x1d\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_4096\x10\x1e\x12 \n\x1cRSA_DECRYPT_OAEP_2048_SHA256\x10\x08\x12 \n\x1cRSA_DECRYPT_OAEP_3072_SHA256\x10\t\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA256\x10\n\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA512\x10\x11\x12\x1e\n\x1aRSA_DECRYPT_OAEP_2048_SHA1\x10%\x12\x1e\n\x1aRSA_DECRYPT_OAEP_3072_SHA1\x10&\x12\x1e\n\x1aRSA_DECRYPT_OAEP_4096_SHA1\x10\'\x12\x17\n\x13\x45\x43_SIGN_P256_SHA256\x10\x0c\x12\x17\n\x13\x45\x43_SIGN_P384_SHA384\x10\r\x12\x1c\n\x18\x45\x43_SIGN_SECP256K1_SHA256\x10\x1f\x12\x0f\n\x0bHMAC_SHA256\x10 \x12\r\n\tHMAC_SHA1\x10!\x12\x0f\n\x0bHMAC_SHA384\x10\"\x12\x0f\n\x0bHMAC_SHA512\x10#\x12\x0f\n\x0bHMAC_SHA224\x10$\x12!\n\x1d\x45XTERNAL_SYMMETRIC_ENCRYPTION\x10\x12\"\x9b\x02\n\x15\x43ryptoKeyVersionState\x12(\n$CRYPTO_KEY_VERSION_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x05\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03\x12\x15\n\x11\x44\x45STROY_SCHEDULED\x10\x04\x12\x12\n\x0ePENDING_IMPORT\x10\x06\x12\x11\n\rIMPORT_FAILED\x10\x07\x12\x15\n\x11GENERATION_FAILED\x10\x08\x12 \n\x1cPENDING_EXTERNAL_DESTRUCTION\x10\t\x12\x1f\n\x1b\x45XTERNAL_DESTRUCTION_FAILED\x10\n\"I\n\x14\x43ryptoKeyVersionView\x12\'\n#CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01:\xaa\x01\xea\x41\xa6\x01\n(cloudkms.googleapis.com/CryptoKeyVersion\x12zprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}\"\x9c\x03\n\tPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\x12R\n\talgorithm\x18\x02 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm\x12/\n\npem_crc32c\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x0c\n\x04name\x18\x04 \x01(\t\x12>\n\x10protection_level\x18\x05 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel:\xae\x01\xea\x41\xaa\x01\n!cloudkms.googleapis.com/PublicKey\x12\x84\x01projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}/publicKey\"\xd4\x08\n\tImportJob\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\rimport_method\x18\x02 \x01(\x0e\x32+.google.cloud.kms.v1.ImportJob.ImportMethodB\x06\xe0\x41\x02\xe0\x41\x05\x12\x46\n\x10protection_level\x18\t \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x06\xe0\x41\x02\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12:\n\x11\x65xpire_event_time\x18\n \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x05state\x18\x06 \x01(\x0e\x32-.google.cloud.kms.v1.ImportJob.ImportJobStateB\x03\xe0\x41\x03\x12I\n\npublic_key\x18\x07 \x01(\x0b\x32\x30.google.cloud.kms.v1.ImportJob.WrappingPublicKeyB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x1a \n\x11WrappingPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\"\xe5\x01\n\x0cImportMethod\x12\x1d\n\x19IMPORT_METHOD_UNSPECIFIED\x10\x00\x12\x1e\n\x1aRSA_OAEP_3072_SHA1_AES_256\x10\x01\x12\x1e\n\x1aRSA_OAEP_4096_SHA1_AES_256\x10\x02\x12 \n\x1cRSA_OAEP_3072_SHA256_AES_256\x10\x03\x12 \n\x1cRSA_OAEP_4096_SHA256_AES_256\x10\x04\x12\x18\n\x14RSA_OAEP_3072_SHA256\x10\x05\x12\x18\n\x14RSA_OAEP_4096_SHA256\x10\x06\"c\n\x0eImportJobState\x12 \n\x1cIMPORT_JOB_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x01\x12\n\n\x06\x41\x43TIVE\x10\x02\x12\x0b\n\x07\x45XPIRED\x10\x03:{\xea\x41x\n!cloudkms.googleapis.com/ImportJob\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/importJobs/{import_job}\"[\n\x1e\x45xternalProtectionLevelOptions\x12\x18\n\x10\x65xternal_key_uri\x18\x01 \x01(\t\x12\x1f\n\x17\x65km_connection_key_path\x18\x02 \x01(\t*j\n\x0fProtectionLevel\x12 \n\x1cPROTECTION_LEVEL_UNSPECIFIED\x10\x00\x12\x0c\n\x08SOFTWARE\x10\x01\x12\x07\n\x03HSM\x10\x02\x12\x0c\n\x08\x45XTERNAL\x10\x03\x12\x10\n\x0c\x45XTERNAL_VPC\x10\x04\x42\x88\x01\n\x17\x63om.google.cloud.kms.v1B\x11KmsResourcesProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1b\x06proto3"
15
+
16
+ pool = Google::Protobuf::DescriptorPool.generated_pool
17
+
18
+ begin
19
+ pool.add_serialized_file(descriptor_data)
20
+ rescue TypeError => e
21
+ # Compatibility code: will be removed in the next major version.
22
+ require 'google/protobuf/descriptor_pb'
23
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
24
+ parsed.clear_dependency
25
+ serialized = parsed.class.encode(parsed)
26
+ file = pool.add_serialized_file(serialized)
27
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
28
+ imports = [
29
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
30
+ ["google.protobuf.Duration", "google/protobuf/duration.proto"],
31
+ ["google.protobuf.Int64Value", "google/protobuf/wrappers.proto"],
32
+ ]
33
+ imports.each do |type_name, expected_filename|
34
+ import_file = pool.lookup(type_name).file_descriptor
35
+ if import_file.name != expected_filename
36
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
172
37
  end
173
38
  end
39
+ warn "Each proto file must use a consistent fully-qualified name."
40
+ warn "This will become an error in the next major version."
174
41
  end
175
42
 
176
43
  module Google