google-cloud-kms-v1 0.19.0 → 0.21.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/kms/v1/ekm_service/client.rb +4 -2
- data/lib/google/cloud/kms/v1/ekm_service/rest/client.rb +4 -2
- data/lib/google/cloud/kms/v1/ekm_service/rest/service_stub.rb +7 -7
- data/lib/google/cloud/kms/v1/ekm_service_pb.rb +26 -71
- data/lib/google/cloud/kms/v1/key_management_service/client.rb +344 -2
- data/lib/google/cloud/kms/v1/key_management_service/rest/client.rb +298 -2
- data/lib/google/cloud/kms/v1/key_management_service/rest/service_stub.rb +146 -26
- data/lib/google/cloud/kms/v1/resources_pb.rb +27 -160
- data/lib/google/cloud/kms/v1/service_pb.rb +31 -215
- data/lib/google/cloud/kms/v1/service_services_pb.rb +12 -0
- data/lib/google/cloud/kms/v1/version.rb +1 -1
- data/proto_docs/google/cloud/kms/v1/resources.rb +13 -0
- data/proto_docs/google/cloud/kms/v1/service.rb +360 -0
- data/proto_docs/google/protobuf/any.rb +7 -4
- data/proto_docs/google/protobuf/timestamp.rb +1 -3
- metadata +4 -4
@@ -59,7 +59,7 @@ module Google
|
|
59
59
|
|
60
60
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_key_rings_request request_pb
|
61
61
|
query_string_params = if query_string_params.any?
|
62
|
-
query_string_params.to_h { |p| p.split
|
62
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
63
63
|
else
|
64
64
|
{}
|
65
65
|
end
|
@@ -97,7 +97,7 @@ module Google
|
|
97
97
|
|
98
98
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_keys_request request_pb
|
99
99
|
query_string_params = if query_string_params.any?
|
100
|
-
query_string_params.to_h { |p| p.split
|
100
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
101
101
|
else
|
102
102
|
{}
|
103
103
|
end
|
@@ -135,7 +135,7 @@ module Google
|
|
135
135
|
|
136
136
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_crypto_key_versions_request request_pb
|
137
137
|
query_string_params = if query_string_params.any?
|
138
|
-
query_string_params.to_h { |p| p.split
|
138
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
139
139
|
else
|
140
140
|
{}
|
141
141
|
end
|
@@ -173,7 +173,7 @@ module Google
|
|
173
173
|
|
174
174
|
verb, uri, query_string_params, body = ServiceStub.transcode_list_import_jobs_request request_pb
|
175
175
|
query_string_params = if query_string_params.any?
|
176
|
-
query_string_params.to_h { |p| p.split
|
176
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
177
177
|
else
|
178
178
|
{}
|
179
179
|
end
|
@@ -211,7 +211,7 @@ module Google
|
|
211
211
|
|
212
212
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_key_ring_request request_pb
|
213
213
|
query_string_params = if query_string_params.any?
|
214
|
-
query_string_params.to_h { |p| p.split
|
214
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
215
215
|
else
|
216
216
|
{}
|
217
217
|
end
|
@@ -249,7 +249,7 @@ module Google
|
|
249
249
|
|
250
250
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_request request_pb
|
251
251
|
query_string_params = if query_string_params.any?
|
252
|
-
query_string_params.to_h { |p| p.split
|
252
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
253
253
|
else
|
254
254
|
{}
|
255
255
|
end
|
@@ -287,7 +287,7 @@ module Google
|
|
287
287
|
|
288
288
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_crypto_key_version_request request_pb
|
289
289
|
query_string_params = if query_string_params.any?
|
290
|
-
query_string_params.to_h { |p| p.split
|
290
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
291
291
|
else
|
292
292
|
{}
|
293
293
|
end
|
@@ -325,7 +325,7 @@ module Google
|
|
325
325
|
|
326
326
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_public_key_request request_pb
|
327
327
|
query_string_params = if query_string_params.any?
|
328
|
-
query_string_params.to_h { |p| p.split
|
328
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
329
329
|
else
|
330
330
|
{}
|
331
331
|
end
|
@@ -363,7 +363,7 @@ module Google
|
|
363
363
|
|
364
364
|
verb, uri, query_string_params, body = ServiceStub.transcode_get_import_job_request request_pb
|
365
365
|
query_string_params = if query_string_params.any?
|
366
|
-
query_string_params.to_h { |p| p.split
|
366
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
367
367
|
else
|
368
368
|
{}
|
369
369
|
end
|
@@ -401,7 +401,7 @@ module Google
|
|
401
401
|
|
402
402
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_key_ring_request request_pb
|
403
403
|
query_string_params = if query_string_params.any?
|
404
|
-
query_string_params.to_h { |p| p.split
|
404
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
405
405
|
else
|
406
406
|
{}
|
407
407
|
end
|
@@ -439,7 +439,7 @@ module Google
|
|
439
439
|
|
440
440
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_request request_pb
|
441
441
|
query_string_params = if query_string_params.any?
|
442
|
-
query_string_params.to_h { |p| p.split
|
442
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
443
443
|
else
|
444
444
|
{}
|
445
445
|
end
|
@@ -477,7 +477,7 @@ module Google
|
|
477
477
|
|
478
478
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_crypto_key_version_request request_pb
|
479
479
|
query_string_params = if query_string_params.any?
|
480
|
-
query_string_params.to_h { |p| p.split
|
480
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
481
481
|
else
|
482
482
|
{}
|
483
483
|
end
|
@@ -515,7 +515,7 @@ module Google
|
|
515
515
|
|
516
516
|
verb, uri, query_string_params, body = ServiceStub.transcode_import_crypto_key_version_request request_pb
|
517
517
|
query_string_params = if query_string_params.any?
|
518
|
-
query_string_params.to_h { |p| p.split
|
518
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
519
519
|
else
|
520
520
|
{}
|
521
521
|
end
|
@@ -553,7 +553,7 @@ module Google
|
|
553
553
|
|
554
554
|
verb, uri, query_string_params, body = ServiceStub.transcode_create_import_job_request request_pb
|
555
555
|
query_string_params = if query_string_params.any?
|
556
|
-
query_string_params.to_h { |p| p.split
|
556
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
557
557
|
else
|
558
558
|
{}
|
559
559
|
end
|
@@ -591,7 +591,7 @@ module Google
|
|
591
591
|
|
592
592
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_request request_pb
|
593
593
|
query_string_params = if query_string_params.any?
|
594
|
-
query_string_params.to_h { |p| p.split
|
594
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
595
595
|
else
|
596
596
|
{}
|
597
597
|
end
|
@@ -629,7 +629,7 @@ module Google
|
|
629
629
|
|
630
630
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_version_request request_pb
|
631
631
|
query_string_params = if query_string_params.any?
|
632
|
-
query_string_params.to_h { |p| p.split
|
632
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
633
633
|
else
|
634
634
|
{}
|
635
635
|
end
|
@@ -667,7 +667,7 @@ module Google
|
|
667
667
|
|
668
668
|
verb, uri, query_string_params, body = ServiceStub.transcode_update_crypto_key_primary_version_request request_pb
|
669
669
|
query_string_params = if query_string_params.any?
|
670
|
-
query_string_params.to_h { |p| p.split
|
670
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
671
671
|
else
|
672
672
|
{}
|
673
673
|
end
|
@@ -705,7 +705,7 @@ module Google
|
|
705
705
|
|
706
706
|
verb, uri, query_string_params, body = ServiceStub.transcode_destroy_crypto_key_version_request request_pb
|
707
707
|
query_string_params = if query_string_params.any?
|
708
|
-
query_string_params.to_h { |p| p.split
|
708
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
709
709
|
else
|
710
710
|
{}
|
711
711
|
end
|
@@ -743,7 +743,7 @@ module Google
|
|
743
743
|
|
744
744
|
verb, uri, query_string_params, body = ServiceStub.transcode_restore_crypto_key_version_request request_pb
|
745
745
|
query_string_params = if query_string_params.any?
|
746
|
-
query_string_params.to_h { |p| p.split
|
746
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
747
747
|
else
|
748
748
|
{}
|
749
749
|
end
|
@@ -781,7 +781,7 @@ module Google
|
|
781
781
|
|
782
782
|
verb, uri, query_string_params, body = ServiceStub.transcode_encrypt_request request_pb
|
783
783
|
query_string_params = if query_string_params.any?
|
784
|
-
query_string_params.to_h { |p| p.split
|
784
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
785
785
|
else
|
786
786
|
{}
|
787
787
|
end
|
@@ -819,7 +819,7 @@ module Google
|
|
819
819
|
|
820
820
|
verb, uri, query_string_params, body = ServiceStub.transcode_decrypt_request request_pb
|
821
821
|
query_string_params = if query_string_params.any?
|
822
|
-
query_string_params.to_h { |p| p.split
|
822
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
823
823
|
else
|
824
824
|
{}
|
825
825
|
end
|
@@ -838,6 +838,82 @@ module Google
|
|
838
838
|
result
|
839
839
|
end
|
840
840
|
|
841
|
+
##
|
842
|
+
# Baseline implementation for the raw_encrypt REST call
|
843
|
+
#
|
844
|
+
# @param request_pb [::Google::Cloud::Kms::V1::RawEncryptRequest]
|
845
|
+
# A request object representing the call parameters. Required.
|
846
|
+
# @param options [::Gapic::CallOptions]
|
847
|
+
# Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
|
848
|
+
#
|
849
|
+
# @yield [result, operation] Access the result along with the TransportOperation object
|
850
|
+
# @yieldparam result [::Google::Cloud::Kms::V1::RawEncryptResponse]
|
851
|
+
# @yieldparam operation [::Gapic::Rest::TransportOperation]
|
852
|
+
#
|
853
|
+
# @return [::Google::Cloud::Kms::V1::RawEncryptResponse]
|
854
|
+
# A result object deserialized from the server's reply
|
855
|
+
def raw_encrypt request_pb, options = nil
|
856
|
+
raise ::ArgumentError, "request must be provided" if request_pb.nil?
|
857
|
+
|
858
|
+
verb, uri, query_string_params, body = ServiceStub.transcode_raw_encrypt_request request_pb
|
859
|
+
query_string_params = if query_string_params.any?
|
860
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
861
|
+
else
|
862
|
+
{}
|
863
|
+
end
|
864
|
+
|
865
|
+
response = @client_stub.make_http_request(
|
866
|
+
verb,
|
867
|
+
uri: uri,
|
868
|
+
body: body || "",
|
869
|
+
params: query_string_params,
|
870
|
+
options: options
|
871
|
+
)
|
872
|
+
operation = ::Gapic::Rest::TransportOperation.new response
|
873
|
+
result = ::Google::Cloud::Kms::V1::RawEncryptResponse.decode_json response.body, ignore_unknown_fields: true
|
874
|
+
|
875
|
+
yield result, operation if block_given?
|
876
|
+
result
|
877
|
+
end
|
878
|
+
|
879
|
+
##
|
880
|
+
# Baseline implementation for the raw_decrypt REST call
|
881
|
+
#
|
882
|
+
# @param request_pb [::Google::Cloud::Kms::V1::RawDecryptRequest]
|
883
|
+
# A request object representing the call parameters. Required.
|
884
|
+
# @param options [::Gapic::CallOptions]
|
885
|
+
# Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
|
886
|
+
#
|
887
|
+
# @yield [result, operation] Access the result along with the TransportOperation object
|
888
|
+
# @yieldparam result [::Google::Cloud::Kms::V1::RawDecryptResponse]
|
889
|
+
# @yieldparam operation [::Gapic::Rest::TransportOperation]
|
890
|
+
#
|
891
|
+
# @return [::Google::Cloud::Kms::V1::RawDecryptResponse]
|
892
|
+
# A result object deserialized from the server's reply
|
893
|
+
def raw_decrypt request_pb, options = nil
|
894
|
+
raise ::ArgumentError, "request must be provided" if request_pb.nil?
|
895
|
+
|
896
|
+
verb, uri, query_string_params, body = ServiceStub.transcode_raw_decrypt_request request_pb
|
897
|
+
query_string_params = if query_string_params.any?
|
898
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
899
|
+
else
|
900
|
+
{}
|
901
|
+
end
|
902
|
+
|
903
|
+
response = @client_stub.make_http_request(
|
904
|
+
verb,
|
905
|
+
uri: uri,
|
906
|
+
body: body || "",
|
907
|
+
params: query_string_params,
|
908
|
+
options: options
|
909
|
+
)
|
910
|
+
operation = ::Gapic::Rest::TransportOperation.new response
|
911
|
+
result = ::Google::Cloud::Kms::V1::RawDecryptResponse.decode_json response.body, ignore_unknown_fields: true
|
912
|
+
|
913
|
+
yield result, operation if block_given?
|
914
|
+
result
|
915
|
+
end
|
916
|
+
|
841
917
|
##
|
842
918
|
# Baseline implementation for the asymmetric_sign REST call
|
843
919
|
#
|
@@ -857,7 +933,7 @@ module Google
|
|
857
933
|
|
858
934
|
verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_sign_request request_pb
|
859
935
|
query_string_params = if query_string_params.any?
|
860
|
-
query_string_params.to_h { |p| p.split
|
936
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
861
937
|
else
|
862
938
|
{}
|
863
939
|
end
|
@@ -895,7 +971,7 @@ module Google
|
|
895
971
|
|
896
972
|
verb, uri, query_string_params, body = ServiceStub.transcode_asymmetric_decrypt_request request_pb
|
897
973
|
query_string_params = if query_string_params.any?
|
898
|
-
query_string_params.to_h { |p| p.split
|
974
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
899
975
|
else
|
900
976
|
{}
|
901
977
|
end
|
@@ -933,7 +1009,7 @@ module Google
|
|
933
1009
|
|
934
1010
|
verb, uri, query_string_params, body = ServiceStub.transcode_mac_sign_request request_pb
|
935
1011
|
query_string_params = if query_string_params.any?
|
936
|
-
query_string_params.to_h { |p| p.split
|
1012
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
937
1013
|
else
|
938
1014
|
{}
|
939
1015
|
end
|
@@ -971,7 +1047,7 @@ module Google
|
|
971
1047
|
|
972
1048
|
verb, uri, query_string_params, body = ServiceStub.transcode_mac_verify_request request_pb
|
973
1049
|
query_string_params = if query_string_params.any?
|
974
|
-
query_string_params.to_h { |p| p.split
|
1050
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
975
1051
|
else
|
976
1052
|
{}
|
977
1053
|
end
|
@@ -1009,7 +1085,7 @@ module Google
|
|
1009
1085
|
|
1010
1086
|
verb, uri, query_string_params, body = ServiceStub.transcode_generate_random_bytes_request request_pb
|
1011
1087
|
query_string_params = if query_string_params.any?
|
1012
|
-
query_string_params.to_h { |p| p.split
|
1088
|
+
query_string_params.to_h { |p| p.split "=", 2 }
|
1013
1089
|
else
|
1014
1090
|
{}
|
1015
1091
|
end
|
@@ -1481,6 +1557,50 @@ module Google
|
|
1481
1557
|
transcoder.transcode request_pb
|
1482
1558
|
end
|
1483
1559
|
|
1560
|
+
##
|
1561
|
+
# @private
|
1562
|
+
#
|
1563
|
+
# GRPC transcoding helper method for the raw_encrypt REST call
|
1564
|
+
#
|
1565
|
+
# @param request_pb [::Google::Cloud::Kms::V1::RawEncryptRequest]
|
1566
|
+
# A request object representing the call parameters. Required.
|
1567
|
+
# @return [Array(String, [String, nil], Hash{String => String})]
|
1568
|
+
# Uri, Body, Query string parameters
|
1569
|
+
def self.transcode_raw_encrypt_request request_pb
|
1570
|
+
transcoder = Gapic::Rest::GrpcTranscoder.new
|
1571
|
+
.with_bindings(
|
1572
|
+
uri_method: :post,
|
1573
|
+
uri_template: "/v1/{name}:rawEncrypt",
|
1574
|
+
body: "*",
|
1575
|
+
matches: [
|
1576
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/keyRings/[^/]+/cryptoKeys/[^/]+/cryptoKeyVersions/[^/]+/?$}, false]
|
1577
|
+
]
|
1578
|
+
)
|
1579
|
+
transcoder.transcode request_pb
|
1580
|
+
end
|
1581
|
+
|
1582
|
+
##
|
1583
|
+
# @private
|
1584
|
+
#
|
1585
|
+
# GRPC transcoding helper method for the raw_decrypt REST call
|
1586
|
+
#
|
1587
|
+
# @param request_pb [::Google::Cloud::Kms::V1::RawDecryptRequest]
|
1588
|
+
# A request object representing the call parameters. Required.
|
1589
|
+
# @return [Array(String, [String, nil], Hash{String => String})]
|
1590
|
+
# Uri, Body, Query string parameters
|
1591
|
+
def self.transcode_raw_decrypt_request request_pb
|
1592
|
+
transcoder = Gapic::Rest::GrpcTranscoder.new
|
1593
|
+
.with_bindings(
|
1594
|
+
uri_method: :post,
|
1595
|
+
uri_template: "/v1/{name}:rawDecrypt",
|
1596
|
+
body: "*",
|
1597
|
+
matches: [
|
1598
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/keyRings/[^/]+/cryptoKeys/[^/]+/cryptoKeyVersions/[^/]+/?$}, false]
|
1599
|
+
]
|
1600
|
+
)
|
1601
|
+
transcoder.transcode request_pb
|
1602
|
+
end
|
1603
|
+
|
1484
1604
|
##
|
1485
1605
|
# @private
|
1486
1606
|
#
|
@@ -1,3 +1,4 @@
|
|
1
|
+
# frozen_string_literal: true
|
1
2
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
3
|
# source: google/cloud/kms/v1/resources.proto
|
3
4
|
|
@@ -9,168 +10,34 @@ require 'google/protobuf/duration_pb'
|
|
9
10
|
require 'google/protobuf/timestamp_pb'
|
10
11
|
require 'google/protobuf/wrappers_pb'
|
11
12
|
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
value :ASYMMETRIC_SIGN, 5
|
37
|
-
value :ASYMMETRIC_DECRYPT, 6
|
38
|
-
value :MAC, 9
|
39
|
-
end
|
40
|
-
add_message "google.cloud.kms.v1.CryptoKeyVersionTemplate" do
|
41
|
-
optional :protection_level, :enum, 1, "google.cloud.kms.v1.ProtectionLevel"
|
42
|
-
optional :algorithm, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
43
|
-
end
|
44
|
-
add_message "google.cloud.kms.v1.KeyOperationAttestation" do
|
45
|
-
optional :format, :enum, 4, "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat"
|
46
|
-
optional :content, :bytes, 5
|
47
|
-
optional :cert_chains, :message, 6, "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains"
|
48
|
-
end
|
49
|
-
add_message "google.cloud.kms.v1.KeyOperationAttestation.CertificateChains" do
|
50
|
-
repeated :cavium_certs, :string, 1
|
51
|
-
repeated :google_card_certs, :string, 2
|
52
|
-
repeated :google_partition_certs, :string, 3
|
53
|
-
end
|
54
|
-
add_enum "google.cloud.kms.v1.KeyOperationAttestation.AttestationFormat" do
|
55
|
-
value :ATTESTATION_FORMAT_UNSPECIFIED, 0
|
56
|
-
value :CAVIUM_V1_COMPRESSED, 3
|
57
|
-
value :CAVIUM_V2_COMPRESSED, 4
|
58
|
-
end
|
59
|
-
add_message "google.cloud.kms.v1.CryptoKeyVersion" do
|
60
|
-
optional :name, :string, 1
|
61
|
-
optional :state, :enum, 3, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState"
|
62
|
-
optional :protection_level, :enum, 7, "google.cloud.kms.v1.ProtectionLevel"
|
63
|
-
optional :algorithm, :enum, 10, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
64
|
-
optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
|
65
|
-
optional :create_time, :message, 4, "google.protobuf.Timestamp"
|
66
|
-
optional :generate_time, :message, 11, "google.protobuf.Timestamp"
|
67
|
-
optional :destroy_time, :message, 5, "google.protobuf.Timestamp"
|
68
|
-
optional :destroy_event_time, :message, 6, "google.protobuf.Timestamp"
|
69
|
-
optional :import_job, :string, 14
|
70
|
-
optional :import_time, :message, 15, "google.protobuf.Timestamp"
|
71
|
-
optional :import_failure_reason, :string, 16
|
72
|
-
optional :generation_failure_reason, :string, 19
|
73
|
-
optional :external_destruction_failure_reason, :string, 20
|
74
|
-
optional :external_protection_level_options, :message, 17, "google.cloud.kms.v1.ExternalProtectionLevelOptions"
|
75
|
-
optional :reimport_eligible, :bool, 18
|
76
|
-
end
|
77
|
-
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
|
78
|
-
value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
|
79
|
-
value :GOOGLE_SYMMETRIC_ENCRYPTION, 1
|
80
|
-
value :RSA_SIGN_PSS_2048_SHA256, 2
|
81
|
-
value :RSA_SIGN_PSS_3072_SHA256, 3
|
82
|
-
value :RSA_SIGN_PSS_4096_SHA256, 4
|
83
|
-
value :RSA_SIGN_PSS_4096_SHA512, 15
|
84
|
-
value :RSA_SIGN_PKCS1_2048_SHA256, 5
|
85
|
-
value :RSA_SIGN_PKCS1_3072_SHA256, 6
|
86
|
-
value :RSA_SIGN_PKCS1_4096_SHA256, 7
|
87
|
-
value :RSA_SIGN_PKCS1_4096_SHA512, 16
|
88
|
-
value :RSA_SIGN_RAW_PKCS1_2048, 28
|
89
|
-
value :RSA_SIGN_RAW_PKCS1_3072, 29
|
90
|
-
value :RSA_SIGN_RAW_PKCS1_4096, 30
|
91
|
-
value :RSA_DECRYPT_OAEP_2048_SHA256, 8
|
92
|
-
value :RSA_DECRYPT_OAEP_3072_SHA256, 9
|
93
|
-
value :RSA_DECRYPT_OAEP_4096_SHA256, 10
|
94
|
-
value :RSA_DECRYPT_OAEP_4096_SHA512, 17
|
95
|
-
value :RSA_DECRYPT_OAEP_2048_SHA1, 37
|
96
|
-
value :RSA_DECRYPT_OAEP_3072_SHA1, 38
|
97
|
-
value :RSA_DECRYPT_OAEP_4096_SHA1, 39
|
98
|
-
value :EC_SIGN_P256_SHA256, 12
|
99
|
-
value :EC_SIGN_P384_SHA384, 13
|
100
|
-
value :EC_SIGN_SECP256K1_SHA256, 31
|
101
|
-
value :HMAC_SHA256, 32
|
102
|
-
value :HMAC_SHA1, 33
|
103
|
-
value :HMAC_SHA384, 34
|
104
|
-
value :HMAC_SHA512, 35
|
105
|
-
value :HMAC_SHA224, 36
|
106
|
-
value :EXTERNAL_SYMMETRIC_ENCRYPTION, 18
|
107
|
-
end
|
108
|
-
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState" do
|
109
|
-
value :CRYPTO_KEY_VERSION_STATE_UNSPECIFIED, 0
|
110
|
-
value :PENDING_GENERATION, 5
|
111
|
-
value :ENABLED, 1
|
112
|
-
value :DISABLED, 2
|
113
|
-
value :DESTROYED, 3
|
114
|
-
value :DESTROY_SCHEDULED, 4
|
115
|
-
value :PENDING_IMPORT, 6
|
116
|
-
value :IMPORT_FAILED, 7
|
117
|
-
value :GENERATION_FAILED, 8
|
118
|
-
value :PENDING_EXTERNAL_DESTRUCTION, 9
|
119
|
-
value :EXTERNAL_DESTRUCTION_FAILED, 10
|
120
|
-
end
|
121
|
-
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView" do
|
122
|
-
value :CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED, 0
|
123
|
-
value :FULL, 1
|
124
|
-
end
|
125
|
-
add_message "google.cloud.kms.v1.PublicKey" do
|
126
|
-
optional :pem, :string, 1
|
127
|
-
optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
128
|
-
optional :pem_crc32c, :message, 3, "google.protobuf.Int64Value"
|
129
|
-
optional :name, :string, 4
|
130
|
-
optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
|
131
|
-
end
|
132
|
-
add_message "google.cloud.kms.v1.ImportJob" do
|
133
|
-
optional :name, :string, 1
|
134
|
-
optional :import_method, :enum, 2, "google.cloud.kms.v1.ImportJob.ImportMethod"
|
135
|
-
optional :protection_level, :enum, 9, "google.cloud.kms.v1.ProtectionLevel"
|
136
|
-
optional :create_time, :message, 3, "google.protobuf.Timestamp"
|
137
|
-
optional :generate_time, :message, 4, "google.protobuf.Timestamp"
|
138
|
-
optional :expire_time, :message, 5, "google.protobuf.Timestamp"
|
139
|
-
optional :expire_event_time, :message, 10, "google.protobuf.Timestamp"
|
140
|
-
optional :state, :enum, 6, "google.cloud.kms.v1.ImportJob.ImportJobState"
|
141
|
-
optional :public_key, :message, 7, "google.cloud.kms.v1.ImportJob.WrappingPublicKey"
|
142
|
-
optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
|
143
|
-
end
|
144
|
-
add_message "google.cloud.kms.v1.ImportJob.WrappingPublicKey" do
|
145
|
-
optional :pem, :string, 1
|
146
|
-
end
|
147
|
-
add_enum "google.cloud.kms.v1.ImportJob.ImportMethod" do
|
148
|
-
value :IMPORT_METHOD_UNSPECIFIED, 0
|
149
|
-
value :RSA_OAEP_3072_SHA1_AES_256, 1
|
150
|
-
value :RSA_OAEP_4096_SHA1_AES_256, 2
|
151
|
-
value :RSA_OAEP_3072_SHA256_AES_256, 3
|
152
|
-
value :RSA_OAEP_4096_SHA256_AES_256, 4
|
153
|
-
value :RSA_OAEP_3072_SHA256, 5
|
154
|
-
value :RSA_OAEP_4096_SHA256, 6
|
155
|
-
end
|
156
|
-
add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
|
157
|
-
value :IMPORT_JOB_STATE_UNSPECIFIED, 0
|
158
|
-
value :PENDING_GENERATION, 1
|
159
|
-
value :ACTIVE, 2
|
160
|
-
value :EXPIRED, 3
|
161
|
-
end
|
162
|
-
add_message "google.cloud.kms.v1.ExternalProtectionLevelOptions" do
|
163
|
-
optional :external_key_uri, :string, 1
|
164
|
-
optional :ekm_connection_key_path, :string, 2
|
165
|
-
end
|
166
|
-
add_enum "google.cloud.kms.v1.ProtectionLevel" do
|
167
|
-
value :PROTECTION_LEVEL_UNSPECIFIED, 0
|
168
|
-
value :SOFTWARE, 1
|
169
|
-
value :HSM, 2
|
170
|
-
value :EXTERNAL, 3
|
171
|
-
value :EXTERNAL_VPC, 4
|
13
|
+
|
14
|
+
descriptor_data = "\n#google/cloud/kms/v1/resources.proto\x12\x13google.cloud.kms.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x1egoogle/protobuf/wrappers.proto\"\xb5\x01\n\x07KeyRing\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03:a\xea\x41^\n\x1f\x63loudkms.googleapis.com/KeyRing\x12;projects/{project}/locations/{location}/keyRings/{key_ring}\"\xae\x07\n\tCryptoKey\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12;\n\x07primary\x18\x02 \x01(\x0b\x32%.google.cloud.kms.v1.CryptoKeyVersionB\x03\xe0\x41\x03\x12\x45\n\x07purpose\x18\x03 \x01(\x0e\x32/.google.cloud.kms.v1.CryptoKey.CryptoKeyPurposeB\x03\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\x12next_rotation_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x34\n\x0frotation_period\x18\x08 \x01(\x0b\x32\x19.google.protobuf.DurationH\x00\x12G\n\x10version_template\x18\x0b \x01(\x0b\x32-.google.cloud.kms.v1.CryptoKeyVersionTemplate\x12:\n\x06labels\x18\n \x03(\x0b\x32*.google.cloud.kms.v1.CryptoKey.LabelsEntry\x12\x18\n\x0bimport_only\x18\r \x01(\x08\x42\x03\xe0\x41\x05\x12\x42\n\x1a\x64\x65stroy_scheduled_duration\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x05\x12%\n\x12\x63rypto_key_backend\x18\x0f \x01(\tB\t\xe0\x41\x05\xfa\x41\x03\n\x01*\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"\x9a\x01\n\x10\x43ryptoKeyPurpose\x12\"\n\x1e\x43RYPTO_KEY_PURPOSE_UNSPECIFIED\x10\x00\x12\x13\n\x0f\x45NCRYPT_DECRYPT\x10\x01\x12\x13\n\x0f\x41SYMMETRIC_SIGN\x10\x05\x12\x16\n\x12\x41SYMMETRIC_DECRYPT\x10\x06\x12\x17\n\x13RAW_ENCRYPT_DECRYPT\x10\x07\x12\x07\n\x03MAC\x10\t:{\xea\x41x\n!cloudkms.googleapis.com/CryptoKey\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}B\x13\n\x11rotation_schedule\"\xb3\x01\n\x18\x43ryptoKeyVersionTemplate\x12>\n\x10protection_level\x18\x01 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel\x12W\n\talgorithm\x18\x03 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x02\"\xb1\x03\n\x17KeyOperationAttestation\x12S\n\x06\x66ormat\x18\x04 \x01(\x0e\x32>.google.cloud.kms.v1.KeyOperationAttestation.AttestationFormatB\x03\xe0\x41\x03\x12\x14\n\x07\x63ontent\x18\x05 \x01(\x0c\x42\x03\xe0\x41\x03\x12X\n\x0b\x63\x65rt_chains\x18\x06 \x01(\x0b\x32>.google.cloud.kms.v1.KeyOperationAttestation.CertificateChainsB\x03\xe0\x41\x03\x1a\x64\n\x11\x43\x65rtificateChains\x12\x14\n\x0c\x63\x61vium_certs\x18\x01 \x03(\t\x12\x19\n\x11google_card_certs\x18\x02 \x03(\t\x12\x1e\n\x16google_partition_certs\x18\x03 \x03(\t\"k\n\x11\x41ttestationFormat\x12\"\n\x1e\x41TTESTATION_FORMAT_UNSPECIFIED\x10\x00\x12\x18\n\x14\x43\x41VIUM_V1_COMPRESSED\x10\x03\x12\x18\n\x14\x43\x41VIUM_V2_COMPRESSED\x10\x04\"\xa8\x12\n\x10\x43ryptoKeyVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\x05state\x18\x03 \x01(\x0e\x32;.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState\x12\x43\n\x10protection_level\x18\x07 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x03\xe0\x41\x03\x12W\n\talgorithm\x18\n \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithmB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12;\n\x12\x64\x65stroy_event_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x17\n\nimport_job\x18\x0e \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0bimport_time\x18\x0f \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\"\n\x15import_failure_reason\x18\x10 \x01(\tB\x03\xe0\x41\x03\x12&\n\x19generation_failure_reason\x18\x13 \x01(\tB\x03\xe0\x41\x03\x12\x30\n#external_destruction_failure_reason\x18\x14 \x01(\tB\x03\xe0\x41\x03\x12^\n!external_protection_level_options\x18\x11 \x01(\x0b\x32\x33.google.cloud.kms.v1.ExternalProtectionLevelOptions\x12\x1e\n\x11reimport_eligible\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\"\x89\x07\n\x19\x43ryptoKeyVersionAlgorithm\x12,\n(CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED\x10\x00\x12\x1f\n\x1bGOOGLE_SYMMETRIC_ENCRYPTION\x10\x01\x12\x0f\n\x0b\x41\x45S_128_GCM\x10)\x12\x0f\n\x0b\x41\x45S_256_GCM\x10\x13\x12\x1c\n\x18RSA_SIGN_PSS_2048_SHA256\x10\x02\x12\x1c\n\x18RSA_SIGN_PSS_3072_SHA256\x10\x03\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA256\x10\x04\x12\x1c\n\x18RSA_SIGN_PSS_4096_SHA512\x10\x0f\x12\x1e\n\x1aRSA_SIGN_PKCS1_2048_SHA256\x10\x05\x12\x1e\n\x1aRSA_SIGN_PKCS1_3072_SHA256\x10\x06\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA256\x10\x07\x12\x1e\n\x1aRSA_SIGN_PKCS1_4096_SHA512\x10\x10\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_2048\x10\x1c\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_3072\x10\x1d\x12\x1b\n\x17RSA_SIGN_RAW_PKCS1_4096\x10\x1e\x12 \n\x1cRSA_DECRYPT_OAEP_2048_SHA256\x10\x08\x12 \n\x1cRSA_DECRYPT_OAEP_3072_SHA256\x10\t\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA256\x10\n\x12 \n\x1cRSA_DECRYPT_OAEP_4096_SHA512\x10\x11\x12\x1e\n\x1aRSA_DECRYPT_OAEP_2048_SHA1\x10%\x12\x1e\n\x1aRSA_DECRYPT_OAEP_3072_SHA1\x10&\x12\x1e\n\x1aRSA_DECRYPT_OAEP_4096_SHA1\x10\'\x12\x17\n\x13\x45\x43_SIGN_P256_SHA256\x10\x0c\x12\x17\n\x13\x45\x43_SIGN_P384_SHA384\x10\r\x12\x1c\n\x18\x45\x43_SIGN_SECP256K1_SHA256\x10\x1f\x12\x0f\n\x0bHMAC_SHA256\x10 \x12\r\n\tHMAC_SHA1\x10!\x12\x0f\n\x0bHMAC_SHA384\x10\"\x12\x0f\n\x0bHMAC_SHA512\x10#\x12\x0f\n\x0bHMAC_SHA224\x10$\x12!\n\x1d\x45XTERNAL_SYMMETRIC_ENCRYPTION\x10\x12\"\x9b\x02\n\x15\x43ryptoKeyVersionState\x12(\n$CRYPTO_KEY_VERSION_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x05\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03\x12\x15\n\x11\x44\x45STROY_SCHEDULED\x10\x04\x12\x12\n\x0ePENDING_IMPORT\x10\x06\x12\x11\n\rIMPORT_FAILED\x10\x07\x12\x15\n\x11GENERATION_FAILED\x10\x08\x12 \n\x1cPENDING_EXTERNAL_DESTRUCTION\x10\t\x12\x1f\n\x1b\x45XTERNAL_DESTRUCTION_FAILED\x10\n\"I\n\x14\x43ryptoKeyVersionView\x12\'\n#CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED\x10\x00\x12\x08\n\x04\x46ULL\x10\x01:\xaa\x01\xea\x41\xa6\x01\n(cloudkms.googleapis.com/CryptoKeyVersion\x12zprojects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}\"\x9c\x03\n\tPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\x12R\n\talgorithm\x18\x02 \x01(\x0e\x32?.google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm\x12/\n\npem_crc32c\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x0c\n\x04name\x18\x04 \x01(\t\x12>\n\x10protection_level\x18\x05 \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevel:\xae\x01\xea\x41\xaa\x01\n!cloudkms.googleapis.com/PublicKey\x12\x84\x01projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}/publicKey\"\xd4\x08\n\tImportJob\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12J\n\rimport_method\x18\x02 \x01(\x0e\x32+.google.cloud.kms.v1.ImportJob.ImportMethodB\x06\xe0\x41\x02\xe0\x41\x05\x12\x46\n\x10protection_level\x18\t \x01(\x0e\x32$.google.cloud.kms.v1.ProtectionLevelB\x06\xe0\x41\x02\xe0\x41\x05\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x36\n\rgenerate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12:\n\x11\x65xpire_event_time\x18\n \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x05state\x18\x06 \x01(\x0e\x32-.google.cloud.kms.v1.ImportJob.ImportJobStateB\x03\xe0\x41\x03\x12I\n\npublic_key\x18\x07 \x01(\x0b\x32\x30.google.cloud.kms.v1.ImportJob.WrappingPublicKeyB\x03\xe0\x41\x03\x12\x46\n\x0b\x61ttestation\x18\x08 \x01(\x0b\x32,.google.cloud.kms.v1.KeyOperationAttestationB\x03\xe0\x41\x03\x1a \n\x11WrappingPublicKey\x12\x0b\n\x03pem\x18\x01 \x01(\t\"\xe5\x01\n\x0cImportMethod\x12\x1d\n\x19IMPORT_METHOD_UNSPECIFIED\x10\x00\x12\x1e\n\x1aRSA_OAEP_3072_SHA1_AES_256\x10\x01\x12\x1e\n\x1aRSA_OAEP_4096_SHA1_AES_256\x10\x02\x12 \n\x1cRSA_OAEP_3072_SHA256_AES_256\x10\x03\x12 \n\x1cRSA_OAEP_4096_SHA256_AES_256\x10\x04\x12\x18\n\x14RSA_OAEP_3072_SHA256\x10\x05\x12\x18\n\x14RSA_OAEP_4096_SHA256\x10\x06\"c\n\x0eImportJobState\x12 \n\x1cIMPORT_JOB_STATE_UNSPECIFIED\x10\x00\x12\x16\n\x12PENDING_GENERATION\x10\x01\x12\n\n\x06\x41\x43TIVE\x10\x02\x12\x0b\n\x07\x45XPIRED\x10\x03:{\xea\x41x\n!cloudkms.googleapis.com/ImportJob\x12Sprojects/{project}/locations/{location}/keyRings/{key_ring}/importJobs/{import_job}\"[\n\x1e\x45xternalProtectionLevelOptions\x12\x18\n\x10\x65xternal_key_uri\x18\x01 \x01(\t\x12\x1f\n\x17\x65km_connection_key_path\x18\x02 \x01(\t*j\n\x0fProtectionLevel\x12 \n\x1cPROTECTION_LEVEL_UNSPECIFIED\x10\x00\x12\x0c\n\x08SOFTWARE\x10\x01\x12\x07\n\x03HSM\x10\x02\x12\x0c\n\x08\x45XTERNAL\x10\x03\x12\x10\n\x0c\x45XTERNAL_VPC\x10\x04\x42\x88\x01\n\x17\x63om.google.cloud.kms.v1B\x11KmsResourcesProtoP\x01Z)cloud.google.com/go/kms/apiv1/kmspb;kmspb\xf8\x01\x01\xaa\x02\x13Google.Cloud.Kms.V1\xca\x02\x13Google\\Cloud\\Kms\\V1b\x06proto3"
|
15
|
+
|
16
|
+
pool = Google::Protobuf::DescriptorPool.generated_pool
|
17
|
+
|
18
|
+
begin
|
19
|
+
pool.add_serialized_file(descriptor_data)
|
20
|
+
rescue TypeError => e
|
21
|
+
# Compatibility code: will be removed in the next major version.
|
22
|
+
require 'google/protobuf/descriptor_pb'
|
23
|
+
parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
|
24
|
+
parsed.clear_dependency
|
25
|
+
serialized = parsed.class.encode(parsed)
|
26
|
+
file = pool.add_serialized_file(serialized)
|
27
|
+
warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
|
28
|
+
imports = [
|
29
|
+
["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
|
30
|
+
["google.protobuf.Duration", "google/protobuf/duration.proto"],
|
31
|
+
["google.protobuf.Int64Value", "google/protobuf/wrappers.proto"],
|
32
|
+
]
|
33
|
+
imports.each do |type_name, expected_filename|
|
34
|
+
import_file = pool.lookup(type_name).file_descriptor
|
35
|
+
if import_file.name != expected_filename
|
36
|
+
warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
|
172
37
|
end
|
173
38
|
end
|
39
|
+
warn "Each proto file must use a consistent fully-qualified name."
|
40
|
+
warn "This will become an error in the next major version."
|
174
41
|
end
|
175
42
|
|
176
43
|
module Google
|