google-cloud-kms-v1 0.6.0 → 0.8.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/AUTHENTICATION.md +8 -8
- data/README.md +1 -1
- data/lib/google/cloud/kms/v1/iam_policy/client.rb +39 -40
- data/lib/google/cloud/kms/v1/key_management_service/client.rb +528 -257
- data/lib/google/cloud/kms/v1/resources_pb.rb +6 -0
- data/lib/google/cloud/kms/v1/service_pb.rb +60 -12
- data/lib/google/cloud/kms/v1/service_services_pb.rb +37 -24
- data/lib/google/cloud/kms/v1/version.rb +1 -1
- data/proto_docs/google/api/field_behavior.rb +7 -1
- data/proto_docs/google/cloud/kms/v1/resources.rb +38 -4
- data/proto_docs/google/cloud/kms/v1/service.rb +259 -58
- data/proto_docs/google/type/expr.rb +35 -12
- metadata +4 -5
- data/lib/google/iam/v1/iam_policy_services_pb.rb +0 -81
@@ -23,6 +23,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
23
23
|
optional :next_rotation_time, :message, 7, "google.protobuf.Timestamp"
|
24
24
|
optional :version_template, :message, 11, "google.cloud.kms.v1.CryptoKeyVersionTemplate"
|
25
25
|
map :labels, :string, :string, 10
|
26
|
+
optional :import_only, :bool, 13
|
27
|
+
optional :destroy_scheduled_duration, :message, 14, "google.protobuf.Duration"
|
26
28
|
oneof :rotation_schedule do
|
27
29
|
optional :rotation_period, :message, 8, "google.protobuf.Duration"
|
28
30
|
end
|
@@ -32,6 +34,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
32
34
|
value :ENCRYPT_DECRYPT, 1
|
33
35
|
value :ASYMMETRIC_SIGN, 5
|
34
36
|
value :ASYMMETRIC_DECRYPT, 6
|
37
|
+
value :MAC, 9
|
35
38
|
end
|
36
39
|
add_message "google.cloud.kms.v1.CryptoKeyVersionTemplate" do
|
37
40
|
optional :protection_level, :enum, 1, "google.cloud.kms.v1.ProtectionLevel"
|
@@ -60,6 +63,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
60
63
|
optional :import_time, :message, 15, "google.protobuf.Timestamp"
|
61
64
|
optional :import_failure_reason, :string, 16
|
62
65
|
optional :external_protection_level_options, :message, 17, "google.cloud.kms.v1.ExternalProtectionLevelOptions"
|
66
|
+
optional :reimport_eligible, :bool, 18
|
63
67
|
end
|
64
68
|
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
|
65
69
|
value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
|
@@ -79,6 +83,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
79
83
|
value :EC_SIGN_P256_SHA256, 12
|
80
84
|
value :EC_SIGN_P384_SHA384, 13
|
81
85
|
value :EC_SIGN_SECP256K1_SHA256, 31
|
86
|
+
value :HMAC_SHA256, 32
|
82
87
|
value :EXTERNAL_SYMMETRIC_ENCRYPTION, 18
|
83
88
|
end
|
84
89
|
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState" do
|
@@ -100,6 +105,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
100
105
|
optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
101
106
|
optional :pem_crc32c, :message, 3, "google.protobuf.Int64Value"
|
102
107
|
optional :name, :string, 4
|
108
|
+
optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
|
103
109
|
end
|
104
110
|
add_message "google.cloud.kms.v1.ImportJob" do
|
105
111
|
optional :name, :string, 1
|
@@ -94,6 +94,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
94
94
|
end
|
95
95
|
add_message "google.cloud.kms.v1.ImportCryptoKeyVersionRequest" do
|
96
96
|
optional :parent, :string, 1
|
97
|
+
optional :crypto_key_version, :string, 6
|
97
98
|
optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
98
99
|
optional :import_job, :string, 4
|
99
100
|
oneof :wrapped_key_material do
|
@@ -113,6 +114,16 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
113
114
|
optional :crypto_key_version, :message, 1, "google.cloud.kms.v1.CryptoKeyVersion"
|
114
115
|
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
115
116
|
end
|
117
|
+
add_message "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest" do
|
118
|
+
optional :name, :string, 1
|
119
|
+
optional :crypto_key_version_id, :string, 2
|
120
|
+
end
|
121
|
+
add_message "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest" do
|
122
|
+
optional :name, :string, 1
|
123
|
+
end
|
124
|
+
add_message "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest" do
|
125
|
+
optional :name, :string, 1
|
126
|
+
end
|
116
127
|
add_message "google.cloud.kms.v1.EncryptRequest" do
|
117
128
|
optional :name, :string, 1
|
118
129
|
optional :plaintext, :bytes, 2
|
@@ -137,9 +148,22 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
137
148
|
optional :ciphertext, :bytes, 3
|
138
149
|
optional :ciphertext_crc32c, :message, 4, "google.protobuf.Int64Value"
|
139
150
|
end
|
140
|
-
add_message "google.cloud.kms.v1.
|
141
|
-
optional :
|
142
|
-
optional :
|
151
|
+
add_message "google.cloud.kms.v1.MacSignRequest" do
|
152
|
+
optional :name, :string, 1
|
153
|
+
optional :data, :bytes, 2
|
154
|
+
optional :data_crc32c, :message, 3, "google.protobuf.Int64Value"
|
155
|
+
end
|
156
|
+
add_message "google.cloud.kms.v1.MacVerifyRequest" do
|
157
|
+
optional :name, :string, 1
|
158
|
+
optional :data, :bytes, 2
|
159
|
+
optional :data_crc32c, :message, 3, "google.protobuf.Int64Value"
|
160
|
+
optional :mac, :bytes, 4
|
161
|
+
optional :mac_crc32c, :message, 5, "google.protobuf.Int64Value"
|
162
|
+
end
|
163
|
+
add_message "google.cloud.kms.v1.GenerateRandomBytesRequest" do
|
164
|
+
optional :location, :string, 1
|
165
|
+
optional :length_bytes, :int32, 2
|
166
|
+
optional :protection_level, :enum, 3, "google.cloud.kms.v1.ProtectionLevel"
|
143
167
|
end
|
144
168
|
add_message "google.cloud.kms.v1.EncryptResponse" do
|
145
169
|
optional :name, :string, 1
|
@@ -147,27 +171,45 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
147
171
|
optional :ciphertext_crc32c, :message, 4, "google.protobuf.Int64Value"
|
148
172
|
optional :verified_plaintext_crc32c, :bool, 5
|
149
173
|
optional :verified_additional_authenticated_data_crc32c, :bool, 6
|
174
|
+
optional :protection_level, :enum, 7, "google.cloud.kms.v1.ProtectionLevel"
|
175
|
+
end
|
176
|
+
add_message "google.cloud.kms.v1.DecryptResponse" do
|
177
|
+
optional :plaintext, :bytes, 1
|
178
|
+
optional :plaintext_crc32c, :message, 2, "google.protobuf.Int64Value"
|
179
|
+
optional :used_primary, :bool, 3
|
180
|
+
optional :protection_level, :enum, 4, "google.cloud.kms.v1.ProtectionLevel"
|
150
181
|
end
|
151
182
|
add_message "google.cloud.kms.v1.AsymmetricSignResponse" do
|
152
183
|
optional :signature, :bytes, 1
|
153
184
|
optional :signature_crc32c, :message, 2, "google.protobuf.Int64Value"
|
154
185
|
optional :verified_digest_crc32c, :bool, 3
|
155
186
|
optional :name, :string, 4
|
187
|
+
optional :protection_level, :enum, 6, "google.cloud.kms.v1.ProtectionLevel"
|
156
188
|
end
|
157
189
|
add_message "google.cloud.kms.v1.AsymmetricDecryptResponse" do
|
158
190
|
optional :plaintext, :bytes, 1
|
159
191
|
optional :plaintext_crc32c, :message, 2, "google.protobuf.Int64Value"
|
160
192
|
optional :verified_ciphertext_crc32c, :bool, 3
|
193
|
+
optional :protection_level, :enum, 4, "google.cloud.kms.v1.ProtectionLevel"
|
161
194
|
end
|
162
|
-
add_message "google.cloud.kms.v1.
|
195
|
+
add_message "google.cloud.kms.v1.MacSignResponse" do
|
163
196
|
optional :name, :string, 1
|
164
|
-
optional :
|
197
|
+
optional :mac, :bytes, 2
|
198
|
+
optional :mac_crc32c, :message, 3, "google.protobuf.Int64Value"
|
199
|
+
optional :verified_data_crc32c, :bool, 4
|
200
|
+
optional :protection_level, :enum, 5, "google.cloud.kms.v1.ProtectionLevel"
|
165
201
|
end
|
166
|
-
add_message "google.cloud.kms.v1.
|
202
|
+
add_message "google.cloud.kms.v1.MacVerifyResponse" do
|
167
203
|
optional :name, :string, 1
|
204
|
+
optional :success, :bool, 2
|
205
|
+
optional :verified_data_crc32c, :bool, 3
|
206
|
+
optional :verified_mac_crc32c, :bool, 4
|
207
|
+
optional :verified_success_integrity, :bool, 5
|
208
|
+
optional :protection_level, :enum, 6, "google.cloud.kms.v1.ProtectionLevel"
|
168
209
|
end
|
169
|
-
add_message "google.cloud.kms.v1.
|
170
|
-
optional :
|
210
|
+
add_message "google.cloud.kms.v1.GenerateRandomBytesResponse" do
|
211
|
+
optional :data, :bytes, 1
|
212
|
+
optional :data_crc32c, :message, 3, "google.protobuf.Int64Value"
|
171
213
|
end
|
172
214
|
add_message "google.cloud.kms.v1.Digest" do
|
173
215
|
oneof :digest do
|
@@ -207,17 +249,23 @@ module Google
|
|
207
249
|
CreateImportJobRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CreateImportJobRequest").msgclass
|
208
250
|
UpdateCryptoKeyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.UpdateCryptoKeyRequest").msgclass
|
209
251
|
UpdateCryptoKeyVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.UpdateCryptoKeyVersionRequest").msgclass
|
252
|
+
UpdateCryptoKeyPrimaryVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest").msgclass
|
253
|
+
DestroyCryptoKeyVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.DestroyCryptoKeyVersionRequest").msgclass
|
254
|
+
RestoreCryptoKeyVersionRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.RestoreCryptoKeyVersionRequest").msgclass
|
210
255
|
EncryptRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.EncryptRequest").msgclass
|
211
256
|
DecryptRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.DecryptRequest").msgclass
|
212
257
|
AsymmetricSignRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.AsymmetricSignRequest").msgclass
|
213
258
|
AsymmetricDecryptRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.AsymmetricDecryptRequest").msgclass
|
214
|
-
|
259
|
+
MacSignRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.MacSignRequest").msgclass
|
260
|
+
MacVerifyRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.MacVerifyRequest").msgclass
|
261
|
+
GenerateRandomBytesRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GenerateRandomBytesRequest").msgclass
|
215
262
|
EncryptResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.EncryptResponse").msgclass
|
263
|
+
DecryptResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.DecryptResponse").msgclass
|
216
264
|
AsymmetricSignResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.AsymmetricSignResponse").msgclass
|
217
265
|
AsymmetricDecryptResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.AsymmetricDecryptResponse").msgclass
|
218
|
-
|
219
|
-
|
220
|
-
|
266
|
+
MacSignResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.MacSignResponse").msgclass
|
267
|
+
MacVerifyResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.MacVerifyResponse").msgclass
|
268
|
+
GenerateRandomBytesResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GenerateRandomBytesResponse").msgclass
|
221
269
|
Digest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.Digest").msgclass
|
222
270
|
LocationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.LocationMetadata").msgclass
|
223
271
|
end
|
@@ -38,7 +38,7 @@ module Google
|
|
38
38
|
# [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc).
|
39
39
|
class Service
|
40
40
|
|
41
|
-
include
|
41
|
+
include GRPC::GenericService
|
42
42
|
|
43
43
|
self.marshal_class_method = :encode
|
44
44
|
self.unmarshal_class_method = :decode
|
@@ -80,11 +80,12 @@ module Google
|
|
80
80
|
# [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
|
81
81
|
# [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
|
82
82
|
rpc :CreateCryptoKeyVersion, ::Google::Cloud::Kms::V1::CreateCryptoKeyVersionRequest, ::Google::Cloud::Kms::V1::CryptoKeyVersion
|
83
|
-
#
|
84
|
-
# wrapped key material provided in the request.
|
83
|
+
# Import wrapped key material into a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
85
84
|
#
|
86
|
-
#
|
87
|
-
#
|
85
|
+
# All requests must specify a [CryptoKey][google.cloud.kms.v1.CryptoKey]. If a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] is
|
86
|
+
# additionally specified in the request, key material will be reimported into
|
87
|
+
# that version. Otherwise, a new version will be created, and will be
|
88
|
+
# assigned the next sequential id within the [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
88
89
|
rpc :ImportCryptoKeyVersion, ::Google::Cloud::Kms::V1::ImportCryptoKeyVersionRequest, ::Google::Cloud::Kms::V1::CryptoKeyVersion
|
89
90
|
# Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
|
90
91
|
#
|
@@ -100,21 +101,6 @@ module Google
|
|
100
101
|
# method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
|
101
102
|
# move between other states.
|
102
103
|
rpc :UpdateCryptoKeyVersion, ::Google::Cloud::Kms::V1::UpdateCryptoKeyVersionRequest, ::Google::Cloud::Kms::V1::CryptoKeyVersion
|
103
|
-
# Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
|
104
|
-
# The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
105
|
-
# [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
106
|
-
rpc :Encrypt, ::Google::Cloud::Kms::V1::EncryptRequest, ::Google::Cloud::Kms::V1::EncryptResponse
|
107
|
-
# Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
108
|
-
# must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
109
|
-
rpc :Decrypt, ::Google::Cloud::Kms::V1::DecryptRequest, ::Google::Cloud::Kms::V1::DecryptResponse
|
110
|
-
# Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
111
|
-
# ASYMMETRIC_SIGN, producing a signature that can be verified with the public
|
112
|
-
# key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
113
|
-
rpc :AsymmetricSign, ::Google::Cloud::Kms::V1::AsymmetricSignRequest, ::Google::Cloud::Kms::V1::AsymmetricSignResponse
|
114
|
-
# Decrypts data that was encrypted with a public key retrieved from
|
115
|
-
# [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
|
116
|
-
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
|
117
|
-
rpc :AsymmetricDecrypt, ::Google::Cloud::Kms::V1::AsymmetricDecryptRequest, ::Google::Cloud::Kms::V1::AsymmetricDecryptResponse
|
118
104
|
# Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
|
119
105
|
#
|
120
106
|
# Returns an error if called on a key whose purpose is not
|
@@ -123,10 +109,11 @@ module Google
|
|
123
109
|
# Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
|
124
110
|
#
|
125
111
|
# Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
|
126
|
-
# [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
|
127
|
-
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to
|
128
|
-
#
|
129
|
-
#
|
112
|
+
# [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED],
|
113
|
+
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to the time
|
114
|
+
# [destroy_scheduled_duration][google.cloud.kms.v1.CryptoKey.destroy_scheduled_duration] in the
|
115
|
+
# future. At that time, the [state][google.cloud.kms.v1.CryptoKeyVersion.state] will
|
116
|
+
# automatically change to
|
130
117
|
# [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
|
131
118
|
# material will be irrevocably destroyed.
|
132
119
|
#
|
@@ -141,6 +128,32 @@ module Google
|
|
141
128
|
# will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
|
142
129
|
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
|
143
130
|
rpc :RestoreCryptoKeyVersion, ::Google::Cloud::Kms::V1::RestoreCryptoKeyVersionRequest, ::Google::Cloud::Kms::V1::CryptoKeyVersion
|
131
|
+
# Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
|
132
|
+
# The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
133
|
+
# [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
134
|
+
rpc :Encrypt, ::Google::Cloud::Kms::V1::EncryptRequest, ::Google::Cloud::Kms::V1::EncryptResponse
|
135
|
+
# Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
136
|
+
# must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
137
|
+
rpc :Decrypt, ::Google::Cloud::Kms::V1::DecryptRequest, ::Google::Cloud::Kms::V1::DecryptResponse
|
138
|
+
# Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
139
|
+
# ASYMMETRIC_SIGN, producing a signature that can be verified with the public
|
140
|
+
# key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
141
|
+
rpc :AsymmetricSign, ::Google::Cloud::Kms::V1::AsymmetricSignRequest, ::Google::Cloud::Kms::V1::AsymmetricSignResponse
|
142
|
+
# Decrypts data that was encrypted with a public key retrieved from
|
143
|
+
# [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
|
144
|
+
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
|
145
|
+
rpc :AsymmetricDecrypt, ::Google::Cloud::Kms::V1::AsymmetricDecryptRequest, ::Google::Cloud::Kms::V1::AsymmetricDecryptResponse
|
146
|
+
# Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
147
|
+
# MAC, producing a tag that can be verified by another source with the
|
148
|
+
# same key.
|
149
|
+
rpc :MacSign, ::Google::Cloud::Kms::V1::MacSignRequest, ::Google::Cloud::Kms::V1::MacSignResponse
|
150
|
+
# Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
151
|
+
# MAC, and returns a response that indicates whether or not the verification
|
152
|
+
# was successful.
|
153
|
+
rpc :MacVerify, ::Google::Cloud::Kms::V1::MacVerifyRequest, ::Google::Cloud::Kms::V1::MacVerifyResponse
|
154
|
+
# Generate random bytes using the Cloud KMS randomness source in the provided
|
155
|
+
# location.
|
156
|
+
rpc :GenerateRandomBytes, ::Google::Cloud::Kms::V1::GenerateRandomBytesRequest, ::Google::Cloud::Kms::V1::GenerateRandomBytesResponse
|
144
157
|
end
|
145
158
|
|
146
159
|
Stub = Service.rpc_stub_class
|
@@ -57,9 +57,15 @@ module Google
|
|
57
57
|
|
58
58
|
# Denotes that a (repeated) field is an unordered list.
|
59
59
|
# This indicates that the service may provide the elements of the list
|
60
|
-
# in any arbitrary
|
60
|
+
# in any arbitrary order, rather than the order the user originally
|
61
61
|
# provided. Additionally, the list's order may or may not be stable.
|
62
62
|
UNORDERED_LIST = 6
|
63
|
+
|
64
|
+
# Denotes that this field returns a non-empty default value if not set.
|
65
|
+
# This indicates that if the user provides the empty value in a request,
|
66
|
+
# a non-empty value will be returned. The user will not be aware of what
|
67
|
+
# non-empty value to expect.
|
68
|
+
NON_EMPTY_DEFAULT = 7
|
63
69
|
end
|
64
70
|
end
|
65
71
|
end
|
@@ -97,6 +97,16 @@ module Google
|
|
97
97
|
# @return [::Google::Protobuf::Map{::String => ::String}]
|
98
98
|
# Labels with user-defined metadata. For more information, see
|
99
99
|
# [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
|
100
|
+
# @!attribute [rw] import_only
|
101
|
+
# @return [::Boolean]
|
102
|
+
# Immutable. Whether this key may contain imported versions only.
|
103
|
+
# @!attribute [rw] destroy_scheduled_duration
|
104
|
+
# @return [::Google::Protobuf::Duration]
|
105
|
+
# Immutable. The period of time that versions of this key spend in the
|
106
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DESTROY_SCHEDULED DESTROY_SCHEDULED}
|
107
|
+
# state before transitioning to
|
108
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DESTROYED DESTROYED}. If not
|
109
|
+
# specified at creation time, the default duration is 24 hours.
|
100
110
|
class CryptoKey
|
101
111
|
include ::Google::Protobuf::MessageExts
|
102
112
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -132,6 +142,10 @@ module Google
|
|
132
142
|
# {::Google::Cloud::Kms::V1::KeyManagementService::Client#asymmetric_decrypt AsymmetricDecrypt} and
|
133
143
|
# {::Google::Cloud::Kms::V1::KeyManagementService::Client#get_public_key GetPublicKey}.
|
134
144
|
ASYMMETRIC_DECRYPT = 6
|
145
|
+
|
146
|
+
# {::Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used with
|
147
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client#mac_sign MacSign}.
|
148
|
+
MAC = 9
|
135
149
|
end
|
136
150
|
end
|
137
151
|
|
@@ -235,16 +249,16 @@ module Google
|
|
235
249
|
# {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DESTROYED DESTROYED}.
|
236
250
|
# @!attribute [r] import_job
|
237
251
|
# @return [::String]
|
238
|
-
# Output only. The name of the {::Google::Cloud::Kms::V1::ImportJob ImportJob} used
|
252
|
+
# Output only. The name of the {::Google::Cloud::Kms::V1::ImportJob ImportJob} used in the most recent import of this
|
239
253
|
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}. Only present if the underlying key material was
|
240
254
|
# imported.
|
241
255
|
# @!attribute [r] import_time
|
242
256
|
# @return [::Google::Protobuf::Timestamp]
|
243
257
|
# Output only. The time at which this {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}'s key material
|
244
|
-
# was imported.
|
258
|
+
# was most recently imported.
|
245
259
|
# @!attribute [r] import_failure_reason
|
246
260
|
# @return [::String]
|
247
|
-
# Output only. The root cause of
|
261
|
+
# Output only. The root cause of the most recent import failure. Only present if
|
248
262
|
# {::Google::Cloud::Kms::V1::CryptoKeyVersion#state state} is
|
249
263
|
# {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::IMPORT_FAILED IMPORT_FAILED}.
|
250
264
|
# @!attribute [rw] external_protection_level_options
|
@@ -252,6 +266,11 @@ module Google
|
|
252
266
|
# ExternalProtectionLevelOptions stores a group of additional fields for
|
253
267
|
# configuring a {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} that are specific to the
|
254
268
|
# {::Google::Cloud::Kms::V1::ProtectionLevel::EXTERNAL EXTERNAL} protection level.
|
269
|
+
# @!attribute [r] reimport_eligible
|
270
|
+
# @return [::Boolean]
|
271
|
+
# Output only. Whether or not this key version is eligible for reimport, by being
|
272
|
+
# specified as a target in
|
273
|
+
# {::Google::Cloud::Kms::V1::ImportCryptoKeyVersionRequest#crypto_key_version ImportCryptoKeyVersionRequest.crypto_key_version}.
|
255
274
|
class CryptoKeyVersion
|
256
275
|
include ::Google::Protobuf::MessageExts
|
257
276
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -288,6 +307,12 @@ module Google
|
|
288
307
|
# The fields in the name after "EC_SIGN_" correspond to the following
|
289
308
|
# parameters: elliptic curve, digest algorithm.
|
290
309
|
#
|
310
|
+
# Algorithms beginning with "HMAC_" are usable with {::Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey.purpose}
|
311
|
+
# {::Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::MAC MAC}.
|
312
|
+
#
|
313
|
+
# The suffix following "HMAC_" corresponds to the hash algorithm being used
|
314
|
+
# (eg. SHA256).
|
315
|
+
#
|
291
316
|
# For more information, see [Key purposes and algorithms]
|
292
317
|
# (https://cloud.google.com/kms/docs/algorithms).
|
293
318
|
module CryptoKeyVersionAlgorithm
|
@@ -343,6 +368,9 @@ module Google
|
|
343
368
|
# HSM protection level.
|
344
369
|
EC_SIGN_SECP256K1_SHA256 = 31
|
345
370
|
|
371
|
+
# HMAC-SHA256 signing with a 256 bit key.
|
372
|
+
HMAC_SHA256 = 32
|
373
|
+
|
346
374
|
# Algorithm representing symmetric encryption by an external key manager.
|
347
375
|
EXTERNAL_SYMMETRIC_ENCRYPTION = 18
|
348
376
|
end
|
@@ -365,7 +393,10 @@ module Google
|
|
365
393
|
DISABLED = 2
|
366
394
|
|
367
395
|
# This version is destroyed, and the key material is no longer stored.
|
368
|
-
#
|
396
|
+
# This version may only become {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED} again if this version is
|
397
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion#reimport_eligible reimport_eligible} and the original
|
398
|
+
# key material is reimported with a call to
|
399
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client#import_crypto_key_version KeyManagementService.ImportCryptoKeyVersion}.
|
369
400
|
DESTROYED = 3
|
370
401
|
|
371
402
|
# This version is scheduled for destruction, and will be destroyed soon.
|
@@ -435,6 +466,9 @@ module Google
|
|
435
466
|
# Provided here for verification.
|
436
467
|
#
|
437
468
|
# NOTE: This field is in Beta.
|
469
|
+
# @!attribute [rw] protection_level
|
470
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
471
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} public key.
|
438
472
|
class PublicKey
|
439
473
|
include ::Google::Protobuf::MessageExts
|
440
474
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -325,8 +325,27 @@ module Google
|
|
325
325
|
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#import_crypto_key_version KeyManagementService.ImportCryptoKeyVersion}.
|
326
326
|
# @!attribute [rw] parent
|
327
327
|
# @return [::String]
|
328
|
-
# Required. The {::Google::Cloud::Kms::V1::CryptoKey#name name} of the {::Google::Cloud::Kms::V1::CryptoKey CryptoKey} to
|
329
|
-
#
|
328
|
+
# Required. The {::Google::Cloud::Kms::V1::CryptoKey#name name} of the {::Google::Cloud::Kms::V1::CryptoKey CryptoKey} to be imported into.
|
329
|
+
#
|
330
|
+
# The create permission is only required on this key when creating a new
|
331
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}.
|
332
|
+
# @!attribute [rw] crypto_key_version
|
333
|
+
# @return [::String]
|
334
|
+
# Optional. The optional {::Google::Cloud::Kms::V1::CryptoKeyVersion#name name} of an existing
|
335
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to target for an import operation.
|
336
|
+
# If this field is not present, a new {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} containing the
|
337
|
+
# supplied key material is created.
|
338
|
+
#
|
339
|
+
# If this field is present, the supplied key material is imported into
|
340
|
+
# the existing {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}. To import into an existing
|
341
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} must be a child of
|
342
|
+
# {::Google::Cloud::Kms::V1::ImportCryptoKeyVersionRequest#parent ImportCryptoKeyVersionRequest.parent}, have been previously created via
|
343
|
+
# [ImportCryptoKeyVersion][], and be in
|
344
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DESTROYED DESTROYED} or
|
345
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::IMPORT_FAILED IMPORT_FAILED}
|
346
|
+
# state. The key material and algorithm must match the previous
|
347
|
+
# {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} exactly if the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} has ever contained
|
348
|
+
# key material.
|
330
349
|
# @!attribute [rw] algorithm
|
331
350
|
# @return [::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm]
|
332
351
|
# Required. The {::Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm algorithm} of
|
@@ -408,6 +427,36 @@ module Google
|
|
408
427
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
409
428
|
end
|
410
429
|
|
430
|
+
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#update_crypto_key_primary_version KeyManagementService.UpdateCryptoKeyPrimaryVersion}.
|
431
|
+
# @!attribute [rw] name
|
432
|
+
# @return [::String]
|
433
|
+
# Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKey CryptoKey} to update.
|
434
|
+
# @!attribute [rw] crypto_key_version_id
|
435
|
+
# @return [::String]
|
436
|
+
# Required. The id of the child {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use as primary.
|
437
|
+
class UpdateCryptoKeyPrimaryVersionRequest
|
438
|
+
include ::Google::Protobuf::MessageExts
|
439
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
440
|
+
end
|
441
|
+
|
442
|
+
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#destroy_crypto_key_version KeyManagementService.DestroyCryptoKeyVersion}.
|
443
|
+
# @!attribute [rw] name
|
444
|
+
# @return [::String]
|
445
|
+
# Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to destroy.
|
446
|
+
class DestroyCryptoKeyVersionRequest
|
447
|
+
include ::Google::Protobuf::MessageExts
|
448
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
449
|
+
end
|
450
|
+
|
451
|
+
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#restore_crypto_key_version KeyManagementService.RestoreCryptoKeyVersion}.
|
452
|
+
# @!attribute [rw] name
|
453
|
+
# @return [::String]
|
454
|
+
# Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to restore.
|
455
|
+
class RestoreCryptoKeyVersionRequest
|
456
|
+
include ::Google::Protobuf::MessageExts
|
457
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
458
|
+
end
|
459
|
+
|
411
460
|
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#encrypt KeyManagementService.Encrypt}.
|
412
461
|
# @!attribute [rw] name
|
413
462
|
# @return [::String]
|
@@ -452,8 +501,6 @@ module Google
|
|
452
501
|
# different languages. However, it is a non-negative integer, which will
|
453
502
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
454
503
|
# that support this type.
|
455
|
-
#
|
456
|
-
# NOTE: This field is in Beta.
|
457
504
|
# @!attribute [rw] additional_authenticated_data_crc32c
|
458
505
|
# @return [::Google::Protobuf::Int64Value]
|
459
506
|
# Optional. An optional CRC32C checksum of the
|
@@ -470,8 +517,6 @@ module Google
|
|
470
517
|
# different languages. However, it is a non-negative integer, which will
|
471
518
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
472
519
|
# that support this type.
|
473
|
-
#
|
474
|
-
# NOTE: This field is in Beta.
|
475
520
|
class EncryptRequest
|
476
521
|
include ::Google::Protobuf::MessageExts
|
477
522
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -505,8 +550,6 @@ module Google
|
|
505
550
|
# different languages. However, it is a non-negative integer, which will
|
506
551
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
507
552
|
# that support this type.
|
508
|
-
#
|
509
|
-
# NOTE: This field is in Beta.
|
510
553
|
# @!attribute [rw] additional_authenticated_data_crc32c
|
511
554
|
# @return [::Google::Protobuf::Int64Value]
|
512
555
|
# Optional. An optional CRC32C checksum of the
|
@@ -523,8 +566,6 @@ module Google
|
|
523
566
|
# different languages. However, it is a non-negative integer, which will
|
524
567
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
525
568
|
# that support this type.
|
526
|
-
#
|
527
|
-
# NOTE: This field is in Beta.
|
528
569
|
class DecryptRequest
|
529
570
|
include ::Google::Protobuf::MessageExts
|
530
571
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -554,8 +595,6 @@ module Google
|
|
554
595
|
# different languages. However, it is a non-negative integer, which will
|
555
596
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
556
597
|
# that support this type.
|
557
|
-
#
|
558
|
-
# NOTE: This field is in Beta.
|
559
598
|
class AsymmetricSignRequest
|
560
599
|
include ::Google::Protobuf::MessageExts
|
561
600
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -585,35 +624,99 @@ module Google
|
|
585
624
|
# different languages. However, it is a non-negative integer, which will
|
586
625
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
587
626
|
# that support this type.
|
588
|
-
#
|
589
|
-
# NOTE: This field is in Beta.
|
590
627
|
class AsymmetricDecryptRequest
|
591
628
|
include ::Google::Protobuf::MessageExts
|
592
629
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
593
630
|
end
|
594
631
|
|
595
|
-
#
|
596
|
-
# @!attribute [rw]
|
632
|
+
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#mac_sign KeyManagementService.MacSign}.
|
633
|
+
# @!attribute [rw] name
|
597
634
|
# @return [::String]
|
598
|
-
# The
|
599
|
-
# @!attribute [rw]
|
635
|
+
# Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for signing.
|
636
|
+
# @!attribute [rw] data
|
637
|
+
# @return [::String]
|
638
|
+
# Required. The data to sign. The MAC tag is computed over this data field based on
|
639
|
+
# the specific algorithm.
|
640
|
+
# @!attribute [rw] data_crc32c
|
600
641
|
# @return [::Google::Protobuf::Int64Value]
|
601
|
-
#
|
602
|
-
# {::Google::Cloud::Kms::V1::
|
603
|
-
# {::Google::Cloud::Kms::V1::
|
604
|
-
#
|
605
|
-
#
|
606
|
-
#
|
607
|
-
#
|
608
|
-
#
|
609
|
-
#
|
642
|
+
# Optional. An optional CRC32C checksum of the {::Google::Cloud::Kms::V1::MacSignRequest#data MacSignRequest.data}. If
|
643
|
+
# specified, {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will verify the integrity of the
|
644
|
+
# received {::Google::Cloud::Kms::V1::MacSignRequest#data MacSignRequest.data} using this checksum.
|
645
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will report an error if the checksum verification
|
646
|
+
# fails. If you receive a checksum error, your client should verify that
|
647
|
+
# CRC32C({::Google::Cloud::Kms::V1::MacSignRequest#data MacSignRequest.data}) is equal to
|
648
|
+
# {::Google::Cloud::Kms::V1::MacSignRequest#data_crc32c MacSignRequest.data_crc32c}, and if so, perform a limited
|
649
|
+
# number of retries. A persistent mismatch may indicate an issue in your
|
650
|
+
# computation of the CRC32C checksum.
|
610
651
|
# Note: This field is defined as int64 for reasons of compatibility across
|
611
652
|
# different languages. However, it is a non-negative integer, which will
|
612
653
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
613
654
|
# that support this type.
|
614
|
-
|
615
|
-
|
616
|
-
|
655
|
+
class MacSignRequest
|
656
|
+
include ::Google::Protobuf::MessageExts
|
657
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
658
|
+
end
|
659
|
+
|
660
|
+
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#mac_verify KeyManagementService.MacVerify}.
|
661
|
+
# @!attribute [rw] name
|
662
|
+
# @return [::String]
|
663
|
+
# Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for verification.
|
664
|
+
# @!attribute [rw] data
|
665
|
+
# @return [::String]
|
666
|
+
# Required. The data used previously as a {::Google::Cloud::Kms::V1::MacSignRequest#data MacSignRequest.data} to generate the MAC
|
667
|
+
# tag.
|
668
|
+
# @!attribute [rw] data_crc32c
|
669
|
+
# @return [::Google::Protobuf::Int64Value]
|
670
|
+
# Optional. An optional CRC32C checksum of the {::Google::Cloud::Kms::V1::MacVerifyRequest#data MacVerifyRequest.data}. If
|
671
|
+
# specified, {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will verify the integrity of the
|
672
|
+
# received {::Google::Cloud::Kms::V1::MacVerifyRequest#data MacVerifyRequest.data} using this checksum.
|
673
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will report an error if the checksum verification
|
674
|
+
# fails. If you receive a checksum error, your client should verify that
|
675
|
+
# CRC32C({::Google::Cloud::Kms::V1::MacVerifyRequest#data MacVerifyRequest.data}) is equal to
|
676
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#data_crc32c MacVerifyRequest.data_crc32c}, and if so, perform a limited
|
677
|
+
# number of retries. A persistent mismatch may indicate an issue in your
|
678
|
+
# computation of the CRC32C checksum.
|
679
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
680
|
+
# different languages. However, it is a non-negative integer, which will
|
681
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
682
|
+
# that support this type.
|
683
|
+
# @!attribute [rw] mac
|
684
|
+
# @return [::String]
|
685
|
+
# Required. The signature to verify.
|
686
|
+
# @!attribute [rw] mac_crc32c
|
687
|
+
# @return [::Google::Protobuf::Int64Value]
|
688
|
+
# Optional. An optional CRC32C checksum of the {::Google::Cloud::Kms::V1::MacVerifyRequest#mac MacVerifyRequest.mac}. If
|
689
|
+
# specified, {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will verify the integrity of the
|
690
|
+
# received {::Google::Cloud::Kms::V1::MacVerifyRequest#mac MacVerifyRequest.mac} using this checksum.
|
691
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will report an error if the checksum verification
|
692
|
+
# fails. If you receive a checksum error, your client should verify that
|
693
|
+
# CRC32C([MacVerifyRequest.tag][]) is equal to
|
694
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#mac_crc32c MacVerifyRequest.mac_crc32c}, and if so, perform a limited
|
695
|
+
# number of retries. A persistent mismatch may indicate an issue in your
|
696
|
+
# computation of the CRC32C checksum.
|
697
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
698
|
+
# different languages. However, it is a non-negative integer, which will
|
699
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
700
|
+
# that support this type.
|
701
|
+
class MacVerifyRequest
|
702
|
+
include ::Google::Protobuf::MessageExts
|
703
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
704
|
+
end
|
705
|
+
|
706
|
+
# Request message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#generate_random_bytes KeyManagementService.GenerateRandomBytes}.
|
707
|
+
# @!attribute [rw] location
|
708
|
+
# @return [::String]
|
709
|
+
# The project-specific location in which to generate random bytes.
|
710
|
+
# For example, "projects/my-project/locations/us-central1".
|
711
|
+
# @!attribute [rw] length_bytes
|
712
|
+
# @return [::Integer]
|
713
|
+
# The length in bytes of the amount of randomness to retrieve. Minimum 8
|
714
|
+
# bytes, maximum 1024 bytes.
|
715
|
+
# @!attribute [rw] protection_level
|
716
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
717
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} to use when generating the random data. Defaults to
|
718
|
+
# {::Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE}.
|
719
|
+
class GenerateRandomBytesRequest
|
617
720
|
include ::Google::Protobuf::MessageExts
|
618
721
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
619
722
|
end
|
@@ -639,8 +742,6 @@ module Google
|
|
639
742
|
# different languages. However, it is a non-negative integer, which will
|
640
743
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
641
744
|
# that support this type.
|
642
|
-
#
|
643
|
-
# NOTE: This field is in Beta.
|
644
745
|
# @!attribute [rw] verified_plaintext_crc32c
|
645
746
|
# @return [::Boolean]
|
646
747
|
# Integrity verification field. A flag indicating whether
|
@@ -651,8 +752,6 @@ module Google
|
|
651
752
|
# that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've set
|
652
753
|
# {::Google::Cloud::Kms::V1::EncryptRequest#plaintext_crc32c EncryptRequest.plaintext_crc32c} but this field is still false, discard
|
653
754
|
# the response and perform a limited number of retries.
|
654
|
-
#
|
655
|
-
# NOTE: This field is in Beta.
|
656
755
|
# @!attribute [rw] verified_additional_authenticated_data_crc32c
|
657
756
|
# @return [::Boolean]
|
658
757
|
# Integrity verification field. A flag indicating whether
|
@@ -664,13 +763,44 @@ module Google
|
|
664
763
|
# that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've set
|
665
764
|
# {::Google::Cloud::Kms::V1::EncryptRequest#additional_authenticated_data_crc32c EncryptRequest.additional_authenticated_data_crc32c} but this field is
|
666
765
|
# still false, discard the response and perform a limited number of retries.
|
667
|
-
#
|
668
|
-
#
|
766
|
+
# @!attribute [rw] protection_level
|
767
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
768
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used in encryption.
|
669
769
|
class EncryptResponse
|
670
770
|
include ::Google::Protobuf::MessageExts
|
671
771
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
672
772
|
end
|
673
773
|
|
774
|
+
# Response message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#decrypt KeyManagementService.Decrypt}.
|
775
|
+
# @!attribute [rw] plaintext
|
776
|
+
# @return [::String]
|
777
|
+
# The decrypted data originally supplied in {::Google::Cloud::Kms::V1::EncryptRequest#plaintext EncryptRequest.plaintext}.
|
778
|
+
# @!attribute [rw] plaintext_crc32c
|
779
|
+
# @return [::Google::Protobuf::Int64Value]
|
780
|
+
# Integrity verification field. A CRC32C checksum of the returned
|
781
|
+
# {::Google::Cloud::Kms::V1::DecryptResponse#plaintext DecryptResponse.plaintext}. An integrity check of
|
782
|
+
# {::Google::Cloud::Kms::V1::DecryptResponse#plaintext DecryptResponse.plaintext} can be performed by computing the CRC32C
|
783
|
+
# checksum of {::Google::Cloud::Kms::V1::DecryptResponse#plaintext DecryptResponse.plaintext} and comparing your results to
|
784
|
+
# this field. Discard the response in case of non-matching checksum values,
|
785
|
+
# and perform a limited number of retries. A persistent mismatch may indicate
|
786
|
+
# an issue in your computation of the CRC32C checksum. Note: receiving this
|
787
|
+
# response message indicates that {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} is able to
|
788
|
+
# successfully decrypt the {::Google::Cloud::Kms::V1::DecryptRequest#ciphertext ciphertext}.
|
789
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
790
|
+
# different languages. However, it is a non-negative integer, which will
|
791
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
792
|
+
# that support this type.
|
793
|
+
# @!attribute [rw] used_primary
|
794
|
+
# @return [::Boolean]
|
795
|
+
# Whether the Decryption was performed using the primary key version.
|
796
|
+
# @!attribute [rw] protection_level
|
797
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
798
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used in decryption.
|
799
|
+
class DecryptResponse
|
800
|
+
include ::Google::Protobuf::MessageExts
|
801
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
802
|
+
end
|
803
|
+
|
674
804
|
# Response message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#asymmetric_sign KeyManagementService.AsymmetricSign}.
|
675
805
|
# @!attribute [rw] signature
|
676
806
|
# @return [::String]
|
@@ -688,8 +818,6 @@ module Google
|
|
688
818
|
# different languages. However, it is a non-negative integer, which will
|
689
819
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
690
820
|
# that support this type.
|
691
|
-
#
|
692
|
-
# NOTE: This field is in Beta.
|
693
821
|
# @!attribute [rw] verified_digest_crc32c
|
694
822
|
# @return [::Boolean]
|
695
823
|
# Integrity verification field. A flag indicating whether
|
@@ -700,14 +828,13 @@ module Google
|
|
700
828
|
# unset or that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've
|
701
829
|
# set {::Google::Cloud::Kms::V1::AsymmetricSignRequest#digest_crc32c AsymmetricSignRequest.digest_crc32c} but this field is still false,
|
702
830
|
# discard the response and perform a limited number of retries.
|
703
|
-
#
|
704
|
-
# NOTE: This field is in Beta.
|
705
831
|
# @!attribute [rw] name
|
706
832
|
# @return [::String]
|
707
833
|
# The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for signing. Check
|
708
834
|
# this field to verify that the intended resource was used for signing.
|
709
|
-
#
|
710
|
-
#
|
835
|
+
# @!attribute [rw] protection_level
|
836
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
837
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for signing.
|
711
838
|
class AsymmetricSignResponse
|
712
839
|
include ::Google::Protobuf::MessageExts
|
713
840
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -730,8 +857,6 @@ module Google
|
|
730
857
|
# different languages. However, it is a non-negative integer, which will
|
731
858
|
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
732
859
|
# that support this type.
|
733
|
-
#
|
734
|
-
# NOTE: This field is in Beta.
|
735
860
|
# @!attribute [rw] verified_ciphertext_crc32c
|
736
861
|
# @return [::Boolean]
|
737
862
|
# Integrity verification field. A flag indicating whether
|
@@ -742,39 +867,115 @@ module Google
|
|
742
867
|
# was left unset or that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If
|
743
868
|
# you've set {::Google::Cloud::Kms::V1::AsymmetricDecryptRequest#ciphertext_crc32c AsymmetricDecryptRequest.ciphertext_crc32c} but this field is
|
744
869
|
# still false, discard the response and perform a limited number of retries.
|
745
|
-
#
|
746
|
-
#
|
870
|
+
# @!attribute [rw] protection_level
|
871
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
872
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used in decryption.
|
747
873
|
class AsymmetricDecryptResponse
|
748
874
|
include ::Google::Protobuf::MessageExts
|
749
875
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
750
876
|
end
|
751
877
|
|
752
|
-
#
|
878
|
+
# Response message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#mac_sign KeyManagementService.MacSign}.
|
753
879
|
# @!attribute [rw] name
|
754
880
|
# @return [::String]
|
755
|
-
#
|
756
|
-
#
|
881
|
+
# The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for signing. Check
|
882
|
+
# this field to verify that the intended resource was used for signing.
|
883
|
+
# @!attribute [rw] mac
|
757
884
|
# @return [::String]
|
758
|
-
#
|
759
|
-
|
885
|
+
# The created signature.
|
886
|
+
# @!attribute [rw] mac_crc32c
|
887
|
+
# @return [::Google::Protobuf::Int64Value]
|
888
|
+
# Integrity verification field. A CRC32C checksum of the returned
|
889
|
+
# {::Google::Cloud::Kms::V1::MacSignResponse#mac MacSignResponse.mac}. An integrity check of
|
890
|
+
# {::Google::Cloud::Kms::V1::MacSignResponse#mac MacSignResponse.mac} can be performed by computing the
|
891
|
+
# CRC32C checksum of {::Google::Cloud::Kms::V1::MacSignResponse#mac MacSignResponse.mac} and comparing your
|
892
|
+
# results to this field. Discard the response in case of non-matching
|
893
|
+
# checksum values, and perform a limited number of retries. A persistent
|
894
|
+
# mismatch may indicate an issue in your computation of the CRC32C checksum.
|
895
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
896
|
+
# different languages. However, it is a non-negative integer, which will
|
897
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
898
|
+
# that support this type.
|
899
|
+
# @!attribute [rw] verified_data_crc32c
|
900
|
+
# @return [::Boolean]
|
901
|
+
# Integrity verification field. A flag indicating whether
|
902
|
+
# {::Google::Cloud::Kms::V1::MacSignRequest#data_crc32c MacSignRequest.data_crc32c} was received by
|
903
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} and used for the integrity verification of the
|
904
|
+
# {::Google::Cloud::Kms::V1::MacSignRequest#data data}. A false value of this field
|
905
|
+
# indicates either that {::Google::Cloud::Kms::V1::MacSignRequest#data_crc32c MacSignRequest.data_crc32c} was left
|
906
|
+
# unset or that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've
|
907
|
+
# set {::Google::Cloud::Kms::V1::MacSignRequest#data_crc32c MacSignRequest.data_crc32c} but this field is still false,
|
908
|
+
# discard the response and perform a limited number of retries.
|
909
|
+
# @!attribute [rw] protection_level
|
910
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
911
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for signing.
|
912
|
+
class MacSignResponse
|
760
913
|
include ::Google::Protobuf::MessageExts
|
761
914
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
762
915
|
end
|
763
916
|
|
764
|
-
#
|
917
|
+
# Response message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#mac_verify KeyManagementService.MacVerify}.
|
765
918
|
# @!attribute [rw] name
|
766
919
|
# @return [::String]
|
767
|
-
#
|
768
|
-
|
920
|
+
# The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for verification.
|
921
|
+
# Check this field to verify that the intended resource was used for
|
922
|
+
# verification.
|
923
|
+
# @!attribute [rw] success
|
924
|
+
# @return [::Boolean]
|
925
|
+
# This field indicates whether or not the verification operation for
|
926
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#mac MacVerifyRequest.mac} over {::Google::Cloud::Kms::V1::MacVerifyRequest#data MacVerifyRequest.data} was successful.
|
927
|
+
# @!attribute [rw] verified_data_crc32c
|
928
|
+
# @return [::Boolean]
|
929
|
+
# Integrity verification field. A flag indicating whether
|
930
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#data_crc32c MacVerifyRequest.data_crc32c} was received by
|
931
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} and used for the integrity verification of the
|
932
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#data data}. A false value of this field
|
933
|
+
# indicates either that {::Google::Cloud::Kms::V1::MacVerifyRequest#data_crc32c MacVerifyRequest.data_crc32c} was left
|
934
|
+
# unset or that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've
|
935
|
+
# set {::Google::Cloud::Kms::V1::MacVerifyRequest#data_crc32c MacVerifyRequest.data_crc32c} but this field is still false,
|
936
|
+
# discard the response and perform a limited number of retries.
|
937
|
+
# @!attribute [rw] verified_mac_crc32c
|
938
|
+
# @return [::Boolean]
|
939
|
+
# Integrity verification field. A flag indicating whether
|
940
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#mac_crc32c MacVerifyRequest.mac_crc32c} was received by
|
941
|
+
# {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} and used for the integrity verification of the
|
942
|
+
# {::Google::Cloud::Kms::V1::MacVerifyRequest#mac data}. A false value of this field
|
943
|
+
# indicates either that {::Google::Cloud::Kms::V1::MacVerifyRequest#mac_crc32c MacVerifyRequest.mac_crc32c} was left
|
944
|
+
# unset or that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've
|
945
|
+
# set {::Google::Cloud::Kms::V1::MacVerifyRequest#mac_crc32c MacVerifyRequest.mac_crc32c} but this field is still false,
|
946
|
+
# discard the response and perform a limited number of retries.
|
947
|
+
# @!attribute [rw] verified_success_integrity
|
948
|
+
# @return [::Boolean]
|
949
|
+
# Integrity verification field. This value is used for the integrity
|
950
|
+
# verification of [MacVerifyResponse.success]. If the value of this field
|
951
|
+
# contradicts the value of [MacVerifyResponse.success], discard the response
|
952
|
+
# and perform a limited number of retries.
|
953
|
+
# @!attribute [rw] protection_level
|
954
|
+
# @return [::Google::Cloud::Kms::V1::ProtectionLevel]
|
955
|
+
# The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for verification.
|
956
|
+
class MacVerifyResponse
|
769
957
|
include ::Google::Protobuf::MessageExts
|
770
958
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
771
959
|
end
|
772
960
|
|
773
|
-
#
|
774
|
-
# @!attribute [rw]
|
961
|
+
# Response message for {::Google::Cloud::Kms::V1::KeyManagementService::Client#generate_random_bytes KeyManagementService.GenerateRandomBytes}.
|
962
|
+
# @!attribute [rw] data
|
775
963
|
# @return [::String]
|
776
|
-
#
|
777
|
-
|
964
|
+
# The generated data.
|
965
|
+
# @!attribute [rw] data_crc32c
|
966
|
+
# @return [::Google::Protobuf::Int64Value]
|
967
|
+
# Integrity verification field. A CRC32C checksum of the returned
|
968
|
+
# {::Google::Cloud::Kms::V1::GenerateRandomBytesResponse#data GenerateRandomBytesResponse.data}. An integrity check of
|
969
|
+
# {::Google::Cloud::Kms::V1::GenerateRandomBytesResponse#data GenerateRandomBytesResponse.data} can be performed by computing the
|
970
|
+
# CRC32C checksum of {::Google::Cloud::Kms::V1::GenerateRandomBytesResponse#data GenerateRandomBytesResponse.data} and comparing your
|
971
|
+
# results to this field. Discard the response in case of non-matching
|
972
|
+
# checksum values, and perform a limited number of retries. A persistent
|
973
|
+
# mismatch may indicate an issue in your computation of the CRC32C checksum.
|
974
|
+
# Note: This field is defined as int64 for reasons of compatibility across
|
975
|
+
# different languages. However, it is a non-negative integer, which will
|
976
|
+
# never exceed 2^32-1, and can be safely downconverted to uint32 in languages
|
977
|
+
# that support this type.
|
978
|
+
class GenerateRandomBytesResponse
|
778
979
|
include ::Google::Protobuf::MessageExts
|
779
980
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
780
981
|
end
|