google-cloud-kms-v1 0.9.0 → 0.10.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 47f6dbe5701a0f2ef54edc2e142cce149f5d815403fbfe0f2c42e10963af11a2
4
- data.tar.gz: 9bd08e4efa6249f48159966adae013ac20942aca4bc7736126886aab57774d4f
3
+ metadata.gz: 4d140ad290eb5976d855cad0e564e5d4405570766cd766780a5b900df9075dc1
4
+ data.tar.gz: bc76394810a5c73b64c1bfe97d6902a020d0adee3b6e2570b9c543403c007899
5
5
  SHA512:
6
- metadata.gz: f146abfb6396ef11701139273e190f30f83e4ee84723701c1c702ad0088a8c8b772c174b6bfd1e1d39d7db678f88d941a9ac4a9b638d1bcffaa3cad4416c291d
7
- data.tar.gz: abe844a7f1fcae5d5cc4e6844c128a16b20df67a66c2048bf645be0033fc74f8ea546a769a81bd1e51d315709ea037939e6a6722373465808015451319166a6e
6
+ metadata.gz: af65e32df12c6000955a2c9d0d4165740bf38d2330b5132250a6ee4e32aa7332541a10840f7676a03fcb8785f775a78e7ce8080993f5bf60a83bba3db8c9e8fa
7
+ data.tar.gz: dd306b0931ef6ab09180108da3719cfca722204ae427ba8151b81453261e67dfd9e0a9a948d38f8a930530b335ebba8e02b445e8af5e37e4ba9f69aaeeed5bdc
@@ -2029,7 +2029,7 @@ module Google
2029
2029
  # @param options [::Gapic::CallOptions, ::Hash]
2030
2030
  # Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
2031
2031
  #
2032
- # @overload asymmetric_sign(name: nil, digest: nil, digest_crc32c: nil)
2032
+ # @overload asymmetric_sign(name: nil, digest: nil, digest_crc32c: nil, data: nil, data_crc32c: nil)
2033
2033
  # Pass arguments to `asymmetric_sign` via keyword arguments. Note that at
2034
2034
  # least one keyword argument is required. To specify no parameters, or to keep all
2035
2035
  # the default parameter values, pass an empty Hash as a request object (see above).
@@ -2037,7 +2037,7 @@ module Google
2037
2037
  # @param name [::String]
2038
2038
  # Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for signing.
2039
2039
  # @param digest [::Google::Cloud::Kms::V1::Digest, ::Hash]
2040
- # Required. The digest of the data to sign. The digest must be produced with
2040
+ # Optional. The digest of the data to sign. The digest must be produced with
2041
2041
  # the same digest algorithm as specified by the key version's
2042
2042
  # {::Google::Cloud::Kms::V1::CryptoKeyVersion#algorithm algorithm}.
2043
2043
  # @param digest_crc32c [::Google::Protobuf::Int64Value, ::Hash]
@@ -2054,6 +2054,24 @@ module Google
2054
2054
  # different languages. However, it is a non-negative integer, which will
2055
2055
  # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
2056
2056
  # that support this type.
2057
+ # @param data [::String]
2058
+ # Optional. This field will only be honored for RAW_PKCS1 keys.
2059
+ # The data to sign. A digest is computed over the data that will be signed,
2060
+ # PKCS #1 padding is applied to the digest directly and then encrypted.
2061
+ # @param data_crc32c [::Google::Protobuf::Int64Value, ::Hash]
2062
+ # Optional. An optional CRC32C checksum of the {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data AsymmetricSignRequest.data}. If
2063
+ # specified, {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will verify the integrity of the
2064
+ # received {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data AsymmetricSignRequest.data} using this checksum.
2065
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will report an error if the checksum verification
2066
+ # fails. If you receive a checksum error, your client should verify that
2067
+ # CRC32C({::Google::Cloud::Kms::V1::AsymmetricSignRequest#data AsymmetricSignRequest.data}) is equal to
2068
+ # {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data_crc32c AsymmetricSignRequest.data_crc32c}, and if so, perform a limited
2069
+ # number of retries. A persistent mismatch may indicate an issue in your
2070
+ # computation of the CRC32C checksum.
2071
+ # Note: This field is defined as int64 for reasons of compatibility across
2072
+ # different languages. However, it is a non-negative integer, which will
2073
+ # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
2074
+ # that support this type.
2057
2075
  #
2058
2076
  # @yield [response, operation] Access the result along with the RPC operation
2059
2077
  # @yieldparam response [::Google::Cloud::Kms::V1::AsymmetricSignResponse]
@@ -76,6 +76,9 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
76
76
  value :RSA_SIGN_PKCS1_3072_SHA256, 6
77
77
  value :RSA_SIGN_PKCS1_4096_SHA256, 7
78
78
  value :RSA_SIGN_PKCS1_4096_SHA512, 16
79
+ value :RSA_SIGN_RAW_PKCS1_2048, 28
80
+ value :RSA_SIGN_RAW_PKCS1_3072, 29
81
+ value :RSA_SIGN_RAW_PKCS1_4096, 30
79
82
  value :RSA_DECRYPT_OAEP_2048_SHA256, 8
80
83
  value :RSA_DECRYPT_OAEP_3072_SHA256, 9
81
84
  value :RSA_DECRYPT_OAEP_4096_SHA256, 10
@@ -142,6 +142,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
142
142
  optional :name, :string, 1
143
143
  optional :digest, :message, 3, "google.cloud.kms.v1.Digest"
144
144
  optional :digest_crc32c, :message, 4, "google.protobuf.Int64Value"
145
+ optional :data, :bytes, 6
146
+ optional :data_crc32c, :message, 7, "google.protobuf.Int64Value"
145
147
  end
146
148
  add_message "google.cloud.kms.v1.AsymmetricDecryptRequest" do
147
149
  optional :name, :string, 1
@@ -184,6 +186,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
184
186
  optional :signature_crc32c, :message, 2, "google.protobuf.Int64Value"
185
187
  optional :verified_digest_crc32c, :bool, 3
186
188
  optional :name, :string, 4
189
+ optional :verified_data_crc32c, :bool, 5
187
190
  optional :protection_level, :enum, 6, "google.cloud.kms.v1.ProtectionLevel"
188
191
  end
189
192
  add_message "google.cloud.kms.v1.AsymmetricDecryptResponse" do
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module Kms
23
23
  module V1
24
- VERSION = "0.9.0"
24
+ VERSION = "0.10.0"
25
25
  end
26
26
  end
27
27
  end
@@ -346,6 +346,15 @@ module Google
346
346
  # RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
347
347
  RSA_SIGN_PKCS1_4096_SHA512 = 16
348
348
 
349
+ # RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key.
350
+ RSA_SIGN_RAW_PKCS1_2048 = 28
351
+
352
+ # RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key.
353
+ RSA_SIGN_RAW_PKCS1_3072 = 29
354
+
355
+ # RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key.
356
+ RSA_SIGN_RAW_PKCS1_4096 = 30
357
+
349
358
  # RSAES-OAEP 2048 bit key with a SHA256 digest.
350
359
  RSA_DECRYPT_OAEP_2048_SHA256 = 8
351
360
 
@@ -577,7 +577,7 @@ module Google
577
577
  # Required. The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} to use for signing.
578
578
  # @!attribute [rw] digest
579
579
  # @return [::Google::Cloud::Kms::V1::Digest]
580
- # Required. The digest of the data to sign. The digest must be produced with
580
+ # Optional. The digest of the data to sign. The digest must be produced with
581
581
  # the same digest algorithm as specified by the key version's
582
582
  # {::Google::Cloud::Kms::V1::CryptoKeyVersion#algorithm algorithm}.
583
583
  # @!attribute [rw] digest_crc32c
@@ -595,6 +595,26 @@ module Google
595
595
  # different languages. However, it is a non-negative integer, which will
596
596
  # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
597
597
  # that support this type.
598
+ # @!attribute [rw] data
599
+ # @return [::String]
600
+ # Optional. This field will only be honored for RAW_PKCS1 keys.
601
+ # The data to sign. A digest is computed over the data that will be signed,
602
+ # PKCS #1 padding is applied to the digest directly and then encrypted.
603
+ # @!attribute [rw] data_crc32c
604
+ # @return [::Google::Protobuf::Int64Value]
605
+ # Optional. An optional CRC32C checksum of the {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data AsymmetricSignRequest.data}. If
606
+ # specified, {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will verify the integrity of the
607
+ # received {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data AsymmetricSignRequest.data} using this checksum.
608
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} will report an error if the checksum verification
609
+ # fails. If you receive a checksum error, your client should verify that
610
+ # CRC32C({::Google::Cloud::Kms::V1::AsymmetricSignRequest#data AsymmetricSignRequest.data}) is equal to
611
+ # {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data_crc32c AsymmetricSignRequest.data_crc32c}, and if so, perform a limited
612
+ # number of retries. A persistent mismatch may indicate an issue in your
613
+ # computation of the CRC32C checksum.
614
+ # Note: This field is defined as int64 for reasons of compatibility across
615
+ # different languages. However, it is a non-negative integer, which will
616
+ # never exceed 2^32-1, and can be safely downconverted to uint32 in languages
617
+ # that support this type.
598
618
  class AsymmetricSignRequest
599
619
  include ::Google::Protobuf::MessageExts
600
620
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -832,6 +852,16 @@ module Google
832
852
  # @return [::String]
833
853
  # The resource name of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for signing. Check
834
854
  # this field to verify that the intended resource was used for signing.
855
+ # @!attribute [rw] verified_data_crc32c
856
+ # @return [::Boolean]
857
+ # Integrity verification field. A flag indicating whether
858
+ # {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data_crc32c AsymmetricSignRequest.data_crc32c} was received by
859
+ # {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService} and used for the integrity verification of the
860
+ # {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data data}. A false value of this field
861
+ # indicates either that {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data_crc32c AsymmetricSignRequest.data_crc32c} was left
862
+ # unset or that it was not delivered to {::Google::Cloud::Kms::V1::KeyManagementService::Client KeyManagementService}. If you've
863
+ # set {::Google::Cloud::Kms::V1::AsymmetricSignRequest#data_crc32c AsymmetricSignRequest.data_crc32c} but this field is still false,
864
+ # discard the response and perform a limited number of retries.
835
865
  # @!attribute [rw] protection_level
836
866
  # @return [::Google::Cloud::Kms::V1::ProtectionLevel]
837
867
  # The {::Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} of the {::Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} used for signing.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-kms-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.9.0
4
+ version: 0.10.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-18 00:00:00.000000000 Z
11
+ date: 2021-10-21 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common