google-cloud-kms 1.0.2 → 1.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/kms/v1/credentials.rb +2 -1
- data/lib/google/cloud/kms/v1/doc/google/cloud/kms/v1/resources.rb +258 -149
- data/lib/google/cloud/kms/v1/doc/google/cloud/kms/v1/service.rb +213 -157
- data/lib/google/cloud/kms/v1/helpers.rb +10 -0
- data/lib/google/cloud/kms/v1/key_management_service_client.rb +399 -143
- data/lib/google/cloud/kms/v1/key_management_service_client_config.json +20 -0
- data/lib/google/cloud/kms/v1/resources_pb.rb +38 -0
- data/lib/google/cloud/kms/v1/service_pb.rb +41 -2
- data/lib/google/cloud/kms/v1/service_services_pb.rb +49 -64
- data/lib/google/cloud/kms/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5db965ca05a2730295562c67ca7aabba12f0514f65334cf8af4365393c4f74b3
|
4
|
+
data.tar.gz: 00e160157392f2daa985ff3f04ede025c587804b0cb8e850f8e391e9dc01097a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 68862a97c1900e8f9d36248332539527ac69c3308bca22d2329b7105acdb5044569f22d4a9098ac9490e2270341b34223154856cf256b81051247c8b5233068c
|
7
|
+
data.tar.gz: 0c27f690f539ecbd3df14dc7c83d5ecc7be332dbef9ce99e47dd0e121e2265236d5219549e901cb7f83314cb0d770f6ffba3c0d565b0048ec41b3b5b70534e5a
|
@@ -21,7 +21,8 @@ module Google
|
|
21
21
|
module V1
|
22
22
|
class Credentials < Google::Auth::Credentials
|
23
23
|
SCOPE = [
|
24
|
-
"https://www.googleapis.com/auth/cloud-platform"
|
24
|
+
"https://www.googleapis.com/auth/cloud-platform",
|
25
|
+
"https://www.googleapis.com/auth/cloudkms"
|
25
26
|
].freeze
|
26
27
|
PATH_ENV_VARS = %w(KMS_CREDENTIALS
|
27
28
|
KMS_KEYFILE
|
@@ -17,153 +17,125 @@ module Google
|
|
17
17
|
module Cloud
|
18
18
|
module Kms
|
19
19
|
module V1
|
20
|
-
# A {Google::Cloud::Kms::V1::KeyRing KeyRing} is a toplevel logical grouping of
|
21
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys}.
|
20
|
+
# A {Google::Cloud::Kms::V1::KeyRing KeyRing} is a toplevel logical grouping of {Google::Cloud::Kms::V1::CryptoKey CryptoKeys}.
|
22
21
|
# @!attribute [rw] name
|
23
22
|
# @return [String]
|
24
|
-
# Output only. The resource name for the
|
25
|
-
# {Google::Cloud::Kms::V1::KeyRing KeyRing} in the format
|
23
|
+
# Output only. The resource name for the {Google::Cloud::Kms::V1::KeyRing KeyRing} in the format
|
26
24
|
# `projects/*/locations/*/keyRings/*`.
|
27
25
|
# @!attribute [rw] create_time
|
28
26
|
# @return [Google::Protobuf::Timestamp]
|
29
|
-
# Output only. The time at which this {Google::Cloud::Kms::V1::KeyRing KeyRing}
|
30
|
-
# was created.
|
27
|
+
# Output only. The time at which this {Google::Cloud::Kms::V1::KeyRing KeyRing} was created.
|
31
28
|
class KeyRing; end
|
32
29
|
|
33
|
-
# A {Google::Cloud::Kms::V1::CryptoKey CryptoKey} represents a logical key that
|
34
|
-
#
|
30
|
+
# A {Google::Cloud::Kms::V1::CryptoKey CryptoKey} represents a logical key that can be used for cryptographic
|
31
|
+
# operations.
|
35
32
|
#
|
36
|
-
# A {Google::Cloud::Kms::V1::CryptoKey CryptoKey} is made up of one or more
|
37
|
-
#
|
38
|
-
# key material used in cryptographic operations.
|
33
|
+
# A {Google::Cloud::Kms::V1::CryptoKey CryptoKey} is made up of one or more {Google::Cloud::Kms::V1::CryptoKeyVersion versions}, which
|
34
|
+
# represent the actual key material used in cryptographic operations.
|
39
35
|
# @!attribute [rw] name
|
40
36
|
# @return [String]
|
41
|
-
# Output only. The resource name for this
|
42
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKey} in the format
|
37
|
+
# Output only. The resource name for this {Google::Cloud::Kms::V1::CryptoKey CryptoKey} in the format
|
43
38
|
# `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
|
44
39
|
# @!attribute [rw] primary
|
45
40
|
# @return [Google::Cloud::Kms::V1::CryptoKeyVersion]
|
46
|
-
# Output only. A copy of the "primary"
|
47
|
-
# {Google::Cloud::Kms::V1::
|
48
|
-
#
|
49
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKey} is given in
|
50
|
-
# {Google::Cloud::Kms::V1::EncryptRequest#name EncryptRequest#name}.
|
41
|
+
# Output only. A copy of the "primary" {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} that will be used
|
42
|
+
# by {Google::Cloud::Kms::V1::KeyManagementService::Encrypt Encrypt} when this {Google::Cloud::Kms::V1::CryptoKey CryptoKey} is given
|
43
|
+
# in {Google::Cloud::Kms::V1::EncryptRequest#name EncryptRequest#name}.
|
51
44
|
#
|
52
|
-
# The {Google::Cloud::Kms::V1::CryptoKey CryptoKey}'s primary version can be
|
53
|
-
# updated via
|
45
|
+
# The {Google::Cloud::Kms::V1::CryptoKey CryptoKey}'s primary version can be updated via
|
54
46
|
# {Google::Cloud::Kms::V1::KeyManagementService::UpdateCryptoKeyPrimaryVersion UpdateCryptoKeyPrimaryVersion}.
|
55
47
|
#
|
56
48
|
# All keys with {Google::Cloud::Kms::V1::CryptoKey#purpose purpose}
|
57
|
-
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT}
|
58
|
-
#
|
49
|
+
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT} have a
|
50
|
+
# primary. For other keys, this field will be omitted.
|
59
51
|
# @!attribute [rw] purpose
|
60
52
|
# @return [Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose]
|
61
53
|
# The immutable purpose of this {Google::Cloud::Kms::V1::CryptoKey CryptoKey}.
|
62
54
|
# @!attribute [rw] create_time
|
63
55
|
# @return [Google::Protobuf::Timestamp]
|
64
|
-
# Output only. The time at which this
|
65
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKey} was created.
|
56
|
+
# Output only. The time at which this {Google::Cloud::Kms::V1::CryptoKey CryptoKey} was created.
|
66
57
|
# @!attribute [rw] next_rotation_time
|
67
58
|
# @return [Google::Protobuf::Timestamp]
|
68
|
-
# At {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time},
|
69
|
-
# the Key Management Service will automatically:
|
59
|
+
# At {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time}, the Key Management Service will automatically:
|
70
60
|
#
|
71
61
|
# 1. Create a new version of this {Google::Cloud::Kms::V1::CryptoKey CryptoKey}.
|
72
62
|
# 2. Mark the new version as primary.
|
73
63
|
#
|
74
64
|
# Key rotations performed manually via
|
75
|
-
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion}
|
76
|
-
# and
|
65
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion} and
|
77
66
|
# {Google::Cloud::Kms::V1::KeyManagementService::UpdateCryptoKeyPrimaryVersion UpdateCryptoKeyPrimaryVersion}
|
78
|
-
# do not affect
|
79
|
-
# {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time}.
|
67
|
+
# do not affect {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time}.
|
80
68
|
#
|
81
69
|
# Keys with {Google::Cloud::Kms::V1::CryptoKey#purpose purpose}
|
82
|
-
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT}
|
83
|
-
#
|
70
|
+
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT} support
|
71
|
+
# automatic rotation. For other keys, this field must be omitted.
|
84
72
|
# @!attribute [rw] rotation_period
|
85
73
|
# @return [Google::Protobuf::Duration]
|
86
|
-
# {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time}
|
87
|
-
#
|
88
|
-
# key. Must be at least one day.
|
74
|
+
# {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time} will be advanced by this period when the service
|
75
|
+
# automatically rotates a key. Must be at least one day.
|
89
76
|
#
|
90
|
-
# If {Google::Cloud::Kms::V1::CryptoKey#rotation_period rotation_period} is
|
91
|
-
# set,
|
92
|
-
# {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time}
|
93
|
-
# must also be set.
|
77
|
+
# If {Google::Cloud::Kms::V1::CryptoKey#rotation_period rotation_period} is set, {Google::Cloud::Kms::V1::CryptoKey#next_rotation_time next_rotation_time} must also be set.
|
94
78
|
#
|
95
79
|
# Keys with {Google::Cloud::Kms::V1::CryptoKey#purpose purpose}
|
96
|
-
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT}
|
97
|
-
#
|
80
|
+
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT} support
|
81
|
+
# automatic rotation. For other keys, this field must be omitted.
|
98
82
|
# @!attribute [rw] version_template
|
99
83
|
# @return [Google::Cloud::Kms::V1::CryptoKeyVersionTemplate]
|
100
|
-
# A template describing settings for new
|
101
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} instances
|
102
|
-
#
|
103
|
-
#
|
104
|
-
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion}
|
105
|
-
# or auto-rotation are controlled by this template.
|
84
|
+
# A template describing settings for new {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} instances.
|
85
|
+
# The properties of new {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} instances created by either
|
86
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion} or
|
87
|
+
# auto-rotation are controlled by this template.
|
106
88
|
# @!attribute [rw] labels
|
107
89
|
# @return [Hash{String => String}]
|
108
90
|
# Labels with user-defined metadata. For more information, see
|
109
91
|
# [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
|
110
92
|
class CryptoKey
|
111
|
-
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose CryptoKeyPurpose}
|
112
|
-
#
|
113
|
-
#
|
114
|
-
#
|
93
|
+
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose CryptoKeyPurpose} describes the cryptographic capabilities of a
|
94
|
+
# {Google::Cloud::Kms::V1::CryptoKey CryptoKey}. A given key can only be used for the operations allowed by
|
95
|
+
# its purpose. For more information, see
|
96
|
+
# [Key purposes](https://cloud.google.com/kms/docs/algorithms#key_purposes).
|
115
97
|
module CryptoKeyPurpose
|
116
98
|
# Not specified.
|
117
99
|
CRYPTO_KEY_PURPOSE_UNSPECIFIED = 0
|
118
100
|
|
119
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used
|
120
|
-
#
|
101
|
+
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used with
|
102
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::Encrypt Encrypt} and
|
121
103
|
# {Google::Cloud::Kms::V1::KeyManagementService::Decrypt Decrypt}.
|
122
104
|
ENCRYPT_DECRYPT = 1
|
123
105
|
|
124
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used
|
125
|
-
#
|
126
|
-
# {Google::Cloud::Kms::V1::KeyManagementService::AsymmetricSign AsymmetricSign}
|
127
|
-
# and
|
106
|
+
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used with
|
107
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::AsymmetricSign AsymmetricSign} and
|
128
108
|
# {Google::Cloud::Kms::V1::KeyManagementService::GetPublicKey GetPublicKey}.
|
129
109
|
ASYMMETRIC_SIGN = 5
|
130
110
|
|
131
|
-
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used
|
132
|
-
#
|
133
|
-
# {Google::Cloud::Kms::V1::KeyManagementService::AsymmetricDecrypt AsymmetricDecrypt}
|
134
|
-
# and
|
111
|
+
# {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} with this purpose may be used with
|
112
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::AsymmetricDecrypt AsymmetricDecrypt} and
|
135
113
|
# {Google::Cloud::Kms::V1::KeyManagementService::GetPublicKey GetPublicKey}.
|
136
114
|
ASYMMETRIC_DECRYPT = 6
|
137
115
|
end
|
138
116
|
end
|
139
117
|
|
140
|
-
# A {Google::Cloud::Kms::V1::CryptoKeyVersionTemplate CryptoKeyVersionTemplate}
|
141
|
-
#
|
142
|
-
# {Google::Cloud::Kms::V1::
|
143
|
-
#
|
144
|
-
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion}
|
145
|
-
# or automatically as a result of auto-rotation.
|
118
|
+
# A {Google::Cloud::Kms::V1::CryptoKeyVersionTemplate CryptoKeyVersionTemplate} specifies the properties to use when creating
|
119
|
+
# a new {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, either manually with
|
120
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion} or
|
121
|
+
# automatically as a result of auto-rotation.
|
146
122
|
# @!attribute [rw] protection_level
|
147
123
|
# @return [Google::Cloud::Kms::V1::ProtectionLevel]
|
148
|
-
# {Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} to use when creating
|
149
|
-
#
|
150
|
-
# template. Immutable. Defaults to
|
151
|
-
# {Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE}.
|
124
|
+
# {Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} to use when creating a {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} based on
|
125
|
+
# this template. Immutable. Defaults to {Google::Cloud::Kms::V1::ProtectionLevel::SOFTWARE SOFTWARE}.
|
152
126
|
# @!attribute [rw] algorithm
|
153
127
|
# @return [Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm]
|
154
|
-
# Required.
|
155
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion
|
156
|
-
# to use when creating a
|
157
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} based on this
|
158
|
-
# template.
|
128
|
+
# Required. {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm Algorithm} to use
|
129
|
+
# when creating a {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} based on this template.
|
159
130
|
#
|
160
131
|
# For backwards compatibility, GOOGLE_SYMMETRIC_ENCRYPTION is implied if both
|
161
|
-
# this field is omitted and
|
162
|
-
# {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose} is
|
132
|
+
# this field is omitted and {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose} is
|
163
133
|
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT}.
|
164
134
|
class CryptoKeyVersionTemplate; end
|
165
135
|
|
166
|
-
# Contains an HSM-generated attestation about a key operation.
|
136
|
+
# Contains an HSM-generated attestation about a key operation. For more
|
137
|
+
# information, see [Verifying attestations]
|
138
|
+
# (https://cloud.google.com/kms/docs/attest-key).
|
167
139
|
# @!attribute [rw] format
|
168
140
|
# @return [Google::Cloud::Kms::V1::KeyOperationAttestation::AttestationFormat]
|
169
141
|
# Output only. The format of the attestation data.
|
@@ -172,8 +144,9 @@ module Google
|
|
172
144
|
# Output only. The attestation data provided by the HSM when the key
|
173
145
|
# operation was performed.
|
174
146
|
class KeyOperationAttestation
|
175
|
-
#
|
147
|
+
# Attestation formats provided by the HSM.
|
176
148
|
module AttestationFormat
|
149
|
+
# Not specified.
|
177
150
|
ATTESTATION_FORMAT_UNSPECIFIED = 0
|
178
151
|
|
179
152
|
# Cavium HSM attestation compressed with gzip. Note that this format is
|
@@ -181,84 +154,83 @@ module Google
|
|
181
154
|
CAVIUM_V1_COMPRESSED = 3
|
182
155
|
|
183
156
|
# Cavium HSM attestation V2 compressed with gzip. This is a new format
|
184
|
-
#
|
157
|
+
# introduced in Cavium's version 3.2-08.
|
185
158
|
CAVIUM_V2_COMPRESSED = 4
|
186
159
|
end
|
187
160
|
end
|
188
161
|
|
189
|
-
# A {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} represents an
|
190
|
-
#
|
162
|
+
# A {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} represents an individual cryptographic key, and the
|
163
|
+
# associated key material.
|
191
164
|
#
|
192
|
-
# An
|
193
|
-
#
|
194
|
-
# version can be used for cryptographic operations.
|
165
|
+
# An {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED} version can be
|
166
|
+
# used for cryptographic operations.
|
195
167
|
#
|
196
168
|
# For security reasons, the raw cryptographic key material represented by a
|
197
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} can never be viewed
|
198
|
-
#
|
199
|
-
#
|
169
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} can never be viewed or exported. It can only be used to
|
170
|
+
# encrypt, decrypt, or sign data when an authorized user or application invokes
|
171
|
+
# Cloud KMS.
|
200
172
|
# @!attribute [rw] name
|
201
173
|
# @return [String]
|
202
|
-
# Output only. The resource name for this
|
203
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} in the format
|
174
|
+
# Output only. The resource name for this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} in the format
|
204
175
|
# `projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*`.
|
205
176
|
# @!attribute [rw] state
|
206
177
|
# @return [Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState]
|
207
|
-
# The current state of the
|
208
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}.
|
178
|
+
# The current state of the {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}.
|
209
179
|
# @!attribute [rw] protection_level
|
210
180
|
# @return [Google::Cloud::Kms::V1::ProtectionLevel]
|
211
|
-
# Output only. The {Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel}
|
212
|
-
#
|
213
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}.
|
181
|
+
# Output only. The {Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} describing how crypto operations are
|
182
|
+
# performed with this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}.
|
214
183
|
# @!attribute [rw] algorithm
|
215
184
|
# @return [Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm]
|
216
|
-
# Output only. The
|
217
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion
|
218
|
-
# that this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}
|
219
|
-
# supports.
|
185
|
+
# Output only. The {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm CryptoKeyVersionAlgorithm} that this
|
186
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} supports.
|
220
187
|
# @!attribute [rw] attestation
|
221
188
|
# @return [Google::Cloud::Kms::V1::KeyOperationAttestation]
|
222
189
|
# Output only. Statement that was generated and signed by the HSM at key
|
223
190
|
# creation time. Use this statement to verify attributes of the key as stored
|
224
191
|
# on the HSM, independently of Google. Only provided for key versions with
|
225
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion#protection_level protection_level}
|
226
|
-
# {Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM}.
|
192
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion#protection_level protection_level} {Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM}.
|
227
193
|
# @!attribute [rw] create_time
|
228
194
|
# @return [Google::Protobuf::Timestamp]
|
229
|
-
# Output only. The time at which this
|
230
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} was created.
|
195
|
+
# Output only. The time at which this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} was created.
|
231
196
|
# @!attribute [rw] generate_time
|
232
197
|
# @return [Google::Protobuf::Timestamp]
|
233
|
-
# Output only. The time this
|
234
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}'s key material was
|
198
|
+
# Output only. The time this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}'s key material was
|
235
199
|
# generated.
|
236
200
|
# @!attribute [rw] destroy_time
|
237
201
|
# @return [Google::Protobuf::Timestamp]
|
238
|
-
# Output only. The time this
|
239
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion
|
240
|
-
# scheduled for destruction. Only present if
|
241
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion#state state} is
|
202
|
+
# Output only. The time this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}'s key material is scheduled
|
203
|
+
# for destruction. Only present if {Google::Cloud::Kms::V1::CryptoKeyVersion#state state} is
|
242
204
|
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DESTROY_SCHEDULED DESTROY_SCHEDULED}.
|
243
205
|
# @!attribute [rw] destroy_event_time
|
244
206
|
# @return [Google::Protobuf::Timestamp]
|
245
207
|
# Output only. The time this CryptoKeyVersion's key material was
|
246
|
-
# destroyed. Only present if
|
247
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion#state state} is
|
208
|
+
# destroyed. Only present if {Google::Cloud::Kms::V1::CryptoKeyVersion#state state} is
|
248
209
|
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DESTROYED DESTROYED}.
|
210
|
+
# @!attribute [rw] import_job
|
211
|
+
# @return [String]
|
212
|
+
# Output only. The name of the {Google::Cloud::Kms::V1::ImportJob ImportJob} used to import this
|
213
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}. Only present if the underlying key material was
|
214
|
+
# imported.
|
215
|
+
# @!attribute [rw] import_time
|
216
|
+
# @return [Google::Protobuf::Timestamp]
|
217
|
+
# Output only. The time at which this {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}'s key material
|
218
|
+
# was imported.
|
219
|
+
# @!attribute [rw] import_failure_reason
|
220
|
+
# @return [String]
|
221
|
+
# Output only. The root cause of an import failure. Only present if
|
222
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion#state state} is
|
223
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::IMPORT_FAILED IMPORT_FAILED}.
|
249
224
|
class CryptoKeyVersion
|
250
|
-
# The algorithm of the
|
251
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, indicating what
|
225
|
+
# The algorithm of the {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, indicating what
|
252
226
|
# parameters must be used for each cryptographic operation.
|
253
227
|
#
|
254
228
|
# The
|
255
229
|
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm::GOOGLE_SYMMETRIC_ENCRYPTION GOOGLE_SYMMETRIC_ENCRYPTION}
|
256
|
-
# algorithm is usable with
|
257
|
-
# {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose}
|
230
|
+
# algorithm is usable with {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose}
|
258
231
|
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ENCRYPT_DECRYPT ENCRYPT_DECRYPT}.
|
259
232
|
#
|
260
|
-
# Algorithms beginning with "RSA_SIGN_" are usable with
|
261
|
-
# {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose}
|
233
|
+
# Algorithms beginning with "RSA_SIGN_" are usable with {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose}
|
262
234
|
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ASYMMETRIC_SIGN ASYMMETRIC_SIGN}.
|
263
235
|
#
|
264
236
|
# The fields in the name after "RSA_SIGN_" correspond to the following
|
@@ -276,12 +248,14 @@ module Google
|
|
276
248
|
# The fields in the name after "RSA_DECRYPT_" correspond to the following
|
277
249
|
# parameters: padding algorithm, modulus bit length, and digest algorithm.
|
278
250
|
#
|
279
|
-
# Algorithms beginning with "EC_SIGN_" are usable with
|
280
|
-
# {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose}
|
251
|
+
# Algorithms beginning with "EC_SIGN_" are usable with {Google::Cloud::Kms::V1::CryptoKey#purpose CryptoKey#purpose}
|
281
252
|
# {Google::Cloud::Kms::V1::CryptoKey::CryptoKeyPurpose::ASYMMETRIC_SIGN ASYMMETRIC_SIGN}.
|
282
253
|
#
|
283
254
|
# The fields in the name after "EC_SIGN_" correspond to the following
|
284
255
|
# parameters: elliptic curve, digest algorithm.
|
256
|
+
#
|
257
|
+
# For more information, see [Key purposes and algorithms]
|
258
|
+
# (https://cloud.google.com/kms/docs/algorithms).
|
285
259
|
module CryptoKeyVersionAlgorithm
|
286
260
|
# Not specified.
|
287
261
|
CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED = 0
|
@@ -298,6 +272,9 @@ module Google
|
|
298
272
|
# RSASSA-PSS 4096 bit key with a SHA256 digest.
|
299
273
|
RSA_SIGN_PSS_4096_SHA256 = 4
|
300
274
|
|
275
|
+
# RSASSA-PSS 4096 bit key with a SHA512 digest.
|
276
|
+
RSA_SIGN_PSS_4096_SHA512 = 15
|
277
|
+
|
301
278
|
# RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
|
302
279
|
RSA_SIGN_PKCS1_2048_SHA256 = 5
|
303
280
|
|
@@ -307,6 +284,9 @@ module Google
|
|
307
284
|
# RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
|
308
285
|
RSA_SIGN_PKCS1_4096_SHA256 = 7
|
309
286
|
|
287
|
+
# RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
|
288
|
+
RSA_SIGN_PKCS1_4096_SHA512 = 16
|
289
|
+
|
310
290
|
# RSAES-OAEP 2048 bit key with a SHA256 digest.
|
311
291
|
RSA_DECRYPT_OAEP_2048_SHA256 = 8
|
312
292
|
|
@@ -316,6 +296,9 @@ module Google
|
|
316
296
|
# RSAES-OAEP 4096 bit key with a SHA256 digest.
|
317
297
|
RSA_DECRYPT_OAEP_4096_SHA256 = 10
|
318
298
|
|
299
|
+
# RSAES-OAEP 4096 bit key with a SHA512 digest.
|
300
|
+
RSA_DECRYPT_OAEP_4096_SHA512 = 17
|
301
|
+
|
319
302
|
# ECDSA on the NIST P-256 curve with a SHA256 digest.
|
320
303
|
EC_SIGN_P256_SHA256 = 12
|
321
304
|
|
@@ -323,26 +306,21 @@ module Google
|
|
323
306
|
EC_SIGN_P384_SHA384 = 13
|
324
307
|
end
|
325
308
|
|
326
|
-
# The state of a {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion},
|
327
|
-
# indicating if it can be used.
|
309
|
+
# The state of a {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, indicating if it can be used.
|
328
310
|
module CryptoKeyVersionState
|
329
311
|
# Not specified.
|
330
312
|
CRYPTO_KEY_VERSION_STATE_UNSPECIFIED = 0
|
331
313
|
|
332
314
|
# This version is still being generated. It may not be used, enabled,
|
333
315
|
# disabled, or destroyed yet. Cloud KMS will automatically mark this
|
334
|
-
# version
|
335
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED}
|
336
|
-
# as soon as the version is ready.
|
316
|
+
# version {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED} as soon as the version is ready.
|
337
317
|
PENDING_GENERATION = 5
|
338
318
|
|
339
319
|
# This version may be used for cryptographic operations.
|
340
320
|
ENABLED = 1
|
341
321
|
|
342
322
|
# This version may not be used, but the key material is still available,
|
343
|
-
# and the version can be placed back into the
|
344
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED}
|
345
|
-
# state.
|
323
|
+
# and the version can be placed back into the {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED} state.
|
346
324
|
DISABLED = 2
|
347
325
|
|
348
326
|
# This version is destroyed, and the key material is no longer stored.
|
@@ -352,34 +330,37 @@ module Google
|
|
352
330
|
# This version is scheduled for destruction, and will be destroyed soon.
|
353
331
|
# Call
|
354
332
|
# {Google::Cloud::Kms::V1::KeyManagementService::RestoreCryptoKeyVersion RestoreCryptoKeyVersion}
|
355
|
-
# to put it back into the
|
356
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DISABLED DISABLED}
|
357
|
-
# state.
|
333
|
+
# to put it back into the {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::DISABLED DISABLED} state.
|
358
334
|
DESTROY_SCHEDULED = 4
|
335
|
+
|
336
|
+
# This version is still being imported. It may not be used, enabled,
|
337
|
+
# disabled, or destroyed yet. Cloud KMS will automatically mark this
|
338
|
+
# version {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionState::ENABLED ENABLED} as soon as the version is ready.
|
339
|
+
PENDING_IMPORT = 6
|
340
|
+
|
341
|
+
# This version was not imported successfully. It may not be used, enabled,
|
342
|
+
# disabled, or destroyed. The submitted key material has been discarded.
|
343
|
+
# Additional details can be found in
|
344
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion#import_failure_reason CryptoKeyVersion#import_failure_reason}.
|
345
|
+
IMPORT_FAILED = 7
|
359
346
|
end
|
360
347
|
|
361
|
-
# A view for {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}s.
|
362
|
-
#
|
363
|
-
# {Google::Cloud::Kms::V1::
|
364
|
-
# {Google::Cloud::Kms::V1::KeyManagementService::ListCryptoKeyVersions KeyManagementService::ListCryptoKeyVersions}
|
365
|
-
# and
|
348
|
+
# A view for {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}s. Controls the level of detail returned
|
349
|
+
# for {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersions} in
|
350
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::ListCryptoKeyVersions KeyManagementService::ListCryptoKeyVersions} and
|
366
351
|
# {Google::Cloud::Kms::V1::KeyManagementService::ListCryptoKeys KeyManagementService::ListCryptoKeys}.
|
367
352
|
module CryptoKeyVersionView
|
368
|
-
# Default view for each
|
369
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion
|
370
|
-
# include the
|
371
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion#attestation attestation} field.
|
353
|
+
# Default view for each {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}. Does not include
|
354
|
+
# the {Google::Cloud::Kms::V1::CryptoKeyVersion#attestation attestation} field.
|
372
355
|
CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED = 0
|
373
356
|
|
374
|
-
# Provides all fields in each
|
375
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, including the
|
357
|
+
# Provides all fields in each {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}, including the
|
376
358
|
# {Google::Cloud::Kms::V1::CryptoKeyVersion#attestation attestation}.
|
377
359
|
FULL = 1
|
378
360
|
end
|
379
361
|
end
|
380
362
|
|
381
|
-
# The public key for a given
|
382
|
-
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}. Obtained via
|
363
|
+
# The public key for a given {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion}. Obtained via
|
383
364
|
# {Google::Cloud::Kms::V1::KeyManagementService::GetPublicKey GetPublicKey}.
|
384
365
|
# @!attribute [rw] pem
|
385
366
|
# @return [String]
|
@@ -390,13 +371,141 @@ module Google
|
|
390
371
|
# (https://tools.ietf.org/html/rfc7468#section-13).
|
391
372
|
# @!attribute [rw] algorithm
|
392
373
|
# @return [Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm]
|
393
|
-
# The
|
394
|
-
#
|
395
|
-
# associated with this key.
|
374
|
+
# The {Google::Cloud::Kms::V1::CryptoKeyVersion::CryptoKeyVersionAlgorithm Algorithm} associated
|
375
|
+
# with this key.
|
396
376
|
class PublicKey; end
|
397
377
|
|
398
|
-
# {Google::Cloud::Kms::V1::
|
399
|
-
#
|
378
|
+
# An {Google::Cloud::Kms::V1::ImportJob ImportJob} can be used to create {Google::Cloud::Kms::V1::CryptoKey CryptoKeys} and
|
379
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersions} using pre-existing key material,
|
380
|
+
# generated outside of Cloud KMS.
|
381
|
+
#
|
382
|
+
# When an {Google::Cloud::Kms::V1::ImportJob ImportJob} is created, Cloud KMS will generate a "wrapping key",
|
383
|
+
# which is a public/private key pair. You use the wrapping key to encrypt (also
|
384
|
+
# known as wrap) the pre-existing key material to protect it during the import
|
385
|
+
# process. The nature of the wrapping key depends on the choice of
|
386
|
+
# {Google::Cloud::Kms::V1::ImportJob#import_method import_method}. When the wrapping key generation
|
387
|
+
# is complete, the {Google::Cloud::Kms::V1::ImportJob#state state} will be set to
|
388
|
+
# {Google::Cloud::Kms::V1::ImportJob::ImportJobState::ACTIVE ACTIVE} and the {Google::Cloud::Kms::V1::ImportJob#public_key public_key}
|
389
|
+
# can be fetched. The fetched public key can then be used to wrap your
|
390
|
+
# pre-existing key material.
|
391
|
+
#
|
392
|
+
# Once the key material is wrapped, it can be imported into a new
|
393
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersion} in an existing {Google::Cloud::Kms::V1::CryptoKey CryptoKey} by calling
|
394
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::ImportCryptoKeyVersion ImportCryptoKeyVersion}.
|
395
|
+
# Multiple {Google::Cloud::Kms::V1::CryptoKeyVersion CryptoKeyVersions} can be imported with a single
|
396
|
+
# {Google::Cloud::Kms::V1::ImportJob ImportJob}. Cloud KMS uses the private key portion of the wrapping key to
|
397
|
+
# unwrap the key material. Only Cloud KMS has access to the private key.
|
398
|
+
#
|
399
|
+
# An {Google::Cloud::Kms::V1::ImportJob ImportJob} expires 3 days after it is created. Once expired, Cloud KMS
|
400
|
+
# will no longer be able to import or unwrap any key material that was wrapped
|
401
|
+
# with the {Google::Cloud::Kms::V1::ImportJob ImportJob}'s public key.
|
402
|
+
#
|
403
|
+
# For more information, see
|
404
|
+
# [Importing a key](https://cloud.google.com/kms/docs/importing-a-key).
|
405
|
+
# @!attribute [rw] name
|
406
|
+
# @return [String]
|
407
|
+
# Output only. The resource name for this {Google::Cloud::Kms::V1::ImportJob ImportJob} in the format
|
408
|
+
# `projects/*/locations/*/keyRings/*/importJobs/*`.
|
409
|
+
# @!attribute [rw] import_method
|
410
|
+
# @return [Google::Cloud::Kms::V1::ImportJob::ImportMethod]
|
411
|
+
# Required and immutable. The wrapping method to be used for incoming
|
412
|
+
# key material.
|
413
|
+
# @!attribute [rw] protection_level
|
414
|
+
# @return [Google::Cloud::Kms::V1::ProtectionLevel]
|
415
|
+
# Required and immutable. The protection level of the {Google::Cloud::Kms::V1::ImportJob ImportJob}. This
|
416
|
+
# must match the
|
417
|
+
# {Google::Cloud::Kms::V1::CryptoKeyVersionTemplate#protection_level protection_level} of the
|
418
|
+
# {Google::Cloud::Kms::V1::CryptoKey#version_template version_template} on the {Google::Cloud::Kms::V1::CryptoKey CryptoKey} you
|
419
|
+
# attempt to import into.
|
420
|
+
# @!attribute [rw] create_time
|
421
|
+
# @return [Google::Protobuf::Timestamp]
|
422
|
+
# Output only. The time at which this {Google::Cloud::Kms::V1::ImportJob ImportJob} was created.
|
423
|
+
# @!attribute [rw] generate_time
|
424
|
+
# @return [Google::Protobuf::Timestamp]
|
425
|
+
# Output only. The time this {Google::Cloud::Kms::V1::ImportJob ImportJob}'s key material was generated.
|
426
|
+
# @!attribute [rw] expire_time
|
427
|
+
# @return [Google::Protobuf::Timestamp]
|
428
|
+
# Output only. The time at which this {Google::Cloud::Kms::V1::ImportJob ImportJob} is scheduled for
|
429
|
+
# expiration and can no longer be used to import key material.
|
430
|
+
# @!attribute [rw] expire_event_time
|
431
|
+
# @return [Google::Protobuf::Timestamp]
|
432
|
+
# Output only. The time this {Google::Cloud::Kms::V1::ImportJob ImportJob} expired. Only present if
|
433
|
+
# {Google::Cloud::Kms::V1::ImportJob#state state} is {Google::Cloud::Kms::V1::ImportJob::ImportJobState::EXPIRED EXPIRED}.
|
434
|
+
# @!attribute [rw] state
|
435
|
+
# @return [Google::Cloud::Kms::V1::ImportJob::ImportJobState]
|
436
|
+
# Output only. The current state of the {Google::Cloud::Kms::V1::ImportJob ImportJob}, indicating if it can
|
437
|
+
# be used.
|
438
|
+
# @!attribute [rw] public_key
|
439
|
+
# @return [Google::Cloud::Kms::V1::ImportJob::WrappingPublicKey]
|
440
|
+
# Output only. The public key with which to wrap key material prior to
|
441
|
+
# import. Only returned if {Google::Cloud::Kms::V1::ImportJob#state state} is
|
442
|
+
# {Google::Cloud::Kms::V1::ImportJob::ImportJobState::ACTIVE ACTIVE}.
|
443
|
+
# @!attribute [rw] attestation
|
444
|
+
# @return [Google::Cloud::Kms::V1::KeyOperationAttestation]
|
445
|
+
# Output only. Statement that was generated and signed by the key creator
|
446
|
+
# (for example, an HSM) at key creation time. Use this statement to verify
|
447
|
+
# attributes of the key as stored on the HSM, independently of Google.
|
448
|
+
# Only present if the chosen {Google::Cloud::Kms::V1::ImportJob::ImportMethod ImportMethod} is one with a protection
|
449
|
+
# level of {Google::Cloud::Kms::V1::ProtectionLevel::HSM HSM}.
|
450
|
+
class ImportJob
|
451
|
+
# The public key component of the wrapping key. For details of the type of
|
452
|
+
# key this public key corresponds to, see the {Google::Cloud::Kms::V1::ImportJob::ImportMethod ImportMethod}.
|
453
|
+
# @!attribute [rw] pem
|
454
|
+
# @return [String]
|
455
|
+
# The public key, encoded in PEM format. For more information, see the [RFC
|
456
|
+
# 7468](https://tools.ietf.org/html/rfc7468) sections for [General
|
457
|
+
# Considerations](https://tools.ietf.org/html/rfc7468#section-2) and
|
458
|
+
# [Textual Encoding of Subject Public Key Info]
|
459
|
+
# (https://tools.ietf.org/html/rfc7468#section-13).
|
460
|
+
class WrappingPublicKey; end
|
461
|
+
|
462
|
+
# The state of the {Google::Cloud::Kms::V1::ImportJob ImportJob}, indicating if it can be used.
|
463
|
+
module ImportJobState
|
464
|
+
# Not specified.
|
465
|
+
IMPORT_JOB_STATE_UNSPECIFIED = 0
|
466
|
+
|
467
|
+
# The wrapping key for this job is still being generated. It may not be
|
468
|
+
# used. Cloud KMS will automatically mark this job as
|
469
|
+
# {Google::Cloud::Kms::V1::ImportJob::ImportJobState::ACTIVE ACTIVE} as soon as the wrapping key is generated.
|
470
|
+
PENDING_GENERATION = 1
|
471
|
+
|
472
|
+
# This job may be used in
|
473
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKey CreateCryptoKey} and
|
474
|
+
# {Google::Cloud::Kms::V1::KeyManagementService::CreateCryptoKeyVersion CreateCryptoKeyVersion}
|
475
|
+
# requests.
|
476
|
+
ACTIVE = 2
|
477
|
+
|
478
|
+
# This job can no longer be used and may not leave this state once entered.
|
479
|
+
EXPIRED = 3
|
480
|
+
end
|
481
|
+
|
482
|
+
# {Google::Cloud::Kms::V1::ImportJob::ImportMethod ImportMethod} describes the key wrapping method chosen for this
|
483
|
+
# {Google::Cloud::Kms::V1::ImportJob ImportJob}.
|
484
|
+
module ImportMethod
|
485
|
+
# Not specified.
|
486
|
+
IMPORT_METHOD_UNSPECIFIED = 0
|
487
|
+
|
488
|
+
# This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping
|
489
|
+
# scheme defined in the PKCS #11 standard. In summary, this involves
|
490
|
+
# wrapping the raw key with an ephemeral AES key, and wrapping the
|
491
|
+
# ephemeral AES key with a 3072 bit RSA key. For more details, see
|
492
|
+
# [RSA AES key wrap
|
493
|
+
# mechanism](http://docs.oasis-open.org/pkcs11/pkcs11-curr/v2.40/cos01/pkcs11-curr-v2.40-cos01.html#_Toc408226908).
|
494
|
+
RSA_OAEP_3072_SHA1_AES_256 = 1
|
495
|
+
|
496
|
+
# This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping
|
497
|
+
# scheme defined in the PKCS #11 standard. In summary, this involves
|
498
|
+
# wrapping the raw key with an ephemeral AES key, and wrapping the
|
499
|
+
# ephemeral AES key with a 4096 bit RSA key. For more details, see
|
500
|
+
# [RSA AES key wrap
|
501
|
+
# mechanism](http://docs.oasis-open.org/pkcs11/pkcs11-curr/v2.40/cos01/pkcs11-curr-v2.40-cos01.html#_Toc408226908).
|
502
|
+
RSA_OAEP_4096_SHA1_AES_256 = 2
|
503
|
+
end
|
504
|
+
end
|
505
|
+
|
506
|
+
# {Google::Cloud::Kms::V1::ProtectionLevel ProtectionLevel} specifies how cryptographic operations are performed.
|
507
|
+
# For more information, see [Protection levels]
|
508
|
+
# (https://cloud.google.com/kms/docs/algorithms#protection_levels).
|
400
509
|
module ProtectionLevel
|
401
510
|
# Not specified.
|
402
511
|
PROTECTION_LEVEL_UNSPECIFIED = 0
|