google-cloud-kms 1.0.2 → 1.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/kms/v1/credentials.rb +2 -1
- data/lib/google/cloud/kms/v1/doc/google/cloud/kms/v1/resources.rb +258 -149
- data/lib/google/cloud/kms/v1/doc/google/cloud/kms/v1/service.rb +213 -157
- data/lib/google/cloud/kms/v1/helpers.rb +10 -0
- data/lib/google/cloud/kms/v1/key_management_service_client.rb +399 -143
- data/lib/google/cloud/kms/v1/key_management_service_client_config.json +20 -0
- data/lib/google/cloud/kms/v1/resources_pb.rb +38 -0
- data/lib/google/cloud/kms/v1/service_pb.rb +41 -2
- data/lib/google/cloud/kms/v1/service_services_pb.rb +49 -64
- data/lib/google/cloud/kms/version.rb +1 -1
- metadata +2 -2
@@ -25,6 +25,11 @@
|
|
25
25
|
"retry_codes_name": "idempotent",
|
26
26
|
"retry_params_name": "default"
|
27
27
|
},
|
28
|
+
"ListImportJobs": {
|
29
|
+
"timeout_millis": 60000,
|
30
|
+
"retry_codes_name": "idempotent",
|
31
|
+
"retry_params_name": "default"
|
32
|
+
},
|
28
33
|
"ListCryptoKeys": {
|
29
34
|
"timeout_millis": 60000,
|
30
35
|
"retry_codes_name": "idempotent",
|
@@ -40,6 +45,11 @@
|
|
40
45
|
"retry_codes_name": "idempotent",
|
41
46
|
"retry_params_name": "default"
|
42
47
|
},
|
48
|
+
"GetImportJob": {
|
49
|
+
"timeout_millis": 60000,
|
50
|
+
"retry_codes_name": "idempotent",
|
51
|
+
"retry_params_name": "default"
|
52
|
+
},
|
43
53
|
"GetCryptoKey": {
|
44
54
|
"timeout_millis": 60000,
|
45
55
|
"retry_codes_name": "idempotent",
|
@@ -55,6 +65,11 @@
|
|
55
65
|
"retry_codes_name": "non_idempotent",
|
56
66
|
"retry_params_name": "default"
|
57
67
|
},
|
68
|
+
"CreateImportJob": {
|
69
|
+
"timeout_millis": 60000,
|
70
|
+
"retry_codes_name": "non_idempotent",
|
71
|
+
"retry_params_name": "default"
|
72
|
+
},
|
58
73
|
"CreateCryptoKey": {
|
59
74
|
"timeout_millis": 60000,
|
60
75
|
"retry_codes_name": "non_idempotent",
|
@@ -65,6 +80,11 @@
|
|
65
80
|
"retry_codes_name": "non_idempotent",
|
66
81
|
"retry_params_name": "default"
|
67
82
|
},
|
83
|
+
"ImportCryptoKeyVersion": {
|
84
|
+
"timeout_millis": 60000,
|
85
|
+
"retry_codes_name": "non_idempotent",
|
86
|
+
"retry_params_name": "default"
|
87
|
+
},
|
68
88
|
"UpdateCryptoKey": {
|
69
89
|
"timeout_millis": 60000,
|
70
90
|
"retry_codes_name": "non_idempotent",
|
@@ -53,6 +53,9 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
53
53
|
optional :generate_time, :message, 11, "google.protobuf.Timestamp"
|
54
54
|
optional :destroy_time, :message, 5, "google.protobuf.Timestamp"
|
55
55
|
optional :destroy_event_time, :message, 6, "google.protobuf.Timestamp"
|
56
|
+
optional :import_job, :string, 14
|
57
|
+
optional :import_time, :message, 15, "google.protobuf.Timestamp"
|
58
|
+
optional :import_failure_reason, :string, 16
|
56
59
|
end
|
57
60
|
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm" do
|
58
61
|
value :CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED, 0
|
@@ -60,12 +63,15 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
60
63
|
value :RSA_SIGN_PSS_2048_SHA256, 2
|
61
64
|
value :RSA_SIGN_PSS_3072_SHA256, 3
|
62
65
|
value :RSA_SIGN_PSS_4096_SHA256, 4
|
66
|
+
value :RSA_SIGN_PSS_4096_SHA512, 15
|
63
67
|
value :RSA_SIGN_PKCS1_2048_SHA256, 5
|
64
68
|
value :RSA_SIGN_PKCS1_3072_SHA256, 6
|
65
69
|
value :RSA_SIGN_PKCS1_4096_SHA256, 7
|
70
|
+
value :RSA_SIGN_PKCS1_4096_SHA512, 16
|
66
71
|
value :RSA_DECRYPT_OAEP_2048_SHA256, 8
|
67
72
|
value :RSA_DECRYPT_OAEP_3072_SHA256, 9
|
68
73
|
value :RSA_DECRYPT_OAEP_4096_SHA256, 10
|
74
|
+
value :RSA_DECRYPT_OAEP_4096_SHA512, 17
|
69
75
|
value :EC_SIGN_P256_SHA256, 12
|
70
76
|
value :EC_SIGN_P384_SHA384, 13
|
71
77
|
end
|
@@ -76,6 +82,8 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
76
82
|
value :DISABLED, 2
|
77
83
|
value :DESTROYED, 3
|
78
84
|
value :DESTROY_SCHEDULED, 4
|
85
|
+
value :PENDING_IMPORT, 6
|
86
|
+
value :IMPORT_FAILED, 7
|
79
87
|
end
|
80
88
|
add_enum "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView" do
|
81
89
|
value :CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED, 0
|
@@ -85,6 +93,32 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
85
93
|
optional :pem, :string, 1
|
86
94
|
optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
87
95
|
end
|
96
|
+
add_message "google.cloud.kms.v1.ImportJob" do
|
97
|
+
optional :name, :string, 1
|
98
|
+
optional :import_method, :enum, 2, "google.cloud.kms.v1.ImportJob.ImportMethod"
|
99
|
+
optional :protection_level, :enum, 9, "google.cloud.kms.v1.ProtectionLevel"
|
100
|
+
optional :create_time, :message, 3, "google.protobuf.Timestamp"
|
101
|
+
optional :generate_time, :message, 4, "google.protobuf.Timestamp"
|
102
|
+
optional :expire_time, :message, 5, "google.protobuf.Timestamp"
|
103
|
+
optional :expire_event_time, :message, 10, "google.protobuf.Timestamp"
|
104
|
+
optional :state, :enum, 6, "google.cloud.kms.v1.ImportJob.ImportJobState"
|
105
|
+
optional :public_key, :message, 7, "google.cloud.kms.v1.ImportJob.WrappingPublicKey"
|
106
|
+
optional :attestation, :message, 8, "google.cloud.kms.v1.KeyOperationAttestation"
|
107
|
+
end
|
108
|
+
add_message "google.cloud.kms.v1.ImportJob.WrappingPublicKey" do
|
109
|
+
optional :pem, :string, 1
|
110
|
+
end
|
111
|
+
add_enum "google.cloud.kms.v1.ImportJob.ImportMethod" do
|
112
|
+
value :IMPORT_METHOD_UNSPECIFIED, 0
|
113
|
+
value :RSA_OAEP_3072_SHA1_AES_256, 1
|
114
|
+
value :RSA_OAEP_4096_SHA1_AES_256, 2
|
115
|
+
end
|
116
|
+
add_enum "google.cloud.kms.v1.ImportJob.ImportJobState" do
|
117
|
+
value :IMPORT_JOB_STATE_UNSPECIFIED, 0
|
118
|
+
value :PENDING_GENERATION, 1
|
119
|
+
value :ACTIVE, 2
|
120
|
+
value :EXPIRED, 3
|
121
|
+
end
|
88
122
|
add_enum "google.cloud.kms.v1.ProtectionLevel" do
|
89
123
|
value :PROTECTION_LEVEL_UNSPECIFIED, 0
|
90
124
|
value :SOFTWARE, 1
|
@@ -107,6 +141,10 @@ module Google
|
|
107
141
|
CryptoKeyVersion::CryptoKeyVersionState = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState").enummodule
|
108
142
|
CryptoKeyVersion::CryptoKeyVersionView = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView").enummodule
|
109
143
|
PublicKey = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.PublicKey").msgclass
|
144
|
+
ImportJob = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ImportJob").msgclass
|
145
|
+
ImportJob::WrappingPublicKey = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ImportJob.WrappingPublicKey").msgclass
|
146
|
+
ImportJob::ImportMethod = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ImportJob.ImportMethod").enummodule
|
147
|
+
ImportJob::ImportJobState = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ImportJob.ImportJobState").enummodule
|
110
148
|
ProtectionLevel = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ProtectionLevel").enummodule
|
111
149
|
end
|
112
150
|
end
|
@@ -7,25 +7,37 @@ require 'google/protobuf'
|
|
7
7
|
require 'google/api/annotations_pb'
|
8
8
|
require 'google/cloud/kms/v1/resources_pb'
|
9
9
|
require 'google/protobuf/field_mask_pb'
|
10
|
-
require 'google/
|
11
|
-
require 'google/protobuf/wrappers_pb'
|
10
|
+
require 'google/api/client_pb'
|
12
11
|
Google::Protobuf::DescriptorPool.generated_pool.build do
|
13
12
|
add_message "google.cloud.kms.v1.ListKeyRingsRequest" do
|
14
13
|
optional :parent, :string, 1
|
15
14
|
optional :page_size, :int32, 2
|
16
15
|
optional :page_token, :string, 3
|
16
|
+
optional :filter, :string, 4
|
17
|
+
optional :order_by, :string, 5
|
17
18
|
end
|
18
19
|
add_message "google.cloud.kms.v1.ListCryptoKeysRequest" do
|
19
20
|
optional :parent, :string, 1
|
20
21
|
optional :page_size, :int32, 2
|
21
22
|
optional :page_token, :string, 3
|
22
23
|
optional :version_view, :enum, 4, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView"
|
24
|
+
optional :filter, :string, 5
|
25
|
+
optional :order_by, :string, 6
|
23
26
|
end
|
24
27
|
add_message "google.cloud.kms.v1.ListCryptoKeyVersionsRequest" do
|
25
28
|
optional :parent, :string, 1
|
26
29
|
optional :page_size, :int32, 2
|
27
30
|
optional :page_token, :string, 3
|
28
31
|
optional :view, :enum, 4, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionView"
|
32
|
+
optional :filter, :string, 5
|
33
|
+
optional :order_by, :string, 6
|
34
|
+
end
|
35
|
+
add_message "google.cloud.kms.v1.ListImportJobsRequest" do
|
36
|
+
optional :parent, :string, 1
|
37
|
+
optional :page_size, :int32, 2
|
38
|
+
optional :page_token, :string, 3
|
39
|
+
optional :filter, :string, 4
|
40
|
+
optional :order_by, :string, 5
|
29
41
|
end
|
30
42
|
add_message "google.cloud.kms.v1.ListKeyRingsResponse" do
|
31
43
|
repeated :key_rings, :message, 1, "google.cloud.kms.v1.KeyRing"
|
@@ -42,6 +54,11 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
42
54
|
optional :next_page_token, :string, 2
|
43
55
|
optional :total_size, :int32, 3
|
44
56
|
end
|
57
|
+
add_message "google.cloud.kms.v1.ListImportJobsResponse" do
|
58
|
+
repeated :import_jobs, :message, 1, "google.cloud.kms.v1.ImportJob"
|
59
|
+
optional :next_page_token, :string, 2
|
60
|
+
optional :total_size, :int32, 3
|
61
|
+
end
|
45
62
|
add_message "google.cloud.kms.v1.GetKeyRingRequest" do
|
46
63
|
optional :name, :string, 1
|
47
64
|
end
|
@@ -54,6 +71,9 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
54
71
|
add_message "google.cloud.kms.v1.GetPublicKeyRequest" do
|
55
72
|
optional :name, :string, 1
|
56
73
|
end
|
74
|
+
add_message "google.cloud.kms.v1.GetImportJobRequest" do
|
75
|
+
optional :name, :string, 1
|
76
|
+
end
|
57
77
|
add_message "google.cloud.kms.v1.CreateKeyRingRequest" do
|
58
78
|
optional :parent, :string, 1
|
59
79
|
optional :key_ring_id, :string, 2
|
@@ -63,11 +83,25 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
63
83
|
optional :parent, :string, 1
|
64
84
|
optional :crypto_key_id, :string, 2
|
65
85
|
optional :crypto_key, :message, 3, "google.cloud.kms.v1.CryptoKey"
|
86
|
+
optional :skip_initial_version_creation, :bool, 5
|
66
87
|
end
|
67
88
|
add_message "google.cloud.kms.v1.CreateCryptoKeyVersionRequest" do
|
68
89
|
optional :parent, :string, 1
|
69
90
|
optional :crypto_key_version, :message, 2, "google.cloud.kms.v1.CryptoKeyVersion"
|
70
91
|
end
|
92
|
+
add_message "google.cloud.kms.v1.ImportCryptoKeyVersionRequest" do
|
93
|
+
optional :parent, :string, 1
|
94
|
+
optional :algorithm, :enum, 2, "google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm"
|
95
|
+
optional :import_job, :string, 4
|
96
|
+
oneof :wrapped_key_material do
|
97
|
+
optional :rsa_aes_wrapped_key, :bytes, 5
|
98
|
+
end
|
99
|
+
end
|
100
|
+
add_message "google.cloud.kms.v1.CreateImportJobRequest" do
|
101
|
+
optional :parent, :string, 1
|
102
|
+
optional :import_job_id, :string, 2
|
103
|
+
optional :import_job, :message, 3, "google.cloud.kms.v1.ImportJob"
|
104
|
+
end
|
71
105
|
add_message "google.cloud.kms.v1.UpdateCryptoKeyRequest" do
|
72
106
|
optional :crypto_key, :message, 1, "google.cloud.kms.v1.CryptoKey"
|
73
107
|
optional :update_mask, :message, 2, "google.protobuf.FieldMask"
|
@@ -136,16 +170,21 @@ module Google
|
|
136
170
|
ListKeyRingsRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListKeyRingsRequest").msgclass
|
137
171
|
ListCryptoKeysRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListCryptoKeysRequest").msgclass
|
138
172
|
ListCryptoKeyVersionsRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListCryptoKeyVersionsRequest").msgclass
|
173
|
+
ListImportJobsRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListImportJobsRequest").msgclass
|
139
174
|
ListKeyRingsResponse = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListKeyRingsResponse").msgclass
|
140
175
|
ListCryptoKeysResponse = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListCryptoKeysResponse").msgclass
|
141
176
|
ListCryptoKeyVersionsResponse = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListCryptoKeyVersionsResponse").msgclass
|
177
|
+
ListImportJobsResponse = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ListImportJobsResponse").msgclass
|
142
178
|
GetKeyRingRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GetKeyRingRequest").msgclass
|
143
179
|
GetCryptoKeyRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GetCryptoKeyRequest").msgclass
|
144
180
|
GetCryptoKeyVersionRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GetCryptoKeyVersionRequest").msgclass
|
145
181
|
GetPublicKeyRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GetPublicKeyRequest").msgclass
|
182
|
+
GetImportJobRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.GetImportJobRequest").msgclass
|
146
183
|
CreateKeyRingRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CreateKeyRingRequest").msgclass
|
147
184
|
CreateCryptoKeyRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CreateCryptoKeyRequest").msgclass
|
148
185
|
CreateCryptoKeyVersionRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CreateCryptoKeyVersionRequest").msgclass
|
186
|
+
ImportCryptoKeyVersionRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.ImportCryptoKeyVersionRequest").msgclass
|
187
|
+
CreateImportJobRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.CreateImportJobRequest").msgclass
|
149
188
|
UpdateCryptoKeyRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.UpdateCryptoKeyRequest").msgclass
|
150
189
|
UpdateCryptoKeyVersionRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.UpdateCryptoKeyVersionRequest").msgclass
|
151
190
|
EncryptRequest = Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.kms.v1.EncryptRequest").msgclass
|
@@ -1,7 +1,7 @@
|
|
1
1
|
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
2
|
# Source: google/cloud/kms/v1/service.proto for package 'google.cloud.kms.v1'
|
3
3
|
# Original file comments:
|
4
|
-
# Copyright
|
4
|
+
# Copyright 2019 Google LLC.
|
5
5
|
#
|
6
6
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
7
|
# you may not use this file except in compliance with the License.
|
@@ -51,110 +51,95 @@ module Google
|
|
51
51
|
rpc :ListCryptoKeys, ListCryptoKeysRequest, ListCryptoKeysResponse
|
52
52
|
# Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
|
53
53
|
rpc :ListCryptoKeyVersions, ListCryptoKeyVersionsRequest, ListCryptoKeyVersionsResponse
|
54
|
+
# Lists [ImportJobs][google.cloud.kms.v1.ImportJob].
|
55
|
+
rpc :ListImportJobs, ListImportJobsRequest, ListImportJobsResponse
|
54
56
|
# Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
|
55
57
|
rpc :GetKeyRing, GetKeyRingRequest, KeyRing
|
56
|
-
# Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as
|
57
|
-
#
|
58
|
-
# [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
58
|
+
# Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its
|
59
|
+
# [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
59
60
|
rpc :GetCryptoKey, GetCryptoKeyRequest, CryptoKey
|
60
|
-
# Returns metadata for a given
|
61
|
-
# [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
61
|
+
# Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
62
62
|
rpc :GetCryptoKeyVersion, GetCryptoKeyVersionRequest, CryptoKeyVersion
|
63
|
-
# Returns the public key for the given
|
64
|
-
# [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
|
63
|
+
# Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
|
65
64
|
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
66
|
-
# [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN]
|
67
|
-
# or
|
65
|
+
# [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or
|
68
66
|
# [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
|
69
67
|
rpc :GetPublicKey, GetPublicKeyRequest, PublicKey
|
70
|
-
#
|
71
|
-
|
68
|
+
# Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob].
|
69
|
+
rpc :GetImportJob, GetImportJobRequest, ImportJob
|
70
|
+
# Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location.
|
72
71
|
rpc :CreateKeyRing, CreateKeyRingRequest, KeyRing
|
73
|
-
# Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a
|
74
|
-
# [KeyRing][google.cloud.kms.v1.KeyRing].
|
72
|
+
# Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing].
|
75
73
|
#
|
76
74
|
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
|
77
75
|
# [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
|
78
76
|
# are required.
|
79
77
|
rpc :CreateCryptoKey, CreateCryptoKeyRequest, CryptoKey
|
80
|
-
# Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a
|
81
|
-
# [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
78
|
+
# Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
82
79
|
#
|
83
80
|
# The server will assign the next sequential id. If unset,
|
84
81
|
# [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
|
85
82
|
# [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
|
86
83
|
rpc :CreateCryptoKeyVersion, CreateCryptoKeyVersionRequest, CryptoKeyVersion
|
84
|
+
# Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the
|
85
|
+
# wrapped key material provided in the request.
|
86
|
+
#
|
87
|
+
# The version ID will be assigned the next sequential id within the
|
88
|
+
# [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
89
|
+
rpc :ImportCryptoKeyVersion, ImportCryptoKeyVersionRequest, CryptoKeyVersion
|
90
|
+
# Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
|
91
|
+
#
|
92
|
+
# [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required.
|
93
|
+
rpc :CreateImportJob, CreateImportJobRequest, ImportJob
|
87
94
|
# Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
88
95
|
rpc :UpdateCryptoKey, UpdateCryptoKeyRequest, CryptoKey
|
89
|
-
# Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s
|
90
|
-
# metadata.
|
96
|
+
# Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata.
|
91
97
|
#
|
92
98
|
# [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
|
93
|
-
# [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]
|
94
|
-
#
|
95
|
-
# [
|
96
|
-
#
|
97
|
-
# [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]
|
98
|
-
# and
|
99
|
-
# [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
|
100
|
-
# to move between other states.
|
99
|
+
# [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and
|
100
|
+
# [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this
|
101
|
+
# method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
|
102
|
+
# move between other states.
|
101
103
|
rpc :UpdateCryptoKeyVersion, UpdateCryptoKeyVersionRequest, CryptoKeyVersion
|
102
|
-
# Encrypts data, so that it can only be recovered by a call to
|
103
|
-
# [
|
104
|
-
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
104
|
+
# Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
|
105
|
+
# The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
105
106
|
# [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
106
107
|
rpc :Encrypt, EncryptRequest, EncryptResponse
|
107
|
-
# Decrypts data that was protected by
|
108
|
-
# [
|
109
|
-
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
110
|
-
# [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
108
|
+
# Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
109
|
+
# must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
111
110
|
rpc :Decrypt, DecryptRequest, DecryptResponse
|
112
|
-
# Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
|
113
|
-
# with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
111
|
+
# Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
114
112
|
# ASYMMETRIC_SIGN, producing a signature that can be verified with the public
|
115
|
-
# key retrieved from
|
116
|
-
# [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
113
|
+
# key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
117
114
|
rpc :AsymmetricSign, AsymmetricSignRequest, AsymmetricSignResponse
|
118
115
|
# Decrypts data that was encrypted with a public key retrieved from
|
119
|
-
# [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]
|
120
|
-
#
|
121
|
-
# with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
122
|
-
# ASYMMETRIC_DECRYPT.
|
116
|
+
# [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
|
117
|
+
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
|
123
118
|
rpc :AsymmetricDecrypt, AsymmetricDecryptRequest, AsymmetricDecryptResponse
|
124
|
-
# Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that
|
125
|
-
# will be used in
|
126
|
-
# [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
|
119
|
+
# Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
|
127
120
|
#
|
128
121
|
# Returns an error if called on an asymmetric key.
|
129
122
|
rpc :UpdateCryptoKeyPrimaryVersion, UpdateCryptoKeyPrimaryVersionRequest, CryptoKey
|
130
|
-
# Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for
|
131
|
-
# destruction.
|
123
|
+
# Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
|
132
124
|
#
|
133
|
-
# Upon calling this method,
|
134
|
-
# [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will
|
135
|
-
# be set to
|
125
|
+
# Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
|
136
126
|
# [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
|
137
|
-
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will
|
138
|
-
#
|
139
|
-
#
|
140
|
-
# [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED],
|
141
|
-
#
|
127
|
+
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
|
128
|
+
# hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
|
129
|
+
# will be changed to
|
130
|
+
# [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
|
131
|
+
# material will be irrevocably destroyed.
|
142
132
|
#
|
143
|
-
# Before the
|
144
|
-
# [
|
145
|
-
# reached,
|
146
|
-
# [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
|
147
|
-
# may be called to reverse the process.
|
133
|
+
# Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
|
134
|
+
# [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
|
148
135
|
rpc :DestroyCryptoKeyVersion, DestroyCryptoKeyVersionRequest, CryptoKeyVersion
|
149
136
|
# Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
|
150
137
|
# [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
|
151
138
|
# state.
|
152
139
|
#
|
153
|
-
# Upon restoration of the CryptoKeyVersion,
|
154
|
-
# [
|
155
|
-
# [
|
156
|
-
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will
|
157
|
-
# be cleared.
|
140
|
+
# Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
|
141
|
+
# will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
|
142
|
+
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
|
158
143
|
rpc :RestoreCryptoKeyVersion, RestoreCryptoKeyVersionRequest, CryptoKeyVersion
|
159
144
|
end
|
160
145
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-kms
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0
|
4
|
+
version: 1.1.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2019-06-
|
11
|
+
date: 2019-06-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-gax
|