google-cloud-kms 1.6.0 → 2.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.yardopts +2 -1
- data/AUTHENTICATION.md +51 -54
- data/LICENSE.md +203 -0
- data/MIGRATING.md +326 -0
- data/README.md +33 -44
- data/lib/{google/cloud/kms/v1/doc/google/iam/v1/iam_policy.rb → google-cloud-kms.rb} +4 -6
- data/lib/google/cloud/kms.rb +92 -122
- data/lib/google/cloud/kms/version.rb +6 -2
- metadata +50 -63
- data/LICENSE +0 -201
- data/lib/google/cloud/kms/v1.rb +0 -159
- data/lib/google/cloud/kms/v1/credentials.rb +0 -42
- data/lib/google/cloud/kms/v1/doc/google/cloud/kms/v1/resources.rb +0 -540
- data/lib/google/cloud/kms/v1/doc/google/cloud/kms/v1/service.rb +0 -491
- data/lib/google/cloud/kms/v1/doc/google/iam/v1/options.rb +0 -21
- data/lib/google/cloud/kms/v1/doc/google/iam/v1/policy.rb +0 -21
- data/lib/google/cloud/kms/v1/doc/google/protobuf/duration.rb +0 -91
- data/lib/google/cloud/kms/v1/doc/google/protobuf/field_mask.rb +0 -222
- data/lib/google/cloud/kms/v1/doc/google/protobuf/timestamp.rb +0 -113
- data/lib/google/cloud/kms/v1/doc/google/type/expr.rb +0 -19
- data/lib/google/cloud/kms/v1/helpers.rb +0 -80
- data/lib/google/cloud/kms/v1/key_management_service_client.rb +0 -1805
- data/lib/google/cloud/kms/v1/key_management_service_client_config.json +0 -162
- data/lib/google/cloud/kms/v1/resources_pb.rb +0 -161
- data/lib/google/cloud/kms/v1/service_pb.rb +0 -209
- data/lib/google/cloud/kms/v1/service_services_pb.rb +0 -151
@@ -1,151 +0,0 @@
|
|
1
|
-
# Generated by the protocol buffer compiler. DO NOT EDIT!
|
2
|
-
# Source: google/cloud/kms/v1/service.proto for package 'google.cloud.kms.v1'
|
3
|
-
# Original file comments:
|
4
|
-
# Copyright 2020 Google LLC
|
5
|
-
#
|
6
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
-
# you may not use this file except in compliance with the License.
|
8
|
-
# You may obtain a copy of the License at
|
9
|
-
#
|
10
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
-
#
|
12
|
-
# Unless required by applicable law or agreed to in writing, software
|
13
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
15
|
-
# See the License for the specific language governing permissions and
|
16
|
-
# limitations under the License.
|
17
|
-
#
|
18
|
-
|
19
|
-
|
20
|
-
require 'grpc'
|
21
|
-
require 'google/cloud/kms/v1/service_pb'
|
22
|
-
|
23
|
-
module Google
|
24
|
-
module Cloud
|
25
|
-
module Kms
|
26
|
-
module V1
|
27
|
-
module KeyManagementService
|
28
|
-
# Google Cloud Key Management Service
|
29
|
-
#
|
30
|
-
# Manages cryptographic keys and operations using those keys. Implements a REST
|
31
|
-
# model with the following objects:
|
32
|
-
#
|
33
|
-
# * [KeyRing][google.cloud.kms.v1.KeyRing]
|
34
|
-
# * [CryptoKey][google.cloud.kms.v1.CryptoKey]
|
35
|
-
# * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
|
36
|
-
# * [ImportJob][google.cloud.kms.v1.ImportJob]
|
37
|
-
#
|
38
|
-
# If you are using manual gRPC libraries, see
|
39
|
-
# [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc).
|
40
|
-
class Service
|
41
|
-
|
42
|
-
include GRPC::GenericService
|
43
|
-
|
44
|
-
self.marshal_class_method = :encode
|
45
|
-
self.unmarshal_class_method = :decode
|
46
|
-
self.service_name = 'google.cloud.kms.v1.KeyManagementService'
|
47
|
-
|
48
|
-
# Lists [KeyRings][google.cloud.kms.v1.KeyRing].
|
49
|
-
rpc :ListKeyRings, ListKeyRingsRequest, ListKeyRingsResponse
|
50
|
-
# Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey].
|
51
|
-
rpc :ListCryptoKeys, ListCryptoKeysRequest, ListCryptoKeysResponse
|
52
|
-
# Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion].
|
53
|
-
rpc :ListCryptoKeyVersions, ListCryptoKeyVersionsRequest, ListCryptoKeyVersionsResponse
|
54
|
-
# Lists [ImportJobs][google.cloud.kms.v1.ImportJob].
|
55
|
-
rpc :ListImportJobs, ListImportJobsRequest, ListImportJobsResponse
|
56
|
-
# Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing].
|
57
|
-
rpc :GetKeyRing, GetKeyRingRequest, KeyRing
|
58
|
-
# Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its
|
59
|
-
# [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
60
|
-
rpc :GetCryptoKey, GetCryptoKeyRequest, CryptoKey
|
61
|
-
# Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
62
|
-
rpc :GetCryptoKeyVersion, GetCryptoKeyVersionRequest, CryptoKeyVersion
|
63
|
-
# Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The
|
64
|
-
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
65
|
-
# [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or
|
66
|
-
# [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
|
67
|
-
rpc :GetPublicKey, GetPublicKeyRequest, PublicKey
|
68
|
-
# Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob].
|
69
|
-
rpc :GetImportJob, GetImportJobRequest, ImportJob
|
70
|
-
# Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location.
|
71
|
-
rpc :CreateKeyRing, CreateKeyRingRequest, KeyRing
|
72
|
-
# Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing].
|
73
|
-
#
|
74
|
-
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and
|
75
|
-
# [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm]
|
76
|
-
# are required.
|
77
|
-
rpc :CreateCryptoKey, CreateCryptoKeyRequest, CryptoKey
|
78
|
-
# Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
79
|
-
#
|
80
|
-
# The server will assign the next sequential id. If unset,
|
81
|
-
# [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
|
82
|
-
# [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED].
|
83
|
-
rpc :CreateCryptoKeyVersion, CreateCryptoKeyVersionRequest, CryptoKeyVersion
|
84
|
-
# Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the
|
85
|
-
# wrapped key material provided in the request.
|
86
|
-
#
|
87
|
-
# The version ID will be assigned the next sequential id within the
|
88
|
-
# [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
89
|
-
rpc :ImportCryptoKeyVersion, ImportCryptoKeyVersionRequest, CryptoKeyVersion
|
90
|
-
# Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing].
|
91
|
-
#
|
92
|
-
# [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required.
|
93
|
-
rpc :CreateImportJob, CreateImportJobRequest, ImportJob
|
94
|
-
# Update a [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
95
|
-
rpc :UpdateCryptoKey, UpdateCryptoKeyRequest, CryptoKey
|
96
|
-
# Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata.
|
97
|
-
#
|
98
|
-
# [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between
|
99
|
-
# [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and
|
100
|
-
# [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this
|
101
|
-
# method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to
|
102
|
-
# move between other states.
|
103
|
-
rpc :UpdateCryptoKeyVersion, UpdateCryptoKeyVersionRequest, CryptoKeyVersion
|
104
|
-
# Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
|
105
|
-
# The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be
|
106
|
-
# [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
107
|
-
rpc :Encrypt, EncryptRequest, EncryptResponse
|
108
|
-
# Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
109
|
-
# must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
110
|
-
rpc :Decrypt, DecryptRequest, DecryptResponse
|
111
|
-
# Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
112
|
-
# ASYMMETRIC_SIGN, producing a signature that can be verified with the public
|
113
|
-
# key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
114
|
-
rpc :AsymmetricSign, AsymmetricSignRequest, AsymmetricSignResponse
|
115
|
-
# Decrypts data that was encrypted with a public key retrieved from
|
116
|
-
# [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
|
117
|
-
# [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
|
118
|
-
rpc :AsymmetricDecrypt, AsymmetricDecryptRequest, AsymmetricDecryptResponse
|
119
|
-
# Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
|
120
|
-
#
|
121
|
-
# Returns an error if called on an asymmetric key.
|
122
|
-
rpc :UpdateCryptoKeyPrimaryVersion, UpdateCryptoKeyPrimaryVersionRequest, CryptoKey
|
123
|
-
# Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
|
124
|
-
#
|
125
|
-
# Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
|
126
|
-
# [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
|
127
|
-
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
|
128
|
-
# hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
|
129
|
-
# will be changed to
|
130
|
-
# [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
|
131
|
-
# material will be irrevocably destroyed.
|
132
|
-
#
|
133
|
-
# Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
|
134
|
-
# [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
|
135
|
-
rpc :DestroyCryptoKeyVersion, DestroyCryptoKeyVersionRequest, CryptoKeyVersion
|
136
|
-
# Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
|
137
|
-
# [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
|
138
|
-
# state.
|
139
|
-
#
|
140
|
-
# Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
|
141
|
-
# will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
|
142
|
-
# and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
|
143
|
-
rpc :RestoreCryptoKeyVersion, RestoreCryptoKeyVersionRequest, CryptoKeyVersion
|
144
|
-
end
|
145
|
-
|
146
|
-
Stub = Service.rpc_stub_class
|
147
|
-
end
|
148
|
-
end
|
149
|
-
end
|
150
|
-
end
|
151
|
-
end
|