| // Code generated by protoc-gen-go. DO NOT EDIT. |
| // source: google/cloud/kms/v1/service.proto |
| |
| package kms |
| |
| import ( |
| context "context" |
| fmt "fmt" |
| math "math" |
| |
| proto "github.com/golang/protobuf/proto" |
| _ "google.golang.org/genproto/googleapis/api/annotations" |
| field_mask "google.golang.org/genproto/protobuf/field_mask" |
| grpc "google.golang.org/grpc" |
| codes "google.golang.org/grpc/codes" |
| status "google.golang.org/grpc/status" |
| ) |
| |
| // Reference imports to suppress errors if they are not otherwise used. |
| var _ = proto.Marshal |
| var _ = fmt.Errorf |
| var _ = math.Inf |
| |
| // This is a compile-time assertion to ensure that this generated file |
| // is compatible with the proto package it is being compiled against. |
| // A compilation error at this line likely means your copy of the |
| // proto package needs to be updated. |
| const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package |
| |
| // Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. |
| type ListKeyRingsRequest struct { |
| // Required. The resource name of the location associated with the |
| // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Optional. Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to include in the |
| // response. Further [KeyRings][google.cloud.kms.v1.KeyRing] can subsequently be obtained by |
| // including the [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] in a subsequent |
| // request. If unspecified, the server will pick an appropriate default. |
| PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` |
| // Optional. Optional pagination token, returned earlier via |
| // [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token]. |
| PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` |
| // Optional. Only include resources that match the filter in the response. For |
| // more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` |
| // Optional. Specify how the results should be sorted. If not specified, the |
| // results will be sorted in the default order. For more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListKeyRingsRequest) Reset() { *m = ListKeyRingsRequest{} } |
| func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) } |
| func (*ListKeyRingsRequest) ProtoMessage() {} |
| func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{0} |
| } |
| |
| func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b) |
| } |
| func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic) |
| } |
| func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListKeyRingsRequest.Merge(m, src) |
| } |
| func (m *ListKeyRingsRequest) XXX_Size() int { |
| return xxx_messageInfo_ListKeyRingsRequest.Size(m) |
| } |
| func (m *ListKeyRingsRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo |
| |
| func (m *ListKeyRingsRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *ListKeyRingsRequest) GetPageSize() int32 { |
| if m != nil { |
| return m.PageSize |
| } |
| return 0 |
| } |
| |
| func (m *ListKeyRingsRequest) GetPageToken() string { |
| if m != nil { |
| return m.PageToken |
| } |
| return "" |
| } |
| |
| func (m *ListKeyRingsRequest) GetFilter() string { |
| if m != nil { |
| return m.Filter |
| } |
| return "" |
| } |
| |
| func (m *ListKeyRingsRequest) GetOrderBy() string { |
| if m != nil { |
| return m.OrderBy |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. |
| type ListCryptoKeysRequest struct { |
| // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format |
| // `projects/*/locations/*/keyRings/*`. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Optional. Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] to include in the |
| // response. Further [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by |
| // including the [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] in a subsequent |
| // request. If unspecified, the server will pick an appropriate default. |
| PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` |
| // Optional. Optional pagination token, returned earlier via |
| // [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token]. |
| PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` |
| // The fields of the primary version to include in the response. |
| VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"` |
| // Optional. Only include resources that match the filter in the response. For |
| // more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` |
| // Optional. Specify how the results should be sorted. If not specified, the |
| // results will be sorted in the default order. For more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListCryptoKeysRequest) Reset() { *m = ListCryptoKeysRequest{} } |
| func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) } |
| func (*ListCryptoKeysRequest) ProtoMessage() {} |
| func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{1} |
| } |
| |
| func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b) |
| } |
| func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic) |
| } |
| func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src) |
| } |
| func (m *ListCryptoKeysRequest) XXX_Size() int { |
| return xxx_messageInfo_ListCryptoKeysRequest.Size(m) |
| } |
| func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo |
| |
| func (m *ListCryptoKeysRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeysRequest) GetPageSize() int32 { |
| if m != nil { |
| return m.PageSize |
| } |
| return 0 |
| } |
| |
| func (m *ListCryptoKeysRequest) GetPageToken() string { |
| if m != nil { |
| return m.PageToken |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView { |
| if m != nil { |
| return m.VersionView |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED |
| } |
| |
| func (m *ListCryptoKeysRequest) GetFilter() string { |
| if m != nil { |
| return m.Filter |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeysRequest) GetOrderBy() string { |
| if m != nil { |
| return m.OrderBy |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. |
| type ListCryptoKeyVersionsRequest struct { |
| // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format |
| // `projects/*/locations/*/keyRings/*/cryptoKeys/*`. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Optional. Optional limit on the number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to |
| // include in the response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] can |
| // subsequently be obtained by including the |
| // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] in a subsequent request. |
| // If unspecified, the server will pick an appropriate default. |
| PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` |
| // Optional. Optional pagination token, returned earlier via |
| // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token]. |
| PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` |
| // The fields to include in the response. |
| View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"` |
| // Optional. Only include resources that match the filter in the response. For |
| // more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` |
| // Optional. Specify how the results should be sorted. If not specified, the |
| // results will be sorted in the default order. For more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) Reset() { *m = ListCryptoKeyVersionsRequest{} } |
| func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) } |
| func (*ListCryptoKeyVersionsRequest) ProtoMessage() {} |
| func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{2} |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b) |
| } |
| func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic) |
| } |
| func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src) |
| } |
| func (m *ListCryptoKeyVersionsRequest) XXX_Size() int { |
| return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m) |
| } |
| func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo |
| |
| func (m *ListCryptoKeyVersionsRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 { |
| if m != nil { |
| return m.PageSize |
| } |
| return 0 |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) GetPageToken() string { |
| if m != nil { |
| return m.PageToken |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView { |
| if m != nil { |
| return m.View |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) GetFilter() string { |
| if m != nil { |
| return m.Filter |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeyVersionsRequest) GetOrderBy() string { |
| if m != nil { |
| return m.OrderBy |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. |
| type ListImportJobsRequest struct { |
| // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format |
| // `projects/*/locations/*/keyRings/*`. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Optional. Optional limit on the number of [ImportJobs][google.cloud.kms.v1.ImportJob] to include in the |
| // response. Further [ImportJobs][google.cloud.kms.v1.ImportJob] can subsequently be obtained by |
| // including the [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token] in a subsequent |
| // request. If unspecified, the server will pick an appropriate default. |
| PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` |
| // Optional. Optional pagination token, returned earlier via |
| // [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token]. |
| PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` |
| // Optional. Only include resources that match the filter in the response. For |
| // more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` |
| // Optional. Specify how the results should be sorted. If not specified, the |
| // results will be sorted in the default order. For more information, see |
| // [Sorting and filtering list |
| // results](https://cloud.google.com/kms/docs/sorting-and-filtering). |
| OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListImportJobsRequest) Reset() { *m = ListImportJobsRequest{} } |
| func (m *ListImportJobsRequest) String() string { return proto.CompactTextString(m) } |
| func (*ListImportJobsRequest) ProtoMessage() {} |
| func (*ListImportJobsRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{3} |
| } |
| |
| func (m *ListImportJobsRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListImportJobsRequest.Unmarshal(m, b) |
| } |
| func (m *ListImportJobsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListImportJobsRequest.Marshal(b, m, deterministic) |
| } |
| func (m *ListImportJobsRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListImportJobsRequest.Merge(m, src) |
| } |
| func (m *ListImportJobsRequest) XXX_Size() int { |
| return xxx_messageInfo_ListImportJobsRequest.Size(m) |
| } |
| func (m *ListImportJobsRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListImportJobsRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListImportJobsRequest proto.InternalMessageInfo |
| |
| func (m *ListImportJobsRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *ListImportJobsRequest) GetPageSize() int32 { |
| if m != nil { |
| return m.PageSize |
| } |
| return 0 |
| } |
| |
| func (m *ListImportJobsRequest) GetPageToken() string { |
| if m != nil { |
| return m.PageToken |
| } |
| return "" |
| } |
| |
| func (m *ListImportJobsRequest) GetFilter() string { |
| if m != nil { |
| return m.Filter |
| } |
| return "" |
| } |
| |
| func (m *ListImportJobsRequest) GetOrderBy() string { |
| if m != nil { |
| return m.OrderBy |
| } |
| return "" |
| } |
| |
| // Response message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. |
| type ListKeyRingsResponse struct { |
| // The list of [KeyRings][google.cloud.kms.v1.KeyRing]. |
| KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"` |
| // A token to retrieve next page of results. Pass this value in |
| // [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] to retrieve the next page of results. |
| NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` |
| // The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched the query. |
| TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListKeyRingsResponse) Reset() { *m = ListKeyRingsResponse{} } |
| func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) } |
| func (*ListKeyRingsResponse) ProtoMessage() {} |
| func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{4} |
| } |
| |
| func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b) |
| } |
| func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic) |
| } |
| func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListKeyRingsResponse.Merge(m, src) |
| } |
| func (m *ListKeyRingsResponse) XXX_Size() int { |
| return xxx_messageInfo_ListKeyRingsResponse.Size(m) |
| } |
| func (m *ListKeyRingsResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo |
| |
| func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing { |
| if m != nil { |
| return m.KeyRings |
| } |
| return nil |
| } |
| |
| func (m *ListKeyRingsResponse) GetNextPageToken() string { |
| if m != nil { |
| return m.NextPageToken |
| } |
| return "" |
| } |
| |
| func (m *ListKeyRingsResponse) GetTotalSize() int32 { |
| if m != nil { |
| return m.TotalSize |
| } |
| return 0 |
| } |
| |
| // Response message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. |
| type ListCryptoKeysResponse struct { |
| // The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey]. |
| CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"` |
| // A token to retrieve next page of results. Pass this value in |
| // [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] to retrieve the next page of results. |
| NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` |
| // The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that matched the query. |
| TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListCryptoKeysResponse) Reset() { *m = ListCryptoKeysResponse{} } |
| func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) } |
| func (*ListCryptoKeysResponse) ProtoMessage() {} |
| func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{5} |
| } |
| |
| func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b) |
| } |
| func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic) |
| } |
| func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src) |
| } |
| func (m *ListCryptoKeysResponse) XXX_Size() int { |
| return xxx_messageInfo_ListCryptoKeysResponse.Size(m) |
| } |
| func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo |
| |
| func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey { |
| if m != nil { |
| return m.CryptoKeys |
| } |
| return nil |
| } |
| |
| func (m *ListCryptoKeysResponse) GetNextPageToken() string { |
| if m != nil { |
| return m.NextPageToken |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeysResponse) GetTotalSize() int32 { |
| if m != nil { |
| return m.TotalSize |
| } |
| return 0 |
| } |
| |
| // Response message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. |
| type ListCryptoKeyVersionsResponse struct { |
| // The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. |
| CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"` |
| // A token to retrieve next page of results. Pass this value in |
| // [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] to retrieve the next page of |
| // results. |
| NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` |
| // The total number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the |
| // query. |
| TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListCryptoKeyVersionsResponse) Reset() { *m = ListCryptoKeyVersionsResponse{} } |
| func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) } |
| func (*ListCryptoKeyVersionsResponse) ProtoMessage() {} |
| func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{6} |
| } |
| |
| func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b) |
| } |
| func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic) |
| } |
| func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src) |
| } |
| func (m *ListCryptoKeyVersionsResponse) XXX_Size() int { |
| return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m) |
| } |
| func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo |
| |
| func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion { |
| if m != nil { |
| return m.CryptoKeyVersions |
| } |
| return nil |
| } |
| |
| func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string { |
| if m != nil { |
| return m.NextPageToken |
| } |
| return "" |
| } |
| |
| func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 { |
| if m != nil { |
| return m.TotalSize |
| } |
| return 0 |
| } |
| |
| // Response message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. |
| type ListImportJobsResponse struct { |
| // The list of [ImportJobs][google.cloud.kms.v1.ImportJob]. |
| ImportJobs []*ImportJob `protobuf:"bytes,1,rep,name=import_jobs,json=importJobs,proto3" json:"import_jobs,omitempty"` |
| // A token to retrieve next page of results. Pass this value in |
| // [ListImportJobsRequest.page_token][google.cloud.kms.v1.ListImportJobsRequest.page_token] to retrieve the next page of results. |
| NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` |
| // The total number of [ImportJobs][google.cloud.kms.v1.ImportJob] that matched the query. |
| TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ListImportJobsResponse) Reset() { *m = ListImportJobsResponse{} } |
| func (m *ListImportJobsResponse) String() string { return proto.CompactTextString(m) } |
| func (*ListImportJobsResponse) ProtoMessage() {} |
| func (*ListImportJobsResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{7} |
| } |
| |
| func (m *ListImportJobsResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ListImportJobsResponse.Unmarshal(m, b) |
| } |
| func (m *ListImportJobsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ListImportJobsResponse.Marshal(b, m, deterministic) |
| } |
| func (m *ListImportJobsResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ListImportJobsResponse.Merge(m, src) |
| } |
| func (m *ListImportJobsResponse) XXX_Size() int { |
| return xxx_messageInfo_ListImportJobsResponse.Size(m) |
| } |
| func (m *ListImportJobsResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_ListImportJobsResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ListImportJobsResponse proto.InternalMessageInfo |
| |
| func (m *ListImportJobsResponse) GetImportJobs() []*ImportJob { |
| if m != nil { |
| return m.ImportJobs |
| } |
| return nil |
| } |
| |
| func (m *ListImportJobsResponse) GetNextPageToken() string { |
| if m != nil { |
| return m.NextPageToken |
| } |
| return "" |
| } |
| |
| func (m *ListImportJobsResponse) GetTotalSize() int32 { |
| if m != nil { |
| return m.TotalSize |
| } |
| return 0 |
| } |
| |
| // Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing]. |
| type GetKeyRingRequest struct { |
| // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] to get. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *GetKeyRingRequest) Reset() { *m = GetKeyRingRequest{} } |
| func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) } |
| func (*GetKeyRingRequest) ProtoMessage() {} |
| func (*GetKeyRingRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{8} |
| } |
| |
| func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b) |
| } |
| func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic) |
| } |
| func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_GetKeyRingRequest.Merge(m, src) |
| } |
| func (m *GetKeyRingRequest) XXX_Size() int { |
| return xxx_messageInfo_GetKeyRingRequest.Size(m) |
| } |
| func (m *GetKeyRingRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo |
| |
| func (m *GetKeyRingRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey]. |
| type GetCryptoKeyRequest struct { |
| // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to get. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *GetCryptoKeyRequest) Reset() { *m = GetCryptoKeyRequest{} } |
| func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) } |
| func (*GetCryptoKeyRequest) ProtoMessage() {} |
| func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{9} |
| } |
| |
| func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b) |
| } |
| func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic) |
| } |
| func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src) |
| } |
| func (m *GetCryptoKeyRequest) XXX_Size() int { |
| return xxx_messageInfo_GetCryptoKeyRequest.Size(m) |
| } |
| func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo |
| |
| func (m *GetCryptoKeyRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion]. |
| type GetCryptoKeyVersionRequest struct { |
| // Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *GetCryptoKeyVersionRequest) Reset() { *m = GetCryptoKeyVersionRequest{} } |
| func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*GetCryptoKeyVersionRequest) ProtoMessage() {} |
| func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{10} |
| } |
| |
| func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b) |
| } |
| func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src) |
| } |
| func (m *GetCryptoKeyVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m) |
| } |
| func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo |
| |
| func (m *GetCryptoKeyVersionRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. |
| type GetPublicKeyRequest struct { |
| // Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to |
| // get. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *GetPublicKeyRequest) Reset() { *m = GetPublicKeyRequest{} } |
| func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) } |
| func (*GetPublicKeyRequest) ProtoMessage() {} |
| func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{11} |
| } |
| |
| func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b) |
| } |
| func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic) |
| } |
| func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_GetPublicKeyRequest.Merge(m, src) |
| } |
| func (m *GetPublicKeyRequest) XXX_Size() int { |
| return xxx_messageInfo_GetPublicKeyRequest.Size(m) |
| } |
| func (m *GetPublicKeyRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo |
| |
| func (m *GetPublicKeyRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob]. |
| type GetImportJobRequest struct { |
| // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] to get. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *GetImportJobRequest) Reset() { *m = GetImportJobRequest{} } |
| func (m *GetImportJobRequest) String() string { return proto.CompactTextString(m) } |
| func (*GetImportJobRequest) ProtoMessage() {} |
| func (*GetImportJobRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{12} |
| } |
| |
| func (m *GetImportJobRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_GetImportJobRequest.Unmarshal(m, b) |
| } |
| func (m *GetImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_GetImportJobRequest.Marshal(b, m, deterministic) |
| } |
| func (m *GetImportJobRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_GetImportJobRequest.Merge(m, src) |
| } |
| func (m *GetImportJobRequest) XXX_Size() int { |
| return xxx_messageInfo_GetImportJobRequest.Size(m) |
| } |
| func (m *GetImportJobRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_GetImportJobRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_GetImportJobRequest proto.InternalMessageInfo |
| |
| func (m *GetImportJobRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing]. |
| type CreateKeyRingRequest struct { |
| // Required. The resource name of the location associated with the |
| // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Required. It must be unique within a location and match the regular |
| // expression `[a-zA-Z0-9_-]{1,63}` |
| KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"` |
| // Required. A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values. |
| KeyRing *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CreateKeyRingRequest) Reset() { *m = CreateKeyRingRequest{} } |
| func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) } |
| func (*CreateKeyRingRequest) ProtoMessage() {} |
| func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{13} |
| } |
| |
| func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b) |
| } |
| func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic) |
| } |
| func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CreateKeyRingRequest.Merge(m, src) |
| } |
| func (m *CreateKeyRingRequest) XXX_Size() int { |
| return xxx_messageInfo_CreateKeyRingRequest.Size(m) |
| } |
| func (m *CreateKeyRingRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo |
| |
| func (m *CreateKeyRingRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *CreateKeyRingRequest) GetKeyRingId() string { |
| if m != nil { |
| return m.KeyRingId |
| } |
| return "" |
| } |
| |
| func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing { |
| if m != nil { |
| return m.KeyRing |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey]. |
| type CreateCryptoKeyRequest struct { |
| // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing associated with the |
| // [CryptoKeys][google.cloud.kms.v1.CryptoKey]. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Required. It must be unique within a KeyRing and match the regular |
| // expression `[a-zA-Z0-9_-]{1,63}` |
| CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"` |
| // Required. A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values. |
| CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` |
| // If set to true, the request will create a [CryptoKey][google.cloud.kms.v1.CryptoKey] without any |
| // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. You must manually call |
| // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or |
| // [ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion] |
| // before you can use this [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| SkipInitialVersionCreation bool `protobuf:"varint,5,opt,name=skip_initial_version_creation,json=skipInitialVersionCreation,proto3" json:"skip_initial_version_creation,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CreateCryptoKeyRequest) Reset() { *m = CreateCryptoKeyRequest{} } |
| func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } |
| func (*CreateCryptoKeyRequest) ProtoMessage() {} |
| func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{14} |
| } |
| |
| func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b) |
| } |
| func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic) |
| } |
| func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src) |
| } |
| func (m *CreateCryptoKeyRequest) XXX_Size() int { |
| return xxx_messageInfo_CreateCryptoKeyRequest.Size(m) |
| } |
| func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo |
| |
| func (m *CreateCryptoKeyRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string { |
| if m != nil { |
| return m.CryptoKeyId |
| } |
| return "" |
| } |
| |
| func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey { |
| if m != nil { |
| return m.CryptoKey |
| } |
| return nil |
| } |
| |
| func (m *CreateCryptoKeyRequest) GetSkipInitialVersionCreation() bool { |
| if m != nil { |
| return m.SkipInitialVersionCreation |
| } |
| return false |
| } |
| |
| // Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion]. |
| type CreateCryptoKeyVersionRequest struct { |
| // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with |
| // the [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Required. A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial field values. |
| CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CreateCryptoKeyVersionRequest) Reset() { *m = CreateCryptoKeyVersionRequest{} } |
| func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*CreateCryptoKeyVersionRequest) ProtoMessage() {} |
| func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{15} |
| } |
| |
| func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b) |
| } |
| func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src) |
| } |
| func (m *CreateCryptoKeyVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m) |
| } |
| func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo |
| |
| func (m *CreateCryptoKeyVersionRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { |
| if m != nil { |
| return m.CryptoKeyVersion |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]. |
| type ImportCryptoKeyVersionRequest struct { |
| // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to |
| // be imported into. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Required. The [algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] of |
| // the key being imported. This does not need to match the |
| // [version_template][google.cloud.kms.v1.CryptoKey.version_template] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] this |
| // version imports into. |
| Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` |
| // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] that was used to |
| // wrap this key material. |
| ImportJob string `protobuf:"bytes,4,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` |
| // Required. The incoming wrapped key material that is to be imported. |
| // |
| // Types that are valid to be assigned to WrappedKeyMaterial: |
| // *ImportCryptoKeyVersionRequest_RsaAesWrappedKey |
| WrappedKeyMaterial isImportCryptoKeyVersionRequest_WrappedKeyMaterial `protobuf_oneof:"wrapped_key_material"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *ImportCryptoKeyVersionRequest) Reset() { *m = ImportCryptoKeyVersionRequest{} } |
| func (m *ImportCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*ImportCryptoKeyVersionRequest) ProtoMessage() {} |
| func (*ImportCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{16} |
| } |
| |
| func (m *ImportCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_ImportCryptoKeyVersionRequest.Unmarshal(m, b) |
| } |
| func (m *ImportCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_ImportCryptoKeyVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *ImportCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_ImportCryptoKeyVersionRequest.Merge(m, src) |
| } |
| func (m *ImportCryptoKeyVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_ImportCryptoKeyVersionRequest.Size(m) |
| } |
| func (m *ImportCryptoKeyVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_ImportCryptoKeyVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_ImportCryptoKeyVersionRequest proto.InternalMessageInfo |
| |
| func (m *ImportCryptoKeyVersionRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *ImportCryptoKeyVersionRequest) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { |
| if m != nil { |
| return m.Algorithm |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
| } |
| |
| func (m *ImportCryptoKeyVersionRequest) GetImportJob() string { |
| if m != nil { |
| return m.ImportJob |
| } |
| return "" |
| } |
| |
| type isImportCryptoKeyVersionRequest_WrappedKeyMaterial interface { |
| isImportCryptoKeyVersionRequest_WrappedKeyMaterial() |
| } |
| |
| type ImportCryptoKeyVersionRequest_RsaAesWrappedKey struct { |
| RsaAesWrappedKey []byte `protobuf:"bytes,5,opt,name=rsa_aes_wrapped_key,json=rsaAesWrappedKey,proto3,oneof"` |
| } |
| |
| func (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey) isImportCryptoKeyVersionRequest_WrappedKeyMaterial() { |
| } |
| |
| func (m *ImportCryptoKeyVersionRequest) GetWrappedKeyMaterial() isImportCryptoKeyVersionRequest_WrappedKeyMaterial { |
| if m != nil { |
| return m.WrappedKeyMaterial |
| } |
| return nil |
| } |
| |
| func (m *ImportCryptoKeyVersionRequest) GetRsaAesWrappedKey() []byte { |
| if x, ok := m.GetWrappedKeyMaterial().(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey); ok { |
| return x.RsaAesWrappedKey |
| } |
| return nil |
| } |
| |
| // XXX_OneofWrappers is for the internal use of the proto package. |
| func (*ImportCryptoKeyVersionRequest) XXX_OneofWrappers() []interface{} { |
| return []interface{}{ |
| (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey)(nil), |
| } |
| } |
| |
| // Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob]. |
| type CreateImportJobRequest struct { |
| // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] associated with the |
| // [ImportJobs][google.cloud.kms.v1.ImportJob]. |
| Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` |
| // Required. It must be unique within a KeyRing and match the regular |
| // expression `[a-zA-Z0-9_-]{1,63}` |
| ImportJobId string `protobuf:"bytes,2,opt,name=import_job_id,json=importJobId,proto3" json:"import_job_id,omitempty"` |
| // Required. An [ImportJob][google.cloud.kms.v1.ImportJob] with initial field values. |
| ImportJob *ImportJob `protobuf:"bytes,3,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CreateImportJobRequest) Reset() { *m = CreateImportJobRequest{} } |
| func (m *CreateImportJobRequest) String() string { return proto.CompactTextString(m) } |
| func (*CreateImportJobRequest) ProtoMessage() {} |
| func (*CreateImportJobRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{17} |
| } |
| |
| func (m *CreateImportJobRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CreateImportJobRequest.Unmarshal(m, b) |
| } |
| func (m *CreateImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CreateImportJobRequest.Marshal(b, m, deterministic) |
| } |
| func (m *CreateImportJobRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CreateImportJobRequest.Merge(m, src) |
| } |
| func (m *CreateImportJobRequest) XXX_Size() int { |
| return xxx_messageInfo_CreateImportJobRequest.Size(m) |
| } |
| func (m *CreateImportJobRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_CreateImportJobRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CreateImportJobRequest proto.InternalMessageInfo |
| |
| func (m *CreateImportJobRequest) GetParent() string { |
| if m != nil { |
| return m.Parent |
| } |
| return "" |
| } |
| |
| func (m *CreateImportJobRequest) GetImportJobId() string { |
| if m != nil { |
| return m.ImportJobId |
| } |
| return "" |
| } |
| |
| func (m *CreateImportJobRequest) GetImportJob() *ImportJob { |
| if m != nil { |
| return m.ImportJob |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey]. |
| type UpdateCryptoKeyRequest struct { |
| // Required. [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values. |
| CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` |
| // Required. List of fields to be updated in this request. |
| UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *UpdateCryptoKeyRequest) Reset() { *m = UpdateCryptoKeyRequest{} } |
| func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } |
| func (*UpdateCryptoKeyRequest) ProtoMessage() {} |
| func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{18} |
| } |
| |
| func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b) |
| } |
| func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic) |
| } |
| func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src) |
| } |
| func (m *UpdateCryptoKeyRequest) XXX_Size() int { |
| return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m) |
| } |
| func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo |
| |
| func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey { |
| if m != nil { |
| return m.CryptoKey |
| } |
| return nil |
| } |
| |
| func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask { |
| if m != nil { |
| return m.UpdateMask |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion]. |
| type UpdateCryptoKeyVersionRequest struct { |
| // Required. [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated values. |
| CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` |
| // Required. List of fields to be updated in this request. |
| UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *UpdateCryptoKeyVersionRequest) Reset() { *m = UpdateCryptoKeyVersionRequest{} } |
| func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*UpdateCryptoKeyVersionRequest) ProtoMessage() {} |
| func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{19} |
| } |
| |
| func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b) |
| } |
| func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src) |
| } |
| func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m) |
| } |
| func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo |
| |
| func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { |
| if m != nil { |
| return m.CryptoKeyVersion |
| } |
| return nil |
| } |
| |
| func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask { |
| if m != nil { |
| return m.UpdateMask |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. |
| type EncryptRequest struct { |
| // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] or [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] |
| // to use for encryption. |
| // |
| // If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server will use its |
| // [primary version][google.cloud.kms.v1.CryptoKey.primary]. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Required. The data to encrypt. Must be no larger than 64KiB. |
| // |
| // The maximum size depends on the key version's |
| // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For |
| // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the plaintext must be no larger |
| // than 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the |
| // plaintext and additional_authenticated_data fields must be no larger than |
| // 8KiB. |
| Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"` |
| // Optional. Optional data that, if specified, must also be provided during decryption |
| // through [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data]. |
| // |
| // The maximum size depends on the key version's |
| // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For |
| // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD must be no larger than |
| // 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the |
| // plaintext and additional_authenticated_data fields must be no larger than |
| // 8KiB. |
| AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *EncryptRequest) Reset() { *m = EncryptRequest{} } |
| func (m *EncryptRequest) String() string { return proto.CompactTextString(m) } |
| func (*EncryptRequest) ProtoMessage() {} |
| func (*EncryptRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{20} |
| } |
| |
| func (m *EncryptRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_EncryptRequest.Unmarshal(m, b) |
| } |
| func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic) |
| } |
| func (m *EncryptRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_EncryptRequest.Merge(m, src) |
| } |
| func (m *EncryptRequest) XXX_Size() int { |
| return xxx_messageInfo_EncryptRequest.Size(m) |
| } |
| func (m *EncryptRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_EncryptRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo |
| |
| func (m *EncryptRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *EncryptRequest) GetPlaintext() []byte { |
| if m != nil { |
| return m.Plaintext |
| } |
| return nil |
| } |
| |
| func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte { |
| if m != nil { |
| return m.AdditionalAuthenticatedData |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. |
| type DecryptRequest struct { |
| // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption. |
| // The server will choose the appropriate version. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Required. The encrypted data originally returned in |
| // [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext]. |
| Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` |
| // Optional. Optional data that must match the data originally supplied in |
| // [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data]. |
| AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *DecryptRequest) Reset() { *m = DecryptRequest{} } |
| func (m *DecryptRequest) String() string { return proto.CompactTextString(m) } |
| func (*DecryptRequest) ProtoMessage() {} |
| func (*DecryptRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{21} |
| } |
| |
| func (m *DecryptRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_DecryptRequest.Unmarshal(m, b) |
| } |
| func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic) |
| } |
| func (m *DecryptRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_DecryptRequest.Merge(m, src) |
| } |
| func (m *DecryptRequest) XXX_Size() int { |
| return xxx_messageInfo_DecryptRequest.Size(m) |
| } |
| func (m *DecryptRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_DecryptRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo |
| |
| func (m *DecryptRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *DecryptRequest) GetCiphertext() []byte { |
| if m != nil { |
| return m.Ciphertext |
| } |
| return nil |
| } |
| |
| func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte { |
| if m != nil { |
| return m.AdditionalAuthenticatedData |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. |
| type AsymmetricSignRequest struct { |
| // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Required. The digest of the data to sign. The digest must be produced with |
| // the same digest algorithm as specified by the key version's |
| // [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. |
| Digest *Digest `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *AsymmetricSignRequest) Reset() { *m = AsymmetricSignRequest{} } |
| func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) } |
| func (*AsymmetricSignRequest) ProtoMessage() {} |
| func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{22} |
| } |
| |
| func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b) |
| } |
| func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic) |
| } |
| func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_AsymmetricSignRequest.Merge(m, src) |
| } |
| func (m *AsymmetricSignRequest) XXX_Size() int { |
| return xxx_messageInfo_AsymmetricSignRequest.Size(m) |
| } |
| func (m *AsymmetricSignRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo |
| |
| func (m *AsymmetricSignRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *AsymmetricSignRequest) GetDigest() *Digest { |
| if m != nil { |
| return m.Digest |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. |
| type AsymmetricDecryptRequest struct { |
| // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for |
| // decryption. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Required. The data encrypted with the named [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public |
| // key using OAEP. |
| Ciphertext []byte `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *AsymmetricDecryptRequest) Reset() { *m = AsymmetricDecryptRequest{} } |
| func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) } |
| func (*AsymmetricDecryptRequest) ProtoMessage() {} |
| func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{23} |
| } |
| |
| func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b) |
| } |
| func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic) |
| } |
| func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src) |
| } |
| func (m *AsymmetricDecryptRequest) XXX_Size() int { |
| return xxx_messageInfo_AsymmetricDecryptRequest.Size(m) |
| } |
| func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo |
| |
| func (m *AsymmetricDecryptRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *AsymmetricDecryptRequest) GetCiphertext() []byte { |
| if m != nil { |
| return m.Ciphertext |
| } |
| return nil |
| } |
| |
| // Response message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. |
| type DecryptResponse struct { |
| // The decrypted data originally supplied in [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext]. |
| Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *DecryptResponse) Reset() { *m = DecryptResponse{} } |
| func (m *DecryptResponse) String() string { return proto.CompactTextString(m) } |
| func (*DecryptResponse) ProtoMessage() {} |
| func (*DecryptResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{24} |
| } |
| |
| func (m *DecryptResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_DecryptResponse.Unmarshal(m, b) |
| } |
| func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic) |
| } |
| func (m *DecryptResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_DecryptResponse.Merge(m, src) |
| } |
| func (m *DecryptResponse) XXX_Size() int { |
| return xxx_messageInfo_DecryptResponse.Size(m) |
| } |
| func (m *DecryptResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_DecryptResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo |
| |
| func (m *DecryptResponse) GetPlaintext() []byte { |
| if m != nil { |
| return m.Plaintext |
| } |
| return nil |
| } |
| |
| // Response message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. |
| type EncryptResponse struct { |
| // The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in encryption. Check |
| // this field to verify that the intended resource was used for encryption. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // The encrypted data. |
| Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *EncryptResponse) Reset() { *m = EncryptResponse{} } |
| func (m *EncryptResponse) String() string { return proto.CompactTextString(m) } |
| func (*EncryptResponse) ProtoMessage() {} |
| func (*EncryptResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{25} |
| } |
| |
| func (m *EncryptResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_EncryptResponse.Unmarshal(m, b) |
| } |
| func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic) |
| } |
| func (m *EncryptResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_EncryptResponse.Merge(m, src) |
| } |
| func (m *EncryptResponse) XXX_Size() int { |
| return xxx_messageInfo_EncryptResponse.Size(m) |
| } |
| func (m *EncryptResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_EncryptResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo |
| |
| func (m *EncryptResponse) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *EncryptResponse) GetCiphertext() []byte { |
| if m != nil { |
| return m.Ciphertext |
| } |
| return nil |
| } |
| |
| // Response message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. |
| type AsymmetricSignResponse struct { |
| // The created signature. |
| Signature []byte `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *AsymmetricSignResponse) Reset() { *m = AsymmetricSignResponse{} } |
| func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) } |
| func (*AsymmetricSignResponse) ProtoMessage() {} |
| func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{26} |
| } |
| |
| func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b) |
| } |
| func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic) |
| } |
| func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_AsymmetricSignResponse.Merge(m, src) |
| } |
| func (m *AsymmetricSignResponse) XXX_Size() int { |
| return xxx_messageInfo_AsymmetricSignResponse.Size(m) |
| } |
| func (m *AsymmetricSignResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo |
| |
| func (m *AsymmetricSignResponse) GetSignature() []byte { |
| if m != nil { |
| return m.Signature |
| } |
| return nil |
| } |
| |
| // Response message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. |
| type AsymmetricDecryptResponse struct { |
| // The decrypted data originally encrypted with the matching public key. |
| Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *AsymmetricDecryptResponse) Reset() { *m = AsymmetricDecryptResponse{} } |
| func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) } |
| func (*AsymmetricDecryptResponse) ProtoMessage() {} |
| func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{27} |
| } |
| |
| func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b) |
| } |
| func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic) |
| } |
| func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src) |
| } |
| func (m *AsymmetricDecryptResponse) XXX_Size() int { |
| return xxx_messageInfo_AsymmetricDecryptResponse.Size(m) |
| } |
| func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() { |
| xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo |
| |
| func (m *AsymmetricDecryptResponse) GetPlaintext() []byte { |
| if m != nil { |
| return m.Plaintext |
| } |
| return nil |
| } |
| |
| // Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. |
| type UpdateCryptoKeyPrimaryVersionRequest struct { |
| // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to update. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Required. The id of the child [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary. |
| CryptoKeyVersionId string `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset() { *m = UpdateCryptoKeyPrimaryVersionRequest{} } |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage() {} |
| func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{28} |
| } |
| |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b) |
| } |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src) |
| } |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m) |
| } |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo |
| |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string { |
| if m != nil { |
| return m.CryptoKeyVersionId |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]. |
| type DestroyCryptoKeyVersionRequest struct { |
| // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *DestroyCryptoKeyVersionRequest) Reset() { *m = DestroyCryptoKeyVersionRequest{} } |
| func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*DestroyCryptoKeyVersionRequest) ProtoMessage() {} |
| func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{29} |
| } |
| |
| func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b) |
| } |
| func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src) |
| } |
| func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m) |
| } |
| func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo |
| |
| func (m *DestroyCryptoKeyVersionRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]. |
| type RestoreCryptoKeyVersionRequest struct { |
| // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *RestoreCryptoKeyVersionRequest) Reset() { *m = RestoreCryptoKeyVersionRequest{} } |
| func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } |
| func (*RestoreCryptoKeyVersionRequest) ProtoMessage() {} |
| func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{30} |
| } |
| |
| func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b) |
| } |
| func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic) |
| } |
| func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src) |
| } |
| func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int { |
| return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m) |
| } |
| func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() { |
| xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo |
| |
| func (m *RestoreCryptoKeyVersionRequest) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| // A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest. |
| type Digest struct { |
| // Required. The message digest. |
| // |
| // Types that are valid to be assigned to Digest: |
| // *Digest_Sha256 |
| // *Digest_Sha384 |
| // *Digest_Sha512 |
| Digest isDigest_Digest `protobuf_oneof:"digest"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *Digest) Reset() { *m = Digest{} } |
| func (m *Digest) String() string { return proto.CompactTextString(m) } |
| func (*Digest) ProtoMessage() {} |
| func (*Digest) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{31} |
| } |
| |
| func (m *Digest) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_Digest.Unmarshal(m, b) |
| } |
| func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_Digest.Marshal(b, m, deterministic) |
| } |
| func (m *Digest) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_Digest.Merge(m, src) |
| } |
| func (m *Digest) XXX_Size() int { |
| return xxx_messageInfo_Digest.Size(m) |
| } |
| func (m *Digest) XXX_DiscardUnknown() { |
| xxx_messageInfo_Digest.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_Digest proto.InternalMessageInfo |
| |
| type isDigest_Digest interface { |
| isDigest_Digest() |
| } |
| |
| type Digest_Sha256 struct { |
| Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"` |
| } |
| |
| type Digest_Sha384 struct { |
| Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"` |
| } |
| |
| type Digest_Sha512 struct { |
| Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"` |
| } |
| |
| func (*Digest_Sha256) isDigest_Digest() {} |
| |
| func (*Digest_Sha384) isDigest_Digest() {} |
| |
| func (*Digest_Sha512) isDigest_Digest() {} |
| |
| func (m *Digest) GetDigest() isDigest_Digest { |
| if m != nil { |
| return m.Digest |
| } |
| return nil |
| } |
| |
| func (m *Digest) GetSha256() []byte { |
| if x, ok := m.GetDigest().(*Digest_Sha256); ok { |
| return x.Sha256 |
| } |
| return nil |
| } |
| |
| func (m *Digest) GetSha384() []byte { |
| if x, ok := m.GetDigest().(*Digest_Sha384); ok { |
| return x.Sha384 |
| } |
| return nil |
| } |
| |
| func (m *Digest) GetSha512() []byte { |
| if x, ok := m.GetDigest().(*Digest_Sha512); ok { |
| return x.Sha512 |
| } |
| return nil |
| } |
| |
| // XXX_OneofWrappers is for the internal use of the proto package. |
| func (*Digest) XXX_OneofWrappers() []interface{} { |
| return []interface{}{ |
| (*Digest_Sha256)(nil), |
| (*Digest_Sha384)(nil), |
| (*Digest_Sha512)(nil), |
| } |
| } |
| |
| // Cloud KMS metadata for the given [google.cloud.location.Location][google.cloud.location.Location]. |
| type LocationMetadata struct { |
| // Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with |
| // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] |
| // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this location. |
| HsmAvailable bool `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *LocationMetadata) Reset() { *m = LocationMetadata{} } |
| func (m *LocationMetadata) String() string { return proto.CompactTextString(m) } |
| func (*LocationMetadata) ProtoMessage() {} |
| func (*LocationMetadata) Descriptor() ([]byte, []int) { |
| return fileDescriptor_723aeaeb61739a25, []int{32} |
| } |
| |
| func (m *LocationMetadata) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_LocationMetadata.Unmarshal(m, b) |
| } |
| func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic) |
| } |
| func (m *LocationMetadata) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_LocationMetadata.Merge(m, src) |
| } |
| func (m *LocationMetadata) XXX_Size() int { |
| return xxx_messageInfo_LocationMetadata.Size(m) |
| } |
| func (m *LocationMetadata) XXX_DiscardUnknown() { |
| xxx_messageInfo_LocationMetadata.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo |
| |
| func (m *LocationMetadata) GetHsmAvailable() bool { |
| if m != nil { |
| return m.HsmAvailable |
| } |
| return false |
| } |
| |
| func init() { |
| proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest") |
| proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest") |
| proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest") |
| proto.RegisterType((*ListImportJobsRequest)(nil), "google.cloud.kms.v1.ListImportJobsRequest") |
| proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse") |
| proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse") |
| proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse") |
| proto.RegisterType((*ListImportJobsResponse)(nil), "google.cloud.kms.v1.ListImportJobsResponse") |
| proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest") |
| proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest") |
| proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest") |
| proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest") |
| proto.RegisterType((*GetImportJobRequest)(nil), "google.cloud.kms.v1.GetImportJobRequest") |
| proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest") |
| proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest") |
| proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest") |
| proto.RegisterType((*ImportCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.ImportCryptoKeyVersionRequest") |
| proto.RegisterType((*CreateImportJobRequest)(nil), "google.cloud.kms.v1.CreateImportJobRequest") |
| proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest") |
| proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest") |
| proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest") |
| proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest") |
| proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest") |
| proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest") |
| proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse") |
| proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse") |
| proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse") |
| proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse") |
| proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest") |
| proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest") |
| proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest") |
| proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest") |
| proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata") |
| } |
| |
| func init() { proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25) } |
| |
| var fileDescriptor_723aeaeb61739a25 = []byte{ |
| // 2283 bytes of a gzipped FileDescriptorProto |
| 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x5a, 0x4d, 0x6c, 0x1b, 0xc7, |
| 0x15, 0xce, 0xd0, 0xb1, 0x2c, 0x3d, 0xc9, 0x92, 0x3d, 0xb2, 0x65, 0x99, 0xb6, 0x64, 0x7b, 0x95, |
| 0x1f, 0x5b, 0x71, 0xb8, 0x15, 0x1d, 0xbb, 0x36, 0x5d, 0xc3, 0x5d, 0x59, 0x89, 0xe3, 0x28, 0x4e, |
| 0x05, 0xfa, 0xaf, 0x4d, 0xd5, 0x6e, 0x86, 0xe4, 0x88, 0xda, 0x90, 0xbb, 0xcb, 0xec, 0x2e, 0xa9, |
| 0x30, 0x6d, 0x2e, 0x05, 0x72, 0x28, 0x50, 0xa0, 0x87, 0x1c, 0x5a, 0xa0, 0x48, 0x51, 0xf4, 0xd8, |
| 0x63, 0xff, 0x80, 0xfe, 0xdd, 0x8a, 0x1e, 0x72, 0x29, 0xfa, 0x73, 0x52, 0x80, 0xc0, 0x87, 0x9e, |
| 0x7a, 0x2a, 0x7a, 0x2a, 0xda, 0x4b, 0xb1, 0x33, 0xb3, 0xbf, 0xdc, 0x25, 0x29, 0x6a, 0x0d, 0xf8, |
| 0x66, 0xce, 0xbe, 0x79, 0xf3, 0x7d, 0x6f, 0xde, 0x7b, 0x33, 0xf3, 0x59, 0x70, 0xae, 0x6e, 0x9a, |
| 0xf5, 0x26, 0x95, 0xab, 0x4d, 0xb3, 0x5d, 0x93, 0x1b, 0xba, 0x2d, 0x77, 0x56, 0x64, 0x9b, 0x5a, |
| 0x1d, 0xad, 0x4a, 0x0b, 0x2d, 0xcb, 0x74, 0x4c, 0x3c, 0xcb, 0x4d, 0x0a, 0xcc, 0xa4, 0xd0, 0xd0, |
| 0xed, 0x42, 0x67, 0x25, 0x7f, 0x5a, 0xcc, 0x23, 0x2d, 0x4d, 0x26, 0x86, 0x61, 0x3a, 0xc4, 0xd1, |
| 0x4c, 0xc3, 0xe6, 0x53, 0xf2, 0x27, 0x42, 0x5f, 0xab, 0x4d, 0x8d, 0x1a, 0x8e, 0xf8, 0x70, 0x26, |
| 0xf4, 0x61, 0x4b, 0xa3, 0xcd, 0x9a, 0x5a, 0xa1, 0xdb, 0xa4, 0xa3, 0x99, 0x96, 0x30, 0x38, 0x19, |
| 0x32, 0xb0, 0xa8, 0x6d, 0xb6, 0x2d, 0x0f, 0x47, 0x7e, 0x29, 0x09, 0xaa, 0x67, 0xe3, 0xad, 0x7c, |
| 0x56, 0x18, 0xb1, 0x5f, 0x95, 0xf6, 0x96, 0x58, 0x45, 0x27, 0x76, 0x83, 0x5b, 0x48, 0x9f, 0x21, |
| 0x98, 0x7d, 0x53, 0xb3, 0x9d, 0x75, 0xda, 0x2d, 0x6b, 0x46, 0xdd, 0x2e, 0xd3, 0xf7, 0xda, 0xd4, |
| 0x76, 0xb0, 0x02, 0x63, 0x2d, 0x62, 0x51, 0xc3, 0x99, 0x47, 0x67, 0xd1, 0xf9, 0x89, 0xd5, 0x0b, |
| 0x8f, 0x95, 0xdc, 0x7f, 0x95, 0x25, 0x38, 0xd7, 0x34, 0xab, 0x82, 0x1c, 0xf7, 0x4d, 0x5a, 0x9a, |
| 0x5d, 0xa8, 0x9a, 0xba, 0xfc, 0xa6, 0xf8, 0x50, 0x16, 0x13, 0xf1, 0x59, 0x98, 0x68, 0x91, 0x3a, |
| 0x55, 0x6d, 0xed, 0x03, 0x3a, 0x9f, 0x3b, 0x8b, 0xce, 0x1f, 0x5c, 0x3d, 0xf0, 0x58, 0x41, 0xe5, |
| 0x71, 0x77, 0xf4, 0x9e, 0xf6, 0x01, 0xc5, 0x12, 0x00, 0xb3, 0x70, 0xcc, 0x06, 0x35, 0xe6, 0x0f, |
| 0xb0, 0x85, 0x98, 0x09, 0x9b, 0x78, 0xdf, 0x1d, 0xc5, 0xa7, 0x60, 0x6c, 0x4b, 0x6b, 0x3a, 0xd4, |
| 0x9a, 0x7f, 0x36, 0xf8, 0x2e, 0x86, 0xf0, 0x22, 0x8c, 0x9b, 0x56, 0x8d, 0x5a, 0x6a, 0xa5, 0x3b, |
| 0x7f, 0x30, 0xf8, 0x7c, 0x88, 0x0d, 0xae, 0x76, 0xa5, 0xdf, 0xe6, 0xe0, 0xb8, 0xcb, 0xee, 0x96, |
| 0xd5, 0x6d, 0x39, 0xe6, 0x3a, 0xed, 0xfa, 0xfc, 0x6e, 0xc6, 0xf8, 0xbd, 0xc8, 0xf8, 0x9d, 0x83, |
| 0x33, 0x2c, 0x9e, 0xee, 0xb6, 0xc6, 0xe8, 0x89, 0x00, 0x65, 0xcc, 0xee, 0x1b, 0x30, 0xd5, 0xa1, |
| 0x96, 0xad, 0x99, 0x86, 0xda, 0xd1, 0xe8, 0x0e, 0xe3, 0x38, 0x5d, 0x2c, 0x15, 0x12, 0x92, 0xac, |
| 0xe0, 0x93, 0x78, 0xc8, 0x67, 0xf4, 0x0c, 0x3c, 0xd4, 0xe8, 0x4e, 0x79, 0xb2, 0x13, 0xfc, 0x08, |
| 0x05, 0xef, 0x60, 0xff, 0xe0, 0x8d, 0x25, 0x04, 0xef, 0xe7, 0x39, 0x38, 0x1d, 0x09, 0x9e, 0x58, |
| 0xe6, 0x69, 0x8b, 0xe1, 0x5b, 0xf0, 0x6c, 0x46, 0xb1, 0x63, 0x7e, 0xf6, 0x17, 0xb4, 0xcf, 0x10, |
| 0xcf, 0xb8, 0x3b, 0x7a, 0xcb, 0xb4, 0x9c, 0x37, 0xcc, 0xca, 0xd3, 0x16, 0xad, 0x7d, 0xd5, 0xd3, |
| 0x0f, 0x11, 0x1c, 0x8b, 0x76, 0x0b, 0xbb, 0x65, 0x1a, 0x36, 0xc5, 0xd7, 0x60, 0xa2, 0x41, 0xbb, |
| 0xaa, 0xe5, 0x0e, 0xce, 0xa3, 0xb3, 0x07, 0xce, 0x4f, 0x16, 0x4f, 0x27, 0x6e, 0x84, 0x47, 0x6a, |
| 0xbc, 0x21, 0x5c, 0xe0, 0x17, 0x60, 0xc6, 0xa0, 0xef, 0x3b, 0x6a, 0x08, 0xb9, 0x4b, 0x6e, 0xa2, |
| 0x7c, 0xd8, 0x1d, 0xde, 0xf0, 0x81, 0x2f, 0x00, 0x38, 0xa6, 0x43, 0x9a, 0x9c, 0xbf, 0x4b, 0xee, |
| 0x60, 0x79, 0x82, 0x8d, 0xb8, 0xdc, 0xa5, 0x9f, 0x20, 0x98, 0x8b, 0x97, 0xba, 0x00, 0x77, 0x13, |
| 0x26, 0xab, 0x6c, 0x54, 0x6d, 0xd0, 0xae, 0x07, 0x6f, 0xb1, 0x7f, 0x9e, 0x94, 0xa1, 0xea, 0x3b, |
| 0xca, 0x0a, 0xe2, 0x1f, 0x10, 0x2c, 0xa4, 0x14, 0x94, 0x40, 0xfa, 0x00, 0x66, 0x03, 0xa4, 0xaa, |
| 0xa8, 0x64, 0x0f, 0xf1, 0xf3, 0x43, 0x65, 0x76, 0xf9, 0x68, 0x35, 0xee, 0x3e, 0xeb, 0x10, 0x87, |
| 0x73, 0x3b, 0x08, 0xb1, 0xc6, 0x46, 0xd5, 0x77, 0xcd, 0x4a, 0xff, 0x10, 0xfb, 0xb3, 0xcb, 0xa0, |
| 0xf9, 0x8e, 0xb2, 0x82, 0xb8, 0x01, 0x47, 0x6f, 0x53, 0x2f, 0x3d, 0xbd, 0xca, 0xbb, 0x0e, 0xcf, |
| 0x1a, 0x44, 0xa7, 0x7b, 0xad, 0x3b, 0x36, 0x49, 0xba, 0x0f, 0xb3, 0xb7, 0x69, 0xb0, 0x65, 0x9e, |
| 0xcf, 0x1b, 0x11, 0x9f, 0xfe, 0xe9, 0x98, 0xe6, 0x33, 0x98, 0xcf, 0xbd, 0x56, 0x20, 0x1f, 0xf6, |
| 0xea, 0xed, 0x9d, 0x70, 0xbe, 0x16, 0x71, 0xfe, 0x05, 0xe6, 0x7c, 0x19, 0xce, 0x0f, 0x74, 0xee, |
| 0xb9, 0xe1, 0x6b, 0x7c, 0x9d, 0x21, 0xdf, 0x68, 0x57, 0x9a, 0x5a, 0x35, 0x84, 0x3c, 0x1b, 0xe7, |
| 0x3c, 0x2c, 0xc1, 0x5e, 0x8e, 0x16, 0x96, 0x60, 0x3e, 0xf7, 0xfa, 0x7b, 0x04, 0xc7, 0x6e, 0x59, |
| 0x94, 0x38, 0x34, 0xb6, 0x85, 0x19, 0x5c, 0x47, 0x96, 0x60, 0xd2, 0x6b, 0x51, 0xaa, 0x56, 0xe3, |
| 0xd9, 0xe5, 0xb6, 0xb7, 0x5c, 0x79, 0x42, 0xf4, 0xa2, 0x3b, 0x35, 0xfc, 0x25, 0x18, 0xf7, 0x8c, |
| 0x58, 0x72, 0x0d, 0x68, 0x63, 0x7c, 0xfe, 0x21, 0x31, 0x5f, 0xfa, 0x6e, 0x0e, 0xe6, 0x38, 0xfc, |
| 0x9e, 0x7c, 0xd9, 0x77, 0xf7, 0x7f, 0x11, 0x0e, 0x87, 0x5a, 0x43, 0x94, 0xc0, 0xa4, 0x5f, 0xf2, |
| 0x77, 0x6a, 0x78, 0x15, 0x20, 0x30, 0x14, 0x24, 0x06, 0x34, 0x3b, 0x11, 0x06, 0xdf, 0x0b, 0x56, |
| 0x60, 0xc1, 0x6e, 0x68, 0x2d, 0x55, 0x33, 0x34, 0x47, 0x23, 0x4d, 0xaf, 0x13, 0xa9, 0x55, 0x97, |
| 0x9c, 0x66, 0x1a, 0xec, 0x70, 0x18, 0x2f, 0xe7, 0x5d, 0xa3, 0x3b, 0xdc, 0x46, 0xa4, 0xc7, 0x2d, |
| 0x61, 0xe1, 0x6e, 0xe5, 0x42, 0x2c, 0x16, 0xb1, 0x2c, 0x4f, 0xdd, 0xd3, 0xc1, 0x45, 0xe4, 0x05, |
| 0xe5, 0xab, 0x80, 0x7b, 0xfb, 0x25, 0x8b, 0xcc, 0xb0, 0xed, 0x92, 0x53, 0x3f, 0x12, 0xef, 0x99, |
| 0xd2, 0x2f, 0x72, 0xb0, 0xc0, 0xb3, 0xf3, 0x09, 0xc2, 0xaf, 0xc0, 0x04, 0x69, 0xd6, 0x4d, 0x4b, |
| 0x73, 0xb6, 0x75, 0x86, 0x7a, 0xba, 0x78, 0x73, 0xb4, 0xeb, 0x8b, 0xe2, 0xb9, 0x11, 0x5b, 0xe9, |
| 0xbb, 0x75, 0xef, 0x04, 0x41, 0x67, 0x0e, 0xce, 0xfc, 0x5c, 0x79, 0xc2, 0xef, 0xbe, 0x58, 0x86, |
| 0x59, 0xcb, 0x26, 0x2a, 0xa1, 0xb6, 0xba, 0x63, 0x91, 0x56, 0x8b, 0xd6, 0x58, 0xee, 0xb8, 0x9b, |
| 0x3c, 0xf5, 0xfa, 0x33, 0xe5, 0x23, 0x96, 0x4d, 0x14, 0x6a, 0x3f, 0xe2, 0x9f, 0xdc, 0x7c, 0x99, |
| 0x83, 0x63, 0x21, 0x43, 0x55, 0x27, 0x0e, 0xb5, 0x34, 0xd2, 0x94, 0xfe, 0x84, 0xbc, 0x02, 0xe8, |
| 0xe9, 0x0c, 0x59, 0x14, 0x40, 0x40, 0x24, 0x5e, 0x00, 0x3e, 0x17, 0x5e, 0x00, 0x21, 0xc6, 0xfd, |
| 0x0a, 0xc0, 0x07, 0x19, 0x8f, 0x88, 0xf4, 0x63, 0x04, 0x73, 0x0f, 0x5a, 0xb5, 0xa4, 0x4a, 0x8e, |
| 0xd6, 0x17, 0x1a, 0xa9, 0xbe, 0xbe, 0x0c, 0x93, 0x6d, 0xe6, 0x9d, 0x3d, 0xc5, 0x44, 0xc2, 0xe6, |
| 0x3d, 0x27, 0xde, 0x6b, 0xad, 0xf0, 0x9a, 0xfb, 0x5a, 0xbb, 0x4b, 0xec, 0x06, 0x77, 0x00, 0x7c, |
| 0x8e, 0x3b, 0x20, 0xfd, 0x0e, 0xc1, 0x42, 0x0c, 0x60, 0x2c, 0x3f, 0x93, 0x6b, 0x03, 0xed, 0xbf, |
| 0x36, 0xb2, 0x41, 0x3f, 0xfd, 0xaa, 0xc1, 0x1c, 0x67, 0x73, 0xa0, 0xe2, 0x73, 0x30, 0xd1, 0x6a, |
| 0x12, 0xcd, 0x70, 0xe8, 0xfb, 0x0e, 0x43, 0x34, 0x25, 0x82, 0xee, 0x8f, 0xe2, 0xdb, 0xb0, 0x40, |
| 0x6a, 0x35, 0xcd, 0xed, 0x4e, 0xa4, 0xa9, 0x92, 0xb6, 0xb3, 0x4d, 0x0d, 0x47, 0xab, 0x12, 0x87, |
| 0xd6, 0xd4, 0x1a, 0x71, 0x08, 0x4b, 0x95, 0x29, 0x7e, 0xe3, 0x3d, 0x15, 0x58, 0x2a, 0x61, 0xc3, |
| 0x35, 0xe2, 0x10, 0xf7, 0x1e, 0x37, 0xbd, 0x46, 0xb3, 0x44, 0xbf, 0x04, 0x50, 0xd5, 0x5a, 0xdb, |
| 0xd4, 0x8a, 0xc3, 0x0f, 0x0d, 0x67, 0x87, 0xff, 0x07, 0x08, 0x8e, 0x2b, 0x76, 0x57, 0xd7, 0xa9, |
| 0x63, 0x69, 0xd5, 0x7b, 0x5a, 0x3d, 0xdb, 0x8b, 0x07, 0xbe, 0x0a, 0x63, 0x35, 0xad, 0x4e, 0x6d, |
| 0x47, 0x14, 0xdf, 0xa9, 0xc4, 0x6c, 0x5b, 0x63, 0x26, 0x9c, 0xa6, 0xb0, 0x97, 0x3e, 0x42, 0x30, |
| 0x1f, 0x20, 0x8b, 0xc5, 0x38, 0x1b, 0x70, 0xd1, 0x50, 0x1f, 0x48, 0x0c, 0xb5, 0x24, 0xc3, 0x8c, |
| 0xbf, 0xb8, 0xb8, 0xe1, 0x9e, 0x0e, 0x27, 0x98, 0x0b, 0x61, 0x2a, 0x94, 0x5b, 0xd2, 0xab, 0x30, |
| 0xe3, 0xe7, 0xb3, 0x98, 0x80, 0xc3, 0x70, 0xc5, 0xe2, 0x8b, 0xbd, 0xfb, 0x1c, 0x59, 0xf7, 0x0a, |
| 0xcc, 0xc5, 0x37, 0x26, 0x58, 0xde, 0xd6, 0xea, 0x06, 0x71, 0xda, 0x16, 0xf5, 0x96, 0xf7, 0x07, |
| 0xa4, 0x6b, 0x70, 0x32, 0x21, 0x6c, 0x43, 0x21, 0xff, 0x04, 0xc1, 0x73, 0xb1, 0x46, 0xb2, 0x61, |
| 0x69, 0x3a, 0xb1, 0xe2, 0xfd, 0x64, 0x9f, 0x29, 0x7e, 0x05, 0x8e, 0xf7, 0xb6, 0xa3, 0x58, 0x1b, |
| 0xc7, 0xf1, 0x56, 0x73, 0xa7, 0x26, 0x6d, 0xc1, 0xe2, 0x1a, 0xb5, 0x1d, 0xcb, 0xec, 0x3e, 0xd9, |
| 0xdb, 0xf2, 0x16, 0x2c, 0x96, 0xa9, 0xed, 0x98, 0x16, 0x7d, 0xb2, 0xeb, 0xbc, 0x03, 0x63, 0x3c, |
| 0xf3, 0xf1, 0x3c, 0x8c, 0xd9, 0xdb, 0xa4, 0x78, 0xf9, 0x0a, 0xdf, 0x94, 0xd7, 0x9f, 0x29, 0x8b, |
| 0xdf, 0xe2, 0xcb, 0xa5, 0xab, 0xaf, 0xf0, 0x14, 0x11, 0x5f, 0x2e, 0x5d, 0x7d, 0x45, 0x7c, 0xb9, |
| 0xbc, 0x52, 0xe4, 0x99, 0x2b, 0xbe, 0x5c, 0x5e, 0x29, 0xae, 0x8e, 0x7b, 0x45, 0x27, 0x7d, 0x11, |
| 0x8e, 0x78, 0x97, 0xdf, 0xbb, 0xd4, 0x21, 0x6e, 0x6b, 0xc0, 0x4b, 0x70, 0x78, 0xdb, 0xd6, 0x55, |
| 0xd2, 0x21, 0x5a, 0x93, 0x54, 0x9a, 0x9c, 0xc4, 0x78, 0x79, 0x6a, 0xdb, 0xd6, 0x15, 0x6f, 0xac, |
| 0xf8, 0xcf, 0xe7, 0xe1, 0xd8, 0x3a, 0xed, 0xde, 0x25, 0x06, 0xa9, 0x53, 0x9d, 0x1a, 0xce, 0x3d, |
| 0xae, 0x7c, 0xe2, 0x9f, 0x22, 0x98, 0x0a, 0x3f, 0xfb, 0xf1, 0xf9, 0xc4, 0x8a, 0x4e, 0xd0, 0x11, |
| 0xf3, 0x17, 0x86, 0xb0, 0xe4, 0x79, 0x2a, 0xdd, 0xd8, 0x55, 0xc4, 0x59, 0xff, 0x9d, 0xbf, 0xfd, |
| 0xe3, 0xe3, 0x5c, 0x01, 0x5f, 0x94, 0x3b, 0x2b, 0xf2, 0xb7, 0xf8, 0xd0, 0x8d, 0x96, 0x65, 0xbe, |
| 0x4b, 0xab, 0x8e, 0x2d, 0x2f, 0xcb, 0xfe, 0x9d, 0x5f, 0x5e, 0xfe, 0x50, 0xf6, 0x75, 0x84, 0x5f, |
| 0x21, 0x98, 0x8e, 0x0a, 0x00, 0x78, 0x39, 0x75, 0xf1, 0x1e, 0x41, 0x30, 0xff, 0xd2, 0x50, 0xb6, |
| 0x02, 0xea, 0x1b, 0x51, 0xa8, 0xd7, 0xf1, 0xb5, 0xc1, 0x50, 0x7d, 0xa4, 0x2e, 0xea, 0x90, 0xb8, |
| 0xf0, 0x39, 0x8a, 0x69, 0x94, 0xfe, 0xb3, 0x7d, 0x65, 0x30, 0xa4, 0x98, 0x24, 0x97, 0x2f, 0xee, |
| 0x65, 0x8a, 0x20, 0xf3, 0xcd, 0x28, 0x99, 0xaf, 0xe0, 0xbb, 0x7b, 0x22, 0x13, 0xe2, 0x12, 0x61, |
| 0xe6, 0xd3, 0xf0, 0x36, 0x26, 0x90, 0x0d, 0xfa, 0x6c, 0x4c, 0x8f, 0x6e, 0xd6, 0x67, 0x63, 0x7a, |
| 0x75, 0x88, 0xfd, 0x6f, 0x4c, 0x48, 0x92, 0xf8, 0x3e, 0x02, 0x08, 0xc4, 0x04, 0xfc, 0x42, 0x22, |
| 0x8e, 0x1e, 0xb5, 0x21, 0xdf, 0xf7, 0xc1, 0x28, 0x5d, 0xdf, 0x55, 0x58, 0x1f, 0x88, 0xa4, 0xb8, |
| 0x3b, 0x30, 0x04, 0x38, 0xfc, 0x23, 0x04, 0x53, 0x61, 0xd9, 0x20, 0xa5, 0x0e, 0x13, 0xf4, 0x8a, |
| 0xfc, 0x80, 0x1b, 0xaa, 0xa4, 0x44, 0xe2, 0x35, 0x1c, 0xa0, 0xe8, 0xce, 0xe3, 0x3f, 0xa2, 0xa8, |
| 0x54, 0xe2, 0x5d, 0x17, 0xe5, 0x81, 0x20, 0xa3, 0x8d, 0x36, 0x3f, 0xdc, 0xed, 0x54, 0x7a, 0x10, |
| 0x49, 0xd7, 0x11, 0x20, 0xf7, 0xe6, 0xaa, 0x4b, 0xe3, 0x37, 0x3c, 0xc8, 0xbe, 0x6e, 0x92, 0x1e, |
| 0xe4, 0xb8, 0xb4, 0x92, 0x12, 0x64, 0xdf, 0x4c, 0x52, 0x19, 0xe2, 0xaf, 0xe1, 0x47, 0x99, 0x22, |
| 0x96, 0x5b, 0x3e, 0x54, 0x91, 0x20, 0x7e, 0x61, 0xa4, 0x63, 0x8f, 0xbf, 0xcf, 0xf2, 0x03, 0x5e, |
| 0x48, 0xa3, 0x25, 0x48, 0x50, 0x4d, 0x6e, 0x64, 0x7f, 0x8d, 0xe0, 0x70, 0x44, 0xdd, 0xc1, 0x17, |
| 0x52, 0x76, 0xba, 0x57, 0x01, 0x1a, 0x50, 0x56, 0x9b, 0xbb, 0xca, 0x29, 0x5e, 0xe4, 0x17, 0x43, |
| 0x22, 0x8f, 0xff, 0x6f, 0x86, 0xfd, 0xaa, 0xb4, 0xa7, 0x03, 0xa5, 0xe4, 0x2b, 0x41, 0xf8, 0xcf, |
| 0x08, 0x66, 0x62, 0x5a, 0x06, 0x7e, 0xa9, 0x0f, 0xf4, 0x3d, 0x57, 0x9f, 0xb9, 0xab, 0x9c, 0x11, |
| 0xf0, 0x23, 0x22, 0x4f, 0xe8, 0x17, 0xa3, 0x70, 0x5b, 0x1a, 0xfd, 0xa0, 0x29, 0x85, 0x9e, 0xad, |
| 0xf8, 0x7f, 0xa8, 0x47, 0xa9, 0xf2, 0xca, 0xb5, 0x38, 0x0c, 0xb1, 0xd1, 0x2a, 0xf6, 0x23, 0xb4, |
| 0xab, 0x9c, 0xec, 0xe5, 0x29, 0x2e, 0x83, 0x8c, 0x61, 0x55, 0xca, 0xf6, 0xf4, 0x29, 0x25, 0x3c, |
| 0x82, 0xf1, 0xdf, 0x11, 0xcc, 0x25, 0x8b, 0x3b, 0x29, 0xec, 0xfb, 0x2a, 0x41, 0xc3, 0xb2, 0x17, |
| 0xd5, 0x2f, 0xdd, 0xcf, 0x96, 0x20, 0xaf, 0xb1, 0x12, 0x5a, 0x0e, 0xa5, 0x69, 0xd0, 0x00, 0xfa, |
| 0xa5, 0xe9, 0x9e, 0x7b, 0x40, 0x28, 0x4d, 0x23, 0x52, 0x4c, 0xe8, 0xd7, 0x88, 0x69, 0x1a, 0x34, |
| 0x8a, 0x52, 0x48, 0xbc, 0xc1, 0x7f, 0x41, 0x30, 0x13, 0x7b, 0x9c, 0xa4, 0x30, 0x4a, 0x16, 0x6b, |
| 0x06, 0x16, 0xde, 0x7b, 0xbb, 0xca, 0x5c, 0x90, 0x20, 0x17, 0x43, 0xb2, 0x06, 0x23, 0x52, 0x2e, |
| 0xae, 0x31, 0x22, 0x81, 0x49, 0x61, 0x94, 0xa3, 0x31, 0x52, 0x7a, 0x1f, 0xe7, 0x7a, 0xa4, 0xa5, |
| 0xfe, 0xc9, 0xd7, 0x57, 0xe6, 0x19, 0x36, 0xf9, 0x3e, 0x41, 0xbb, 0xca, 0x62, 0x6f, 0x29, 0xf4, |
| 0x30, 0xee, 0x14, 0xdf, 0x89, 0x31, 0xf6, 0x4c, 0x0b, 0x59, 0x9d, 0x57, 0x89, 0x25, 0xf9, 0x4b, |
| 0x04, 0x87, 0xc4, 0x0b, 0x1a, 0x2f, 0x25, 0x52, 0x8a, 0xea, 0x45, 0xf9, 0xe7, 0xfa, 0x1b, 0x05, |
| 0x77, 0xdb, 0x69, 0x17, 0xf7, 0x45, 0xff, 0xc1, 0x2b, 0x12, 0x74, 0x75, 0xd4, 0x23, 0x78, 0xf9, |
| 0xc3, 0x12, 0xe5, 0x8b, 0xb8, 0x25, 0xe7, 0xc2, 0x16, 0xef, 0xed, 0x14, 0xd8, 0x51, 0x11, 0x23, |
| 0x05, 0x76, 0xec, 0xc9, 0xee, 0xc2, 0x9e, 0x61, 0xb0, 0x03, 0x6d, 0x80, 0xe1, 0x7e, 0x4d, 0x52, |
| 0x46, 0xbe, 0x9f, 0x95, 0x6a, 0xd4, 0x87, 0xfd, 0x18, 0xc1, 0x74, 0x54, 0x68, 0x48, 0xb9, 0x92, |
| 0x27, 0xca, 0x44, 0x29, 0x57, 0xf2, 0x64, 0xe5, 0x42, 0x6a, 0xef, 0x2a, 0x93, 0x8c, 0x0b, 0x7f, |
| 0x9e, 0x32, 0x1e, 0x44, 0xda, 0xcc, 0xf4, 0x0a, 0x54, 0x22, 0x91, 0xb5, 0x5d, 0x8a, 0xff, 0x42, |
| 0x70, 0xb4, 0x47, 0x13, 0xc1, 0x2f, 0x0f, 0x40, 0x1e, 0xdb, 0xad, 0xc2, 0xb0, 0xe6, 0x82, 0xeb, |
| 0xb7, 0x53, 0xf6, 0xad, 0x26, 0xa9, 0x4f, 0x8a, 0xef, 0x5a, 0xb0, 0xab, 0xff, 0xee, 0xd5, 0x84, |
| 0xa3, 0x52, 0x0e, 0xbe, 0x36, 0x4c, 0x83, 0x49, 0x94, 0x7f, 0x06, 0x76, 0xd2, 0xce, 0xae, 0x92, |
| 0xe7, 0xd4, 0x93, 0x54, 0x1e, 0x16, 0x85, 0x7b, 0xd2, 0x5b, 0xa3, 0x67, 0x2f, 0x6f, 0x54, 0x51, |
| 0x6c, 0x2e, 0xe9, 0xcf, 0x11, 0x9c, 0x48, 0x11, 0x88, 0xf0, 0xa5, 0x94, 0x62, 0xeb, 0x27, 0x27, |
| 0x0d, 0xdb, 0x50, 0xeb, 0xe1, 0x87, 0xdc, 0xdb, 0xd2, 0x83, 0x6c, 0xf7, 0xb7, 0xc6, 0x31, 0x7a, |
| 0x04, 0x53, 0x94, 0xa9, 0x14, 0x82, 0xfd, 0x75, 0xac, 0xa7, 0x83, 0xa0, 0xc5, 0x31, 0x96, 0xd0, |
| 0x72, 0xde, 0xf9, 0x54, 0x39, 0x91, 0x22, 0xa2, 0xfd, 0x55, 0x79, 0xb4, 0xed, 0x38, 0x2d, 0xbb, |
| 0x24, 0xcb, 0x3b, 0x3b, 0x3b, 0x71, 0x85, 0x8d, 0xb4, 0x9d, 0x6d, 0xfe, 0xf7, 0x6f, 0x2f, 0xb7, |
| 0x9a, 0xc4, 0xd9, 0x32, 0x2d, 0xfd, 0xe2, 0x50, 0xe6, 0x0d, 0xdd, 0x5e, 0xfd, 0x1e, 0x82, 0x13, |
| 0x55, 0x53, 0x4f, 0x8a, 0xc5, 0xea, 0xf8, 0xba, 0x6e, 0x6f, 0x58, 0xa6, 0x63, 0x6e, 0xa0, 0xb7, |
| 0xaf, 0x08, 0x83, 0xba, 0xd9, 0x24, 0x46, 0xbd, 0x60, 0x5a, 0x75, 0xb9, 0x4e, 0x0d, 0xf6, 0x9f, |
| 0x1c, 0x72, 0xb0, 0x40, 0xe4, 0xcf, 0xf0, 0xae, 0x37, 0x74, 0xfb, 0x3f, 0x08, 0xfd, 0x2c, 0x37, |
| 0x7b, 0x9b, 0xcf, 0xbd, 0xc5, 0x9c, 0xaf, 0xeb, 0x76, 0xe1, 0xe1, 0xca, 0xa7, 0xde, 0xe8, 0x26, |
| 0x1b, 0xdd, 0x5c, 0xd7, 0xed, 0xcd, 0x87, 0x2b, 0x95, 0x31, 0xe6, 0xf1, 0xd2, 0xff, 0x03, 0x00, |
| 0x00, 0xff, 0xff, 0x5a, 0x2c, 0x4c, 0x19, 0x82, 0x28, 0x00, 0x00, |
| } |
| |
| // Reference imports to suppress errors if they are not otherwise used. |
| var _ context.Context |
| var _ grpc.ClientConnInterface |
| |
| // This is a compile-time assertion to ensure that this generated file |
| // is compatible with the grpc package it is being compiled against. |
| const _ = grpc.SupportPackageIsVersion6 |
| |
| // KeyManagementServiceClient is the client API for KeyManagementService service. |
| // |
| // For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. |
| type KeyManagementServiceClient interface { |
| // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. |
| ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) |
| // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. |
| ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) |
| // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. |
| ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) |
| // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. |
| ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) |
| // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. |
| GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) |
| // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its |
| // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. |
| GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) |
| // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. |
| GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) |
| // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be |
| // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or |
| // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. |
| GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) |
| // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. |
| GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) |
| // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. |
| CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) |
| // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. |
| // |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and |
| // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] |
| // are required. |
| CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) |
| // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| // |
| // The server will assign the next sequential id. If unset, |
| // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to |
| // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. |
| CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) |
| // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the |
| // wrapped key material provided in the request. |
| // |
| // The version ID will be assigned the next sequential id within the |
| // [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) |
| // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. |
| // |
| // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. |
| CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) |
| // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) |
| // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. |
| // |
| // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between |
| // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and |
| // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this |
| // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to |
| // move between other states. |
| UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) |
| // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. |
| // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be |
| // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. |
| Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) |
| // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. |
| Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) |
| // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // ASYMMETRIC_SIGN, producing a signature that can be verified with the public |
| // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. |
| AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) |
| // Decrypts data that was encrypted with a public key retrieved from |
| // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. |
| AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) |
| // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. |
| // |
| // Returns an error if called on an asymmetric key. |
| UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) |
| // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. |
| // |
| // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to |
| // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] |
| // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 |
| // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] |
| // will be changed to |
| // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key |
| // material will be irrevocably destroyed. |
| // |
| // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, |
| // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. |
| DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) |
| // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the |
| // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] |
| // state. |
| // |
| // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] |
| // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], |
| // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. |
| RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) |
| } |
| |
| type keyManagementServiceClient struct { |
| cc grpc.ClientConnInterface |
| } |
| |
| func NewKeyManagementServiceClient(cc grpc.ClientConnInterface) KeyManagementServiceClient { |
| return &keyManagementServiceClient{cc} |
| } |
| |
| func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) { |
| out := new(ListKeyRingsResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) { |
| out := new(ListCryptoKeysResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) { |
| out := new(ListCryptoKeyVersionsResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) { |
| out := new(ListImportJobsResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { |
| out := new(KeyRing) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { |
| out := new(CryptoKey) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { |
| out := new(CryptoKeyVersion) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) { |
| out := new(PublicKey) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { |
| out := new(ImportJob) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetImportJob", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { |
| out := new(KeyRing) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { |
| out := new(CryptoKey) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { |
| out := new(CryptoKeyVersion) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { |
| out := new(CryptoKeyVersion) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { |
| out := new(ImportJob) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { |
| out := new(CryptoKey) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { |
| out := new(CryptoKeyVersion) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) { |
| out := new(EncryptResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) { |
| out := new(DecryptResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) { |
| out := new(AsymmetricSignResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) { |
| out := new(AsymmetricDecryptResponse) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) { |
| out := new(CryptoKey) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { |
| out := new(CryptoKeyVersion) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { |
| out := new(CryptoKeyVersion) |
| err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...) |
| if err != nil { |
| return nil, err |
| } |
| return out, nil |
| } |
| |
| // KeyManagementServiceServer is the server API for KeyManagementService service. |
| type KeyManagementServiceServer interface { |
| // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. |
| ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error) |
| // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. |
| ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) |
| // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. |
| ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) |
| // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. |
| ListImportJobs(context.Context, *ListImportJobsRequest) (*ListImportJobsResponse, error) |
| // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. |
| GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error) |
| // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its |
| // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. |
| GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error) |
| // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. |
| GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) |
| // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be |
| // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or |
| // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. |
| GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error) |
| // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. |
| GetImportJob(context.Context, *GetImportJobRequest) (*ImportJob, error) |
| // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. |
| CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error) |
| // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. |
| // |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and |
| // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] |
| // are required. |
| CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error) |
| // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| // |
| // The server will assign the next sequential id. If unset, |
| // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to |
| // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. |
| CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) |
| // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the |
| // wrapped key material provided in the request. |
| // |
| // The version ID will be assigned the next sequential id within the |
| // [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| ImportCryptoKeyVersion(context.Context, *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) |
| // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. |
| // |
| // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. |
| CreateImportJob(context.Context, *CreateImportJobRequest) (*ImportJob, error) |
| // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error) |
| // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. |
| // |
| // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between |
| // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and |
| // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this |
| // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to |
| // move between other states. |
| UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) |
| // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. |
| // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be |
| // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. |
| Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error) |
| // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. |
| Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error) |
| // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // ASYMMETRIC_SIGN, producing a signature that can be verified with the public |
| // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. |
| AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error) |
| // Decrypts data that was encrypted with a public key retrieved from |
| // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. |
| AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) |
| // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. |
| // |
| // Returns an error if called on an asymmetric key. |
| UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) |
| // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. |
| // |
| // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to |
| // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] |
| // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 |
| // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] |
| // will be changed to |
| // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key |
| // material will be irrevocably destroyed. |
| // |
| // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, |
| // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. |
| DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) |
| // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the |
| // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] |
| // state. |
| // |
| // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] |
| // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], |
| // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. |
| RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) |
| } |
| |
| // UnimplementedKeyManagementServiceServer can be embedded to have forward compatible implementations. |
| type UnimplementedKeyManagementServiceServer struct { |
| } |
| |
| func (*UnimplementedKeyManagementServiceServer) ListKeyRings(ctx context.Context, req *ListKeyRingsRequest) (*ListKeyRingsResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method ListKeyRings not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) ListCryptoKeys(ctx context.Context, req *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeys not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) ListCryptoKeyVersions(ctx context.Context, req *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeyVersions not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) ListImportJobs(ctx context.Context, req *ListImportJobsRequest) (*ListImportJobsResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method ListImportJobs not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) GetKeyRing(ctx context.Context, req *GetKeyRingRequest) (*KeyRing, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method GetKeyRing not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) GetCryptoKey(ctx context.Context, req *GetCryptoKeyRequest) (*CryptoKey, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKey not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) GetCryptoKeyVersion(ctx context.Context, req *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKeyVersion not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) GetPublicKey(ctx context.Context, req *GetPublicKeyRequest) (*PublicKey, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method GetPublicKey not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) GetImportJob(ctx context.Context, req *GetImportJobRequest) (*ImportJob, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method GetImportJob not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) CreateKeyRing(ctx context.Context, req *CreateKeyRingRequest) (*KeyRing, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method CreateKeyRing not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) CreateCryptoKey(ctx context.Context, req *CreateCryptoKeyRequest) (*CryptoKey, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKey not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) CreateCryptoKeyVersion(ctx context.Context, req *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKeyVersion not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) ImportCryptoKeyVersion(ctx context.Context, req *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method ImportCryptoKeyVersion not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) CreateImportJob(ctx context.Context, req *CreateImportJobRequest) (*ImportJob, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method CreateImportJob not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKey(ctx context.Context, req *UpdateCryptoKeyRequest) (*CryptoKey, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKey not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyVersion(ctx context.Context, req *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyVersion not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) Encrypt(ctx context.Context, req *EncryptRequest) (*EncryptResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method Encrypt not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) Decrypt(ctx context.Context, req *DecryptRequest) (*DecryptResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method Decrypt not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) AsymmetricSign(ctx context.Context, req *AsymmetricSignRequest) (*AsymmetricSignResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method AsymmetricSign not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) AsymmetricDecrypt(ctx context.Context, req *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method AsymmetricDecrypt not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyPrimaryVersion not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) DestroyCryptoKeyVersion(ctx context.Context, req *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method DestroyCryptoKeyVersion not implemented") |
| } |
| func (*UnimplementedKeyManagementServiceServer) RestoreCryptoKeyVersion(ctx context.Context, req *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { |
| return nil, status.Errorf(codes.Unimplemented, "method RestoreCryptoKeyVersion not implemented") |
| } |
| |
| func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) { |
| s.RegisterService(&_KeyManagementService_serviceDesc, srv) |
| } |
| |
| func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(ListKeyRingsRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(ListCryptoKeysRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(ListCryptoKeyVersionsRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_ListImportJobs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(ListImportJobsRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).ListImportJobs(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).ListImportJobs(ctx, req.(*ListImportJobsRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(GetKeyRingRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(GetCryptoKeyRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(GetCryptoKeyVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(GetPublicKeyRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_GetImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(GetImportJobRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).GetImportJob(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetImportJob", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).GetImportJob(ctx, req.(*GetImportJobRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(CreateKeyRingRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(CreateCryptoKeyRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(CreateCryptoKeyVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_ImportCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(ImportCryptoKeyVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, req.(*ImportCryptoKeyVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_CreateImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(CreateImportJobRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).CreateImportJob(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).CreateImportJob(ctx, req.(*CreateImportJobRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(UpdateCryptoKeyRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(UpdateCryptoKeyVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(EncryptRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).Encrypt(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(DecryptRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).Decrypt(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(AsymmetricSignRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(AsymmetricDecryptRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(UpdateCryptoKeyPrimaryVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(DestroyCryptoKeyVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { |
| in := new(RestoreCryptoKeyVersionRequest) |
| if err := dec(in); err != nil { |
| return nil, err |
| } |
| if interceptor == nil { |
| return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in) |
| } |
| info := &grpc.UnaryServerInfo{ |
| Server: srv, |
| FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", |
| } |
| handler := func(ctx context.Context, req interface{}) (interface{}, error) { |
| return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest)) |
| } |
| return interceptor(ctx, in, info, handler) |
| } |
| |
| var _KeyManagementService_serviceDesc = grpc.ServiceDesc{ |
| ServiceName: "google.cloud.kms.v1.KeyManagementService", |
| HandlerType: (*KeyManagementServiceServer)(nil), |
| Methods: []grpc.MethodDesc{ |
| { |
| MethodName: "ListKeyRings", |
| Handler: _KeyManagementService_ListKeyRings_Handler, |
| }, |
| { |
| MethodName: "ListCryptoKeys", |
| Handler: _KeyManagementService_ListCryptoKeys_Handler, |
| }, |
| { |
| MethodName: "ListCryptoKeyVersions", |
| Handler: _KeyManagementService_ListCryptoKeyVersions_Handler, |
| }, |
| { |
| MethodName: "ListImportJobs", |
| Handler: _KeyManagementService_ListImportJobs_Handler, |
| }, |
| { |
| MethodName: "GetKeyRing", |
| Handler: _KeyManagementService_GetKeyRing_Handler, |
| }, |
| { |
| MethodName: "GetCryptoKey", |
| Handler: _KeyManagementService_GetCryptoKey_Handler, |
| }, |
| { |
| MethodName: "GetCryptoKeyVersion", |
| Handler: _KeyManagementService_GetCryptoKeyVersion_Handler, |
| }, |
| { |
| MethodName: "GetPublicKey", |
| Handler: _KeyManagementService_GetPublicKey_Handler, |
| }, |
| { |
| MethodName: "GetImportJob", |
| Handler: _KeyManagementService_GetImportJob_Handler, |
| }, |
| { |
| MethodName: "CreateKeyRing", |
| Handler: _KeyManagementService_CreateKeyRing_Handler, |
| }, |
| { |
| MethodName: "CreateCryptoKey", |
| Handler: _KeyManagementService_CreateCryptoKey_Handler, |
| }, |
| { |
| MethodName: "CreateCryptoKeyVersion", |
| Handler: _KeyManagementService_CreateCryptoKeyVersion_Handler, |
| }, |
| { |
| MethodName: "ImportCryptoKeyVersion", |
| Handler: _KeyManagementService_ImportCryptoKeyVersion_Handler, |
| }, |
| { |
| MethodName: "CreateImportJob", |
| Handler: _KeyManagementService_CreateImportJob_Handler, |
| }, |
| { |
| MethodName: "UpdateCryptoKey", |
| Handler: _KeyManagementService_UpdateCryptoKey_Handler, |
| }, |
| { |
| MethodName: "UpdateCryptoKeyVersion", |
| Handler: _KeyManagementService_UpdateCryptoKeyVersion_Handler, |
| }, |
| { |
| MethodName: "Encrypt", |
| Handler: _KeyManagementService_Encrypt_Handler, |
| }, |
| { |
| MethodName: "Decrypt", |
| Handler: _KeyManagementService_Decrypt_Handler, |
| }, |
| { |
| MethodName: "AsymmetricSign", |
| Handler: _KeyManagementService_AsymmetricSign_Handler, |
| }, |
| { |
| MethodName: "AsymmetricDecrypt", |
| Handler: _KeyManagementService_AsymmetricDecrypt_Handler, |
| }, |
| { |
| MethodName: "UpdateCryptoKeyPrimaryVersion", |
| Handler: _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler, |
| }, |
| { |
| MethodName: "DestroyCryptoKeyVersion", |
| Handler: _KeyManagementService_DestroyCryptoKeyVersion_Handler, |
| }, |
| { |
| MethodName: "RestoreCryptoKeyVersion", |
| Handler: _KeyManagementService_RestoreCryptoKeyVersion_Handler, |
| }, |
| }, |
| Streams: []grpc.StreamDesc{}, |
| Metadata: "google/cloud/kms/v1/service.proto", |
| } |