1// Copyright 2019 Google LLC
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7//     https://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15// Code generated by gapic-generator. DO NOT EDIT.
16
17package kms_test
18
19import (
20	"context"
21
22	kms "cloud.google.com/go/kms/apiv1"
23	"google.golang.org/api/iterator"
24	kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1"
25)
26
27func ExampleNewKeyManagementClient() {
28	ctx := context.Background()
29	c, err := kms.NewKeyManagementClient(ctx)
30	if err != nil {
31		// TODO: Handle error.
32	}
33	// TODO: Use client.
34	_ = c
35}
36
37func ExampleKeyManagementClient_ListKeyRings() {
38	ctx := context.Background()
39	c, err := kms.NewKeyManagementClient(ctx)
40	if err != nil {
41		// TODO: Handle error.
42	}
43
44	req := &kmspb.ListKeyRingsRequest{
45		// TODO: Fill request struct fields.
46	}
47	it := c.ListKeyRings(ctx, req)
48	for {
49		resp, err := it.Next()
50		if err == iterator.Done {
51			break
52		}
53		if err != nil {
54			// TODO: Handle error.
55		}
56		// TODO: Use resp.
57		_ = resp
58	}
59}
60
61func ExampleKeyManagementClient_ListImportJobs() {
62	ctx := context.Background()
63	c, err := kms.NewKeyManagementClient(ctx)
64	if err != nil {
65		// TODO: Handle error.
66	}
67
68	req := &kmspb.ListImportJobsRequest{
69		// TODO: Fill request struct fields.
70	}
71	it := c.ListImportJobs(ctx, req)
72	for {
73		resp, err := it.Next()
74		if err == iterator.Done {
75			break
76		}
77		if err != nil {
78			// TODO: Handle error.
79		}
80		// TODO: Use resp.
81		_ = resp
82	}
83}
84
85func ExampleKeyManagementClient_ListCryptoKeys() {
86	ctx := context.Background()
87	c, err := kms.NewKeyManagementClient(ctx)
88	if err != nil {
89		// TODO: Handle error.
90	}
91
92	req := &kmspb.ListCryptoKeysRequest{
93		// TODO: Fill request struct fields.
94	}
95	it := c.ListCryptoKeys(ctx, req)
96	for {
97		resp, err := it.Next()
98		if err == iterator.Done {
99			break
100		}
101		if err != nil {
102			// TODO: Handle error.
103		}
104		// TODO: Use resp.
105		_ = resp
106	}
107}
108
109func ExampleKeyManagementClient_ListCryptoKeyVersions() {
110	ctx := context.Background()
111	c, err := kms.NewKeyManagementClient(ctx)
112	if err != nil {
113		// TODO: Handle error.
114	}
115
116	req := &kmspb.ListCryptoKeyVersionsRequest{
117		// TODO: Fill request struct fields.
118	}
119	it := c.ListCryptoKeyVersions(ctx, req)
120	for {
121		resp, err := it.Next()
122		if err == iterator.Done {
123			break
124		}
125		if err != nil {
126			// TODO: Handle error.
127		}
128		// TODO: Use resp.
129		_ = resp
130	}
131}
132
133func ExampleKeyManagementClient_GetKeyRing() {
134	ctx := context.Background()
135	c, err := kms.NewKeyManagementClient(ctx)
136	if err != nil {
137		// TODO: Handle error.
138	}
139
140	req := &kmspb.GetKeyRingRequest{
141		// TODO: Fill request struct fields.
142	}
143	resp, err := c.GetKeyRing(ctx, req)
144	if err != nil {
145		// TODO: Handle error.
146	}
147	// TODO: Use resp.
148	_ = resp
149}
150
151func ExampleKeyManagementClient_GetImportJob() {
152	ctx := context.Background()
153	c, err := kms.NewKeyManagementClient(ctx)
154	if err != nil {
155		// TODO: Handle error.
156	}
157
158	req := &kmspb.GetImportJobRequest{
159		// TODO: Fill request struct fields.
160	}
161	resp, err := c.GetImportJob(ctx, req)
162	if err != nil {
163		// TODO: Handle error.
164	}
165	// TODO: Use resp.
166	_ = resp
167}
168
169func ExampleKeyManagementClient_GetCryptoKey() {
170	ctx := context.Background()
171	c, err := kms.NewKeyManagementClient(ctx)
172	if err != nil {
173		// TODO: Handle error.
174	}
175
176	req := &kmspb.GetCryptoKeyRequest{
177		// TODO: Fill request struct fields.
178	}
179	resp, err := c.GetCryptoKey(ctx, req)
180	if err != nil {
181		// TODO: Handle error.
182	}
183	// TODO: Use resp.
184	_ = resp
185}
186
187func ExampleKeyManagementClient_GetCryptoKeyVersion() {
188	ctx := context.Background()
189	c, err := kms.NewKeyManagementClient(ctx)
190	if err != nil {
191		// TODO: Handle error.
192	}
193
194	req := &kmspb.GetCryptoKeyVersionRequest{
195		// TODO: Fill request struct fields.
196	}
197	resp, err := c.GetCryptoKeyVersion(ctx, req)
198	if err != nil {
199		// TODO: Handle error.
200	}
201	// TODO: Use resp.
202	_ = resp
203}
204
205func ExampleKeyManagementClient_CreateKeyRing() {
206	ctx := context.Background()
207	c, err := kms.NewKeyManagementClient(ctx)
208	if err != nil {
209		// TODO: Handle error.
210	}
211
212	req := &kmspb.CreateKeyRingRequest{
213		// TODO: Fill request struct fields.
214	}
215	resp, err := c.CreateKeyRing(ctx, req)
216	if err != nil {
217		// TODO: Handle error.
218	}
219	// TODO: Use resp.
220	_ = resp
221}
222
223func ExampleKeyManagementClient_CreateImportJob() {
224	ctx := context.Background()
225	c, err := kms.NewKeyManagementClient(ctx)
226	if err != nil {
227		// TODO: Handle error.
228	}
229
230	req := &kmspb.CreateImportJobRequest{
231		// TODO: Fill request struct fields.
232	}
233	resp, err := c.CreateImportJob(ctx, req)
234	if err != nil {
235		// TODO: Handle error.
236	}
237	// TODO: Use resp.
238	_ = resp
239}
240
241func ExampleKeyManagementClient_CreateCryptoKey() {
242	ctx := context.Background()
243	c, err := kms.NewKeyManagementClient(ctx)
244	if err != nil {
245		// TODO: Handle error.
246	}
247
248	req := &kmspb.CreateCryptoKeyRequest{
249		// TODO: Fill request struct fields.
250	}
251	resp, err := c.CreateCryptoKey(ctx, req)
252	if err != nil {
253		// TODO: Handle error.
254	}
255	// TODO: Use resp.
256	_ = resp
257}
258
259func ExampleKeyManagementClient_CreateCryptoKeyVersion() {
260	ctx := context.Background()
261	c, err := kms.NewKeyManagementClient(ctx)
262	if err != nil {
263		// TODO: Handle error.
264	}
265
266	req := &kmspb.CreateCryptoKeyVersionRequest{
267		// TODO: Fill request struct fields.
268	}
269	resp, err := c.CreateCryptoKeyVersion(ctx, req)
270	if err != nil {
271		// TODO: Handle error.
272	}
273	// TODO: Use resp.
274	_ = resp
275}
276
277func ExampleKeyManagementClient_ImportCryptoKeyVersion() {
278	ctx := context.Background()
279	c, err := kms.NewKeyManagementClient(ctx)
280	if err != nil {
281		// TODO: Handle error.
282	}
283
284	req := &kmspb.ImportCryptoKeyVersionRequest{
285		// TODO: Fill request struct fields.
286	}
287	resp, err := c.ImportCryptoKeyVersion(ctx, req)
288	if err != nil {
289		// TODO: Handle error.
290	}
291	// TODO: Use resp.
292	_ = resp
293}
294
295func ExampleKeyManagementClient_UpdateCryptoKey() {
296	ctx := context.Background()
297	c, err := kms.NewKeyManagementClient(ctx)
298	if err != nil {
299		// TODO: Handle error.
300	}
301
302	req := &kmspb.UpdateCryptoKeyRequest{
303		// TODO: Fill request struct fields.
304	}
305	resp, err := c.UpdateCryptoKey(ctx, req)
306	if err != nil {
307		// TODO: Handle error.
308	}
309	// TODO: Use resp.
310	_ = resp
311}
312
313func ExampleKeyManagementClient_UpdateCryptoKeyVersion() {
314	ctx := context.Background()
315	c, err := kms.NewKeyManagementClient(ctx)
316	if err != nil {
317		// TODO: Handle error.
318	}
319
320	req := &kmspb.UpdateCryptoKeyVersionRequest{
321		// TODO: Fill request struct fields.
322	}
323	resp, err := c.UpdateCryptoKeyVersion(ctx, req)
324	if err != nil {
325		// TODO: Handle error.
326	}
327	// TODO: Use resp.
328	_ = resp
329}
330
331func ExampleKeyManagementClient_Encrypt() {
332	ctx := context.Background()
333	c, err := kms.NewKeyManagementClient(ctx)
334	if err != nil {
335		// TODO: Handle error.
336	}
337
338	req := &kmspb.EncryptRequest{
339		// TODO: Fill request struct fields.
340	}
341	resp, err := c.Encrypt(ctx, req)
342	if err != nil {
343		// TODO: Handle error.
344	}
345	// TODO: Use resp.
346	_ = resp
347}
348
349func ExampleKeyManagementClient_Decrypt() {
350	ctx := context.Background()
351	c, err := kms.NewKeyManagementClient(ctx)
352	if err != nil {
353		// TODO: Handle error.
354	}
355
356	req := &kmspb.DecryptRequest{
357		// TODO: Fill request struct fields.
358	}
359	resp, err := c.Decrypt(ctx, req)
360	if err != nil {
361		// TODO: Handle error.
362	}
363	// TODO: Use resp.
364	_ = resp
365}
366
367func ExampleKeyManagementClient_UpdateCryptoKeyPrimaryVersion() {
368	ctx := context.Background()
369	c, err := kms.NewKeyManagementClient(ctx)
370	if err != nil {
371		// TODO: Handle error.
372	}
373
374	req := &kmspb.UpdateCryptoKeyPrimaryVersionRequest{
375		// TODO: Fill request struct fields.
376	}
377	resp, err := c.UpdateCryptoKeyPrimaryVersion(ctx, req)
378	if err != nil {
379		// TODO: Handle error.
380	}
381	// TODO: Use resp.
382	_ = resp
383}
384
385func ExampleKeyManagementClient_DestroyCryptoKeyVersion() {
386	ctx := context.Background()
387	c, err := kms.NewKeyManagementClient(ctx)
388	if err != nil {
389		// TODO: Handle error.
390	}
391
392	req := &kmspb.DestroyCryptoKeyVersionRequest{
393		// TODO: Fill request struct fields.
394	}
395	resp, err := c.DestroyCryptoKeyVersion(ctx, req)
396	if err != nil {
397		// TODO: Handle error.
398	}
399	// TODO: Use resp.
400	_ = resp
401}
402
403func ExampleKeyManagementClient_RestoreCryptoKeyVersion() {
404	ctx := context.Background()
405	c, err := kms.NewKeyManagementClient(ctx)
406	if err != nil {
407		// TODO: Handle error.
408	}
409
410	req := &kmspb.RestoreCryptoKeyVersionRequest{
411		// TODO: Fill request struct fields.
412	}
413	resp, err := c.RestoreCryptoKeyVersion(ctx, req)
414	if err != nil {
415		// TODO: Handle error.
416	}
417	// TODO: Use resp.
418	_ = resp
419}
420
421func ExampleKeyManagementClient_GetPublicKey() {
422	ctx := context.Background()
423	c, err := kms.NewKeyManagementClient(ctx)
424	if err != nil {
425		// TODO: Handle error.
426	}
427
428	req := &kmspb.GetPublicKeyRequest{
429		// TODO: Fill request struct fields.
430	}
431	resp, err := c.GetPublicKey(ctx, req)
432	if err != nil {
433		// TODO: Handle error.
434	}
435	// TODO: Use resp.
436	_ = resp
437}
438
439func ExampleKeyManagementClient_AsymmetricDecrypt() {
440	ctx := context.Background()
441	c, err := kms.NewKeyManagementClient(ctx)
442	if err != nil {
443		// TODO: Handle error.
444	}
445
446	req := &kmspb.AsymmetricDecryptRequest{
447		// TODO: Fill request struct fields.
448	}
449	resp, err := c.AsymmetricDecrypt(ctx, req)
450	if err != nil {
451		// TODO: Handle error.
452	}
453	// TODO: Use resp.
454	_ = resp
455}
456
457func ExampleKeyManagementClient_AsymmetricSign() {
458	ctx := context.Background()
459	c, err := kms.NewKeyManagementClient(ctx)
460	if err != nil {
461		// TODO: Handle error.
462	}
463
464	req := &kmspb.AsymmetricSignRequest{
465		// TODO: Fill request struct fields.
466	}
467	resp, err := c.AsymmetricSign(ctx, req)
468	if err != nil {
469		// TODO: Handle error.
470	}
471	// TODO: Use resp.
472	_ = resp
473}
474