1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/kms/v1/service.proto 3 4package kms 5 6import ( 7 context "context" 8 fmt "fmt" 9 math "math" 10 11 proto "github.com/golang/protobuf/proto" 12 _ "google.golang.org/genproto/googleapis/api/annotations" 13 field_mask "google.golang.org/genproto/protobuf/field_mask" 14 grpc "google.golang.org/grpc" 15) 16 17// Reference imports to suppress errors if they are not otherwise used. 18var _ = proto.Marshal 19var _ = fmt.Errorf 20var _ = math.Inf 21 22// This is a compile-time assertion to ensure that this generated file 23// is compatible with the proto package it is being compiled against. 24// A compilation error at this line likely means your copy of the 25// proto package needs to be updated. 26const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 27 28// Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 29type ListKeyRingsRequest struct { 30 // Required. The resource name of the location associated with the 31 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. 32 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 33 // Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to include in the 34 // response. Further [KeyRings][google.cloud.kms.v1.KeyRing] can subsequently be obtained by 35 // including the [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] in a subsequent 36 // request. If unspecified, the server will pick an appropriate default. 37 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 38 // Optional pagination token, returned earlier via 39 // [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token]. 40 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 41 // Optional. Only include resources that match the filter in the response. 42 Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` 43 // Optional. Specify how the results should be sorted. If not specified, the 44 // results will be sorted in the default order. 45 OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 46 XXX_NoUnkeyedLiteral struct{} `json:"-"` 47 XXX_unrecognized []byte `json:"-"` 48 XXX_sizecache int32 `json:"-"` 49} 50 51func (m *ListKeyRingsRequest) Reset() { *m = ListKeyRingsRequest{} } 52func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) } 53func (*ListKeyRingsRequest) ProtoMessage() {} 54func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) { 55 return fileDescriptor_723aeaeb61739a25, []int{0} 56} 57 58func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error { 59 return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b) 60} 61func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 62 return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic) 63} 64func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) { 65 xxx_messageInfo_ListKeyRingsRequest.Merge(m, src) 66} 67func (m *ListKeyRingsRequest) XXX_Size() int { 68 return xxx_messageInfo_ListKeyRingsRequest.Size(m) 69} 70func (m *ListKeyRingsRequest) XXX_DiscardUnknown() { 71 xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m) 72} 73 74var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo 75 76func (m *ListKeyRingsRequest) GetParent() string { 77 if m != nil { 78 return m.Parent 79 } 80 return "" 81} 82 83func (m *ListKeyRingsRequest) GetPageSize() int32 { 84 if m != nil { 85 return m.PageSize 86 } 87 return 0 88} 89 90func (m *ListKeyRingsRequest) GetPageToken() string { 91 if m != nil { 92 return m.PageToken 93 } 94 return "" 95} 96 97func (m *ListKeyRingsRequest) GetFilter() string { 98 if m != nil { 99 return m.Filter 100 } 101 return "" 102} 103 104func (m *ListKeyRingsRequest) GetOrderBy() string { 105 if m != nil { 106 return m.OrderBy 107 } 108 return "" 109} 110 111// Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 112type ListCryptoKeysRequest struct { 113 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format 114 // `projects/*/locations/*/keyRings/*`. 115 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 116 // Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] to include in the 117 // response. Further [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by 118 // including the [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] in a subsequent 119 // request. If unspecified, the server will pick an appropriate default. 120 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 121 // Optional pagination token, returned earlier via 122 // [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token]. 123 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 124 // The fields of the primary version to include in the response. 125 VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"` 126 // Optional. Only include resources that match the filter in the response. 127 Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` 128 // Optional. Specify how the results should be sorted. If not specified, the 129 // results will be sorted in the default order. 130 OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 131 XXX_NoUnkeyedLiteral struct{} `json:"-"` 132 XXX_unrecognized []byte `json:"-"` 133 XXX_sizecache int32 `json:"-"` 134} 135 136func (m *ListCryptoKeysRequest) Reset() { *m = ListCryptoKeysRequest{} } 137func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) } 138func (*ListCryptoKeysRequest) ProtoMessage() {} 139func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) { 140 return fileDescriptor_723aeaeb61739a25, []int{1} 141} 142 143func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error { 144 return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b) 145} 146func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 147 return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic) 148} 149func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) { 150 xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src) 151} 152func (m *ListCryptoKeysRequest) XXX_Size() int { 153 return xxx_messageInfo_ListCryptoKeysRequest.Size(m) 154} 155func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() { 156 xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m) 157} 158 159var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo 160 161func (m *ListCryptoKeysRequest) GetParent() string { 162 if m != nil { 163 return m.Parent 164 } 165 return "" 166} 167 168func (m *ListCryptoKeysRequest) GetPageSize() int32 { 169 if m != nil { 170 return m.PageSize 171 } 172 return 0 173} 174 175func (m *ListCryptoKeysRequest) GetPageToken() string { 176 if m != nil { 177 return m.PageToken 178 } 179 return "" 180} 181 182func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView { 183 if m != nil { 184 return m.VersionView 185 } 186 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 187} 188 189func (m *ListCryptoKeysRequest) GetFilter() string { 190 if m != nil { 191 return m.Filter 192 } 193 return "" 194} 195 196func (m *ListCryptoKeysRequest) GetOrderBy() string { 197 if m != nil { 198 return m.OrderBy 199 } 200 return "" 201} 202 203// Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 204type ListCryptoKeyVersionsRequest struct { 205 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format 206 // `projects/*/locations/*/keyRings/*/cryptoKeys/*`. 207 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 208 // Optional limit on the number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to 209 // include in the response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] can 210 // subsequently be obtained by including the 211 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] in a subsequent request. 212 // If unspecified, the server will pick an appropriate default. 213 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 214 // Optional pagination token, returned earlier via 215 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token]. 216 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 217 // The fields to include in the response. 218 View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"` 219 // Optional. Only include resources that match the filter in the response. 220 Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` 221 // Optional. Specify how the results should be sorted. If not specified, the 222 // results will be sorted in the default order. 223 OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 224 XXX_NoUnkeyedLiteral struct{} `json:"-"` 225 XXX_unrecognized []byte `json:"-"` 226 XXX_sizecache int32 `json:"-"` 227} 228 229func (m *ListCryptoKeyVersionsRequest) Reset() { *m = ListCryptoKeyVersionsRequest{} } 230func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) } 231func (*ListCryptoKeyVersionsRequest) ProtoMessage() {} 232func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) { 233 return fileDescriptor_723aeaeb61739a25, []int{2} 234} 235 236func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error { 237 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b) 238} 239func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 240 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic) 241} 242func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) { 243 xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src) 244} 245func (m *ListCryptoKeyVersionsRequest) XXX_Size() int { 246 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m) 247} 248func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() { 249 xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m) 250} 251 252var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo 253 254func (m *ListCryptoKeyVersionsRequest) GetParent() string { 255 if m != nil { 256 return m.Parent 257 } 258 return "" 259} 260 261func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 { 262 if m != nil { 263 return m.PageSize 264 } 265 return 0 266} 267 268func (m *ListCryptoKeyVersionsRequest) GetPageToken() string { 269 if m != nil { 270 return m.PageToken 271 } 272 return "" 273} 274 275func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView { 276 if m != nil { 277 return m.View 278 } 279 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 280} 281 282func (m *ListCryptoKeyVersionsRequest) GetFilter() string { 283 if m != nil { 284 return m.Filter 285 } 286 return "" 287} 288 289func (m *ListCryptoKeyVersionsRequest) GetOrderBy() string { 290 if m != nil { 291 return m.OrderBy 292 } 293 return "" 294} 295 296// Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. 297type ListImportJobsRequest struct { 298 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format 299 // `projects/*/locations/*/keyRings/*`. 300 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 301 // Optional limit on the number of [ImportJobs][google.cloud.kms.v1.ImportJob] to include in the 302 // response. Further [ImportJobs][google.cloud.kms.v1.ImportJob] can subsequently be obtained by 303 // including the [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token] in a subsequent 304 // request. If unspecified, the server will pick an appropriate default. 305 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 306 // Optional pagination token, returned earlier via 307 // [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token]. 308 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 309 // Optional. Only include resources that match the filter in the response. 310 Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` 311 // Optional. Specify how the results should be sorted. If not specified, the 312 // results will be sorted in the default order. 313 OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 314 XXX_NoUnkeyedLiteral struct{} `json:"-"` 315 XXX_unrecognized []byte `json:"-"` 316 XXX_sizecache int32 `json:"-"` 317} 318 319func (m *ListImportJobsRequest) Reset() { *m = ListImportJobsRequest{} } 320func (m *ListImportJobsRequest) String() string { return proto.CompactTextString(m) } 321func (*ListImportJobsRequest) ProtoMessage() {} 322func (*ListImportJobsRequest) Descriptor() ([]byte, []int) { 323 return fileDescriptor_723aeaeb61739a25, []int{3} 324} 325 326func (m *ListImportJobsRequest) XXX_Unmarshal(b []byte) error { 327 return xxx_messageInfo_ListImportJobsRequest.Unmarshal(m, b) 328} 329func (m *ListImportJobsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 330 return xxx_messageInfo_ListImportJobsRequest.Marshal(b, m, deterministic) 331} 332func (m *ListImportJobsRequest) XXX_Merge(src proto.Message) { 333 xxx_messageInfo_ListImportJobsRequest.Merge(m, src) 334} 335func (m *ListImportJobsRequest) XXX_Size() int { 336 return xxx_messageInfo_ListImportJobsRequest.Size(m) 337} 338func (m *ListImportJobsRequest) XXX_DiscardUnknown() { 339 xxx_messageInfo_ListImportJobsRequest.DiscardUnknown(m) 340} 341 342var xxx_messageInfo_ListImportJobsRequest proto.InternalMessageInfo 343 344func (m *ListImportJobsRequest) GetParent() string { 345 if m != nil { 346 return m.Parent 347 } 348 return "" 349} 350 351func (m *ListImportJobsRequest) GetPageSize() int32 { 352 if m != nil { 353 return m.PageSize 354 } 355 return 0 356} 357 358func (m *ListImportJobsRequest) GetPageToken() string { 359 if m != nil { 360 return m.PageToken 361 } 362 return "" 363} 364 365func (m *ListImportJobsRequest) GetFilter() string { 366 if m != nil { 367 return m.Filter 368 } 369 return "" 370} 371 372func (m *ListImportJobsRequest) GetOrderBy() string { 373 if m != nil { 374 return m.OrderBy 375 } 376 return "" 377} 378 379// Response message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 380type ListKeyRingsResponse struct { 381 // The list of [KeyRings][google.cloud.kms.v1.KeyRing]. 382 KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"` 383 // A token to retrieve next page of results. Pass this value in 384 // [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] to retrieve the next page of results. 385 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 386 // The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched the query. 387 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 388 XXX_NoUnkeyedLiteral struct{} `json:"-"` 389 XXX_unrecognized []byte `json:"-"` 390 XXX_sizecache int32 `json:"-"` 391} 392 393func (m *ListKeyRingsResponse) Reset() { *m = ListKeyRingsResponse{} } 394func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) } 395func (*ListKeyRingsResponse) ProtoMessage() {} 396func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) { 397 return fileDescriptor_723aeaeb61739a25, []int{4} 398} 399 400func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error { 401 return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b) 402} 403func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 404 return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic) 405} 406func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) { 407 xxx_messageInfo_ListKeyRingsResponse.Merge(m, src) 408} 409func (m *ListKeyRingsResponse) XXX_Size() int { 410 return xxx_messageInfo_ListKeyRingsResponse.Size(m) 411} 412func (m *ListKeyRingsResponse) XXX_DiscardUnknown() { 413 xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m) 414} 415 416var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo 417 418func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing { 419 if m != nil { 420 return m.KeyRings 421 } 422 return nil 423} 424 425func (m *ListKeyRingsResponse) GetNextPageToken() string { 426 if m != nil { 427 return m.NextPageToken 428 } 429 return "" 430} 431 432func (m *ListKeyRingsResponse) GetTotalSize() int32 { 433 if m != nil { 434 return m.TotalSize 435 } 436 return 0 437} 438 439// Response message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 440type ListCryptoKeysResponse struct { 441 // The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 442 CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"` 443 // A token to retrieve next page of results. Pass this value in 444 // [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] to retrieve the next page of results. 445 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 446 // The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that matched the query. 447 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 448 XXX_NoUnkeyedLiteral struct{} `json:"-"` 449 XXX_unrecognized []byte `json:"-"` 450 XXX_sizecache int32 `json:"-"` 451} 452 453func (m *ListCryptoKeysResponse) Reset() { *m = ListCryptoKeysResponse{} } 454func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) } 455func (*ListCryptoKeysResponse) ProtoMessage() {} 456func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) { 457 return fileDescriptor_723aeaeb61739a25, []int{5} 458} 459 460func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error { 461 return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b) 462} 463func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 464 return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic) 465} 466func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) { 467 xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src) 468} 469func (m *ListCryptoKeysResponse) XXX_Size() int { 470 return xxx_messageInfo_ListCryptoKeysResponse.Size(m) 471} 472func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() { 473 xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m) 474} 475 476var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo 477 478func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey { 479 if m != nil { 480 return m.CryptoKeys 481 } 482 return nil 483} 484 485func (m *ListCryptoKeysResponse) GetNextPageToken() string { 486 if m != nil { 487 return m.NextPageToken 488 } 489 return "" 490} 491 492func (m *ListCryptoKeysResponse) GetTotalSize() int32 { 493 if m != nil { 494 return m.TotalSize 495 } 496 return 0 497} 498 499// Response message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 500type ListCryptoKeyVersionsResponse struct { 501 // The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 502 CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"` 503 // A token to retrieve next page of results. Pass this value in 504 // [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] to retrieve the next page of 505 // results. 506 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 507 // The total number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the 508 // query. 509 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 510 XXX_NoUnkeyedLiteral struct{} `json:"-"` 511 XXX_unrecognized []byte `json:"-"` 512 XXX_sizecache int32 `json:"-"` 513} 514 515func (m *ListCryptoKeyVersionsResponse) Reset() { *m = ListCryptoKeyVersionsResponse{} } 516func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) } 517func (*ListCryptoKeyVersionsResponse) ProtoMessage() {} 518func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) { 519 return fileDescriptor_723aeaeb61739a25, []int{6} 520} 521 522func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error { 523 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b) 524} 525func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 526 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic) 527} 528func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) { 529 xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src) 530} 531func (m *ListCryptoKeyVersionsResponse) XXX_Size() int { 532 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m) 533} 534func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() { 535 xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m) 536} 537 538var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo 539 540func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion { 541 if m != nil { 542 return m.CryptoKeyVersions 543 } 544 return nil 545} 546 547func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string { 548 if m != nil { 549 return m.NextPageToken 550 } 551 return "" 552} 553 554func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 { 555 if m != nil { 556 return m.TotalSize 557 } 558 return 0 559} 560 561// Response message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. 562type ListImportJobsResponse struct { 563 // The list of [ImportJobs][google.cloud.kms.v1.ImportJob]. 564 ImportJobs []*ImportJob `protobuf:"bytes,1,rep,name=import_jobs,json=importJobs,proto3" json:"import_jobs,omitempty"` 565 // A token to retrieve next page of results. Pass this value in 566 // [ListImportJobsRequest.page_token][google.cloud.kms.v1.ListImportJobsRequest.page_token] to retrieve the next page of results. 567 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 568 // The total number of [ImportJobs][google.cloud.kms.v1.ImportJob] that matched the query. 569 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 570 XXX_NoUnkeyedLiteral struct{} `json:"-"` 571 XXX_unrecognized []byte `json:"-"` 572 XXX_sizecache int32 `json:"-"` 573} 574 575func (m *ListImportJobsResponse) Reset() { *m = ListImportJobsResponse{} } 576func (m *ListImportJobsResponse) String() string { return proto.CompactTextString(m) } 577func (*ListImportJobsResponse) ProtoMessage() {} 578func (*ListImportJobsResponse) Descriptor() ([]byte, []int) { 579 return fileDescriptor_723aeaeb61739a25, []int{7} 580} 581 582func (m *ListImportJobsResponse) XXX_Unmarshal(b []byte) error { 583 return xxx_messageInfo_ListImportJobsResponse.Unmarshal(m, b) 584} 585func (m *ListImportJobsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 586 return xxx_messageInfo_ListImportJobsResponse.Marshal(b, m, deterministic) 587} 588func (m *ListImportJobsResponse) XXX_Merge(src proto.Message) { 589 xxx_messageInfo_ListImportJobsResponse.Merge(m, src) 590} 591func (m *ListImportJobsResponse) XXX_Size() int { 592 return xxx_messageInfo_ListImportJobsResponse.Size(m) 593} 594func (m *ListImportJobsResponse) XXX_DiscardUnknown() { 595 xxx_messageInfo_ListImportJobsResponse.DiscardUnknown(m) 596} 597 598var xxx_messageInfo_ListImportJobsResponse proto.InternalMessageInfo 599 600func (m *ListImportJobsResponse) GetImportJobs() []*ImportJob { 601 if m != nil { 602 return m.ImportJobs 603 } 604 return nil 605} 606 607func (m *ListImportJobsResponse) GetNextPageToken() string { 608 if m != nil { 609 return m.NextPageToken 610 } 611 return "" 612} 613 614func (m *ListImportJobsResponse) GetTotalSize() int32 { 615 if m != nil { 616 return m.TotalSize 617 } 618 return 0 619} 620 621// Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing]. 622type GetKeyRingRequest struct { 623 // The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] to get. 624 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 625 XXX_NoUnkeyedLiteral struct{} `json:"-"` 626 XXX_unrecognized []byte `json:"-"` 627 XXX_sizecache int32 `json:"-"` 628} 629 630func (m *GetKeyRingRequest) Reset() { *m = GetKeyRingRequest{} } 631func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) } 632func (*GetKeyRingRequest) ProtoMessage() {} 633func (*GetKeyRingRequest) Descriptor() ([]byte, []int) { 634 return fileDescriptor_723aeaeb61739a25, []int{8} 635} 636 637func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error { 638 return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b) 639} 640func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 641 return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic) 642} 643func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) { 644 xxx_messageInfo_GetKeyRingRequest.Merge(m, src) 645} 646func (m *GetKeyRingRequest) XXX_Size() int { 647 return xxx_messageInfo_GetKeyRingRequest.Size(m) 648} 649func (m *GetKeyRingRequest) XXX_DiscardUnknown() { 650 xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m) 651} 652 653var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo 654 655func (m *GetKeyRingRequest) GetName() string { 656 if m != nil { 657 return m.Name 658 } 659 return "" 660} 661 662// Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey]. 663type GetCryptoKeyRequest struct { 664 // The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to get. 665 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 666 XXX_NoUnkeyedLiteral struct{} `json:"-"` 667 XXX_unrecognized []byte `json:"-"` 668 XXX_sizecache int32 `json:"-"` 669} 670 671func (m *GetCryptoKeyRequest) Reset() { *m = GetCryptoKeyRequest{} } 672func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 673func (*GetCryptoKeyRequest) ProtoMessage() {} 674func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) { 675 return fileDescriptor_723aeaeb61739a25, []int{9} 676} 677 678func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 679 return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b) 680} 681func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 682 return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic) 683} 684func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) { 685 xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src) 686} 687func (m *GetCryptoKeyRequest) XXX_Size() int { 688 return xxx_messageInfo_GetCryptoKeyRequest.Size(m) 689} 690func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() { 691 xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m) 692} 693 694var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo 695 696func (m *GetCryptoKeyRequest) GetName() string { 697 if m != nil { 698 return m.Name 699 } 700 return "" 701} 702 703// Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion]. 704type GetCryptoKeyVersionRequest struct { 705 // The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get. 706 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 707 XXX_NoUnkeyedLiteral struct{} `json:"-"` 708 XXX_unrecognized []byte `json:"-"` 709 XXX_sizecache int32 `json:"-"` 710} 711 712func (m *GetCryptoKeyVersionRequest) Reset() { *m = GetCryptoKeyVersionRequest{} } 713func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 714func (*GetCryptoKeyVersionRequest) ProtoMessage() {} 715func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 716 return fileDescriptor_723aeaeb61739a25, []int{10} 717} 718 719func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 720 return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b) 721} 722func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 723 return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic) 724} 725func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 726 xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src) 727} 728func (m *GetCryptoKeyVersionRequest) XXX_Size() int { 729 return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m) 730} 731func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() { 732 xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m) 733} 734 735var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo 736 737func (m *GetCryptoKeyVersionRequest) GetName() string { 738 if m != nil { 739 return m.Name 740 } 741 return "" 742} 743 744// Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 745type GetPublicKeyRequest struct { 746 // The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to 747 // get. 748 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 749 XXX_NoUnkeyedLiteral struct{} `json:"-"` 750 XXX_unrecognized []byte `json:"-"` 751 XXX_sizecache int32 `json:"-"` 752} 753 754func (m *GetPublicKeyRequest) Reset() { *m = GetPublicKeyRequest{} } 755func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) } 756func (*GetPublicKeyRequest) ProtoMessage() {} 757func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) { 758 return fileDescriptor_723aeaeb61739a25, []int{11} 759} 760 761func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error { 762 return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b) 763} 764func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 765 return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic) 766} 767func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) { 768 xxx_messageInfo_GetPublicKeyRequest.Merge(m, src) 769} 770func (m *GetPublicKeyRequest) XXX_Size() int { 771 return xxx_messageInfo_GetPublicKeyRequest.Size(m) 772} 773func (m *GetPublicKeyRequest) XXX_DiscardUnknown() { 774 xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m) 775} 776 777var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo 778 779func (m *GetPublicKeyRequest) GetName() string { 780 if m != nil { 781 return m.Name 782 } 783 return "" 784} 785 786// Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob]. 787type GetImportJobRequest struct { 788 // The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] to get. 789 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 790 XXX_NoUnkeyedLiteral struct{} `json:"-"` 791 XXX_unrecognized []byte `json:"-"` 792 XXX_sizecache int32 `json:"-"` 793} 794 795func (m *GetImportJobRequest) Reset() { *m = GetImportJobRequest{} } 796func (m *GetImportJobRequest) String() string { return proto.CompactTextString(m) } 797func (*GetImportJobRequest) ProtoMessage() {} 798func (*GetImportJobRequest) Descriptor() ([]byte, []int) { 799 return fileDescriptor_723aeaeb61739a25, []int{12} 800} 801 802func (m *GetImportJobRequest) XXX_Unmarshal(b []byte) error { 803 return xxx_messageInfo_GetImportJobRequest.Unmarshal(m, b) 804} 805func (m *GetImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 806 return xxx_messageInfo_GetImportJobRequest.Marshal(b, m, deterministic) 807} 808func (m *GetImportJobRequest) XXX_Merge(src proto.Message) { 809 xxx_messageInfo_GetImportJobRequest.Merge(m, src) 810} 811func (m *GetImportJobRequest) XXX_Size() int { 812 return xxx_messageInfo_GetImportJobRequest.Size(m) 813} 814func (m *GetImportJobRequest) XXX_DiscardUnknown() { 815 xxx_messageInfo_GetImportJobRequest.DiscardUnknown(m) 816} 817 818var xxx_messageInfo_GetImportJobRequest proto.InternalMessageInfo 819 820func (m *GetImportJobRequest) GetName() string { 821 if m != nil { 822 return m.Name 823 } 824 return "" 825} 826 827// Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing]. 828type CreateKeyRingRequest struct { 829 // Required. The resource name of the location associated with the 830 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. 831 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 832 // Required. It must be unique within a location and match the regular 833 // expression `[a-zA-Z0-9_-]{1,63}` 834 KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"` 835 // A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values. 836 KeyRing *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"` 837 XXX_NoUnkeyedLiteral struct{} `json:"-"` 838 XXX_unrecognized []byte `json:"-"` 839 XXX_sizecache int32 `json:"-"` 840} 841 842func (m *CreateKeyRingRequest) Reset() { *m = CreateKeyRingRequest{} } 843func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) } 844func (*CreateKeyRingRequest) ProtoMessage() {} 845func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) { 846 return fileDescriptor_723aeaeb61739a25, []int{13} 847} 848 849func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error { 850 return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b) 851} 852func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 853 return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic) 854} 855func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) { 856 xxx_messageInfo_CreateKeyRingRequest.Merge(m, src) 857} 858func (m *CreateKeyRingRequest) XXX_Size() int { 859 return xxx_messageInfo_CreateKeyRingRequest.Size(m) 860} 861func (m *CreateKeyRingRequest) XXX_DiscardUnknown() { 862 xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m) 863} 864 865var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo 866 867func (m *CreateKeyRingRequest) GetParent() string { 868 if m != nil { 869 return m.Parent 870 } 871 return "" 872} 873 874func (m *CreateKeyRingRequest) GetKeyRingId() string { 875 if m != nil { 876 return m.KeyRingId 877 } 878 return "" 879} 880 881func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing { 882 if m != nil { 883 return m.KeyRing 884 } 885 return nil 886} 887 888// Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey]. 889type CreateCryptoKeyRequest struct { 890 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing associated with the 891 // [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 892 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 893 // Required. It must be unique within a KeyRing and match the regular 894 // expression `[a-zA-Z0-9_-]{1,63}` 895 CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"` 896 // A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values. 897 CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 898 // If set to true, the request will create a [CryptoKey][google.cloud.kms.v1.CryptoKey] without any 899 // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. You must manually call 900 // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or 901 // [ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion] 902 // before you can use this [CryptoKey][google.cloud.kms.v1.CryptoKey]. 903 SkipInitialVersionCreation bool `protobuf:"varint,5,opt,name=skip_initial_version_creation,json=skipInitialVersionCreation,proto3" json:"skip_initial_version_creation,omitempty"` 904 XXX_NoUnkeyedLiteral struct{} `json:"-"` 905 XXX_unrecognized []byte `json:"-"` 906 XXX_sizecache int32 `json:"-"` 907} 908 909func (m *CreateCryptoKeyRequest) Reset() { *m = CreateCryptoKeyRequest{} } 910func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 911func (*CreateCryptoKeyRequest) ProtoMessage() {} 912func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) { 913 return fileDescriptor_723aeaeb61739a25, []int{14} 914} 915 916func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 917 return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b) 918} 919func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 920 return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic) 921} 922func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) { 923 xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src) 924} 925func (m *CreateCryptoKeyRequest) XXX_Size() int { 926 return xxx_messageInfo_CreateCryptoKeyRequest.Size(m) 927} 928func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() { 929 xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m) 930} 931 932var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo 933 934func (m *CreateCryptoKeyRequest) GetParent() string { 935 if m != nil { 936 return m.Parent 937 } 938 return "" 939} 940 941func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string { 942 if m != nil { 943 return m.CryptoKeyId 944 } 945 return "" 946} 947 948func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 949 if m != nil { 950 return m.CryptoKey 951 } 952 return nil 953} 954 955func (m *CreateCryptoKeyRequest) GetSkipInitialVersionCreation() bool { 956 if m != nil { 957 return m.SkipInitialVersionCreation 958 } 959 return false 960} 961 962// Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion]. 963type CreateCryptoKeyVersionRequest struct { 964 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with 965 // the [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 966 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 967 // A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial field values. 968 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 969 XXX_NoUnkeyedLiteral struct{} `json:"-"` 970 XXX_unrecognized []byte `json:"-"` 971 XXX_sizecache int32 `json:"-"` 972} 973 974func (m *CreateCryptoKeyVersionRequest) Reset() { *m = CreateCryptoKeyVersionRequest{} } 975func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 976func (*CreateCryptoKeyVersionRequest) ProtoMessage() {} 977func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 978 return fileDescriptor_723aeaeb61739a25, []int{15} 979} 980 981func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 982 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b) 983} 984func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 985 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 986} 987func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 988 xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src) 989} 990func (m *CreateCryptoKeyVersionRequest) XXX_Size() int { 991 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m) 992} 993func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 994 xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m) 995} 996 997var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo 998 999func (m *CreateCryptoKeyVersionRequest) GetParent() string { 1000 if m != nil { 1001 return m.Parent 1002 } 1003 return "" 1004} 1005 1006func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 1007 if m != nil { 1008 return m.CryptoKeyVersion 1009 } 1010 return nil 1011} 1012 1013// Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]. 1014type ImportCryptoKeyVersionRequest struct { 1015 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to 1016 // be imported into. 1017 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 1018 // Required. The [algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] of 1019 // the key being imported. This does not need to match the 1020 // [version_template][google.cloud.kms.v1.CryptoKey.version_template] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] this 1021 // version imports into. 1022 Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` 1023 // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] that was used to 1024 // wrap this key material. 1025 ImportJob string `protobuf:"bytes,4,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` 1026 // Required. The incoming wrapped key material that is to be imported. 1027 // 1028 // Types that are valid to be assigned to WrappedKeyMaterial: 1029 // *ImportCryptoKeyVersionRequest_RsaAesWrappedKey 1030 WrappedKeyMaterial isImportCryptoKeyVersionRequest_WrappedKeyMaterial `protobuf_oneof:"wrapped_key_material"` 1031 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1032 XXX_unrecognized []byte `json:"-"` 1033 XXX_sizecache int32 `json:"-"` 1034} 1035 1036func (m *ImportCryptoKeyVersionRequest) Reset() { *m = ImportCryptoKeyVersionRequest{} } 1037func (m *ImportCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1038func (*ImportCryptoKeyVersionRequest) ProtoMessage() {} 1039func (*ImportCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1040 return fileDescriptor_723aeaeb61739a25, []int{16} 1041} 1042 1043func (m *ImportCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1044 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Unmarshal(m, b) 1045} 1046func (m *ImportCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1047 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1048} 1049func (m *ImportCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1050 xxx_messageInfo_ImportCryptoKeyVersionRequest.Merge(m, src) 1051} 1052func (m *ImportCryptoKeyVersionRequest) XXX_Size() int { 1053 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Size(m) 1054} 1055func (m *ImportCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1056 xxx_messageInfo_ImportCryptoKeyVersionRequest.DiscardUnknown(m) 1057} 1058 1059var xxx_messageInfo_ImportCryptoKeyVersionRequest proto.InternalMessageInfo 1060 1061func (m *ImportCryptoKeyVersionRequest) GetParent() string { 1062 if m != nil { 1063 return m.Parent 1064 } 1065 return "" 1066} 1067 1068func (m *ImportCryptoKeyVersionRequest) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { 1069 if m != nil { 1070 return m.Algorithm 1071 } 1072 return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED 1073} 1074 1075func (m *ImportCryptoKeyVersionRequest) GetImportJob() string { 1076 if m != nil { 1077 return m.ImportJob 1078 } 1079 return "" 1080} 1081 1082type isImportCryptoKeyVersionRequest_WrappedKeyMaterial interface { 1083 isImportCryptoKeyVersionRequest_WrappedKeyMaterial() 1084} 1085 1086type ImportCryptoKeyVersionRequest_RsaAesWrappedKey struct { 1087 RsaAesWrappedKey []byte `protobuf:"bytes,5,opt,name=rsa_aes_wrapped_key,json=rsaAesWrappedKey,proto3,oneof"` 1088} 1089 1090func (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey) isImportCryptoKeyVersionRequest_WrappedKeyMaterial() { 1091} 1092 1093func (m *ImportCryptoKeyVersionRequest) GetWrappedKeyMaterial() isImportCryptoKeyVersionRequest_WrappedKeyMaterial { 1094 if m != nil { 1095 return m.WrappedKeyMaterial 1096 } 1097 return nil 1098} 1099 1100func (m *ImportCryptoKeyVersionRequest) GetRsaAesWrappedKey() []byte { 1101 if x, ok := m.GetWrappedKeyMaterial().(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey); ok { 1102 return x.RsaAesWrappedKey 1103 } 1104 return nil 1105} 1106 1107// XXX_OneofWrappers is for the internal use of the proto package. 1108func (*ImportCryptoKeyVersionRequest) XXX_OneofWrappers() []interface{} { 1109 return []interface{}{ 1110 (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey)(nil), 1111 } 1112} 1113 1114// Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob]. 1115type CreateImportJobRequest struct { 1116 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] associated with the 1117 // [ImportJobs][google.cloud.kms.v1.ImportJob]. 1118 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 1119 // Required. It must be unique within a KeyRing and match the regular 1120 // expression `[a-zA-Z0-9_-]{1,63}` 1121 ImportJobId string `protobuf:"bytes,2,opt,name=import_job_id,json=importJobId,proto3" json:"import_job_id,omitempty"` 1122 // Required. An [ImportJob][google.cloud.kms.v1.ImportJob] with initial field values. 1123 ImportJob *ImportJob `protobuf:"bytes,3,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` 1124 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1125 XXX_unrecognized []byte `json:"-"` 1126 XXX_sizecache int32 `json:"-"` 1127} 1128 1129func (m *CreateImportJobRequest) Reset() { *m = CreateImportJobRequest{} } 1130func (m *CreateImportJobRequest) String() string { return proto.CompactTextString(m) } 1131func (*CreateImportJobRequest) ProtoMessage() {} 1132func (*CreateImportJobRequest) Descriptor() ([]byte, []int) { 1133 return fileDescriptor_723aeaeb61739a25, []int{17} 1134} 1135 1136func (m *CreateImportJobRequest) XXX_Unmarshal(b []byte) error { 1137 return xxx_messageInfo_CreateImportJobRequest.Unmarshal(m, b) 1138} 1139func (m *CreateImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1140 return xxx_messageInfo_CreateImportJobRequest.Marshal(b, m, deterministic) 1141} 1142func (m *CreateImportJobRequest) XXX_Merge(src proto.Message) { 1143 xxx_messageInfo_CreateImportJobRequest.Merge(m, src) 1144} 1145func (m *CreateImportJobRequest) XXX_Size() int { 1146 return xxx_messageInfo_CreateImportJobRequest.Size(m) 1147} 1148func (m *CreateImportJobRequest) XXX_DiscardUnknown() { 1149 xxx_messageInfo_CreateImportJobRequest.DiscardUnknown(m) 1150} 1151 1152var xxx_messageInfo_CreateImportJobRequest proto.InternalMessageInfo 1153 1154func (m *CreateImportJobRequest) GetParent() string { 1155 if m != nil { 1156 return m.Parent 1157 } 1158 return "" 1159} 1160 1161func (m *CreateImportJobRequest) GetImportJobId() string { 1162 if m != nil { 1163 return m.ImportJobId 1164 } 1165 return "" 1166} 1167 1168func (m *CreateImportJobRequest) GetImportJob() *ImportJob { 1169 if m != nil { 1170 return m.ImportJob 1171 } 1172 return nil 1173} 1174 1175// Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey]. 1176type UpdateCryptoKeyRequest struct { 1177 // [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values. 1178 CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 1179 // Required list of fields to be updated in this request. 1180 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 1181 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1182 XXX_unrecognized []byte `json:"-"` 1183 XXX_sizecache int32 `json:"-"` 1184} 1185 1186func (m *UpdateCryptoKeyRequest) Reset() { *m = UpdateCryptoKeyRequest{} } 1187func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 1188func (*UpdateCryptoKeyRequest) ProtoMessage() {} 1189func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) { 1190 return fileDescriptor_723aeaeb61739a25, []int{18} 1191} 1192 1193func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 1194 return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b) 1195} 1196func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1197 return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic) 1198} 1199func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) { 1200 xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src) 1201} 1202func (m *UpdateCryptoKeyRequest) XXX_Size() int { 1203 return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m) 1204} 1205func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() { 1206 xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m) 1207} 1208 1209var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo 1210 1211func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 1212 if m != nil { 1213 return m.CryptoKey 1214 } 1215 return nil 1216} 1217 1218func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask { 1219 if m != nil { 1220 return m.UpdateMask 1221 } 1222 return nil 1223} 1224 1225// Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion]. 1226type UpdateCryptoKeyVersionRequest struct { 1227 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated values. 1228 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 1229 // Required list of fields to be updated in this request. 1230 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 1231 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1232 XXX_unrecognized []byte `json:"-"` 1233 XXX_sizecache int32 `json:"-"` 1234} 1235 1236func (m *UpdateCryptoKeyVersionRequest) Reset() { *m = UpdateCryptoKeyVersionRequest{} } 1237func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1238func (*UpdateCryptoKeyVersionRequest) ProtoMessage() {} 1239func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1240 return fileDescriptor_723aeaeb61739a25, []int{19} 1241} 1242 1243func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1244 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b) 1245} 1246func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1247 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1248} 1249func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1250 xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src) 1251} 1252func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int { 1253 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m) 1254} 1255func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1256 xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m) 1257} 1258 1259var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo 1260 1261func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 1262 if m != nil { 1263 return m.CryptoKeyVersion 1264 } 1265 return nil 1266} 1267 1268func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask { 1269 if m != nil { 1270 return m.UpdateMask 1271 } 1272 return nil 1273} 1274 1275// Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1276type EncryptRequest struct { 1277 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] or [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1278 // to use for encryption. 1279 // 1280 // If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server will use its 1281 // [primary version][google.cloud.kms.v1.CryptoKey.primary]. 1282 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1283 // Required. The data to encrypt. Must be no larger than 64KiB. 1284 // 1285 // The maximum size depends on the key version's 1286 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For 1287 // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the plaintext must be no larger 1288 // than 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the 1289 // plaintext and additional_authenticated_data fields must be no larger than 1290 // 8KiB. 1291 Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1292 // Optional data that, if specified, must also be provided during decryption 1293 // through [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data]. 1294 // 1295 // The maximum size depends on the key version's 1296 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For 1297 // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD must be no larger than 1298 // 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the 1299 // plaintext and additional_authenticated_data fields must be no larger than 1300 // 8KiB. 1301 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 1302 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1303 XXX_unrecognized []byte `json:"-"` 1304 XXX_sizecache int32 `json:"-"` 1305} 1306 1307func (m *EncryptRequest) Reset() { *m = EncryptRequest{} } 1308func (m *EncryptRequest) String() string { return proto.CompactTextString(m) } 1309func (*EncryptRequest) ProtoMessage() {} 1310func (*EncryptRequest) Descriptor() ([]byte, []int) { 1311 return fileDescriptor_723aeaeb61739a25, []int{20} 1312} 1313 1314func (m *EncryptRequest) XXX_Unmarshal(b []byte) error { 1315 return xxx_messageInfo_EncryptRequest.Unmarshal(m, b) 1316} 1317func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1318 return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic) 1319} 1320func (m *EncryptRequest) XXX_Merge(src proto.Message) { 1321 xxx_messageInfo_EncryptRequest.Merge(m, src) 1322} 1323func (m *EncryptRequest) XXX_Size() int { 1324 return xxx_messageInfo_EncryptRequest.Size(m) 1325} 1326func (m *EncryptRequest) XXX_DiscardUnknown() { 1327 xxx_messageInfo_EncryptRequest.DiscardUnknown(m) 1328} 1329 1330var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo 1331 1332func (m *EncryptRequest) GetName() string { 1333 if m != nil { 1334 return m.Name 1335 } 1336 return "" 1337} 1338 1339func (m *EncryptRequest) GetPlaintext() []byte { 1340 if m != nil { 1341 return m.Plaintext 1342 } 1343 return nil 1344} 1345 1346func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte { 1347 if m != nil { 1348 return m.AdditionalAuthenticatedData 1349 } 1350 return nil 1351} 1352 1353// Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1354type DecryptRequest struct { 1355 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption. 1356 // The server will choose the appropriate version. 1357 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1358 // Required. The encrypted data originally returned in 1359 // [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext]. 1360 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1361 // Optional data that must match the data originally supplied in 1362 // [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data]. 1363 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 1364 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1365 XXX_unrecognized []byte `json:"-"` 1366 XXX_sizecache int32 `json:"-"` 1367} 1368 1369func (m *DecryptRequest) Reset() { *m = DecryptRequest{} } 1370func (m *DecryptRequest) String() string { return proto.CompactTextString(m) } 1371func (*DecryptRequest) ProtoMessage() {} 1372func (*DecryptRequest) Descriptor() ([]byte, []int) { 1373 return fileDescriptor_723aeaeb61739a25, []int{21} 1374} 1375 1376func (m *DecryptRequest) XXX_Unmarshal(b []byte) error { 1377 return xxx_messageInfo_DecryptRequest.Unmarshal(m, b) 1378} 1379func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1380 return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic) 1381} 1382func (m *DecryptRequest) XXX_Merge(src proto.Message) { 1383 xxx_messageInfo_DecryptRequest.Merge(m, src) 1384} 1385func (m *DecryptRequest) XXX_Size() int { 1386 return xxx_messageInfo_DecryptRequest.Size(m) 1387} 1388func (m *DecryptRequest) XXX_DiscardUnknown() { 1389 xxx_messageInfo_DecryptRequest.DiscardUnknown(m) 1390} 1391 1392var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo 1393 1394func (m *DecryptRequest) GetName() string { 1395 if m != nil { 1396 return m.Name 1397 } 1398 return "" 1399} 1400 1401func (m *DecryptRequest) GetCiphertext() []byte { 1402 if m != nil { 1403 return m.Ciphertext 1404 } 1405 return nil 1406} 1407 1408func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte { 1409 if m != nil { 1410 return m.AdditionalAuthenticatedData 1411 } 1412 return nil 1413} 1414 1415// Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1416type AsymmetricSignRequest struct { 1417 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing. 1418 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1419 // Required. The digest of the data to sign. The digest must be produced with 1420 // the same digest algorithm as specified by the key version's 1421 // [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. 1422 Digest *Digest `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"` 1423 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1424 XXX_unrecognized []byte `json:"-"` 1425 XXX_sizecache int32 `json:"-"` 1426} 1427 1428func (m *AsymmetricSignRequest) Reset() { *m = AsymmetricSignRequest{} } 1429func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) } 1430func (*AsymmetricSignRequest) ProtoMessage() {} 1431func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) { 1432 return fileDescriptor_723aeaeb61739a25, []int{22} 1433} 1434 1435func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error { 1436 return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b) 1437} 1438func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1439 return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic) 1440} 1441func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) { 1442 xxx_messageInfo_AsymmetricSignRequest.Merge(m, src) 1443} 1444func (m *AsymmetricSignRequest) XXX_Size() int { 1445 return xxx_messageInfo_AsymmetricSignRequest.Size(m) 1446} 1447func (m *AsymmetricSignRequest) XXX_DiscardUnknown() { 1448 xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m) 1449} 1450 1451var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo 1452 1453func (m *AsymmetricSignRequest) GetName() string { 1454 if m != nil { 1455 return m.Name 1456 } 1457 return "" 1458} 1459 1460func (m *AsymmetricSignRequest) GetDigest() *Digest { 1461 if m != nil { 1462 return m.Digest 1463 } 1464 return nil 1465} 1466 1467// Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1468type AsymmetricDecryptRequest struct { 1469 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for 1470 // decryption. 1471 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1472 // Required. The data encrypted with the named [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public 1473 // key using OAEP. 1474 Ciphertext []byte `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1475 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1476 XXX_unrecognized []byte `json:"-"` 1477 XXX_sizecache int32 `json:"-"` 1478} 1479 1480func (m *AsymmetricDecryptRequest) Reset() { *m = AsymmetricDecryptRequest{} } 1481func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) } 1482func (*AsymmetricDecryptRequest) ProtoMessage() {} 1483func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) { 1484 return fileDescriptor_723aeaeb61739a25, []int{23} 1485} 1486 1487func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error { 1488 return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b) 1489} 1490func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1491 return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic) 1492} 1493func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) { 1494 xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src) 1495} 1496func (m *AsymmetricDecryptRequest) XXX_Size() int { 1497 return xxx_messageInfo_AsymmetricDecryptRequest.Size(m) 1498} 1499func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() { 1500 xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m) 1501} 1502 1503var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo 1504 1505func (m *AsymmetricDecryptRequest) GetName() string { 1506 if m != nil { 1507 return m.Name 1508 } 1509 return "" 1510} 1511 1512func (m *AsymmetricDecryptRequest) GetCiphertext() []byte { 1513 if m != nil { 1514 return m.Ciphertext 1515 } 1516 return nil 1517} 1518 1519// Response message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1520type DecryptResponse struct { 1521 // The decrypted data originally supplied in [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext]. 1522 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1523 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1524 XXX_unrecognized []byte `json:"-"` 1525 XXX_sizecache int32 `json:"-"` 1526} 1527 1528func (m *DecryptResponse) Reset() { *m = DecryptResponse{} } 1529func (m *DecryptResponse) String() string { return proto.CompactTextString(m) } 1530func (*DecryptResponse) ProtoMessage() {} 1531func (*DecryptResponse) Descriptor() ([]byte, []int) { 1532 return fileDescriptor_723aeaeb61739a25, []int{24} 1533} 1534 1535func (m *DecryptResponse) XXX_Unmarshal(b []byte) error { 1536 return xxx_messageInfo_DecryptResponse.Unmarshal(m, b) 1537} 1538func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1539 return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic) 1540} 1541func (m *DecryptResponse) XXX_Merge(src proto.Message) { 1542 xxx_messageInfo_DecryptResponse.Merge(m, src) 1543} 1544func (m *DecryptResponse) XXX_Size() int { 1545 return xxx_messageInfo_DecryptResponse.Size(m) 1546} 1547func (m *DecryptResponse) XXX_DiscardUnknown() { 1548 xxx_messageInfo_DecryptResponse.DiscardUnknown(m) 1549} 1550 1551var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo 1552 1553func (m *DecryptResponse) GetPlaintext() []byte { 1554 if m != nil { 1555 return m.Plaintext 1556 } 1557 return nil 1558} 1559 1560// Response message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1561type EncryptResponse struct { 1562 // The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in encryption. 1563 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1564 // The encrypted data. 1565 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1566 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1567 XXX_unrecognized []byte `json:"-"` 1568 XXX_sizecache int32 `json:"-"` 1569} 1570 1571func (m *EncryptResponse) Reset() { *m = EncryptResponse{} } 1572func (m *EncryptResponse) String() string { return proto.CompactTextString(m) } 1573func (*EncryptResponse) ProtoMessage() {} 1574func (*EncryptResponse) Descriptor() ([]byte, []int) { 1575 return fileDescriptor_723aeaeb61739a25, []int{25} 1576} 1577 1578func (m *EncryptResponse) XXX_Unmarshal(b []byte) error { 1579 return xxx_messageInfo_EncryptResponse.Unmarshal(m, b) 1580} 1581func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1582 return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic) 1583} 1584func (m *EncryptResponse) XXX_Merge(src proto.Message) { 1585 xxx_messageInfo_EncryptResponse.Merge(m, src) 1586} 1587func (m *EncryptResponse) XXX_Size() int { 1588 return xxx_messageInfo_EncryptResponse.Size(m) 1589} 1590func (m *EncryptResponse) XXX_DiscardUnknown() { 1591 xxx_messageInfo_EncryptResponse.DiscardUnknown(m) 1592} 1593 1594var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo 1595 1596func (m *EncryptResponse) GetName() string { 1597 if m != nil { 1598 return m.Name 1599 } 1600 return "" 1601} 1602 1603func (m *EncryptResponse) GetCiphertext() []byte { 1604 if m != nil { 1605 return m.Ciphertext 1606 } 1607 return nil 1608} 1609 1610// Response message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1611type AsymmetricSignResponse struct { 1612 // The created signature. 1613 Signature []byte `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"` 1614 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1615 XXX_unrecognized []byte `json:"-"` 1616 XXX_sizecache int32 `json:"-"` 1617} 1618 1619func (m *AsymmetricSignResponse) Reset() { *m = AsymmetricSignResponse{} } 1620func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) } 1621func (*AsymmetricSignResponse) ProtoMessage() {} 1622func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) { 1623 return fileDescriptor_723aeaeb61739a25, []int{26} 1624} 1625 1626func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error { 1627 return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b) 1628} 1629func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1630 return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic) 1631} 1632func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) { 1633 xxx_messageInfo_AsymmetricSignResponse.Merge(m, src) 1634} 1635func (m *AsymmetricSignResponse) XXX_Size() int { 1636 return xxx_messageInfo_AsymmetricSignResponse.Size(m) 1637} 1638func (m *AsymmetricSignResponse) XXX_DiscardUnknown() { 1639 xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m) 1640} 1641 1642var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo 1643 1644func (m *AsymmetricSignResponse) GetSignature() []byte { 1645 if m != nil { 1646 return m.Signature 1647 } 1648 return nil 1649} 1650 1651// Response message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1652type AsymmetricDecryptResponse struct { 1653 // The decrypted data originally encrypted with the matching public key. 1654 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1655 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1656 XXX_unrecognized []byte `json:"-"` 1657 XXX_sizecache int32 `json:"-"` 1658} 1659 1660func (m *AsymmetricDecryptResponse) Reset() { *m = AsymmetricDecryptResponse{} } 1661func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) } 1662func (*AsymmetricDecryptResponse) ProtoMessage() {} 1663func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) { 1664 return fileDescriptor_723aeaeb61739a25, []int{27} 1665} 1666 1667func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error { 1668 return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b) 1669} 1670func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1671 return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic) 1672} 1673func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) { 1674 xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src) 1675} 1676func (m *AsymmetricDecryptResponse) XXX_Size() int { 1677 return xxx_messageInfo_AsymmetricDecryptResponse.Size(m) 1678} 1679func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() { 1680 xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m) 1681} 1682 1683var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo 1684 1685func (m *AsymmetricDecryptResponse) GetPlaintext() []byte { 1686 if m != nil { 1687 return m.Plaintext 1688 } 1689 return nil 1690} 1691 1692// Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. 1693type UpdateCryptoKeyPrimaryVersionRequest struct { 1694 // The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to update. 1695 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1696 // The id of the child [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary. 1697 CryptoKeyVersionId string `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"` 1698 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1699 XXX_unrecognized []byte `json:"-"` 1700 XXX_sizecache int32 `json:"-"` 1701} 1702 1703func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset() { *m = UpdateCryptoKeyPrimaryVersionRequest{} } 1704func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) } 1705func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage() {} 1706func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) { 1707 return fileDescriptor_723aeaeb61739a25, []int{28} 1708} 1709 1710func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error { 1711 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b) 1712} 1713func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1714 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic) 1715} 1716func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) { 1717 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src) 1718} 1719func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int { 1720 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m) 1721} 1722func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() { 1723 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m) 1724} 1725 1726var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo 1727 1728func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string { 1729 if m != nil { 1730 return m.Name 1731 } 1732 return "" 1733} 1734 1735func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string { 1736 if m != nil { 1737 return m.CryptoKeyVersionId 1738 } 1739 return "" 1740} 1741 1742// Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]. 1743type DestroyCryptoKeyVersionRequest struct { 1744 // The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy. 1745 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1746 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1747 XXX_unrecognized []byte `json:"-"` 1748 XXX_sizecache int32 `json:"-"` 1749} 1750 1751func (m *DestroyCryptoKeyVersionRequest) Reset() { *m = DestroyCryptoKeyVersionRequest{} } 1752func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1753func (*DestroyCryptoKeyVersionRequest) ProtoMessage() {} 1754func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1755 return fileDescriptor_723aeaeb61739a25, []int{29} 1756} 1757 1758func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1759 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b) 1760} 1761func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1762 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1763} 1764func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1765 xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src) 1766} 1767func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int { 1768 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m) 1769} 1770func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1771 xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m) 1772} 1773 1774var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo 1775 1776func (m *DestroyCryptoKeyVersionRequest) GetName() string { 1777 if m != nil { 1778 return m.Name 1779 } 1780 return "" 1781} 1782 1783// Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]. 1784type RestoreCryptoKeyVersionRequest struct { 1785 // The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore. 1786 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1787 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1788 XXX_unrecognized []byte `json:"-"` 1789 XXX_sizecache int32 `json:"-"` 1790} 1791 1792func (m *RestoreCryptoKeyVersionRequest) Reset() { *m = RestoreCryptoKeyVersionRequest{} } 1793func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1794func (*RestoreCryptoKeyVersionRequest) ProtoMessage() {} 1795func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1796 return fileDescriptor_723aeaeb61739a25, []int{30} 1797} 1798 1799func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1800 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b) 1801} 1802func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1803 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1804} 1805func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1806 xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src) 1807} 1808func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int { 1809 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m) 1810} 1811func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1812 xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m) 1813} 1814 1815var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo 1816 1817func (m *RestoreCryptoKeyVersionRequest) GetName() string { 1818 if m != nil { 1819 return m.Name 1820 } 1821 return "" 1822} 1823 1824// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest. 1825type Digest struct { 1826 // Required. The message digest. 1827 // 1828 // Types that are valid to be assigned to Digest: 1829 // *Digest_Sha256 1830 // *Digest_Sha384 1831 // *Digest_Sha512 1832 Digest isDigest_Digest `protobuf_oneof:"digest"` 1833 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1834 XXX_unrecognized []byte `json:"-"` 1835 XXX_sizecache int32 `json:"-"` 1836} 1837 1838func (m *Digest) Reset() { *m = Digest{} } 1839func (m *Digest) String() string { return proto.CompactTextString(m) } 1840func (*Digest) ProtoMessage() {} 1841func (*Digest) Descriptor() ([]byte, []int) { 1842 return fileDescriptor_723aeaeb61739a25, []int{31} 1843} 1844 1845func (m *Digest) XXX_Unmarshal(b []byte) error { 1846 return xxx_messageInfo_Digest.Unmarshal(m, b) 1847} 1848func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1849 return xxx_messageInfo_Digest.Marshal(b, m, deterministic) 1850} 1851func (m *Digest) XXX_Merge(src proto.Message) { 1852 xxx_messageInfo_Digest.Merge(m, src) 1853} 1854func (m *Digest) XXX_Size() int { 1855 return xxx_messageInfo_Digest.Size(m) 1856} 1857func (m *Digest) XXX_DiscardUnknown() { 1858 xxx_messageInfo_Digest.DiscardUnknown(m) 1859} 1860 1861var xxx_messageInfo_Digest proto.InternalMessageInfo 1862 1863type isDigest_Digest interface { 1864 isDigest_Digest() 1865} 1866 1867type Digest_Sha256 struct { 1868 Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"` 1869} 1870 1871type Digest_Sha384 struct { 1872 Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"` 1873} 1874 1875type Digest_Sha512 struct { 1876 Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"` 1877} 1878 1879func (*Digest_Sha256) isDigest_Digest() {} 1880 1881func (*Digest_Sha384) isDigest_Digest() {} 1882 1883func (*Digest_Sha512) isDigest_Digest() {} 1884 1885func (m *Digest) GetDigest() isDigest_Digest { 1886 if m != nil { 1887 return m.Digest 1888 } 1889 return nil 1890} 1891 1892func (m *Digest) GetSha256() []byte { 1893 if x, ok := m.GetDigest().(*Digest_Sha256); ok { 1894 return x.Sha256 1895 } 1896 return nil 1897} 1898 1899func (m *Digest) GetSha384() []byte { 1900 if x, ok := m.GetDigest().(*Digest_Sha384); ok { 1901 return x.Sha384 1902 } 1903 return nil 1904} 1905 1906func (m *Digest) GetSha512() []byte { 1907 if x, ok := m.GetDigest().(*Digest_Sha512); ok { 1908 return x.Sha512 1909 } 1910 return nil 1911} 1912 1913// XXX_OneofWrappers is for the internal use of the proto package. 1914func (*Digest) XXX_OneofWrappers() []interface{} { 1915 return []interface{}{ 1916 (*Digest_Sha256)(nil), 1917 (*Digest_Sha384)(nil), 1918 (*Digest_Sha512)(nil), 1919 } 1920} 1921 1922// Cloud KMS metadata for the given [google.cloud.location.Location][google.cloud.location.Location]. 1923type LocationMetadata struct { 1924 // Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with 1925 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] 1926 // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this location. 1927 HsmAvailable bool `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"` 1928 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1929 XXX_unrecognized []byte `json:"-"` 1930 XXX_sizecache int32 `json:"-"` 1931} 1932 1933func (m *LocationMetadata) Reset() { *m = LocationMetadata{} } 1934func (m *LocationMetadata) String() string { return proto.CompactTextString(m) } 1935func (*LocationMetadata) ProtoMessage() {} 1936func (*LocationMetadata) Descriptor() ([]byte, []int) { 1937 return fileDescriptor_723aeaeb61739a25, []int{32} 1938} 1939 1940func (m *LocationMetadata) XXX_Unmarshal(b []byte) error { 1941 return xxx_messageInfo_LocationMetadata.Unmarshal(m, b) 1942} 1943func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1944 return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic) 1945} 1946func (m *LocationMetadata) XXX_Merge(src proto.Message) { 1947 xxx_messageInfo_LocationMetadata.Merge(m, src) 1948} 1949func (m *LocationMetadata) XXX_Size() int { 1950 return xxx_messageInfo_LocationMetadata.Size(m) 1951} 1952func (m *LocationMetadata) XXX_DiscardUnknown() { 1953 xxx_messageInfo_LocationMetadata.DiscardUnknown(m) 1954} 1955 1956var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo 1957 1958func (m *LocationMetadata) GetHsmAvailable() bool { 1959 if m != nil { 1960 return m.HsmAvailable 1961 } 1962 return false 1963} 1964 1965func init() { 1966 proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest") 1967 proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest") 1968 proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest") 1969 proto.RegisterType((*ListImportJobsRequest)(nil), "google.cloud.kms.v1.ListImportJobsRequest") 1970 proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse") 1971 proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse") 1972 proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse") 1973 proto.RegisterType((*ListImportJobsResponse)(nil), "google.cloud.kms.v1.ListImportJobsResponse") 1974 proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest") 1975 proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest") 1976 proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest") 1977 proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest") 1978 proto.RegisterType((*GetImportJobRequest)(nil), "google.cloud.kms.v1.GetImportJobRequest") 1979 proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest") 1980 proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest") 1981 proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest") 1982 proto.RegisterType((*ImportCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.ImportCryptoKeyVersionRequest") 1983 proto.RegisterType((*CreateImportJobRequest)(nil), "google.cloud.kms.v1.CreateImportJobRequest") 1984 proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest") 1985 proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest") 1986 proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest") 1987 proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest") 1988 proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest") 1989 proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest") 1990 proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse") 1991 proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse") 1992 proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse") 1993 proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse") 1994 proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest") 1995 proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest") 1996 proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest") 1997 proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest") 1998 proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata") 1999} 2000 2001func init() { proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25) } 2002 2003var fileDescriptor_723aeaeb61739a25 = []byte{ 2004 // 2029 bytes of a gzipped FileDescriptorProto 2005 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x5a, 0xcd, 0x73, 0x1c, 0x47, 2006 0x15, 0x4f, 0xfb, 0x43, 0x96, 0x9e, 0x64, 0xc9, 0x6e, 0xd9, 0xb2, 0xb2, 0xb6, 0x54, 0x66, 0x1c, 2007 0x82, 0xad, 0x24, 0x3b, 0x68, 0x25, 0x3b, 0xf6, 0xba, 0x42, 0x6a, 0x65, 0x25, 0x8e, 0x90, 0x65, 2008 0x54, 0xa3, 0xd8, 0x26, 0x29, 0xa7, 0xc6, 0xad, 0xdd, 0xf6, 0x6a, 0xbc, 0x3b, 0x1f, 0x4c, 0xb7, 2009 0xa4, 0x6c, 0x20, 0x17, 0x0e, 0x90, 0x43, 0x6e, 0xa1, 0x8a, 0x50, 0x50, 0x14, 0x05, 0x37, 0x0a, 2010 0x0e, 0xdc, 0xe0, 0xc0, 0x8d, 0x53, 0x8e, 0x81, 0xc0, 0x2d, 0x27, 0xfe, 0x01, 0x0e, 0x54, 0x71, 2011 0x81, 0xa2, 0xa6, 0xa7, 0xe7, 0x73, 0x67, 0x66, 0x3f, 0xbc, 0x2e, 0xb8, 0x69, 0x7b, 0x5e, 0xbf, 2012 0xfe, 0xfd, 0xfa, 0xfd, 0x7e, 0x33, 0xfd, 0xba, 0x04, 0x5f, 0x69, 0xda, 0x76, 0xb3, 0x4d, 0xd5, 2013 0x7a, 0xdb, 0xde, 0x6f, 0xa8, 0x2d, 0x93, 0xa9, 0x07, 0xcb, 0x2a, 0xa3, 0xee, 0x81, 0x51, 0xa7, 2014 0x65, 0xc7, 0xb5, 0xb9, 0x8d, 0x67, 0xfd, 0x90, 0xb2, 0x08, 0x29, 0xb7, 0x4c, 0x56, 0x3e, 0x58, 2015 0x2e, 0x5d, 0x90, 0xf3, 0x88, 0x63, 0xa8, 0xc4, 0xb2, 0x6c, 0x4e, 0xb8, 0x61, 0x5b, 0xcc, 0x9f, 2016 0x52, 0xba, 0x94, 0x95, 0xd5, 0xa5, 0xcc, 0xde, 0x77, 0xeb, 0x34, 0x08, 0xba, 0x28, 0x83, 0xc4, 2017 0xaf, 0xdd, 0xfd, 0xc7, 0xea, 0x63, 0x83, 0xb6, 0x1b, 0xba, 0x49, 0x58, 0x4b, 0x46, 0x9c, 0x8b, 2018 0x2d, 0x52, 0x6f, 0x1b, 0xd4, 0xe2, 0xfe, 0x03, 0xe5, 0x67, 0x08, 0x66, 0xef, 0x18, 0x8c, 0x6f, 2019 0xd2, 0x8e, 0x66, 0x58, 0x4d, 0xa6, 0xd1, 0xef, 0xec, 0x53, 0xc6, 0xf1, 0x1c, 0x8c, 0x39, 0xc4, 2020 0xa5, 0x16, 0x9f, 0x47, 0x17, 0xd1, 0xe5, 0x09, 0x4d, 0xfe, 0xc2, 0xe7, 0x61, 0xc2, 0x21, 0x4d, 2021 0xaa, 0x33, 0xe3, 0x03, 0x3a, 0x7f, 0xe4, 0x22, 0xba, 0x7c, 0x5c, 0x1b, 0xf7, 0x06, 0x76, 0x8c, 2022 0x0f, 0x28, 0x5e, 0x00, 0x10, 0x0f, 0xb9, 0xdd, 0xa2, 0xd6, 0xfc, 0x51, 0x31, 0x51, 0x84, 0xbf, 2023 0xed, 0x0d, 0x78, 0x39, 0x1f, 0x1b, 0x6d, 0x4e, 0xdd, 0xf9, 0x63, 0x7e, 0x4e, 0xff, 0x17, 0x7e, 2024 0x1e, 0xc6, 0x6d, 0xb7, 0x41, 0x5d, 0x7d, 0xb7, 0x33, 0x7f, 0x5c, 0x3c, 0x39, 0x21, 0x7e, 0xaf, 2025 0x75, 0x94, 0x7f, 0x23, 0x38, 0xeb, 0xc1, 0xbb, 0xe5, 0x76, 0x1c, 0x6e, 0x6f, 0xd2, 0xce, 0x33, 2026 0x05, 0xf8, 0x1e, 0x4c, 0x1d, 0x50, 0x97, 0x19, 0xb6, 0xa5, 0x1f, 0x18, 0xf4, 0x50, 0xc0, 0x9c, 2027 0xae, 0x54, 0xcb, 0x19, 0x65, 0x2b, 0x87, 0x88, 0xee, 0xfb, 0x33, 0xba, 0x06, 0xee, 0x1b, 0xf4, 2028 0x50, 0x9b, 0x3c, 0x88, 0x7e, 0xc4, 0xf8, 0x1f, 0xcf, 0xe5, 0x3f, 0x96, 0xe4, 0xff, 0x4f, 0x04, 2029 0x17, 0x12, 0xfc, 0x65, 0xf2, 0x67, 0xba, 0x0d, 0x77, 0xe1, 0xd8, 0x88, 0xe8, 0x8b, 0x3c, 0xc3, 2030 0xf0, 0xfe, 0xb9, 0xac, 0xfb, 0x86, 0xe9, 0xd8, 0x2e, 0xff, 0xa6, 0xbd, 0xfb, 0xff, 0x26, 0xcc, 2031 0x4f, 0x11, 0x9c, 0x49, 0xfa, 0x86, 0x39, 0xb6, 0xc5, 0x28, 0xbe, 0x01, 0x13, 0x2d, 0xda, 0xd1, 2032 0x5d, 0x6f, 0x70, 0x1e, 0x5d, 0x3c, 0x7a, 0x79, 0xb2, 0x72, 0x21, 0x73, 0x07, 0xe5, 0x4c, 0x6d, 2033 0xbc, 0x25, 0x53, 0xe0, 0x17, 0x61, 0xc6, 0xa2, 0xef, 0x73, 0x3d, 0x06, 0xf5, 0x88, 0x58, 0xf5, 2034 0xa4, 0x37, 0xbc, 0x1d, 0xc2, 0x5d, 0x00, 0xe0, 0x36, 0x27, 0x6d, 0x9f, 0xeb, 0x51, 0xc1, 0x75, 2035 0x42, 0x8c, 0x78, 0x64, 0x95, 0x5f, 0x20, 0x98, 0x4b, 0x7b, 0x46, 0x82, 0x7b, 0x1d, 0x26, 0xeb, 2036 0x62, 0x54, 0x6f, 0xd1, 0x4e, 0x00, 0x6f, 0xb1, 0xb8, 0xc0, 0x1a, 0xd4, 0xc3, 0x44, 0xa3, 0x82, 2037 0xf8, 0x47, 0x04, 0x0b, 0x39, 0xb2, 0x96, 0x48, 0xef, 0xc1, 0x6c, 0x84, 0x54, 0x97, 0x2e, 0x0a, 2038 0x10, 0x7f, 0xb5, 0x2f, 0x49, 0x6a, 0xa7, 0xeb, 0xe9, 0xf4, 0xa3, 0xde, 0xe2, 0xb8, 0x3c, 0xa3, 2039 0x2d, 0x36, 0xc4, 0xa8, 0xfe, 0xc4, 0xde, 0x2d, 0xde, 0xe2, 0x70, 0xb6, 0x06, 0x46, 0x98, 0x68, 2040 0x54, 0x10, 0xbf, 0x06, 0xa7, 0x6f, 0xd3, 0x40, 0x9e, 0x81, 0x79, 0x30, 0x1c, 0xb3, 0x88, 0x49, 2041 0xa5, 0x75, 0xc4, 0xdf, 0xca, 0x15, 0x98, 0xbd, 0x4d, 0xa3, 0x4a, 0x14, 0x85, 0x7e, 0x1d, 0x4a, 2042 0xf1, 0xd0, 0x60, 0x9f, 0x7b, 0x26, 0xdf, 0xde, 0xdf, 0x6d, 0x1b, 0xf5, 0x1e, 0xc9, 0xfd, 0xd0, 2043 0x68, 0x4f, 0x0a, 0x42, 0x7f, 0x88, 0xe0, 0xcc, 0x2d, 0x97, 0x12, 0x4e, 0x53, 0xfc, 0xf2, 0x5e, 2044 0x0e, 0x8b, 0x30, 0x19, 0x98, 0x52, 0x37, 0x1a, 0x72, 0x3f, 0x27, 0xa4, 0xf1, 0x36, 0x1a, 0xf8, 2045 0x55, 0x18, 0x0f, 0x9e, 0x8b, 0x9d, 0xec, 0xe5, 0xd9, 0x13, 0x72, 0xaa, 0xf2, 0x57, 0x04, 0x73, 2046 0x3e, 0x92, 0xae, 0x0d, 0xcc, 0xc3, 0xa2, 0xc0, 0xc9, 0x98, 0xb2, 0x43, 0x34, 0x93, 0xa1, 0x58, 2047 0x37, 0x1a, 0xf8, 0x35, 0x80, 0x28, 0x46, 0x22, 0xea, 0x65, 0xd3, 0x89, 0x30, 0x01, 0xae, 0xc1, 2048 0x02, 0x6b, 0x19, 0x8e, 0x6e, 0x58, 0x06, 0x37, 0x48, 0x3b, 0xb0, 0x8f, 0x5e, 0xf7, 0x90, 0x1a, 2049 0xb6, 0x25, 0x5e, 0x66, 0xe3, 0x5a, 0xc9, 0x0b, 0xda, 0xf0, 0x63, 0x64, 0x2d, 0x6f, 0xc9, 0x08, 2050 0xe5, 0x63, 0x04, 0x0b, 0x29, 0x62, 0xa9, 0x72, 0xe7, 0xf1, 0xdb, 0x01, 0xdc, 0xed, 0x5c, 0x41, 2051 0xb2, 0x6f, 0xe3, 0x9e, 0x4a, 0x1b, 0x57, 0xf9, 0x0f, 0x82, 0x05, 0x5f, 0x1a, 0x83, 0xc2, 0x79, 2052 0x0f, 0x26, 0x48, 0xbb, 0x69, 0xbb, 0x06, 0xdf, 0x33, 0x05, 0x8a, 0xe9, 0xca, 0xeb, 0xc3, 0x7d, 2053 0xd1, 0x6a, 0x41, 0x1a, 0x2d, 0xca, 0xe8, 0xb9, 0x30, 0xb2, 0xbb, 0xfc, 0x7c, 0x4c, 0x84, 0x6e, 2054 0xc6, 0x2a, 0xcc, 0xba, 0x8c, 0xe8, 0x84, 0x32, 0xfd, 0xd0, 0x25, 0x8e, 0x43, 0x1b, 0xa2, 0xa2, 2055 0xde, 0xfe, 0x4f, 0xbd, 0xf5, 0x9c, 0x76, 0xca, 0x65, 0xa4, 0x46, 0xd9, 0x03, 0xff, 0xd1, 0x26, 2056 0xed, 0xac, 0xcd, 0xc1, 0x99, 0x58, 0xa0, 0x6e, 0x12, 0x4e, 0x5d, 0x83, 0xb4, 0x95, 0x4f, 0x42, 2057 0xa1, 0x75, 0x39, 0xa4, 0x40, 0x68, 0x11, 0xb4, 0x98, 0xd0, 0x42, 0x74, 0xbe, 0xd0, 0x62, 0xf0, 2058 0x8b, 0x84, 0x16, 0x2d, 0x1b, 0xd1, 0x53, 0x7e, 0x84, 0x60, 0xee, 0x9e, 0xd3, 0xc8, 0x92, 0x7f, 2059 0x52, 0xc2, 0x68, 0x50, 0x09, 0xdf, 0x84, 0xc9, 0x7d, 0x91, 0x58, 0x9c, 0x62, 0xa5, 0x7c, 0x4a, 2060 0xc1, 0xfc, 0xe0, 0xa0, 0x5b, 0x7e, 0xd3, 0x3b, 0xe8, 0x6e, 0x11, 0xd6, 0xd2, 0xc0, 0x0f, 0xf7, 2061 0xfe, 0x56, 0x7e, 0x87, 0x60, 0x21, 0x05, 0x2b, 0xa5, 0x96, 0x6c, 0x91, 0xa2, 0xa7, 0x12, 0xe9, 2062 0xd3, 0x61, 0xfe, 0x01, 0x82, 0xe9, 0x37, 0x2c, 0x91, 0xb3, 0xe0, 0xd5, 0x87, 0x2f, 0xc0, 0x84, 2063 0xd3, 0x26, 0x86, 0xc5, 0xe9, 0xfb, 0x5c, 0xac, 0x30, 0xa5, 0x45, 0x03, 0x78, 0x0d, 0x16, 0x48, 2064 0xa3, 0x61, 0x78, 0x0e, 0x26, 0x6d, 0x9d, 0xec, 0xf3, 0x3d, 0x6a, 0x71, 0xa3, 0x4e, 0x38, 0x6d, 2065 0xe8, 0x0d, 0xc2, 0x89, 0xa8, 0xf0, 0x94, 0x76, 0x3e, 0x0a, 0xaa, 0xc5, 0x63, 0xd6, 0x09, 0x27, 2066 0xca, 0x47, 0x08, 0xa6, 0xd7, 0x69, 0x4f, 0x20, 0x8b, 0x00, 0x75, 0xc3, 0xd9, 0xa3, 0x6e, 0x0c, 2067 0x49, 0x6c, 0x64, 0x24, 0x50, 0x1e, 0xc1, 0xd9, 0x1a, 0xeb, 0x98, 0x26, 0xe5, 0xae, 0x51, 0xdf, 2068 0x31, 0x9a, 0x45, 0x9f, 0x1a, 0xbc, 0x02, 0x63, 0x0d, 0xa3, 0x49, 0x19, 0x97, 0x32, 0x3e, 0x9f, 2069 0x59, 0xc6, 0x75, 0x11, 0xa2, 0xc9, 0x50, 0xe5, 0x2e, 0xcc, 0x47, 0x2b, 0x0c, 0xcc, 0xfa, 0x68, 2070 0x9a, 0xb5, 0xa2, 0xc2, 0x4c, 0x98, 0x45, 0x1e, 0x08, 0x12, 0x15, 0x43, 0xa9, 0x8a, 0x29, 0x6f, 2071 0xc0, 0x4c, 0x58, 0x75, 0x39, 0x61, 0x88, 0xdd, 0x56, 0xae, 0xc1, 0x5c, 0x7a, 0xa7, 0xa2, 0xe5, 2072 0x99, 0xd1, 0xb4, 0x08, 0xdf, 0x77, 0x69, 0xb0, 0x7c, 0x38, 0xa0, 0xdc, 0x80, 0xe7, 0x33, 0xf8, 2073 0xf7, 0x85, 0xdc, 0x84, 0x17, 0x52, 0x1e, 0xdb, 0x76, 0x0d, 0x93, 0xb8, 0x7d, 0x1c, 0x0b, 0xf0, 2074 0x32, 0x9c, 0xed, 0xb6, 0x5f, 0xf4, 0x8a, 0xc2, 0x69, 0x6b, 0x6d, 0x34, 0x94, 0x55, 0x58, 0x5c, 2075 0xa7, 0x8c, 0xbb, 0x76, 0x67, 0x90, 0xf3, 0xc7, 0x2a, 0x2c, 0x6a, 0x94, 0x71, 0xdb, 0xa5, 0x83, 2076 0xcc, 0x7a, 0x04, 0x63, 0xbe, 0x4e, 0xf0, 0x3c, 0x8c, 0xb1, 0x3d, 0x52, 0xb9, 0x7a, 0xcd, 0xe7, 2077 0xff, 0xd6, 0x73, 0x9a, 0xfc, 0x2d, 0x9f, 0xac, 0x5c, 0x5f, 0xf5, 0xab, 0x21, 0x9f, 0xac, 0x5c, 2078 0x5f, 0x95, 0x4f, 0xae, 0x2e, 0x57, 0x7c, 0x7d, 0xc8, 0x27, 0x57, 0x97, 0x2b, 0x6b, 0xe3, 0x81, 2079 0x44, 0x95, 0x57, 0xe1, 0xd4, 0x1d, 0xbb, 0x2e, 0x3e, 0xb5, 0x5b, 0x94, 0x13, 0xcf, 0x10, 0xf8, 2080 0x12, 0x9c, 0xdc, 0x63, 0xa6, 0x4e, 0x0e, 0x88, 0xd1, 0x26, 0xbb, 0x6d, 0x1f, 0xd2, 0xb8, 0x36, 2081 0xb5, 0xc7, 0xcc, 0x5a, 0x30, 0x56, 0xf9, 0xf1, 0x25, 0x38, 0xb3, 0x49, 0x3b, 0x5b, 0xc4, 0x22, 2082 0x4d, 0x6a, 0x52, 0x8b, 0xef, 0xf8, 0x37, 0x0c, 0xf8, 0x27, 0x08, 0xa6, 0xe2, 0x0d, 0x09, 0xbe, 2083 0x9c, 0xa9, 0xff, 0x8c, 0x5e, 0xbf, 0x74, 0xa5, 0x8f, 0x48, 0x5f, 0x12, 0xca, 0xea, 0xf7, 0xff, 2084 0xfc, 0xf7, 0x4f, 0x8e, 0x94, 0xf1, 0xcb, 0xea, 0xc1, 0xb2, 0xfa, 0x5d, 0xff, 0x43, 0xf3, 0x9a, 2085 0xe3, 0xda, 0x4f, 0x68, 0x9d, 0x33, 0x75, 0x49, 0x6d, 0x4b, 0x52, 0x4c, 0x5d, 0xfa, 0x50, 0x0d, 2086 0x1b, 0x9b, 0xdf, 0x20, 0x98, 0x4e, 0x76, 0x24, 0x78, 0x29, 0x77, 0xcd, 0xae, 0x56, 0xbf, 0xf4, 2087 0x52, 0x5f, 0xb1, 0x12, 0x61, 0x4d, 0x20, 0xbc, 0x89, 0x6f, 0xf4, 0x46, 0x18, 0x02, 0xf4, 0xc0, 2088 0xc6, 0x9a, 0x9c, 0x2f, 0xd2, 0x97, 0x0e, 0x61, 0xfb, 0xb0, 0xdc, 0x1b, 0x49, 0xaa, 0x41, 0x2f, 2089 0x55, 0x06, 0x99, 0x22, 0x39, 0xdc, 0x13, 0x1c, 0xbe, 0x85, 0xb7, 0x06, 0xe2, 0x10, 0xa3, 0x90, 2090 0x20, 0x14, 0xa2, 0x0f, 0xca, 0x10, 0x75, 0x2d, 0x05, 0x65, 0xe8, 0xea, 0xbc, 0x0b, 0xca, 0xd0, 2091 0xdd, 0x06, 0x0d, 0x5d, 0x86, 0x58, 0x23, 0xf4, 0x11, 0x02, 0x88, 0x5a, 0x18, 0xfc, 0x62, 0xe6, 2092 0xf2, 0x5d, 0x3d, 0x4e, 0xa9, 0xf0, 0xe4, 0x9e, 0x12, 0xb0, 0xe7, 0xf6, 0x3e, 0x50, 0xe1, 0x9f, 2093 0x22, 0x98, 0x8a, 0x77, 0x3e, 0x39, 0xe6, 0xca, 0xe8, 0xa3, 0x4a, 0x3d, 0xce, 0x3c, 0xa9, 0x8d, 2094 0xea, 0x0f, 0x50, 0xb2, 0xd2, 0xf8, 0x4f, 0x28, 0xd9, 0xc2, 0x05, 0xe7, 0x11, 0xb5, 0x27, 0xc8, 2095 0xe4, 0xbb, 0xb0, 0xd4, 0xdf, 0xc9, 0x27, 0x25, 0xcf, 0x21, 0x20, 0x77, 0x6b, 0xd3, 0xa3, 0xf1, 2096 0x07, 0x7f, 0x93, 0xc3, 0x66, 0x31, 0x7f, 0x93, 0xd3, 0xfd, 0x64, 0xce, 0x26, 0x87, 0x61, 0x8a, 2097 0x2e, 0x10, 0xbf, 0x83, 0x1f, 0x8c, 0x14, 0xb1, 0xea, 0x84, 0x50, 0xa5, 0x40, 0x42, 0x23, 0xe4, 2098 0x63, 0x4f, 0x1f, 0xdf, 0x4b, 0x3d, 0x8e, 0xdb, 0xc3, 0x09, 0x24, 0xb2, 0x91, 0xb7, 0xb3, 0x9f, 2099 0x22, 0x38, 0x99, 0xe8, 0x97, 0xf1, 0x95, 0x9c, 0x4a, 0x77, 0xf7, 0xd4, 0x3d, 0xfc, 0xf4, 0x0d, 2100 0x81, 0xee, 0xba, 0x32, 0xd0, 0x07, 0xa1, 0x1a, 0x76, 0xdb, 0xf8, 0xb7, 0x08, 0x66, 0x52, 0x7d, 2101 0x26, 0x7e, 0xa9, 0x00, 0xdc, 0xc0, 0xfe, 0xda, 0x12, 0x00, 0x6f, 0x2b, 0xc3, 0x7f, 0x0f, 0xaa, 2102 0xb1, 0x46, 0x06, 0x7f, 0xd9, 0xdd, 0xf0, 0x07, 0x76, 0xab, 0xf4, 0x03, 0x7b, 0x38, 0xc7, 0x19, 2103 0x82, 0x44, 0x5d, 0x19, 0xed, 0x07, 0xa1, 0x9a, 0xd1, 0x03, 0xe1, 0xbf, 0x20, 0x98, 0xcb, 0xee, 2104 0xb4, 0x73, 0x08, 0x16, 0xb6, 0xe5, 0xfd, 0x12, 0x94, 0x06, 0x55, 0xde, 0x1e, 0x2d, 0x41, 0xdf, 2105 0x06, 0x55, 0xb4, 0x14, 0xd3, 0x59, 0xe4, 0xd1, 0x22, 0x9d, 0x0d, 0x6c, 0xd3, 0x61, 0x75, 0x16, 2106 0x39, 0xb5, 0x1a, 0x6b, 0xc5, 0xf1, 0xef, 0x11, 0xcc, 0xa4, 0x8e, 0xd7, 0x39, 0x78, 0xb3, 0xfb, 2107 0xef, 0x9e, 0xbe, 0xf8, 0xb6, 0xc0, 0xab, 0x55, 0xd6, 0x05, 0xde, 0x48, 0x08, 0xe5, 0x61, 0x3e, 2108 0x41, 0x09, 0x8b, 0xfc, 0xa3, 0xfb, 0x52, 0xa0, 0x58, 0x41, 0x85, 0xad, 0x7a, 0xbf, 0x0a, 0xfa, 2109 0x9e, 0xe0, 0x73, 0x50, 0x79, 0x94, 0xe2, 0x13, 0x08, 0xbb, 0x3c, 0xaa, 0xb7, 0x7e, 0xa6, 0x6b, 2110 0x7e, 0x85, 0xe0, 0x84, 0xec, 0xe3, 0xf0, 0xa5, 0x4c, 0xc0, 0xc9, 0xde, 0xbe, 0xf4, 0x42, 0x71, 2111 0x90, 0x3c, 0x45, 0x05, 0xa2, 0x5a, 0x1b, 0xf6, 0xbb, 0xb5, 0xf4, 0x61, 0x95, 0xfa, 0x39, 0x3d, 2112 0x13, 0xfc, 0x12, 0xc1, 0x09, 0xd9, 0xe4, 0xe5, 0xa0, 0x4c, 0xb6, 0xc0, 0x39, 0x28, 0x53, 0x7d, 2113 0xa2, 0x72, 0x47, 0xa0, 0x7c, 0x53, 0xa9, 0x0d, 0x7d, 0x84, 0xa9, 0x36, 0x68, 0x08, 0xf2, 0x73, 2114 0x04, 0xd3, 0xc9, 0x5e, 0x36, 0xe7, 0x94, 0x9a, 0x79, 0x35, 0x90, 0x73, 0x4a, 0xcd, 0x6e, 0x8e, 2115 0x95, 0xa6, 0x40, 0x4e, 0x94, 0x87, 0x23, 0x3d, 0x17, 0x54, 0x49, 0x62, 0x35, 0x8f, 0xd4, 0x97, 2116 0x08, 0x4e, 0x77, 0x35, 0xda, 0xf8, 0x95, 0x1e, 0x58, 0x53, 0xd5, 0x28, 0xf7, 0x1b, 0x2e, 0xd9, 2117 0x3d, 0x11, 0xec, 0x1a, 0x8a, 0xfe, 0xac, 0xd8, 0xad, 0x47, 0x55, 0xfb, 0xa2, 0xfb, 0xca, 0x2d, 2118 0x79, 0x1d, 0x80, 0x6f, 0xf4, 0xe3, 0xfd, 0xcc, 0x2b, 0x84, 0x9e, 0xef, 0xb2, 0x77, 0x04, 0xd1, 2119 0x1d, 0xe5, 0xee, 0xf0, 0x02, 0xf4, 0x6f, 0xe2, 0x92, 0xcb, 0x7b, 0xbc, 0xfe, 0x86, 0xe0, 0x5c, 2120 0xce, 0xbd, 0x03, 0x5e, 0xc9, 0x71, 0x47, 0xd1, 0x2d, 0x45, 0xbf, 0xaf, 0xb3, 0x47, 0x82, 0xd2, 2121 0xbb, 0xca, 0xbd, 0xd1, 0xd6, 0xae, 0xe1, 0x83, 0x0b, 0x98, 0xe5, 0xdc, 0x8d, 0xe4, 0x30, 0x2b, 2122 0xbe, 0x49, 0xf9, 0x1f, 0x33, 0x73, 0x7d, 0x70, 0x55, 0xb4, 0x54, 0xe2, 0x9f, 0xd5, 0xce, 0x09, 2123 0x0c, 0x1e, 0x04, 0x1f, 0x13, 0x71, 0x0c, 0x56, 0xae, 0xdb, 0xe6, 0xe7, 0xb5, 0x07, 0x7b, 0x9c, 2124 0x3b, 0xac, 0xaa, 0xaa, 0x87, 0x87, 0x87, 0xa9, 0x87, 0x2a, 0xd9, 0xe7, 0x7b, 0xfe, 0x7f, 0x5a, 2125 0xbc, 0xe2, 0xb4, 0x09, 0x7f, 0x6c, 0xbb, 0xe6, 0xcb, 0x7d, 0x85, 0xb7, 0x4c, 0xb6, 0xf6, 0x31, 2126 0x82, 0x73, 0x75, 0xdb, 0xcc, 0xda, 0x84, 0xb5, 0xf1, 0x4d, 0x93, 0x6d, 0xbb, 0x36, 0xb7, 0xb7, 2127 0xd1, 0xbb, 0xd7, 0x64, 0x40, 0xd3, 0x6e, 0x13, 0xab, 0x59, 0xb6, 0xdd, 0xa6, 0xda, 0xa4, 0x96, 2128 0xb8, 0x1d, 0x56, 0xa3, 0x05, 0x12, 0xff, 0xf0, 0x71, 0xb3, 0x65, 0xb2, 0x7f, 0x21, 0xf4, 0xeb, 2129 0x23, 0xb3, 0xb7, 0xfd, 0xb9, 0xb7, 0x44, 0xf2, 0x4d, 0x93, 0x95, 0xef, 0x2f, 0x7f, 0x16, 0x8c, 2130 0x3e, 0x14, 0xa3, 0x0f, 0x37, 0x4d, 0xf6, 0xf0, 0xfe, 0xf2, 0xee, 0x98, 0xc8, 0xb8, 0xf2, 0xdf, 2131 0x00, 0x00, 0x00, 0xff, 0xff, 0xd5, 0x1e, 0x95, 0x51, 0x97, 0x22, 0x00, 0x00, 2132} 2133 2134// Reference imports to suppress errors if they are not otherwise used. 2135var _ context.Context 2136var _ grpc.ClientConn 2137 2138// This is a compile-time assertion to ensure that this generated file 2139// is compatible with the grpc package it is being compiled against. 2140const _ = grpc.SupportPackageIsVersion4 2141 2142// KeyManagementServiceClient is the client API for KeyManagementService service. 2143// 2144// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 2145type KeyManagementServiceClient interface { 2146 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2147 ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) 2148 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2149 ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) 2150 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2151 ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) 2152 // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2153 ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) 2154 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2155 GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 2156 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its 2157 // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2158 GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2159 // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2160 GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2161 // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2162 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2163 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or 2164 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2165 GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) 2166 // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2167 GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) 2168 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. 2169 CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 2170 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2171 // 2172 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2173 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2174 // are required. 2175 CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2176 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2177 // 2178 // The server will assign the next sequential id. If unset, 2179 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2180 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2181 CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2182 // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the 2183 // wrapped key material provided in the request. 2184 // 2185 // The version ID will be assigned the next sequential id within the 2186 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2187 ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2188 // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2189 // 2190 // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. 2191 CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) 2192 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2193 UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2194 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. 2195 // 2196 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2197 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and 2198 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this 2199 // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to 2200 // move between other states. 2201 UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2202 // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 2203 // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2204 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2205 Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) 2206 // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2207 // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2208 Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) 2209 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2210 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2211 // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2212 AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) 2213 // Decrypts data that was encrypted with a public key retrieved from 2214 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2215 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. 2216 AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) 2217 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2218 // 2219 // Returns an error if called on an asymmetric key. 2220 UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2221 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. 2222 // 2223 // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2224 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2225 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 2226 // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2227 // will be changed to 2228 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key 2229 // material will be irrevocably destroyed. 2230 // 2231 // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, 2232 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. 2233 DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2234 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2235 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2236 // state. 2237 // 2238 // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2239 // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2240 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. 2241 RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2242} 2243 2244type keyManagementServiceClient struct { 2245 cc *grpc.ClientConn 2246} 2247 2248func NewKeyManagementServiceClient(cc *grpc.ClientConn) KeyManagementServiceClient { 2249 return &keyManagementServiceClient{cc} 2250} 2251 2252func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) { 2253 out := new(ListKeyRingsResponse) 2254 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...) 2255 if err != nil { 2256 return nil, err 2257 } 2258 return out, nil 2259} 2260 2261func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) { 2262 out := new(ListCryptoKeysResponse) 2263 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...) 2264 if err != nil { 2265 return nil, err 2266 } 2267 return out, nil 2268} 2269 2270func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) { 2271 out := new(ListCryptoKeyVersionsResponse) 2272 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...) 2273 if err != nil { 2274 return nil, err 2275 } 2276 return out, nil 2277} 2278 2279func (c *keyManagementServiceClient) ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) { 2280 out := new(ListImportJobsResponse) 2281 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", in, out, opts...) 2282 if err != nil { 2283 return nil, err 2284 } 2285 return out, nil 2286} 2287 2288func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 2289 out := new(KeyRing) 2290 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...) 2291 if err != nil { 2292 return nil, err 2293 } 2294 return out, nil 2295} 2296 2297func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2298 out := new(CryptoKey) 2299 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...) 2300 if err != nil { 2301 return nil, err 2302 } 2303 return out, nil 2304} 2305 2306func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2307 out := new(CryptoKeyVersion) 2308 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...) 2309 if err != nil { 2310 return nil, err 2311 } 2312 return out, nil 2313} 2314 2315func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) { 2316 out := new(PublicKey) 2317 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...) 2318 if err != nil { 2319 return nil, err 2320 } 2321 return out, nil 2322} 2323 2324func (c *keyManagementServiceClient) GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { 2325 out := new(ImportJob) 2326 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetImportJob", in, out, opts...) 2327 if err != nil { 2328 return nil, err 2329 } 2330 return out, nil 2331} 2332 2333func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 2334 out := new(KeyRing) 2335 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...) 2336 if err != nil { 2337 return nil, err 2338 } 2339 return out, nil 2340} 2341 2342func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2343 out := new(CryptoKey) 2344 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...) 2345 if err != nil { 2346 return nil, err 2347 } 2348 return out, nil 2349} 2350 2351func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2352 out := new(CryptoKeyVersion) 2353 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...) 2354 if err != nil { 2355 return nil, err 2356 } 2357 return out, nil 2358} 2359 2360func (c *keyManagementServiceClient) ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2361 out := new(CryptoKeyVersion) 2362 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", in, out, opts...) 2363 if err != nil { 2364 return nil, err 2365 } 2366 return out, nil 2367} 2368 2369func (c *keyManagementServiceClient) CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { 2370 out := new(ImportJob) 2371 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", in, out, opts...) 2372 if err != nil { 2373 return nil, err 2374 } 2375 return out, nil 2376} 2377 2378func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2379 out := new(CryptoKey) 2380 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...) 2381 if err != nil { 2382 return nil, err 2383 } 2384 return out, nil 2385} 2386 2387func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2388 out := new(CryptoKeyVersion) 2389 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...) 2390 if err != nil { 2391 return nil, err 2392 } 2393 return out, nil 2394} 2395 2396func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) { 2397 out := new(EncryptResponse) 2398 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...) 2399 if err != nil { 2400 return nil, err 2401 } 2402 return out, nil 2403} 2404 2405func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) { 2406 out := new(DecryptResponse) 2407 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...) 2408 if err != nil { 2409 return nil, err 2410 } 2411 return out, nil 2412} 2413 2414func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) { 2415 out := new(AsymmetricSignResponse) 2416 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...) 2417 if err != nil { 2418 return nil, err 2419 } 2420 return out, nil 2421} 2422 2423func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) { 2424 out := new(AsymmetricDecryptResponse) 2425 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...) 2426 if err != nil { 2427 return nil, err 2428 } 2429 return out, nil 2430} 2431 2432func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2433 out := new(CryptoKey) 2434 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...) 2435 if err != nil { 2436 return nil, err 2437 } 2438 return out, nil 2439} 2440 2441func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2442 out := new(CryptoKeyVersion) 2443 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...) 2444 if err != nil { 2445 return nil, err 2446 } 2447 return out, nil 2448} 2449 2450func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2451 out := new(CryptoKeyVersion) 2452 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...) 2453 if err != nil { 2454 return nil, err 2455 } 2456 return out, nil 2457} 2458 2459// KeyManagementServiceServer is the server API for KeyManagementService service. 2460type KeyManagementServiceServer interface { 2461 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2462 ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error) 2463 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2464 ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) 2465 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2466 ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) 2467 // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2468 ListImportJobs(context.Context, *ListImportJobsRequest) (*ListImportJobsResponse, error) 2469 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2470 GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error) 2471 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its 2472 // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2473 GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error) 2474 // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2475 GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2476 // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2477 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2478 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or 2479 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2480 GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error) 2481 // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2482 GetImportJob(context.Context, *GetImportJobRequest) (*ImportJob, error) 2483 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. 2484 CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error) 2485 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2486 // 2487 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2488 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2489 // are required. 2490 CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error) 2491 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2492 // 2493 // The server will assign the next sequential id. If unset, 2494 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2495 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2496 CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2497 // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the 2498 // wrapped key material provided in the request. 2499 // 2500 // The version ID will be assigned the next sequential id within the 2501 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2502 ImportCryptoKeyVersion(context.Context, *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2503 // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2504 // 2505 // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. 2506 CreateImportJob(context.Context, *CreateImportJobRequest) (*ImportJob, error) 2507 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2508 UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error) 2509 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. 2510 // 2511 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2512 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and 2513 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this 2514 // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to 2515 // move between other states. 2516 UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2517 // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 2518 // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2519 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2520 Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error) 2521 // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2522 // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2523 Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error) 2524 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2525 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2526 // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2527 AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error) 2528 // Decrypts data that was encrypted with a public key retrieved from 2529 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2530 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. 2531 AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) 2532 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2533 // 2534 // Returns an error if called on an asymmetric key. 2535 UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) 2536 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. 2537 // 2538 // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2539 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2540 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 2541 // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2542 // will be changed to 2543 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key 2544 // material will be irrevocably destroyed. 2545 // 2546 // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, 2547 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. 2548 DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2549 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2550 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2551 // state. 2552 // 2553 // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2554 // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2555 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. 2556 RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2557} 2558 2559func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) { 2560 s.RegisterService(&_KeyManagementService_serviceDesc, srv) 2561} 2562 2563func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2564 in := new(ListKeyRingsRequest) 2565 if err := dec(in); err != nil { 2566 return nil, err 2567 } 2568 if interceptor == nil { 2569 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in) 2570 } 2571 info := &grpc.UnaryServerInfo{ 2572 Server: srv, 2573 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", 2574 } 2575 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2576 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest)) 2577 } 2578 return interceptor(ctx, in, info, handler) 2579} 2580 2581func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2582 in := new(ListCryptoKeysRequest) 2583 if err := dec(in); err != nil { 2584 return nil, err 2585 } 2586 if interceptor == nil { 2587 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in) 2588 } 2589 info := &grpc.UnaryServerInfo{ 2590 Server: srv, 2591 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", 2592 } 2593 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2594 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest)) 2595 } 2596 return interceptor(ctx, in, info, handler) 2597} 2598 2599func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2600 in := new(ListCryptoKeyVersionsRequest) 2601 if err := dec(in); err != nil { 2602 return nil, err 2603 } 2604 if interceptor == nil { 2605 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in) 2606 } 2607 info := &grpc.UnaryServerInfo{ 2608 Server: srv, 2609 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", 2610 } 2611 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2612 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest)) 2613 } 2614 return interceptor(ctx, in, info, handler) 2615} 2616 2617func _KeyManagementService_ListImportJobs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2618 in := new(ListImportJobsRequest) 2619 if err := dec(in); err != nil { 2620 return nil, err 2621 } 2622 if interceptor == nil { 2623 return srv.(KeyManagementServiceServer).ListImportJobs(ctx, in) 2624 } 2625 info := &grpc.UnaryServerInfo{ 2626 Server: srv, 2627 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", 2628 } 2629 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2630 return srv.(KeyManagementServiceServer).ListImportJobs(ctx, req.(*ListImportJobsRequest)) 2631 } 2632 return interceptor(ctx, in, info, handler) 2633} 2634 2635func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2636 in := new(GetKeyRingRequest) 2637 if err := dec(in); err != nil { 2638 return nil, err 2639 } 2640 if interceptor == nil { 2641 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in) 2642 } 2643 info := &grpc.UnaryServerInfo{ 2644 Server: srv, 2645 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", 2646 } 2647 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2648 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest)) 2649 } 2650 return interceptor(ctx, in, info, handler) 2651} 2652 2653func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2654 in := new(GetCryptoKeyRequest) 2655 if err := dec(in); err != nil { 2656 return nil, err 2657 } 2658 if interceptor == nil { 2659 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in) 2660 } 2661 info := &grpc.UnaryServerInfo{ 2662 Server: srv, 2663 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", 2664 } 2665 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2666 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest)) 2667 } 2668 return interceptor(ctx, in, info, handler) 2669} 2670 2671func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2672 in := new(GetCryptoKeyVersionRequest) 2673 if err := dec(in); err != nil { 2674 return nil, err 2675 } 2676 if interceptor == nil { 2677 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in) 2678 } 2679 info := &grpc.UnaryServerInfo{ 2680 Server: srv, 2681 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", 2682 } 2683 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2684 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest)) 2685 } 2686 return interceptor(ctx, in, info, handler) 2687} 2688 2689func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2690 in := new(GetPublicKeyRequest) 2691 if err := dec(in); err != nil { 2692 return nil, err 2693 } 2694 if interceptor == nil { 2695 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in) 2696 } 2697 info := &grpc.UnaryServerInfo{ 2698 Server: srv, 2699 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", 2700 } 2701 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2702 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest)) 2703 } 2704 return interceptor(ctx, in, info, handler) 2705} 2706 2707func _KeyManagementService_GetImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2708 in := new(GetImportJobRequest) 2709 if err := dec(in); err != nil { 2710 return nil, err 2711 } 2712 if interceptor == nil { 2713 return srv.(KeyManagementServiceServer).GetImportJob(ctx, in) 2714 } 2715 info := &grpc.UnaryServerInfo{ 2716 Server: srv, 2717 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetImportJob", 2718 } 2719 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2720 return srv.(KeyManagementServiceServer).GetImportJob(ctx, req.(*GetImportJobRequest)) 2721 } 2722 return interceptor(ctx, in, info, handler) 2723} 2724 2725func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2726 in := new(CreateKeyRingRequest) 2727 if err := dec(in); err != nil { 2728 return nil, err 2729 } 2730 if interceptor == nil { 2731 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in) 2732 } 2733 info := &grpc.UnaryServerInfo{ 2734 Server: srv, 2735 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", 2736 } 2737 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2738 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest)) 2739 } 2740 return interceptor(ctx, in, info, handler) 2741} 2742 2743func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2744 in := new(CreateCryptoKeyRequest) 2745 if err := dec(in); err != nil { 2746 return nil, err 2747 } 2748 if interceptor == nil { 2749 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in) 2750 } 2751 info := &grpc.UnaryServerInfo{ 2752 Server: srv, 2753 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", 2754 } 2755 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2756 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest)) 2757 } 2758 return interceptor(ctx, in, info, handler) 2759} 2760 2761func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2762 in := new(CreateCryptoKeyVersionRequest) 2763 if err := dec(in); err != nil { 2764 return nil, err 2765 } 2766 if interceptor == nil { 2767 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in) 2768 } 2769 info := &grpc.UnaryServerInfo{ 2770 Server: srv, 2771 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", 2772 } 2773 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2774 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest)) 2775 } 2776 return interceptor(ctx, in, info, handler) 2777} 2778 2779func _KeyManagementService_ImportCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2780 in := new(ImportCryptoKeyVersionRequest) 2781 if err := dec(in); err != nil { 2782 return nil, err 2783 } 2784 if interceptor == nil { 2785 return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, in) 2786 } 2787 info := &grpc.UnaryServerInfo{ 2788 Server: srv, 2789 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", 2790 } 2791 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2792 return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, req.(*ImportCryptoKeyVersionRequest)) 2793 } 2794 return interceptor(ctx, in, info, handler) 2795} 2796 2797func _KeyManagementService_CreateImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2798 in := new(CreateImportJobRequest) 2799 if err := dec(in); err != nil { 2800 return nil, err 2801 } 2802 if interceptor == nil { 2803 return srv.(KeyManagementServiceServer).CreateImportJob(ctx, in) 2804 } 2805 info := &grpc.UnaryServerInfo{ 2806 Server: srv, 2807 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", 2808 } 2809 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2810 return srv.(KeyManagementServiceServer).CreateImportJob(ctx, req.(*CreateImportJobRequest)) 2811 } 2812 return interceptor(ctx, in, info, handler) 2813} 2814 2815func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2816 in := new(UpdateCryptoKeyRequest) 2817 if err := dec(in); err != nil { 2818 return nil, err 2819 } 2820 if interceptor == nil { 2821 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in) 2822 } 2823 info := &grpc.UnaryServerInfo{ 2824 Server: srv, 2825 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", 2826 } 2827 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2828 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest)) 2829 } 2830 return interceptor(ctx, in, info, handler) 2831} 2832 2833func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2834 in := new(UpdateCryptoKeyVersionRequest) 2835 if err := dec(in); err != nil { 2836 return nil, err 2837 } 2838 if interceptor == nil { 2839 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in) 2840 } 2841 info := &grpc.UnaryServerInfo{ 2842 Server: srv, 2843 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", 2844 } 2845 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2846 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest)) 2847 } 2848 return interceptor(ctx, in, info, handler) 2849} 2850 2851func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2852 in := new(EncryptRequest) 2853 if err := dec(in); err != nil { 2854 return nil, err 2855 } 2856 if interceptor == nil { 2857 return srv.(KeyManagementServiceServer).Encrypt(ctx, in) 2858 } 2859 info := &grpc.UnaryServerInfo{ 2860 Server: srv, 2861 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt", 2862 } 2863 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2864 return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest)) 2865 } 2866 return interceptor(ctx, in, info, handler) 2867} 2868 2869func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2870 in := new(DecryptRequest) 2871 if err := dec(in); err != nil { 2872 return nil, err 2873 } 2874 if interceptor == nil { 2875 return srv.(KeyManagementServiceServer).Decrypt(ctx, in) 2876 } 2877 info := &grpc.UnaryServerInfo{ 2878 Server: srv, 2879 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt", 2880 } 2881 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2882 return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest)) 2883 } 2884 return interceptor(ctx, in, info, handler) 2885} 2886 2887func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2888 in := new(AsymmetricSignRequest) 2889 if err := dec(in); err != nil { 2890 return nil, err 2891 } 2892 if interceptor == nil { 2893 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in) 2894 } 2895 info := &grpc.UnaryServerInfo{ 2896 Server: srv, 2897 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", 2898 } 2899 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2900 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest)) 2901 } 2902 return interceptor(ctx, in, info, handler) 2903} 2904 2905func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2906 in := new(AsymmetricDecryptRequest) 2907 if err := dec(in); err != nil { 2908 return nil, err 2909 } 2910 if interceptor == nil { 2911 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in) 2912 } 2913 info := &grpc.UnaryServerInfo{ 2914 Server: srv, 2915 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", 2916 } 2917 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2918 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest)) 2919 } 2920 return interceptor(ctx, in, info, handler) 2921} 2922 2923func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2924 in := new(UpdateCryptoKeyPrimaryVersionRequest) 2925 if err := dec(in); err != nil { 2926 return nil, err 2927 } 2928 if interceptor == nil { 2929 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in) 2930 } 2931 info := &grpc.UnaryServerInfo{ 2932 Server: srv, 2933 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", 2934 } 2935 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2936 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest)) 2937 } 2938 return interceptor(ctx, in, info, handler) 2939} 2940 2941func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2942 in := new(DestroyCryptoKeyVersionRequest) 2943 if err := dec(in); err != nil { 2944 return nil, err 2945 } 2946 if interceptor == nil { 2947 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in) 2948 } 2949 info := &grpc.UnaryServerInfo{ 2950 Server: srv, 2951 FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", 2952 } 2953 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2954 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest)) 2955 } 2956 return interceptor(ctx, in, info, handler) 2957} 2958 2959func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2960 in := new(RestoreCryptoKeyVersionRequest) 2961 if err := dec(in); err != nil { 2962 return nil, err 2963 } 2964 if interceptor == nil { 2965 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in) 2966 } 2967 info := &grpc.UnaryServerInfo{ 2968 Server: srv, 2969 FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", 2970 } 2971 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2972 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest)) 2973 } 2974 return interceptor(ctx, in, info, handler) 2975} 2976 2977var _KeyManagementService_serviceDesc = grpc.ServiceDesc{ 2978 ServiceName: "google.cloud.kms.v1.KeyManagementService", 2979 HandlerType: (*KeyManagementServiceServer)(nil), 2980 Methods: []grpc.MethodDesc{ 2981 { 2982 MethodName: "ListKeyRings", 2983 Handler: _KeyManagementService_ListKeyRings_Handler, 2984 }, 2985 { 2986 MethodName: "ListCryptoKeys", 2987 Handler: _KeyManagementService_ListCryptoKeys_Handler, 2988 }, 2989 { 2990 MethodName: "ListCryptoKeyVersions", 2991 Handler: _KeyManagementService_ListCryptoKeyVersions_Handler, 2992 }, 2993 { 2994 MethodName: "ListImportJobs", 2995 Handler: _KeyManagementService_ListImportJobs_Handler, 2996 }, 2997 { 2998 MethodName: "GetKeyRing", 2999 Handler: _KeyManagementService_GetKeyRing_Handler, 3000 }, 3001 { 3002 MethodName: "GetCryptoKey", 3003 Handler: _KeyManagementService_GetCryptoKey_Handler, 3004 }, 3005 { 3006 MethodName: "GetCryptoKeyVersion", 3007 Handler: _KeyManagementService_GetCryptoKeyVersion_Handler, 3008 }, 3009 { 3010 MethodName: "GetPublicKey", 3011 Handler: _KeyManagementService_GetPublicKey_Handler, 3012 }, 3013 { 3014 MethodName: "GetImportJob", 3015 Handler: _KeyManagementService_GetImportJob_Handler, 3016 }, 3017 { 3018 MethodName: "CreateKeyRing", 3019 Handler: _KeyManagementService_CreateKeyRing_Handler, 3020 }, 3021 { 3022 MethodName: "CreateCryptoKey", 3023 Handler: _KeyManagementService_CreateCryptoKey_Handler, 3024 }, 3025 { 3026 MethodName: "CreateCryptoKeyVersion", 3027 Handler: _KeyManagementService_CreateCryptoKeyVersion_Handler, 3028 }, 3029 { 3030 MethodName: "ImportCryptoKeyVersion", 3031 Handler: _KeyManagementService_ImportCryptoKeyVersion_Handler, 3032 }, 3033 { 3034 MethodName: "CreateImportJob", 3035 Handler: _KeyManagementService_CreateImportJob_Handler, 3036 }, 3037 { 3038 MethodName: "UpdateCryptoKey", 3039 Handler: _KeyManagementService_UpdateCryptoKey_Handler, 3040 }, 3041 { 3042 MethodName: "UpdateCryptoKeyVersion", 3043 Handler: _KeyManagementService_UpdateCryptoKeyVersion_Handler, 3044 }, 3045 { 3046 MethodName: "Encrypt", 3047 Handler: _KeyManagementService_Encrypt_Handler, 3048 }, 3049 { 3050 MethodName: "Decrypt", 3051 Handler: _KeyManagementService_Decrypt_Handler, 3052 }, 3053 { 3054 MethodName: "AsymmetricSign", 3055 Handler: _KeyManagementService_AsymmetricSign_Handler, 3056 }, 3057 { 3058 MethodName: "AsymmetricDecrypt", 3059 Handler: _KeyManagementService_AsymmetricDecrypt_Handler, 3060 }, 3061 { 3062 MethodName: "UpdateCryptoKeyPrimaryVersion", 3063 Handler: _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler, 3064 }, 3065 { 3066 MethodName: "DestroyCryptoKeyVersion", 3067 Handler: _KeyManagementService_DestroyCryptoKeyVersion_Handler, 3068 }, 3069 { 3070 MethodName: "RestoreCryptoKeyVersion", 3071 Handler: _KeyManagementService_RestoreCryptoKeyVersion_Handler, 3072 }, 3073 }, 3074 Streams: []grpc.StreamDesc{}, 3075 Metadata: "google/cloud/kms/v1/service.proto", 3076} 3077