1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/kms/v1/service.proto 3 4package kms 5 6import ( 7 context "context" 8 fmt "fmt" 9 math "math" 10 11 proto "github.com/golang/protobuf/proto" 12 _ "google.golang.org/genproto/googleapis/api/annotations" 13 field_mask "google.golang.org/genproto/protobuf/field_mask" 14 grpc "google.golang.org/grpc" 15 codes "google.golang.org/grpc/codes" 16 status "google.golang.org/grpc/status" 17) 18 19// Reference imports to suppress errors if they are not otherwise used. 20var _ = proto.Marshal 21var _ = fmt.Errorf 22var _ = math.Inf 23 24// This is a compile-time assertion to ensure that this generated file 25// is compatible with the proto package it is being compiled against. 26// A compilation error at this line likely means your copy of the 27// proto package needs to be updated. 28const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 29 30// Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 31type ListKeyRingsRequest struct { 32 // Required. The resource name of the location associated with the 33 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. 34 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 35 // Optional. Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to include in the 36 // response. Further [KeyRings][google.cloud.kms.v1.KeyRing] can subsequently be obtained by 37 // including the [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] in a subsequent 38 // request. If unspecified, the server will pick an appropriate default. 39 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 40 // Optional. Optional pagination token, returned earlier via 41 // [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token]. 42 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 43 // Optional. Only include resources that match the filter in the response. For 44 // more information, see 45 // [Sorting and filtering list 46 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 47 Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` 48 // Optional. Specify how the results should be sorted. If not specified, the 49 // results will be sorted in the default order. For more information, see 50 // [Sorting and filtering list 51 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 52 OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 53 XXX_NoUnkeyedLiteral struct{} `json:"-"` 54 XXX_unrecognized []byte `json:"-"` 55 XXX_sizecache int32 `json:"-"` 56} 57 58func (m *ListKeyRingsRequest) Reset() { *m = ListKeyRingsRequest{} } 59func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) } 60func (*ListKeyRingsRequest) ProtoMessage() {} 61func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) { 62 return fileDescriptor_723aeaeb61739a25, []int{0} 63} 64 65func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error { 66 return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b) 67} 68func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 69 return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic) 70} 71func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) { 72 xxx_messageInfo_ListKeyRingsRequest.Merge(m, src) 73} 74func (m *ListKeyRingsRequest) XXX_Size() int { 75 return xxx_messageInfo_ListKeyRingsRequest.Size(m) 76} 77func (m *ListKeyRingsRequest) XXX_DiscardUnknown() { 78 xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m) 79} 80 81var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo 82 83func (m *ListKeyRingsRequest) GetParent() string { 84 if m != nil { 85 return m.Parent 86 } 87 return "" 88} 89 90func (m *ListKeyRingsRequest) GetPageSize() int32 { 91 if m != nil { 92 return m.PageSize 93 } 94 return 0 95} 96 97func (m *ListKeyRingsRequest) GetPageToken() string { 98 if m != nil { 99 return m.PageToken 100 } 101 return "" 102} 103 104func (m *ListKeyRingsRequest) GetFilter() string { 105 if m != nil { 106 return m.Filter 107 } 108 return "" 109} 110 111func (m *ListKeyRingsRequest) GetOrderBy() string { 112 if m != nil { 113 return m.OrderBy 114 } 115 return "" 116} 117 118// Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 119type ListCryptoKeysRequest struct { 120 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format 121 // `projects/*/locations/*/keyRings/*`. 122 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 123 // Optional. Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] to include in the 124 // response. Further [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by 125 // including the [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] in a subsequent 126 // request. If unspecified, the server will pick an appropriate default. 127 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 128 // Optional. Optional pagination token, returned earlier via 129 // [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token]. 130 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 131 // The fields of the primary version to include in the response. 132 VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"` 133 // Optional. Only include resources that match the filter in the response. For 134 // more information, see 135 // [Sorting and filtering list 136 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 137 Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` 138 // Optional. Specify how the results should be sorted. If not specified, the 139 // results will be sorted in the default order. For more information, see 140 // [Sorting and filtering list 141 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 142 OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 143 XXX_NoUnkeyedLiteral struct{} `json:"-"` 144 XXX_unrecognized []byte `json:"-"` 145 XXX_sizecache int32 `json:"-"` 146} 147 148func (m *ListCryptoKeysRequest) Reset() { *m = ListCryptoKeysRequest{} } 149func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) } 150func (*ListCryptoKeysRequest) ProtoMessage() {} 151func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) { 152 return fileDescriptor_723aeaeb61739a25, []int{1} 153} 154 155func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error { 156 return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b) 157} 158func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 159 return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic) 160} 161func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) { 162 xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src) 163} 164func (m *ListCryptoKeysRequest) XXX_Size() int { 165 return xxx_messageInfo_ListCryptoKeysRequest.Size(m) 166} 167func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() { 168 xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m) 169} 170 171var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo 172 173func (m *ListCryptoKeysRequest) GetParent() string { 174 if m != nil { 175 return m.Parent 176 } 177 return "" 178} 179 180func (m *ListCryptoKeysRequest) GetPageSize() int32 { 181 if m != nil { 182 return m.PageSize 183 } 184 return 0 185} 186 187func (m *ListCryptoKeysRequest) GetPageToken() string { 188 if m != nil { 189 return m.PageToken 190 } 191 return "" 192} 193 194func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView { 195 if m != nil { 196 return m.VersionView 197 } 198 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 199} 200 201func (m *ListCryptoKeysRequest) GetFilter() string { 202 if m != nil { 203 return m.Filter 204 } 205 return "" 206} 207 208func (m *ListCryptoKeysRequest) GetOrderBy() string { 209 if m != nil { 210 return m.OrderBy 211 } 212 return "" 213} 214 215// Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 216type ListCryptoKeyVersionsRequest struct { 217 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format 218 // `projects/*/locations/*/keyRings/*/cryptoKeys/*`. 219 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 220 // Optional. Optional limit on the number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to 221 // include in the response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] can 222 // subsequently be obtained by including the 223 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] in a subsequent request. 224 // If unspecified, the server will pick an appropriate default. 225 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 226 // Optional. Optional pagination token, returned earlier via 227 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token]. 228 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 229 // The fields to include in the response. 230 View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"` 231 // Optional. Only include resources that match the filter in the response. For 232 // more information, see 233 // [Sorting and filtering list 234 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 235 Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` 236 // Optional. Specify how the results should be sorted. If not specified, the 237 // results will be sorted in the default order. For more information, see 238 // [Sorting and filtering list 239 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 240 OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 241 XXX_NoUnkeyedLiteral struct{} `json:"-"` 242 XXX_unrecognized []byte `json:"-"` 243 XXX_sizecache int32 `json:"-"` 244} 245 246func (m *ListCryptoKeyVersionsRequest) Reset() { *m = ListCryptoKeyVersionsRequest{} } 247func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) } 248func (*ListCryptoKeyVersionsRequest) ProtoMessage() {} 249func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) { 250 return fileDescriptor_723aeaeb61739a25, []int{2} 251} 252 253func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error { 254 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b) 255} 256func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 257 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic) 258} 259func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) { 260 xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src) 261} 262func (m *ListCryptoKeyVersionsRequest) XXX_Size() int { 263 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m) 264} 265func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() { 266 xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m) 267} 268 269var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo 270 271func (m *ListCryptoKeyVersionsRequest) GetParent() string { 272 if m != nil { 273 return m.Parent 274 } 275 return "" 276} 277 278func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 { 279 if m != nil { 280 return m.PageSize 281 } 282 return 0 283} 284 285func (m *ListCryptoKeyVersionsRequest) GetPageToken() string { 286 if m != nil { 287 return m.PageToken 288 } 289 return "" 290} 291 292func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView { 293 if m != nil { 294 return m.View 295 } 296 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 297} 298 299func (m *ListCryptoKeyVersionsRequest) GetFilter() string { 300 if m != nil { 301 return m.Filter 302 } 303 return "" 304} 305 306func (m *ListCryptoKeyVersionsRequest) GetOrderBy() string { 307 if m != nil { 308 return m.OrderBy 309 } 310 return "" 311} 312 313// Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. 314type ListImportJobsRequest struct { 315 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format 316 // `projects/*/locations/*/keyRings/*`. 317 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 318 // Optional. Optional limit on the number of [ImportJobs][google.cloud.kms.v1.ImportJob] to include in the 319 // response. Further [ImportJobs][google.cloud.kms.v1.ImportJob] can subsequently be obtained by 320 // including the [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token] in a subsequent 321 // request. If unspecified, the server will pick an appropriate default. 322 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 323 // Optional. Optional pagination token, returned earlier via 324 // [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token]. 325 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 326 // Optional. Only include resources that match the filter in the response. For 327 // more information, see 328 // [Sorting and filtering list 329 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 330 Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` 331 // Optional. Specify how the results should be sorted. If not specified, the 332 // results will be sorted in the default order. For more information, see 333 // [Sorting and filtering list 334 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 335 OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 336 XXX_NoUnkeyedLiteral struct{} `json:"-"` 337 XXX_unrecognized []byte `json:"-"` 338 XXX_sizecache int32 `json:"-"` 339} 340 341func (m *ListImportJobsRequest) Reset() { *m = ListImportJobsRequest{} } 342func (m *ListImportJobsRequest) String() string { return proto.CompactTextString(m) } 343func (*ListImportJobsRequest) ProtoMessage() {} 344func (*ListImportJobsRequest) Descriptor() ([]byte, []int) { 345 return fileDescriptor_723aeaeb61739a25, []int{3} 346} 347 348func (m *ListImportJobsRequest) XXX_Unmarshal(b []byte) error { 349 return xxx_messageInfo_ListImportJobsRequest.Unmarshal(m, b) 350} 351func (m *ListImportJobsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 352 return xxx_messageInfo_ListImportJobsRequest.Marshal(b, m, deterministic) 353} 354func (m *ListImportJobsRequest) XXX_Merge(src proto.Message) { 355 xxx_messageInfo_ListImportJobsRequest.Merge(m, src) 356} 357func (m *ListImportJobsRequest) XXX_Size() int { 358 return xxx_messageInfo_ListImportJobsRequest.Size(m) 359} 360func (m *ListImportJobsRequest) XXX_DiscardUnknown() { 361 xxx_messageInfo_ListImportJobsRequest.DiscardUnknown(m) 362} 363 364var xxx_messageInfo_ListImportJobsRequest proto.InternalMessageInfo 365 366func (m *ListImportJobsRequest) GetParent() string { 367 if m != nil { 368 return m.Parent 369 } 370 return "" 371} 372 373func (m *ListImportJobsRequest) GetPageSize() int32 { 374 if m != nil { 375 return m.PageSize 376 } 377 return 0 378} 379 380func (m *ListImportJobsRequest) GetPageToken() string { 381 if m != nil { 382 return m.PageToken 383 } 384 return "" 385} 386 387func (m *ListImportJobsRequest) GetFilter() string { 388 if m != nil { 389 return m.Filter 390 } 391 return "" 392} 393 394func (m *ListImportJobsRequest) GetOrderBy() string { 395 if m != nil { 396 return m.OrderBy 397 } 398 return "" 399} 400 401// Response message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 402type ListKeyRingsResponse struct { 403 // The list of [KeyRings][google.cloud.kms.v1.KeyRing]. 404 KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"` 405 // A token to retrieve next page of results. Pass this value in 406 // [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] to retrieve the next page of results. 407 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 408 // The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched the query. 409 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 410 XXX_NoUnkeyedLiteral struct{} `json:"-"` 411 XXX_unrecognized []byte `json:"-"` 412 XXX_sizecache int32 `json:"-"` 413} 414 415func (m *ListKeyRingsResponse) Reset() { *m = ListKeyRingsResponse{} } 416func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) } 417func (*ListKeyRingsResponse) ProtoMessage() {} 418func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) { 419 return fileDescriptor_723aeaeb61739a25, []int{4} 420} 421 422func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error { 423 return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b) 424} 425func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 426 return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic) 427} 428func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) { 429 xxx_messageInfo_ListKeyRingsResponse.Merge(m, src) 430} 431func (m *ListKeyRingsResponse) XXX_Size() int { 432 return xxx_messageInfo_ListKeyRingsResponse.Size(m) 433} 434func (m *ListKeyRingsResponse) XXX_DiscardUnknown() { 435 xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m) 436} 437 438var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo 439 440func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing { 441 if m != nil { 442 return m.KeyRings 443 } 444 return nil 445} 446 447func (m *ListKeyRingsResponse) GetNextPageToken() string { 448 if m != nil { 449 return m.NextPageToken 450 } 451 return "" 452} 453 454func (m *ListKeyRingsResponse) GetTotalSize() int32 { 455 if m != nil { 456 return m.TotalSize 457 } 458 return 0 459} 460 461// Response message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 462type ListCryptoKeysResponse struct { 463 // The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 464 CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"` 465 // A token to retrieve next page of results. Pass this value in 466 // [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] to retrieve the next page of results. 467 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 468 // The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that matched the query. 469 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 470 XXX_NoUnkeyedLiteral struct{} `json:"-"` 471 XXX_unrecognized []byte `json:"-"` 472 XXX_sizecache int32 `json:"-"` 473} 474 475func (m *ListCryptoKeysResponse) Reset() { *m = ListCryptoKeysResponse{} } 476func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) } 477func (*ListCryptoKeysResponse) ProtoMessage() {} 478func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) { 479 return fileDescriptor_723aeaeb61739a25, []int{5} 480} 481 482func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error { 483 return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b) 484} 485func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 486 return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic) 487} 488func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) { 489 xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src) 490} 491func (m *ListCryptoKeysResponse) XXX_Size() int { 492 return xxx_messageInfo_ListCryptoKeysResponse.Size(m) 493} 494func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() { 495 xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m) 496} 497 498var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo 499 500func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey { 501 if m != nil { 502 return m.CryptoKeys 503 } 504 return nil 505} 506 507func (m *ListCryptoKeysResponse) GetNextPageToken() string { 508 if m != nil { 509 return m.NextPageToken 510 } 511 return "" 512} 513 514func (m *ListCryptoKeysResponse) GetTotalSize() int32 { 515 if m != nil { 516 return m.TotalSize 517 } 518 return 0 519} 520 521// Response message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 522type ListCryptoKeyVersionsResponse struct { 523 // The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 524 CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"` 525 // A token to retrieve next page of results. Pass this value in 526 // [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] to retrieve the next page of 527 // results. 528 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 529 // The total number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the 530 // query. 531 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 532 XXX_NoUnkeyedLiteral struct{} `json:"-"` 533 XXX_unrecognized []byte `json:"-"` 534 XXX_sizecache int32 `json:"-"` 535} 536 537func (m *ListCryptoKeyVersionsResponse) Reset() { *m = ListCryptoKeyVersionsResponse{} } 538func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) } 539func (*ListCryptoKeyVersionsResponse) ProtoMessage() {} 540func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) { 541 return fileDescriptor_723aeaeb61739a25, []int{6} 542} 543 544func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error { 545 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b) 546} 547func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 548 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic) 549} 550func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) { 551 xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src) 552} 553func (m *ListCryptoKeyVersionsResponse) XXX_Size() int { 554 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m) 555} 556func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() { 557 xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m) 558} 559 560var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo 561 562func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion { 563 if m != nil { 564 return m.CryptoKeyVersions 565 } 566 return nil 567} 568 569func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string { 570 if m != nil { 571 return m.NextPageToken 572 } 573 return "" 574} 575 576func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 { 577 if m != nil { 578 return m.TotalSize 579 } 580 return 0 581} 582 583// Response message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. 584type ListImportJobsResponse struct { 585 // The list of [ImportJobs][google.cloud.kms.v1.ImportJob]. 586 ImportJobs []*ImportJob `protobuf:"bytes,1,rep,name=import_jobs,json=importJobs,proto3" json:"import_jobs,omitempty"` 587 // A token to retrieve next page of results. Pass this value in 588 // [ListImportJobsRequest.page_token][google.cloud.kms.v1.ListImportJobsRequest.page_token] to retrieve the next page of results. 589 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 590 // The total number of [ImportJobs][google.cloud.kms.v1.ImportJob] that matched the query. 591 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 592 XXX_NoUnkeyedLiteral struct{} `json:"-"` 593 XXX_unrecognized []byte `json:"-"` 594 XXX_sizecache int32 `json:"-"` 595} 596 597func (m *ListImportJobsResponse) Reset() { *m = ListImportJobsResponse{} } 598func (m *ListImportJobsResponse) String() string { return proto.CompactTextString(m) } 599func (*ListImportJobsResponse) ProtoMessage() {} 600func (*ListImportJobsResponse) Descriptor() ([]byte, []int) { 601 return fileDescriptor_723aeaeb61739a25, []int{7} 602} 603 604func (m *ListImportJobsResponse) XXX_Unmarshal(b []byte) error { 605 return xxx_messageInfo_ListImportJobsResponse.Unmarshal(m, b) 606} 607func (m *ListImportJobsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 608 return xxx_messageInfo_ListImportJobsResponse.Marshal(b, m, deterministic) 609} 610func (m *ListImportJobsResponse) XXX_Merge(src proto.Message) { 611 xxx_messageInfo_ListImportJobsResponse.Merge(m, src) 612} 613func (m *ListImportJobsResponse) XXX_Size() int { 614 return xxx_messageInfo_ListImportJobsResponse.Size(m) 615} 616func (m *ListImportJobsResponse) XXX_DiscardUnknown() { 617 xxx_messageInfo_ListImportJobsResponse.DiscardUnknown(m) 618} 619 620var xxx_messageInfo_ListImportJobsResponse proto.InternalMessageInfo 621 622func (m *ListImportJobsResponse) GetImportJobs() []*ImportJob { 623 if m != nil { 624 return m.ImportJobs 625 } 626 return nil 627} 628 629func (m *ListImportJobsResponse) GetNextPageToken() string { 630 if m != nil { 631 return m.NextPageToken 632 } 633 return "" 634} 635 636func (m *ListImportJobsResponse) GetTotalSize() int32 { 637 if m != nil { 638 return m.TotalSize 639 } 640 return 0 641} 642 643// Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing]. 644type GetKeyRingRequest struct { 645 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] to get. 646 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 647 XXX_NoUnkeyedLiteral struct{} `json:"-"` 648 XXX_unrecognized []byte `json:"-"` 649 XXX_sizecache int32 `json:"-"` 650} 651 652func (m *GetKeyRingRequest) Reset() { *m = GetKeyRingRequest{} } 653func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) } 654func (*GetKeyRingRequest) ProtoMessage() {} 655func (*GetKeyRingRequest) Descriptor() ([]byte, []int) { 656 return fileDescriptor_723aeaeb61739a25, []int{8} 657} 658 659func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error { 660 return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b) 661} 662func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 663 return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic) 664} 665func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) { 666 xxx_messageInfo_GetKeyRingRequest.Merge(m, src) 667} 668func (m *GetKeyRingRequest) XXX_Size() int { 669 return xxx_messageInfo_GetKeyRingRequest.Size(m) 670} 671func (m *GetKeyRingRequest) XXX_DiscardUnknown() { 672 xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m) 673} 674 675var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo 676 677func (m *GetKeyRingRequest) GetName() string { 678 if m != nil { 679 return m.Name 680 } 681 return "" 682} 683 684// Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey]. 685type GetCryptoKeyRequest struct { 686 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to get. 687 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 688 XXX_NoUnkeyedLiteral struct{} `json:"-"` 689 XXX_unrecognized []byte `json:"-"` 690 XXX_sizecache int32 `json:"-"` 691} 692 693func (m *GetCryptoKeyRequest) Reset() { *m = GetCryptoKeyRequest{} } 694func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 695func (*GetCryptoKeyRequest) ProtoMessage() {} 696func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) { 697 return fileDescriptor_723aeaeb61739a25, []int{9} 698} 699 700func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 701 return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b) 702} 703func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 704 return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic) 705} 706func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) { 707 xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src) 708} 709func (m *GetCryptoKeyRequest) XXX_Size() int { 710 return xxx_messageInfo_GetCryptoKeyRequest.Size(m) 711} 712func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() { 713 xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m) 714} 715 716var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo 717 718func (m *GetCryptoKeyRequest) GetName() string { 719 if m != nil { 720 return m.Name 721 } 722 return "" 723} 724 725// Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion]. 726type GetCryptoKeyVersionRequest struct { 727 // Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get. 728 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 729 XXX_NoUnkeyedLiteral struct{} `json:"-"` 730 XXX_unrecognized []byte `json:"-"` 731 XXX_sizecache int32 `json:"-"` 732} 733 734func (m *GetCryptoKeyVersionRequest) Reset() { *m = GetCryptoKeyVersionRequest{} } 735func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 736func (*GetCryptoKeyVersionRequest) ProtoMessage() {} 737func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 738 return fileDescriptor_723aeaeb61739a25, []int{10} 739} 740 741func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 742 return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b) 743} 744func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 745 return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic) 746} 747func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 748 xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src) 749} 750func (m *GetCryptoKeyVersionRequest) XXX_Size() int { 751 return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m) 752} 753func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() { 754 xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m) 755} 756 757var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo 758 759func (m *GetCryptoKeyVersionRequest) GetName() string { 760 if m != nil { 761 return m.Name 762 } 763 return "" 764} 765 766// Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 767type GetPublicKeyRequest struct { 768 // Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to 769 // get. 770 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 771 XXX_NoUnkeyedLiteral struct{} `json:"-"` 772 XXX_unrecognized []byte `json:"-"` 773 XXX_sizecache int32 `json:"-"` 774} 775 776func (m *GetPublicKeyRequest) Reset() { *m = GetPublicKeyRequest{} } 777func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) } 778func (*GetPublicKeyRequest) ProtoMessage() {} 779func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) { 780 return fileDescriptor_723aeaeb61739a25, []int{11} 781} 782 783func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error { 784 return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b) 785} 786func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 787 return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic) 788} 789func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) { 790 xxx_messageInfo_GetPublicKeyRequest.Merge(m, src) 791} 792func (m *GetPublicKeyRequest) XXX_Size() int { 793 return xxx_messageInfo_GetPublicKeyRequest.Size(m) 794} 795func (m *GetPublicKeyRequest) XXX_DiscardUnknown() { 796 xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m) 797} 798 799var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo 800 801func (m *GetPublicKeyRequest) GetName() string { 802 if m != nil { 803 return m.Name 804 } 805 return "" 806} 807 808// Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob]. 809type GetImportJobRequest struct { 810 // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] to get. 811 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 812 XXX_NoUnkeyedLiteral struct{} `json:"-"` 813 XXX_unrecognized []byte `json:"-"` 814 XXX_sizecache int32 `json:"-"` 815} 816 817func (m *GetImportJobRequest) Reset() { *m = GetImportJobRequest{} } 818func (m *GetImportJobRequest) String() string { return proto.CompactTextString(m) } 819func (*GetImportJobRequest) ProtoMessage() {} 820func (*GetImportJobRequest) Descriptor() ([]byte, []int) { 821 return fileDescriptor_723aeaeb61739a25, []int{12} 822} 823 824func (m *GetImportJobRequest) XXX_Unmarshal(b []byte) error { 825 return xxx_messageInfo_GetImportJobRequest.Unmarshal(m, b) 826} 827func (m *GetImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 828 return xxx_messageInfo_GetImportJobRequest.Marshal(b, m, deterministic) 829} 830func (m *GetImportJobRequest) XXX_Merge(src proto.Message) { 831 xxx_messageInfo_GetImportJobRequest.Merge(m, src) 832} 833func (m *GetImportJobRequest) XXX_Size() int { 834 return xxx_messageInfo_GetImportJobRequest.Size(m) 835} 836func (m *GetImportJobRequest) XXX_DiscardUnknown() { 837 xxx_messageInfo_GetImportJobRequest.DiscardUnknown(m) 838} 839 840var xxx_messageInfo_GetImportJobRequest proto.InternalMessageInfo 841 842func (m *GetImportJobRequest) GetName() string { 843 if m != nil { 844 return m.Name 845 } 846 return "" 847} 848 849// Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing]. 850type CreateKeyRingRequest struct { 851 // Required. The resource name of the location associated with the 852 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. 853 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 854 // Required. It must be unique within a location and match the regular 855 // expression `[a-zA-Z0-9_-]{1,63}` 856 KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"` 857 // Required. A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values. 858 KeyRing *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"` 859 XXX_NoUnkeyedLiteral struct{} `json:"-"` 860 XXX_unrecognized []byte `json:"-"` 861 XXX_sizecache int32 `json:"-"` 862} 863 864func (m *CreateKeyRingRequest) Reset() { *m = CreateKeyRingRequest{} } 865func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) } 866func (*CreateKeyRingRequest) ProtoMessage() {} 867func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) { 868 return fileDescriptor_723aeaeb61739a25, []int{13} 869} 870 871func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error { 872 return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b) 873} 874func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 875 return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic) 876} 877func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) { 878 xxx_messageInfo_CreateKeyRingRequest.Merge(m, src) 879} 880func (m *CreateKeyRingRequest) XXX_Size() int { 881 return xxx_messageInfo_CreateKeyRingRequest.Size(m) 882} 883func (m *CreateKeyRingRequest) XXX_DiscardUnknown() { 884 xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m) 885} 886 887var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo 888 889func (m *CreateKeyRingRequest) GetParent() string { 890 if m != nil { 891 return m.Parent 892 } 893 return "" 894} 895 896func (m *CreateKeyRingRequest) GetKeyRingId() string { 897 if m != nil { 898 return m.KeyRingId 899 } 900 return "" 901} 902 903func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing { 904 if m != nil { 905 return m.KeyRing 906 } 907 return nil 908} 909 910// Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey]. 911type CreateCryptoKeyRequest struct { 912 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing associated with the 913 // [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 914 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 915 // Required. It must be unique within a KeyRing and match the regular 916 // expression `[a-zA-Z0-9_-]{1,63}` 917 CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"` 918 // Required. A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values. 919 CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 920 // If set to true, the request will create a [CryptoKey][google.cloud.kms.v1.CryptoKey] without any 921 // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. You must manually call 922 // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or 923 // [ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion] 924 // before you can use this [CryptoKey][google.cloud.kms.v1.CryptoKey]. 925 SkipInitialVersionCreation bool `protobuf:"varint,5,opt,name=skip_initial_version_creation,json=skipInitialVersionCreation,proto3" json:"skip_initial_version_creation,omitempty"` 926 XXX_NoUnkeyedLiteral struct{} `json:"-"` 927 XXX_unrecognized []byte `json:"-"` 928 XXX_sizecache int32 `json:"-"` 929} 930 931func (m *CreateCryptoKeyRequest) Reset() { *m = CreateCryptoKeyRequest{} } 932func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 933func (*CreateCryptoKeyRequest) ProtoMessage() {} 934func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) { 935 return fileDescriptor_723aeaeb61739a25, []int{14} 936} 937 938func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 939 return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b) 940} 941func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 942 return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic) 943} 944func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) { 945 xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src) 946} 947func (m *CreateCryptoKeyRequest) XXX_Size() int { 948 return xxx_messageInfo_CreateCryptoKeyRequest.Size(m) 949} 950func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() { 951 xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m) 952} 953 954var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo 955 956func (m *CreateCryptoKeyRequest) GetParent() string { 957 if m != nil { 958 return m.Parent 959 } 960 return "" 961} 962 963func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string { 964 if m != nil { 965 return m.CryptoKeyId 966 } 967 return "" 968} 969 970func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 971 if m != nil { 972 return m.CryptoKey 973 } 974 return nil 975} 976 977func (m *CreateCryptoKeyRequest) GetSkipInitialVersionCreation() bool { 978 if m != nil { 979 return m.SkipInitialVersionCreation 980 } 981 return false 982} 983 984// Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion]. 985type CreateCryptoKeyVersionRequest struct { 986 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with 987 // the [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 988 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 989 // Required. A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial field values. 990 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 991 XXX_NoUnkeyedLiteral struct{} `json:"-"` 992 XXX_unrecognized []byte `json:"-"` 993 XXX_sizecache int32 `json:"-"` 994} 995 996func (m *CreateCryptoKeyVersionRequest) Reset() { *m = CreateCryptoKeyVersionRequest{} } 997func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 998func (*CreateCryptoKeyVersionRequest) ProtoMessage() {} 999func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1000 return fileDescriptor_723aeaeb61739a25, []int{15} 1001} 1002 1003func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1004 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b) 1005} 1006func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1007 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1008} 1009func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1010 xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src) 1011} 1012func (m *CreateCryptoKeyVersionRequest) XXX_Size() int { 1013 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m) 1014} 1015func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1016 xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m) 1017} 1018 1019var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo 1020 1021func (m *CreateCryptoKeyVersionRequest) GetParent() string { 1022 if m != nil { 1023 return m.Parent 1024 } 1025 return "" 1026} 1027 1028func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 1029 if m != nil { 1030 return m.CryptoKeyVersion 1031 } 1032 return nil 1033} 1034 1035// Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]. 1036type ImportCryptoKeyVersionRequest struct { 1037 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to 1038 // be imported into. 1039 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 1040 // Required. The [algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] of 1041 // the key being imported. This does not need to match the 1042 // [version_template][google.cloud.kms.v1.CryptoKey.version_template] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] this 1043 // version imports into. 1044 Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` 1045 // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] that was used to 1046 // wrap this key material. 1047 ImportJob string `protobuf:"bytes,4,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` 1048 // Required. The incoming wrapped key material that is to be imported. 1049 // 1050 // Types that are valid to be assigned to WrappedKeyMaterial: 1051 // *ImportCryptoKeyVersionRequest_RsaAesWrappedKey 1052 WrappedKeyMaterial isImportCryptoKeyVersionRequest_WrappedKeyMaterial `protobuf_oneof:"wrapped_key_material"` 1053 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1054 XXX_unrecognized []byte `json:"-"` 1055 XXX_sizecache int32 `json:"-"` 1056} 1057 1058func (m *ImportCryptoKeyVersionRequest) Reset() { *m = ImportCryptoKeyVersionRequest{} } 1059func (m *ImportCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1060func (*ImportCryptoKeyVersionRequest) ProtoMessage() {} 1061func (*ImportCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1062 return fileDescriptor_723aeaeb61739a25, []int{16} 1063} 1064 1065func (m *ImportCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1066 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Unmarshal(m, b) 1067} 1068func (m *ImportCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1069 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1070} 1071func (m *ImportCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1072 xxx_messageInfo_ImportCryptoKeyVersionRequest.Merge(m, src) 1073} 1074func (m *ImportCryptoKeyVersionRequest) XXX_Size() int { 1075 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Size(m) 1076} 1077func (m *ImportCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1078 xxx_messageInfo_ImportCryptoKeyVersionRequest.DiscardUnknown(m) 1079} 1080 1081var xxx_messageInfo_ImportCryptoKeyVersionRequest proto.InternalMessageInfo 1082 1083func (m *ImportCryptoKeyVersionRequest) GetParent() string { 1084 if m != nil { 1085 return m.Parent 1086 } 1087 return "" 1088} 1089 1090func (m *ImportCryptoKeyVersionRequest) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { 1091 if m != nil { 1092 return m.Algorithm 1093 } 1094 return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED 1095} 1096 1097func (m *ImportCryptoKeyVersionRequest) GetImportJob() string { 1098 if m != nil { 1099 return m.ImportJob 1100 } 1101 return "" 1102} 1103 1104type isImportCryptoKeyVersionRequest_WrappedKeyMaterial interface { 1105 isImportCryptoKeyVersionRequest_WrappedKeyMaterial() 1106} 1107 1108type ImportCryptoKeyVersionRequest_RsaAesWrappedKey struct { 1109 RsaAesWrappedKey []byte `protobuf:"bytes,5,opt,name=rsa_aes_wrapped_key,json=rsaAesWrappedKey,proto3,oneof"` 1110} 1111 1112func (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey) isImportCryptoKeyVersionRequest_WrappedKeyMaterial() { 1113} 1114 1115func (m *ImportCryptoKeyVersionRequest) GetWrappedKeyMaterial() isImportCryptoKeyVersionRequest_WrappedKeyMaterial { 1116 if m != nil { 1117 return m.WrappedKeyMaterial 1118 } 1119 return nil 1120} 1121 1122func (m *ImportCryptoKeyVersionRequest) GetRsaAesWrappedKey() []byte { 1123 if x, ok := m.GetWrappedKeyMaterial().(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey); ok { 1124 return x.RsaAesWrappedKey 1125 } 1126 return nil 1127} 1128 1129// XXX_OneofWrappers is for the internal use of the proto package. 1130func (*ImportCryptoKeyVersionRequest) XXX_OneofWrappers() []interface{} { 1131 return []interface{}{ 1132 (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey)(nil), 1133 } 1134} 1135 1136// Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob]. 1137type CreateImportJobRequest struct { 1138 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] associated with the 1139 // [ImportJobs][google.cloud.kms.v1.ImportJob]. 1140 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 1141 // Required. It must be unique within a KeyRing and match the regular 1142 // expression `[a-zA-Z0-9_-]{1,63}` 1143 ImportJobId string `protobuf:"bytes,2,opt,name=import_job_id,json=importJobId,proto3" json:"import_job_id,omitempty"` 1144 // Required. An [ImportJob][google.cloud.kms.v1.ImportJob] with initial field values. 1145 ImportJob *ImportJob `protobuf:"bytes,3,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` 1146 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1147 XXX_unrecognized []byte `json:"-"` 1148 XXX_sizecache int32 `json:"-"` 1149} 1150 1151func (m *CreateImportJobRequest) Reset() { *m = CreateImportJobRequest{} } 1152func (m *CreateImportJobRequest) String() string { return proto.CompactTextString(m) } 1153func (*CreateImportJobRequest) ProtoMessage() {} 1154func (*CreateImportJobRequest) Descriptor() ([]byte, []int) { 1155 return fileDescriptor_723aeaeb61739a25, []int{17} 1156} 1157 1158func (m *CreateImportJobRequest) XXX_Unmarshal(b []byte) error { 1159 return xxx_messageInfo_CreateImportJobRequest.Unmarshal(m, b) 1160} 1161func (m *CreateImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1162 return xxx_messageInfo_CreateImportJobRequest.Marshal(b, m, deterministic) 1163} 1164func (m *CreateImportJobRequest) XXX_Merge(src proto.Message) { 1165 xxx_messageInfo_CreateImportJobRequest.Merge(m, src) 1166} 1167func (m *CreateImportJobRequest) XXX_Size() int { 1168 return xxx_messageInfo_CreateImportJobRequest.Size(m) 1169} 1170func (m *CreateImportJobRequest) XXX_DiscardUnknown() { 1171 xxx_messageInfo_CreateImportJobRequest.DiscardUnknown(m) 1172} 1173 1174var xxx_messageInfo_CreateImportJobRequest proto.InternalMessageInfo 1175 1176func (m *CreateImportJobRequest) GetParent() string { 1177 if m != nil { 1178 return m.Parent 1179 } 1180 return "" 1181} 1182 1183func (m *CreateImportJobRequest) GetImportJobId() string { 1184 if m != nil { 1185 return m.ImportJobId 1186 } 1187 return "" 1188} 1189 1190func (m *CreateImportJobRequest) GetImportJob() *ImportJob { 1191 if m != nil { 1192 return m.ImportJob 1193 } 1194 return nil 1195} 1196 1197// Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey]. 1198type UpdateCryptoKeyRequest struct { 1199 // Required. [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values. 1200 CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 1201 // Required. List of fields to be updated in this request. 1202 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 1203 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1204 XXX_unrecognized []byte `json:"-"` 1205 XXX_sizecache int32 `json:"-"` 1206} 1207 1208func (m *UpdateCryptoKeyRequest) Reset() { *m = UpdateCryptoKeyRequest{} } 1209func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 1210func (*UpdateCryptoKeyRequest) ProtoMessage() {} 1211func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) { 1212 return fileDescriptor_723aeaeb61739a25, []int{18} 1213} 1214 1215func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 1216 return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b) 1217} 1218func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1219 return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic) 1220} 1221func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) { 1222 xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src) 1223} 1224func (m *UpdateCryptoKeyRequest) XXX_Size() int { 1225 return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m) 1226} 1227func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() { 1228 xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m) 1229} 1230 1231var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo 1232 1233func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 1234 if m != nil { 1235 return m.CryptoKey 1236 } 1237 return nil 1238} 1239 1240func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask { 1241 if m != nil { 1242 return m.UpdateMask 1243 } 1244 return nil 1245} 1246 1247// Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion]. 1248type UpdateCryptoKeyVersionRequest struct { 1249 // Required. [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated values. 1250 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 1251 // Required. List of fields to be updated in this request. 1252 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 1253 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1254 XXX_unrecognized []byte `json:"-"` 1255 XXX_sizecache int32 `json:"-"` 1256} 1257 1258func (m *UpdateCryptoKeyVersionRequest) Reset() { *m = UpdateCryptoKeyVersionRequest{} } 1259func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1260func (*UpdateCryptoKeyVersionRequest) ProtoMessage() {} 1261func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1262 return fileDescriptor_723aeaeb61739a25, []int{19} 1263} 1264 1265func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1266 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b) 1267} 1268func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1269 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1270} 1271func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1272 xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src) 1273} 1274func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int { 1275 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m) 1276} 1277func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1278 xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m) 1279} 1280 1281var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo 1282 1283func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 1284 if m != nil { 1285 return m.CryptoKeyVersion 1286 } 1287 return nil 1288} 1289 1290func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask { 1291 if m != nil { 1292 return m.UpdateMask 1293 } 1294 return nil 1295} 1296 1297// Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1298type EncryptRequest struct { 1299 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] or [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1300 // to use for encryption. 1301 // 1302 // If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server will use its 1303 // [primary version][google.cloud.kms.v1.CryptoKey.primary]. 1304 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1305 // Required. The data to encrypt. Must be no larger than 64KiB. 1306 // 1307 // The maximum size depends on the key version's 1308 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For 1309 // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the plaintext must be no larger 1310 // than 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the 1311 // plaintext and additional_authenticated_data fields must be no larger than 1312 // 8KiB. 1313 Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1314 // Optional. Optional data that, if specified, must also be provided during decryption 1315 // through [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data]. 1316 // 1317 // The maximum size depends on the key version's 1318 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For 1319 // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD must be no larger than 1320 // 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the 1321 // plaintext and additional_authenticated_data fields must be no larger than 1322 // 8KiB. 1323 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 1324 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1325 XXX_unrecognized []byte `json:"-"` 1326 XXX_sizecache int32 `json:"-"` 1327} 1328 1329func (m *EncryptRequest) Reset() { *m = EncryptRequest{} } 1330func (m *EncryptRequest) String() string { return proto.CompactTextString(m) } 1331func (*EncryptRequest) ProtoMessage() {} 1332func (*EncryptRequest) Descriptor() ([]byte, []int) { 1333 return fileDescriptor_723aeaeb61739a25, []int{20} 1334} 1335 1336func (m *EncryptRequest) XXX_Unmarshal(b []byte) error { 1337 return xxx_messageInfo_EncryptRequest.Unmarshal(m, b) 1338} 1339func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1340 return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic) 1341} 1342func (m *EncryptRequest) XXX_Merge(src proto.Message) { 1343 xxx_messageInfo_EncryptRequest.Merge(m, src) 1344} 1345func (m *EncryptRequest) XXX_Size() int { 1346 return xxx_messageInfo_EncryptRequest.Size(m) 1347} 1348func (m *EncryptRequest) XXX_DiscardUnknown() { 1349 xxx_messageInfo_EncryptRequest.DiscardUnknown(m) 1350} 1351 1352var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo 1353 1354func (m *EncryptRequest) GetName() string { 1355 if m != nil { 1356 return m.Name 1357 } 1358 return "" 1359} 1360 1361func (m *EncryptRequest) GetPlaintext() []byte { 1362 if m != nil { 1363 return m.Plaintext 1364 } 1365 return nil 1366} 1367 1368func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte { 1369 if m != nil { 1370 return m.AdditionalAuthenticatedData 1371 } 1372 return nil 1373} 1374 1375// Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1376type DecryptRequest struct { 1377 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption. 1378 // The server will choose the appropriate version. 1379 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1380 // Required. The encrypted data originally returned in 1381 // [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext]. 1382 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1383 // Optional. Optional data that must match the data originally supplied in 1384 // [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data]. 1385 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 1386 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1387 XXX_unrecognized []byte `json:"-"` 1388 XXX_sizecache int32 `json:"-"` 1389} 1390 1391func (m *DecryptRequest) Reset() { *m = DecryptRequest{} } 1392func (m *DecryptRequest) String() string { return proto.CompactTextString(m) } 1393func (*DecryptRequest) ProtoMessage() {} 1394func (*DecryptRequest) Descriptor() ([]byte, []int) { 1395 return fileDescriptor_723aeaeb61739a25, []int{21} 1396} 1397 1398func (m *DecryptRequest) XXX_Unmarshal(b []byte) error { 1399 return xxx_messageInfo_DecryptRequest.Unmarshal(m, b) 1400} 1401func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1402 return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic) 1403} 1404func (m *DecryptRequest) XXX_Merge(src proto.Message) { 1405 xxx_messageInfo_DecryptRequest.Merge(m, src) 1406} 1407func (m *DecryptRequest) XXX_Size() int { 1408 return xxx_messageInfo_DecryptRequest.Size(m) 1409} 1410func (m *DecryptRequest) XXX_DiscardUnknown() { 1411 xxx_messageInfo_DecryptRequest.DiscardUnknown(m) 1412} 1413 1414var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo 1415 1416func (m *DecryptRequest) GetName() string { 1417 if m != nil { 1418 return m.Name 1419 } 1420 return "" 1421} 1422 1423func (m *DecryptRequest) GetCiphertext() []byte { 1424 if m != nil { 1425 return m.Ciphertext 1426 } 1427 return nil 1428} 1429 1430func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte { 1431 if m != nil { 1432 return m.AdditionalAuthenticatedData 1433 } 1434 return nil 1435} 1436 1437// Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1438type AsymmetricSignRequest struct { 1439 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing. 1440 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1441 // Required. The digest of the data to sign. The digest must be produced with 1442 // the same digest algorithm as specified by the key version's 1443 // [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. 1444 Digest *Digest `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"` 1445 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1446 XXX_unrecognized []byte `json:"-"` 1447 XXX_sizecache int32 `json:"-"` 1448} 1449 1450func (m *AsymmetricSignRequest) Reset() { *m = AsymmetricSignRequest{} } 1451func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) } 1452func (*AsymmetricSignRequest) ProtoMessage() {} 1453func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) { 1454 return fileDescriptor_723aeaeb61739a25, []int{22} 1455} 1456 1457func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error { 1458 return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b) 1459} 1460func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1461 return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic) 1462} 1463func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) { 1464 xxx_messageInfo_AsymmetricSignRequest.Merge(m, src) 1465} 1466func (m *AsymmetricSignRequest) XXX_Size() int { 1467 return xxx_messageInfo_AsymmetricSignRequest.Size(m) 1468} 1469func (m *AsymmetricSignRequest) XXX_DiscardUnknown() { 1470 xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m) 1471} 1472 1473var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo 1474 1475func (m *AsymmetricSignRequest) GetName() string { 1476 if m != nil { 1477 return m.Name 1478 } 1479 return "" 1480} 1481 1482func (m *AsymmetricSignRequest) GetDigest() *Digest { 1483 if m != nil { 1484 return m.Digest 1485 } 1486 return nil 1487} 1488 1489// Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1490type AsymmetricDecryptRequest struct { 1491 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for 1492 // decryption. 1493 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1494 // Required. The data encrypted with the named [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public 1495 // key using OAEP. 1496 Ciphertext []byte `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1497 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1498 XXX_unrecognized []byte `json:"-"` 1499 XXX_sizecache int32 `json:"-"` 1500} 1501 1502func (m *AsymmetricDecryptRequest) Reset() { *m = AsymmetricDecryptRequest{} } 1503func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) } 1504func (*AsymmetricDecryptRequest) ProtoMessage() {} 1505func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) { 1506 return fileDescriptor_723aeaeb61739a25, []int{23} 1507} 1508 1509func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error { 1510 return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b) 1511} 1512func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1513 return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic) 1514} 1515func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) { 1516 xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src) 1517} 1518func (m *AsymmetricDecryptRequest) XXX_Size() int { 1519 return xxx_messageInfo_AsymmetricDecryptRequest.Size(m) 1520} 1521func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() { 1522 xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m) 1523} 1524 1525var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo 1526 1527func (m *AsymmetricDecryptRequest) GetName() string { 1528 if m != nil { 1529 return m.Name 1530 } 1531 return "" 1532} 1533 1534func (m *AsymmetricDecryptRequest) GetCiphertext() []byte { 1535 if m != nil { 1536 return m.Ciphertext 1537 } 1538 return nil 1539} 1540 1541// Response message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1542type DecryptResponse struct { 1543 // The decrypted data originally supplied in [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext]. 1544 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1545 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1546 XXX_unrecognized []byte `json:"-"` 1547 XXX_sizecache int32 `json:"-"` 1548} 1549 1550func (m *DecryptResponse) Reset() { *m = DecryptResponse{} } 1551func (m *DecryptResponse) String() string { return proto.CompactTextString(m) } 1552func (*DecryptResponse) ProtoMessage() {} 1553func (*DecryptResponse) Descriptor() ([]byte, []int) { 1554 return fileDescriptor_723aeaeb61739a25, []int{24} 1555} 1556 1557func (m *DecryptResponse) XXX_Unmarshal(b []byte) error { 1558 return xxx_messageInfo_DecryptResponse.Unmarshal(m, b) 1559} 1560func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1561 return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic) 1562} 1563func (m *DecryptResponse) XXX_Merge(src proto.Message) { 1564 xxx_messageInfo_DecryptResponse.Merge(m, src) 1565} 1566func (m *DecryptResponse) XXX_Size() int { 1567 return xxx_messageInfo_DecryptResponse.Size(m) 1568} 1569func (m *DecryptResponse) XXX_DiscardUnknown() { 1570 xxx_messageInfo_DecryptResponse.DiscardUnknown(m) 1571} 1572 1573var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo 1574 1575func (m *DecryptResponse) GetPlaintext() []byte { 1576 if m != nil { 1577 return m.Plaintext 1578 } 1579 return nil 1580} 1581 1582// Response message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1583type EncryptResponse struct { 1584 // The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in encryption. Check 1585 // this field to verify that the intended resource was used for encryption. 1586 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1587 // The encrypted data. 1588 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1589 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1590 XXX_unrecognized []byte `json:"-"` 1591 XXX_sizecache int32 `json:"-"` 1592} 1593 1594func (m *EncryptResponse) Reset() { *m = EncryptResponse{} } 1595func (m *EncryptResponse) String() string { return proto.CompactTextString(m) } 1596func (*EncryptResponse) ProtoMessage() {} 1597func (*EncryptResponse) Descriptor() ([]byte, []int) { 1598 return fileDescriptor_723aeaeb61739a25, []int{25} 1599} 1600 1601func (m *EncryptResponse) XXX_Unmarshal(b []byte) error { 1602 return xxx_messageInfo_EncryptResponse.Unmarshal(m, b) 1603} 1604func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1605 return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic) 1606} 1607func (m *EncryptResponse) XXX_Merge(src proto.Message) { 1608 xxx_messageInfo_EncryptResponse.Merge(m, src) 1609} 1610func (m *EncryptResponse) XXX_Size() int { 1611 return xxx_messageInfo_EncryptResponse.Size(m) 1612} 1613func (m *EncryptResponse) XXX_DiscardUnknown() { 1614 xxx_messageInfo_EncryptResponse.DiscardUnknown(m) 1615} 1616 1617var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo 1618 1619func (m *EncryptResponse) GetName() string { 1620 if m != nil { 1621 return m.Name 1622 } 1623 return "" 1624} 1625 1626func (m *EncryptResponse) GetCiphertext() []byte { 1627 if m != nil { 1628 return m.Ciphertext 1629 } 1630 return nil 1631} 1632 1633// Response message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1634type AsymmetricSignResponse struct { 1635 // The created signature. 1636 Signature []byte `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"` 1637 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1638 XXX_unrecognized []byte `json:"-"` 1639 XXX_sizecache int32 `json:"-"` 1640} 1641 1642func (m *AsymmetricSignResponse) Reset() { *m = AsymmetricSignResponse{} } 1643func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) } 1644func (*AsymmetricSignResponse) ProtoMessage() {} 1645func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) { 1646 return fileDescriptor_723aeaeb61739a25, []int{26} 1647} 1648 1649func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error { 1650 return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b) 1651} 1652func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1653 return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic) 1654} 1655func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) { 1656 xxx_messageInfo_AsymmetricSignResponse.Merge(m, src) 1657} 1658func (m *AsymmetricSignResponse) XXX_Size() int { 1659 return xxx_messageInfo_AsymmetricSignResponse.Size(m) 1660} 1661func (m *AsymmetricSignResponse) XXX_DiscardUnknown() { 1662 xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m) 1663} 1664 1665var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo 1666 1667func (m *AsymmetricSignResponse) GetSignature() []byte { 1668 if m != nil { 1669 return m.Signature 1670 } 1671 return nil 1672} 1673 1674// Response message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1675type AsymmetricDecryptResponse struct { 1676 // The decrypted data originally encrypted with the matching public key. 1677 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1678 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1679 XXX_unrecognized []byte `json:"-"` 1680 XXX_sizecache int32 `json:"-"` 1681} 1682 1683func (m *AsymmetricDecryptResponse) Reset() { *m = AsymmetricDecryptResponse{} } 1684func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) } 1685func (*AsymmetricDecryptResponse) ProtoMessage() {} 1686func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) { 1687 return fileDescriptor_723aeaeb61739a25, []int{27} 1688} 1689 1690func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error { 1691 return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b) 1692} 1693func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1694 return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic) 1695} 1696func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) { 1697 xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src) 1698} 1699func (m *AsymmetricDecryptResponse) XXX_Size() int { 1700 return xxx_messageInfo_AsymmetricDecryptResponse.Size(m) 1701} 1702func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() { 1703 xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m) 1704} 1705 1706var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo 1707 1708func (m *AsymmetricDecryptResponse) GetPlaintext() []byte { 1709 if m != nil { 1710 return m.Plaintext 1711 } 1712 return nil 1713} 1714 1715// Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. 1716type UpdateCryptoKeyPrimaryVersionRequest struct { 1717 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to update. 1718 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1719 // Required. The id of the child [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary. 1720 CryptoKeyVersionId string `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"` 1721 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1722 XXX_unrecognized []byte `json:"-"` 1723 XXX_sizecache int32 `json:"-"` 1724} 1725 1726func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset() { *m = UpdateCryptoKeyPrimaryVersionRequest{} } 1727func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) } 1728func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage() {} 1729func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) { 1730 return fileDescriptor_723aeaeb61739a25, []int{28} 1731} 1732 1733func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error { 1734 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b) 1735} 1736func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1737 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic) 1738} 1739func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) { 1740 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src) 1741} 1742func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int { 1743 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m) 1744} 1745func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() { 1746 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m) 1747} 1748 1749var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo 1750 1751func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string { 1752 if m != nil { 1753 return m.Name 1754 } 1755 return "" 1756} 1757 1758func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string { 1759 if m != nil { 1760 return m.CryptoKeyVersionId 1761 } 1762 return "" 1763} 1764 1765// Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]. 1766type DestroyCryptoKeyVersionRequest struct { 1767 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy. 1768 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1769 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1770 XXX_unrecognized []byte `json:"-"` 1771 XXX_sizecache int32 `json:"-"` 1772} 1773 1774func (m *DestroyCryptoKeyVersionRequest) Reset() { *m = DestroyCryptoKeyVersionRequest{} } 1775func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1776func (*DestroyCryptoKeyVersionRequest) ProtoMessage() {} 1777func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1778 return fileDescriptor_723aeaeb61739a25, []int{29} 1779} 1780 1781func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1782 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b) 1783} 1784func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1785 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1786} 1787func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1788 xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src) 1789} 1790func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int { 1791 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m) 1792} 1793func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1794 xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m) 1795} 1796 1797var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo 1798 1799func (m *DestroyCryptoKeyVersionRequest) GetName() string { 1800 if m != nil { 1801 return m.Name 1802 } 1803 return "" 1804} 1805 1806// Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]. 1807type RestoreCryptoKeyVersionRequest struct { 1808 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore. 1809 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1810 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1811 XXX_unrecognized []byte `json:"-"` 1812 XXX_sizecache int32 `json:"-"` 1813} 1814 1815func (m *RestoreCryptoKeyVersionRequest) Reset() { *m = RestoreCryptoKeyVersionRequest{} } 1816func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1817func (*RestoreCryptoKeyVersionRequest) ProtoMessage() {} 1818func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1819 return fileDescriptor_723aeaeb61739a25, []int{30} 1820} 1821 1822func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1823 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b) 1824} 1825func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1826 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1827} 1828func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1829 xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src) 1830} 1831func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int { 1832 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m) 1833} 1834func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1835 xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m) 1836} 1837 1838var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo 1839 1840func (m *RestoreCryptoKeyVersionRequest) GetName() string { 1841 if m != nil { 1842 return m.Name 1843 } 1844 return "" 1845} 1846 1847// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest. 1848type Digest struct { 1849 // Required. The message digest. 1850 // 1851 // Types that are valid to be assigned to Digest: 1852 // *Digest_Sha256 1853 // *Digest_Sha384 1854 // *Digest_Sha512 1855 Digest isDigest_Digest `protobuf_oneof:"digest"` 1856 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1857 XXX_unrecognized []byte `json:"-"` 1858 XXX_sizecache int32 `json:"-"` 1859} 1860 1861func (m *Digest) Reset() { *m = Digest{} } 1862func (m *Digest) String() string { return proto.CompactTextString(m) } 1863func (*Digest) ProtoMessage() {} 1864func (*Digest) Descriptor() ([]byte, []int) { 1865 return fileDescriptor_723aeaeb61739a25, []int{31} 1866} 1867 1868func (m *Digest) XXX_Unmarshal(b []byte) error { 1869 return xxx_messageInfo_Digest.Unmarshal(m, b) 1870} 1871func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1872 return xxx_messageInfo_Digest.Marshal(b, m, deterministic) 1873} 1874func (m *Digest) XXX_Merge(src proto.Message) { 1875 xxx_messageInfo_Digest.Merge(m, src) 1876} 1877func (m *Digest) XXX_Size() int { 1878 return xxx_messageInfo_Digest.Size(m) 1879} 1880func (m *Digest) XXX_DiscardUnknown() { 1881 xxx_messageInfo_Digest.DiscardUnknown(m) 1882} 1883 1884var xxx_messageInfo_Digest proto.InternalMessageInfo 1885 1886type isDigest_Digest interface { 1887 isDigest_Digest() 1888} 1889 1890type Digest_Sha256 struct { 1891 Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"` 1892} 1893 1894type Digest_Sha384 struct { 1895 Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"` 1896} 1897 1898type Digest_Sha512 struct { 1899 Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"` 1900} 1901 1902func (*Digest_Sha256) isDigest_Digest() {} 1903 1904func (*Digest_Sha384) isDigest_Digest() {} 1905 1906func (*Digest_Sha512) isDigest_Digest() {} 1907 1908func (m *Digest) GetDigest() isDigest_Digest { 1909 if m != nil { 1910 return m.Digest 1911 } 1912 return nil 1913} 1914 1915func (m *Digest) GetSha256() []byte { 1916 if x, ok := m.GetDigest().(*Digest_Sha256); ok { 1917 return x.Sha256 1918 } 1919 return nil 1920} 1921 1922func (m *Digest) GetSha384() []byte { 1923 if x, ok := m.GetDigest().(*Digest_Sha384); ok { 1924 return x.Sha384 1925 } 1926 return nil 1927} 1928 1929func (m *Digest) GetSha512() []byte { 1930 if x, ok := m.GetDigest().(*Digest_Sha512); ok { 1931 return x.Sha512 1932 } 1933 return nil 1934} 1935 1936// XXX_OneofWrappers is for the internal use of the proto package. 1937func (*Digest) XXX_OneofWrappers() []interface{} { 1938 return []interface{}{ 1939 (*Digest_Sha256)(nil), 1940 (*Digest_Sha384)(nil), 1941 (*Digest_Sha512)(nil), 1942 } 1943} 1944 1945// Cloud KMS metadata for the given [google.cloud.location.Location][google.cloud.location.Location]. 1946type LocationMetadata struct { 1947 // Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with 1948 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] 1949 // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this location. 1950 HsmAvailable bool `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"` 1951 // Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with 1952 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] 1953 // [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location. 1954 EkmAvailable bool `protobuf:"varint,2,opt,name=ekm_available,json=ekmAvailable,proto3" json:"ekm_available,omitempty"` 1955 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1956 XXX_unrecognized []byte `json:"-"` 1957 XXX_sizecache int32 `json:"-"` 1958} 1959 1960func (m *LocationMetadata) Reset() { *m = LocationMetadata{} } 1961func (m *LocationMetadata) String() string { return proto.CompactTextString(m) } 1962func (*LocationMetadata) ProtoMessage() {} 1963func (*LocationMetadata) Descriptor() ([]byte, []int) { 1964 return fileDescriptor_723aeaeb61739a25, []int{32} 1965} 1966 1967func (m *LocationMetadata) XXX_Unmarshal(b []byte) error { 1968 return xxx_messageInfo_LocationMetadata.Unmarshal(m, b) 1969} 1970func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1971 return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic) 1972} 1973func (m *LocationMetadata) XXX_Merge(src proto.Message) { 1974 xxx_messageInfo_LocationMetadata.Merge(m, src) 1975} 1976func (m *LocationMetadata) XXX_Size() int { 1977 return xxx_messageInfo_LocationMetadata.Size(m) 1978} 1979func (m *LocationMetadata) XXX_DiscardUnknown() { 1980 xxx_messageInfo_LocationMetadata.DiscardUnknown(m) 1981} 1982 1983var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo 1984 1985func (m *LocationMetadata) GetHsmAvailable() bool { 1986 if m != nil { 1987 return m.HsmAvailable 1988 } 1989 return false 1990} 1991 1992func (m *LocationMetadata) GetEkmAvailable() bool { 1993 if m != nil { 1994 return m.EkmAvailable 1995 } 1996 return false 1997} 1998 1999func init() { 2000 proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest") 2001 proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest") 2002 proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest") 2003 proto.RegisterType((*ListImportJobsRequest)(nil), "google.cloud.kms.v1.ListImportJobsRequest") 2004 proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse") 2005 proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse") 2006 proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse") 2007 proto.RegisterType((*ListImportJobsResponse)(nil), "google.cloud.kms.v1.ListImportJobsResponse") 2008 proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest") 2009 proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest") 2010 proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest") 2011 proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest") 2012 proto.RegisterType((*GetImportJobRequest)(nil), "google.cloud.kms.v1.GetImportJobRequest") 2013 proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest") 2014 proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest") 2015 proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest") 2016 proto.RegisterType((*ImportCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.ImportCryptoKeyVersionRequest") 2017 proto.RegisterType((*CreateImportJobRequest)(nil), "google.cloud.kms.v1.CreateImportJobRequest") 2018 proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest") 2019 proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest") 2020 proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest") 2021 proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest") 2022 proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest") 2023 proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest") 2024 proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse") 2025 proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse") 2026 proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse") 2027 proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse") 2028 proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest") 2029 proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest") 2030 proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest") 2031 proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest") 2032 proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata") 2033} 2034 2035func init() { 2036 proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25) 2037} 2038 2039var fileDescriptor_723aeaeb61739a25 = []byte{ 2040 // 2314 bytes of a gzipped FileDescriptorProto 2041 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x5a, 0xcd, 0x6f, 0x1b, 0xc7, 2042 0x15, 0xcf, 0xd0, 0xb1, 0x2c, 0x3d, 0xc9, 0x92, 0x3d, 0xb2, 0x65, 0x99, 0xb6, 0x64, 0x7b, 0x95, 2043 0x3a, 0xb6, 0xe2, 0x70, 0x2b, 0x3a, 0x36, 0x6c, 0xba, 0x86, 0xbb, 0xb2, 0x12, 0xdb, 0x51, 0x9c, 2044 0x0a, 0xf4, 0x57, 0x9b, 0xaa, 0xdd, 0x0c, 0xc9, 0x11, 0xb5, 0x21, 0x77, 0x97, 0xd9, 0x5d, 0x52, 2045 0x61, 0xda, 0x5c, 0x0a, 0xa4, 0x40, 0x81, 0x02, 0x3d, 0xe4, 0xd0, 0x02, 0x45, 0x8a, 0xa2, 0xc7, 2046 0x5e, 0x9b, 0xf6, 0xd0, 0x0f, 0xa0, 0xa7, 0x1e, 0xd2, 0x43, 0xd1, 0x8f, 0x93, 0x02, 0x04, 0x3e, 2047 0xf4, 0x0f, 0x28, 0x7a, 0x2a, 0xda, 0x4b, 0xb1, 0x33, 0xb3, 0x9f, 0xdc, 0x25, 0x29, 0x6a, 0x0d, 2048 0xe4, 0x66, 0xce, 0xbe, 0x79, 0xf3, 0xfb, 0xbd, 0x79, 0xef, 0xcd, 0xcc, 0xcf, 0x82, 0x73, 0x75, 2049 0xd3, 0xac, 0x37, 0xa9, 0x5c, 0x6d, 0x9a, 0xed, 0x9a, 0xdc, 0xd0, 0x6d, 0xb9, 0xb3, 0x22, 0xdb, 2050 0xd4, 0xea, 0x68, 0x55, 0x5a, 0x68, 0x59, 0xa6, 0x63, 0xe2, 0x59, 0x6e, 0x52, 0x60, 0x26, 0x85, 2051 0x86, 0x6e, 0x17, 0x3a, 0x2b, 0xf9, 0xd3, 0x62, 0x1e, 0x69, 0x69, 0x32, 0x31, 0x0c, 0xd3, 0x21, 2052 0x8e, 0x66, 0x1a, 0x36, 0x9f, 0x92, 0x3f, 0x11, 0xfa, 0x5a, 0x6d, 0x6a, 0xd4, 0x70, 0xc4, 0x87, 2053 0x33, 0xa1, 0x0f, 0x5b, 0x1a, 0x6d, 0xd6, 0xd4, 0x0a, 0xdd, 0x26, 0x1d, 0xcd, 0xb4, 0x84, 0xc1, 2054 0xc9, 0x90, 0x81, 0x45, 0x6d, 0xb3, 0x6d, 0x79, 0x38, 0xf2, 0x4b, 0x49, 0x50, 0x3d, 0x1b, 0x6f, 2055 0xe5, 0xb3, 0xc2, 0x88, 0xfd, 0xaa, 0xb4, 0xb7, 0xc4, 0x2a, 0x3a, 0xb1, 0x1b, 0xdc, 0x42, 0xfa, 2056 0x0c, 0xc1, 0xec, 0x1b, 0x9a, 0xed, 0xac, 0xd3, 0x6e, 0x59, 0x33, 0xea, 0x76, 0x99, 0xbe, 0xdb, 2057 0xa6, 0xb6, 0x83, 0x15, 0x18, 0x6b, 0x11, 0x8b, 0x1a, 0xce, 0x3c, 0x3a, 0x8b, 0x2e, 0x4c, 0xac, 2058 0x5e, 0x7c, 0xaa, 0xe4, 0xfe, 0xab, 0x2c, 0xc1, 0xb9, 0xa6, 0x59, 0x15, 0xe4, 0xb8, 0x6f, 0xd2, 2059 0xd2, 0xec, 0x42, 0xd5, 0xd4, 0xe5, 0x37, 0xc4, 0x87, 0xb2, 0x98, 0x88, 0xcf, 0xc2, 0x44, 0x8b, 2060 0xd4, 0xa9, 0x6a, 0x6b, 0xef, 0xd3, 0xf9, 0xdc, 0x59, 0x74, 0xe1, 0xe0, 0xea, 0x81, 0xa7, 0x0a, 2061 0x2a, 0x8f, 0xbb, 0xa3, 0x0f, 0xb4, 0xf7, 0x29, 0x96, 0x00, 0x98, 0x85, 0x63, 0x36, 0xa8, 0x31, 2062 0x7f, 0x80, 0x2d, 0xc4, 0x4c, 0xd8, 0xc4, 0x87, 0xee, 0x28, 0x3e, 0x05, 0x63, 0x5b, 0x5a, 0xd3, 2063 0xa1, 0xd6, 0xfc, 0xf3, 0xc1, 0x77, 0x31, 0x84, 0x17, 0x61, 0xdc, 0xb4, 0x6a, 0xd4, 0x52, 0x2b, 2064 0xdd, 0xf9, 0x83, 0xc1, 0xe7, 0x43, 0x6c, 0x70, 0xb5, 0x2b, 0xfd, 0x36, 0x07, 0xc7, 0x5d, 0x76, 2065 0xb7, 0xad, 0x6e, 0xcb, 0x31, 0xd7, 0x69, 0xd7, 0xe7, 0x77, 0x2b, 0xc6, 0xef, 0x45, 0xc6, 0xef, 2066 0x1c, 0x9c, 0x61, 0xf1, 0x74, 0xb7, 0x35, 0x46, 0x4f, 0x04, 0x28, 0x63, 0x76, 0xdf, 0x82, 0xa9, 2067 0x0e, 0xb5, 0x6c, 0xcd, 0x34, 0xd4, 0x8e, 0x46, 0x77, 0x18, 0xc7, 0xe9, 0x62, 0xa9, 0x90, 0x90, 2068 0x64, 0x05, 0x9f, 0xc4, 0x63, 0x3e, 0xa3, 0x67, 0xe0, 0xb1, 0x46, 0x77, 0xca, 0x93, 0x9d, 0xe0, 2069 0x47, 0x28, 0x78, 0x07, 0xfb, 0x07, 0x6f, 0x2c, 0x21, 0x78, 0x9f, 0xe4, 0xe0, 0x74, 0x24, 0x78, 2070 0x62, 0x99, 0xc1, 0x39, 0x92, 0x16, 0x43, 0xdf, 0x53, 0xc6, 0x51, 0x7c, 0x13, 0x9e, 0xcf, 0x28, 2071 0x7a, 0xcc, 0xcf, 0xfe, 0xc2, 0xf6, 0x19, 0xe2, 0x39, 0x77, 0x4f, 0x6f, 0x99, 0x96, 0xf3, 0xba, 2072 0x59, 0xf9, 0xa2, 0xe5, 0xdc, 0xbe, 0x2a, 0xea, 0x27, 0x08, 0x8e, 0x45, 0xfb, 0x85, 0xdd, 0x32, 2073 0x0d, 0x9b, 0xe2, 0xeb, 0x30, 0xd1, 0xa0, 0x5d, 0xd5, 0x72, 0x07, 0xe7, 0xd1, 0xd9, 0x03, 0x17, 2074 0x26, 0x8b, 0xa7, 0x13, 0x37, 0xc2, 0x23, 0x35, 0xde, 0x10, 0x2e, 0xf0, 0x79, 0x98, 0x31, 0xe8, 2075 0x7b, 0x8e, 0x1a, 0x42, 0xee, 0x92, 0x9b, 0x28, 0x1f, 0x76, 0x87, 0x37, 0x7c, 0xe0, 0x0b, 0x00, 2076 0x8e, 0xe9, 0x90, 0x26, 0xe7, 0xef, 0x92, 0x3b, 0x58, 0x9e, 0x60, 0x23, 0x2e, 0x77, 0xe9, 0xe7, 2077 0x08, 0xe6, 0xe2, 0xc5, 0x2e, 0xc0, 0xdd, 0x82, 0xc9, 0x2a, 0x1b, 0x55, 0x1b, 0xb4, 0xeb, 0xc1, 2078 0x5b, 0xec, 0x9f, 0x27, 0x65, 0xa8, 0xfa, 0x8e, 0xb2, 0x82, 0xf8, 0x07, 0x04, 0x0b, 0x29, 0x25, 2079 0x25, 0x90, 0x3e, 0x82, 0xd9, 0x00, 0xa9, 0x2a, 0x6a, 0xd9, 0x43, 0xfc, 0xa5, 0xa1, 0x32, 0xbb, 2080 0x7c, 0xb4, 0x1a, 0x77, 0x9f, 0x75, 0x88, 0xc3, 0xb9, 0x1d, 0x84, 0x58, 0x63, 0xa3, 0xea, 0x3b, 2081 0x66, 0xa5, 0x7f, 0x88, 0xfd, 0xd9, 0x65, 0xd0, 0x7c, 0x47, 0x59, 0x41, 0xdc, 0x80, 0xa3, 0x77, 2082 0xa8, 0x97, 0x9e, 0x5e, 0xe5, 0xdd, 0x80, 0xe7, 0x0d, 0xa2, 0xd3, 0xbd, 0xd6, 0x1d, 0x9b, 0x24, 2083 0x3d, 0x84, 0xd9, 0x3b, 0x34, 0xd8, 0x32, 0xcf, 0xe7, 0xcd, 0x88, 0xcf, 0x3d, 0xf4, 0x3e, 0xee, 2084 0xb5, 0x02, 0xf9, 0xb0, 0x57, 0x6f, 0xef, 0x84, 0xf3, 0xb5, 0x88, 0xf3, 0x2f, 0x33, 0xe7, 0xcb, 2085 0x70, 0x61, 0xa0, 0x73, 0xcf, 0x0d, 0x5f, 0xe3, 0x9b, 0x0c, 0xf9, 0x46, 0xbb, 0xd2, 0xd4, 0xaa, 2086 0x21, 0xe4, 0xd9, 0x38, 0xe7, 0x61, 0x09, 0xf6, 0x72, 0xb4, 0xb0, 0x04, 0xf3, 0xb9, 0xd7, 0xdf, 2087 0x23, 0x38, 0x76, 0xdb, 0xa2, 0xc4, 0xa1, 0xb1, 0x2d, 0xcc, 0xe0, 0x42, 0xb2, 0x04, 0x93, 0x5e, 2088 0x8b, 0x52, 0xb5, 0x1a, 0xcf, 0x2e, 0xb7, 0xbd, 0xe5, 0xca, 0x13, 0xa2, 0x17, 0xdd, 0xab, 0xe1, 2089 0xaf, 0xc0, 0xb8, 0x67, 0xc4, 0x92, 0x6b, 0x40, 0x1b, 0xe3, 0xf3, 0x0f, 0x89, 0xf9, 0xd2, 0x0f, 2090 0x72, 0x30, 0xc7, 0xe1, 0xf7, 0xe4, 0xcb, 0xbe, 0xbb, 0xff, 0x8b, 0x70, 0x38, 0xd4, 0x1a, 0xa2, 2091 0x04, 0x26, 0xfd, 0x92, 0xbf, 0x57, 0xc3, 0xab, 0x00, 0x81, 0xa1, 0x20, 0x31, 0xa0, 0xd9, 0x89, 2092 0x30, 0xf8, 0x5e, 0xb0, 0x02, 0x0b, 0x76, 0x43, 0x6b, 0xa9, 0x9a, 0xa1, 0x39, 0x1a, 0x69, 0x7a, 2093 0x9d, 0x48, 0xad, 0xba, 0xe4, 0x34, 0xd3, 0x60, 0x87, 0xc3, 0x78, 0x39, 0xef, 0x1a, 0xdd, 0xe3, 2094 0x36, 0x22, 0x3d, 0x6e, 0x0b, 0x0b, 0x77, 0x2b, 0x17, 0x62, 0xb1, 0x88, 0x65, 0x79, 0x06, 0x17, 2095 0x88, 0xaf, 0x03, 0xee, 0xed, 0x97, 0x2c, 0x32, 0xc3, 0xb6, 0x4b, 0x4e, 0xfd, 0x48, 0xbc, 0x67, 2096 0x4a, 0xbf, 0xca, 0xc1, 0x02, 0xcf, 0xce, 0x67, 0x08, 0xbf, 0x02, 0x13, 0xa4, 0x59, 0x37, 0x2d, 2097 0xcd, 0xd9, 0xd6, 0x19, 0xea, 0xe9, 0xe2, 0xad, 0xd1, 0xae, 0x2f, 0x8a, 0xe7, 0x46, 0x6c, 0xa5, 2098 0xef, 0xd6, 0xbd, 0x13, 0x04, 0x9d, 0x39, 0x38, 0xf3, 0x73, 0xe5, 0x09, 0xbf, 0xfb, 0x62, 0x19, 2099 0x66, 0x2d, 0x9b, 0xa8, 0x84, 0xda, 0xea, 0x8e, 0x45, 0x5a, 0x2d, 0x5a, 0x63, 0xb9, 0xe3, 0x6e, 2100 0xf2, 0xd4, 0xdd, 0xe7, 0xca, 0x47, 0x2c, 0x9b, 0x28, 0xd4, 0x7e, 0xc2, 0x3f, 0xb9, 0xf9, 0x32, 2101 0x07, 0xc7, 0x42, 0x86, 0xaa, 0x4e, 0x1c, 0x6a, 0x69, 0xa4, 0x29, 0xfd, 0x09, 0x79, 0x05, 0xd0, 2102 0xd3, 0x19, 0xb2, 0x28, 0x80, 0x80, 0x48, 0xbc, 0x00, 0x7c, 0x2e, 0xbc, 0x00, 0x42, 0x8c, 0xfb, 2103 0x15, 0x80, 0x0f, 0x32, 0x1e, 0x11, 0xe9, 0x67, 0x08, 0xe6, 0x1e, 0xb5, 0x6a, 0x49, 0x95, 0x1c, 2104 0xad, 0x2f, 0x34, 0x52, 0x7d, 0x7d, 0x15, 0x26, 0xdb, 0xcc, 0x3b, 0x7b, 0x8c, 0x89, 0x84, 0xcd, 2105 0x7b, 0x4e, 0xbc, 0xf7, 0x5a, 0xe1, 0x35, 0xf7, 0xbd, 0x76, 0x9f, 0xd8, 0x0d, 0xee, 0x00, 0xf8, 2106 0x1c, 0x77, 0x40, 0xfa, 0x1d, 0x82, 0x85, 0x18, 0xc0, 0x58, 0x7e, 0x26, 0xd7, 0x06, 0xda, 0x7f, 2107 0x6d, 0x64, 0x80, 0xfe, 0xa7, 0x08, 0xa6, 0x5f, 0x35, 0x98, 0x63, 0x0f, 0xee, 0x42, 0xe4, 0xe4, 2108 0x98, 0x60, 0xd9, 0x71, 0x00, 0xd0, 0x32, 0x3f, 0x19, 0xf0, 0x39, 0x98, 0x68, 0x35, 0x89, 0x66, 2109 0x38, 0xf4, 0x3d, 0x87, 0xad, 0x38, 0x25, 0x82, 0xea, 0x8f, 0xe2, 0x3b, 0xb0, 0x40, 0x6a, 0x35, 2110 0xcd, 0xed, 0x3e, 0xa4, 0xa9, 0x92, 0xb6, 0xb3, 0x4d, 0x0d, 0x47, 0xab, 0x12, 0x87, 0xd6, 0xd4, 2111 0x1a, 0x71, 0x08, 0x4b, 0x85, 0x29, 0x7e, 0xa3, 0x3d, 0x15, 0x58, 0x2a, 0x61, 0xc3, 0x35, 0xe2, 2112 0x10, 0xf7, 0x9e, 0x36, 0xbd, 0x46, 0x23, 0xe8, 0xf6, 0x77, 0xdc, 0xe3, 0x25, 0x80, 0xaa, 0xd6, 2113 0xda, 0xa6, 0x56, 0x1c, 0x7e, 0x68, 0x38, 0x3b, 0xfc, 0x3f, 0x46, 0x70, 0x5c, 0xb1, 0xbb, 0xba, 2114 0x4e, 0x1d, 0x4b, 0xab, 0x3e, 0xd0, 0xea, 0xd9, 0x5e, 0x2c, 0xf0, 0x35, 0x18, 0xab, 0x69, 0x75, 2115 0x6a, 0x3b, 0xa2, 0xb8, 0x4e, 0x25, 0x66, 0xd3, 0x1a, 0x33, 0xe1, 0x34, 0x85, 0xbd, 0xf4, 0x21, 2116 0x82, 0xf9, 0x00, 0x59, 0x2c, 0xc6, 0xd9, 0x80, 0x8b, 0x86, 0xfa, 0x40, 0x62, 0xa8, 0x25, 0x19, 2117 0x66, 0xfc, 0xc5, 0xc5, 0x0d, 0xf6, 0x74, 0x38, 0xc1, 0x5c, 0x08, 0x53, 0xa1, 0xdc, 0x92, 0x5e, 2118 0x85, 0x19, 0x3f, 0x5f, 0xc5, 0x04, 0x1c, 0x86, 0x2b, 0x16, 0x5f, 0xec, 0xdd, 0xe7, 0xc8, 0xba, 2119 0x57, 0x61, 0x2e, 0xbe, 0x31, 0xc1, 0xf2, 0xb6, 0x56, 0x37, 0x88, 0xd3, 0xb6, 0xa8, 0xb7, 0xbc, 2120 0x3f, 0x20, 0x5d, 0x87, 0x93, 0x09, 0x61, 0x1b, 0x0a, 0xf9, 0xc7, 0x08, 0x5e, 0x88, 0x35, 0x8a, 2121 0x0d, 0x4b, 0xd3, 0x89, 0x15, 0xef, 0x17, 0xfb, 0x4c, 0xf1, 0xab, 0x70, 0xbc, 0xb7, 0xdd, 0xc4, 2122 0xda, 0x34, 0x8e, 0xb7, 0x92, 0x7b, 0x35, 0x69, 0x0b, 0x16, 0xd7, 0xa8, 0xed, 0x58, 0x66, 0xf7, 2123 0xd9, 0xde, 0x86, 0xb7, 0x60, 0xb1, 0x4c, 0x6d, 0xc7, 0xb4, 0xe8, 0xb3, 0x5d, 0xe7, 0x6d, 0x18, 2124 0xe3, 0x99, 0x8f, 0xe7, 0x61, 0xcc, 0xde, 0x26, 0xc5, 0x2b, 0x57, 0xf9, 0xa6, 0xdc, 0x7d, 0xae, 2125 0x2c, 0x7e, 0x8b, 0x2f, 0x97, 0xaf, 0xbd, 0xc2, 0x53, 0x44, 0x7c, 0xb9, 0x7c, 0xed, 0x15, 0xf1, 2126 0xe5, 0xca, 0x4a, 0x91, 0x67, 0xae, 0xf8, 0x72, 0x65, 0xa5, 0xb8, 0x3a, 0xee, 0x15, 0x9d, 0xb4, 2127 0x09, 0x47, 0xbc, 0xcb, 0xed, 0x7d, 0xea, 0x10, 0xb7, 0x35, 0xe0, 0x25, 0x38, 0xbc, 0x6d, 0xeb, 2128 0x2a, 0xe9, 0x10, 0xad, 0x49, 0x2a, 0x4d, 0x4e, 0x62, 0xbc, 0x3c, 0xb5, 0x6d, 0xeb, 0x8a, 0x37, 2129 0xe6, 0x1a, 0xd1, 0x46, 0xd8, 0x28, 0xc7, 0x8d, 0x68, 0x23, 0x30, 0x2a, 0x7e, 0xff, 0x3c, 0x1c, 2130 0x5b, 0xa7, 0xdd, 0xfb, 0xc4, 0x20, 0x75, 0xaa, 0x53, 0xc3, 0x79, 0xc0, 0x05, 0x50, 0xfc, 0x0b, 2131 0x04, 0x53, 0xe1, 0xb7, 0x3f, 0xbe, 0x90, 0x58, 0xf6, 0x09, 0x72, 0x62, 0xfe, 0xe2, 0x10, 0x96, 2132 0x3c, 0x99, 0xa5, 0x9b, 0xbb, 0x8a, 0x38, 0xf0, 0xbf, 0xf7, 0xf7, 0x7f, 0x7e, 0x94, 0x2b, 0xe0, 2133 0x4b, 0x72, 0x67, 0x45, 0xfe, 0x0e, 0x1f, 0xba, 0xd9, 0xb2, 0xcc, 0x77, 0x68, 0xd5, 0xb1, 0xe5, 2134 0x65, 0xd9, 0xbf, 0xf8, 0xcb, 0xcb, 0x1f, 0xc8, 0xbe, 0x98, 0xf0, 0x6b, 0x04, 0xd3, 0x51, 0x15, 2135 0x00, 0x2f, 0xa7, 0x2e, 0xde, 0xa3, 0x0b, 0xe6, 0x5f, 0x1a, 0xca, 0x56, 0x40, 0x7d, 0x3d, 0x0a, 2136 0xf5, 0x06, 0xbe, 0x3e, 0x18, 0xaa, 0x8f, 0xd4, 0x45, 0x1d, 0x52, 0x18, 0x3e, 0x47, 0x31, 0xa9, 2137 0xd2, 0x7f, 0xbb, 0xaf, 0x0c, 0x86, 0x14, 0x53, 0xe6, 0xf2, 0xc5, 0xbd, 0x4c, 0x11, 0x64, 0xbe, 2138 0x1d, 0x25, 0xf3, 0x35, 0x7c, 0x7f, 0x4f, 0x64, 0x42, 0x5c, 0x22, 0xcc, 0x7c, 0x1a, 0xde, 0xc6, 2139 0x04, 0xda, 0x41, 0x9f, 0x8d, 0xe9, 0x11, 0xcf, 0xfa, 0x6c, 0x4c, 0xaf, 0x18, 0xb1, 0xff, 0x8d, 2140 0x09, 0xe9, 0x12, 0x3f, 0x42, 0x00, 0x81, 0xa2, 0x80, 0xcf, 0x27, 0xe2, 0xe8, 0x91, 0x1c, 0xf2, 2141 0x7d, 0x5f, 0x8d, 0xd2, 0x8d, 0x5d, 0x85, 0x35, 0x8b, 0x48, 0x8a, 0xbb, 0x03, 0x43, 0x80, 0x63, 2142 0x75, 0x18, 0xd6, 0x0e, 0x52, 0xea, 0x30, 0x41, 0xb4, 0xc8, 0x0f, 0xb8, 0xa6, 0x4a, 0x77, 0xc3, 2143 0xb8, 0xbc, 0xb0, 0x0d, 0x87, 0x2b, 0x9a, 0x00, 0xf8, 0xcf, 0x28, 0x2a, 0x9b, 0x78, 0x57, 0x47, 2144 0x79, 0x20, 0xd6, 0x68, 0x53, 0xce, 0x0f, 0x77, 0x53, 0x95, 0x36, 0xc3, 0xc8, 0xbd, 0xe4, 0x1d, 2145 0x01, 0x79, 0x6f, 0xe6, 0xba, 0x6c, 0xfe, 0xc8, 0x43, 0xee, 0x4b, 0x29, 0xe9, 0x21, 0x8f, 0xab, 2146 0x2d, 0x29, 0x21, 0xf7, 0xcd, 0xa4, 0xad, 0x30, 0xf0, 0x6f, 0xe0, 0x27, 0x99, 0x02, 0x97, 0x5b, 2147 0x3e, 0x62, 0x91, 0x35, 0x7e, 0xb5, 0xa4, 0x53, 0x88, 0xbf, 0xdc, 0xf2, 0x03, 0xde, 0x4e, 0xfb, 2148 0xca, 0x9a, 0xa0, 0xd2, 0xdc, 0x38, 0xff, 0x06, 0xc1, 0xe1, 0x88, 0xfc, 0x83, 0x2f, 0xa6, 0x6c, 2149 0x7f, 0xaf, 0x44, 0x34, 0xa0, 0xe4, 0x36, 0x77, 0x95, 0x53, 0xbc, 0x01, 0x5c, 0x0a, 0xa9, 0x40, 2150 0xfe, 0xbf, 0x19, 0xf6, 0x6b, 0xd2, 0x9e, 0x0e, 0x9b, 0x92, 0x2f, 0x15, 0xe1, 0xbf, 0x20, 0x98, 2151 0x89, 0x89, 0x1d, 0xf8, 0xa5, 0x3e, 0xd0, 0xf7, 0x5c, 0x99, 0xe6, 0xae, 0x72, 0x46, 0xc0, 0x8f, 2152 0xa8, 0x40, 0xa1, 0x5f, 0x8c, 0xc2, 0x1d, 0x69, 0xf4, 0x43, 0xa8, 0x14, 0x7a, 0xd7, 0xe2, 0xff, 2153 0xa1, 0x1e, 0x29, 0xcb, 0xab, 0xe1, 0xe2, 0x30, 0xc4, 0x46, 0x2b, 0xe3, 0x0f, 0xd1, 0xae, 0x72, 2154 0xb2, 0x97, 0xa7, 0xb8, 0x4d, 0x32, 0x86, 0x55, 0x29, 0xdb, 0x93, 0xa9, 0x94, 0xf0, 0x4a, 0xc6, 2155 0xff, 0x40, 0x30, 0x97, 0xac, 0xfe, 0xa4, 0xb0, 0xef, 0x2b, 0x15, 0x0d, 0xcb, 0x5e, 0xe5, 0x4d, 2156 0x40, 0x7a, 0x98, 0x2d, 0x41, 0x5e, 0x63, 0x25, 0xb4, 0x1c, 0x4a, 0xd3, 0xa0, 0x0f, 0xf4, 0x4b, 2157 0xd3, 0x3d, 0xb7, 0x82, 0x50, 0x9a, 0x46, 0xb4, 0x9a, 0xd0, 0xaf, 0x11, 0xd3, 0x34, 0x68, 0x14, 2158 0xa5, 0x90, 0xba, 0x83, 0xff, 0x8a, 0x60, 0x26, 0xf6, 0xba, 0x49, 0x61, 0x94, 0xac, 0xe6, 0x0c, 2159 0x2c, 0xbc, 0x77, 0x77, 0x95, 0xb9, 0x20, 0x41, 0x2e, 0x85, 0x74, 0x0f, 0x46, 0xa4, 0x5c, 0x5c, 2160 0x63, 0x44, 0x02, 0x93, 0xc2, 0x28, 0xe7, 0x65, 0xa4, 0xf4, 0x3e, 0xca, 0xf5, 0x68, 0x4f, 0xfd, 2161 0x93, 0xaf, 0xaf, 0x0e, 0x34, 0x6c, 0xf2, 0x7d, 0x8c, 0x76, 0x95, 0xc5, 0xde, 0x52, 0xe8, 0x61, 2162 0xdc, 0x29, 0xbe, 0x1d, 0x63, 0xec, 0x99, 0x16, 0xb2, 0x3a, 0xb6, 0x12, 0x4b, 0xf2, 0x13, 0x04, 2163 0x87, 0xc4, 0x13, 0x1c, 0x2f, 0x25, 0x52, 0x8a, 0x0a, 0x4a, 0xf9, 0x17, 0xfa, 0x1b, 0x05, 0xf7, 2164 0xde, 0x69, 0x17, 0xf7, 0x25, 0xff, 0xc5, 0x2c, 0x12, 0x74, 0x75, 0xd4, 0x93, 0x78, 0xf9, 0x83, 2165 0x12, 0xe5, 0x8b, 0xb8, 0x25, 0xe7, 0xc2, 0x16, 0x0f, 0xf6, 0x14, 0xd8, 0x51, 0x15, 0x24, 0x05, 2166 0x76, 0xec, 0xcd, 0xef, 0xc2, 0x9e, 0x61, 0xb0, 0x03, 0x71, 0x81, 0xe1, 0x7e, 0x4d, 0x52, 0x46, 2167 0xbe, 0xb4, 0x95, 0x6a, 0xd4, 0x87, 0xfd, 0x14, 0xc1, 0x74, 0x54, 0xa9, 0x48, 0xb9, 0xae, 0x27, 2168 0xea, 0x4c, 0x29, 0xd7, 0xf5, 0x64, 0xe9, 0x43, 0x6a, 0xef, 0x2a, 0x93, 0x8c, 0x0b, 0x7f, 0xdf, 2169 0x32, 0x1e, 0x44, 0xda, 0xcc, 0xf4, 0x26, 0x54, 0x22, 0x91, 0xb5, 0x5d, 0x8a, 0xff, 0x42, 0x70, 2170 0xb4, 0x47, 0x54, 0xc1, 0x2f, 0x0f, 0x40, 0x1e, 0xdb, 0xad, 0xc2, 0xb0, 0xe6, 0x82, 0xeb, 0x77, 2171 0x53, 0xf6, 0xad, 0x26, 0xa9, 0xcf, 0x8a, 0xef, 0x5a, 0xb0, 0xab, 0xff, 0xee, 0x15, 0x8d, 0xa3, 2172 0x5a, 0x10, 0xbe, 0x3e, 0x4c, 0x83, 0x49, 0xd4, 0x8f, 0x06, 0x76, 0xd2, 0xce, 0xae, 0x92, 0xe7, 2173 0xd4, 0x93, 0x64, 0x22, 0x16, 0x85, 0x07, 0xd2, 0x9b, 0xa3, 0x67, 0x2f, 0x6f, 0x54, 0x51, 0x6c, 2174 0x2e, 0xe9, 0xcf, 0x11, 0x9c, 0x48, 0x51, 0x98, 0xf0, 0xe5, 0x94, 0x62, 0xeb, 0xa7, 0x47, 0x0d, 2175 0xdb, 0x50, 0xeb, 0xe1, 0x6b, 0xf1, 0x5b, 0xd2, 0xa3, 0x6c, 0xf7, 0xb7, 0xc6, 0x31, 0x7a, 0x04, 2176 0x53, 0xa4, 0xad, 0x14, 0x82, 0xfd, 0x85, 0xb0, 0x2f, 0x06, 0x41, 0x8b, 0x63, 0x2c, 0xa1, 0xe5, 2177 0xbc, 0xf3, 0xa9, 0x72, 0x22, 0x45, 0x85, 0xfb, 0x9b, 0xf2, 0x64, 0xdb, 0x71, 0x5a, 0x76, 0x49, 2178 0x96, 0x77, 0x76, 0x76, 0xe2, 0x12, 0x1d, 0x69, 0x3b, 0xdb, 0xfc, 0x4f, 0xe4, 0x5e, 0x6e, 0x35, 2179 0x89, 0xb3, 0x65, 0x5a, 0xfa, 0xa5, 0xa1, 0xcc, 0x1b, 0xba, 0xbd, 0xfa, 0x43, 0x04, 0x27, 0xaa, 2180 0xa6, 0x9e, 0x14, 0x8b, 0xd5, 0xf1, 0x75, 0xdd, 0xde, 0xb0, 0x4c, 0xc7, 0xdc, 0x40, 0x6f, 0x5d, 2181 0x15, 0x06, 0x75, 0xb3, 0x49, 0x8c, 0x7a, 0xc1, 0xb4, 0xea, 0x72, 0x9d, 0x1a, 0xec, 0x7f, 0x41, 2182 0xe4, 0x60, 0x81, 0xc8, 0x5f, 0xea, 0xdd, 0x68, 0xe8, 0xf6, 0x7f, 0x10, 0xfa, 0x65, 0x6e, 0xf6, 2183 0x0e, 0x9f, 0x7b, 0x9b, 0x39, 0x5f, 0xd7, 0xed, 0xc2, 0xe3, 0x95, 0x4f, 0xbd, 0xd1, 0x4d, 0x36, 2184 0xba, 0xb9, 0xae, 0xdb, 0x9b, 0x8f, 0x57, 0x2a, 0x63, 0xcc, 0xe3, 0xe5, 0xff, 0x07, 0x00, 0x00, 2185 0xff, 0xff, 0x97, 0x2c, 0x57, 0x2d, 0xa5, 0x28, 0x00, 0x00, 2186} 2187 2188// Reference imports to suppress errors if they are not otherwise used. 2189var _ context.Context 2190var _ grpc.ClientConnInterface 2191 2192// This is a compile-time assertion to ensure that this generated file 2193// is compatible with the grpc package it is being compiled against. 2194const _ = grpc.SupportPackageIsVersion6 2195 2196// KeyManagementServiceClient is the client API for KeyManagementService service. 2197// 2198// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 2199type KeyManagementServiceClient interface { 2200 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2201 ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) 2202 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2203 ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) 2204 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2205 ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) 2206 // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2207 ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) 2208 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2209 GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 2210 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its 2211 // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2212 GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2213 // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2214 GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2215 // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2216 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2217 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or 2218 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2219 GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) 2220 // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2221 GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) 2222 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. 2223 CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 2224 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2225 // 2226 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2227 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2228 // are required. 2229 CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2230 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2231 // 2232 // The server will assign the next sequential id. If unset, 2233 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2234 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2235 CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2236 // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the 2237 // wrapped key material provided in the request. 2238 // 2239 // The version ID will be assigned the next sequential id within the 2240 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2241 ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2242 // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2243 // 2244 // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. 2245 CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) 2246 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2247 UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2248 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. 2249 // 2250 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2251 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and 2252 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this 2253 // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to 2254 // move between other states. 2255 UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2256 // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 2257 // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2258 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2259 Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) 2260 // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2261 // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2262 Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) 2263 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2264 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2265 // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2266 AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) 2267 // Decrypts data that was encrypted with a public key retrieved from 2268 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2269 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. 2270 AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) 2271 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2272 // 2273 // Returns an error if called on an asymmetric key. 2274 UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2275 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. 2276 // 2277 // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2278 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2279 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 2280 // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2281 // will be changed to 2282 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key 2283 // material will be irrevocably destroyed. 2284 // 2285 // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, 2286 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. 2287 DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2288 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2289 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2290 // state. 2291 // 2292 // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2293 // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2294 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. 2295 RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2296} 2297 2298type keyManagementServiceClient struct { 2299 cc grpc.ClientConnInterface 2300} 2301 2302func NewKeyManagementServiceClient(cc grpc.ClientConnInterface) KeyManagementServiceClient { 2303 return &keyManagementServiceClient{cc} 2304} 2305 2306func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) { 2307 out := new(ListKeyRingsResponse) 2308 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...) 2309 if err != nil { 2310 return nil, err 2311 } 2312 return out, nil 2313} 2314 2315func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) { 2316 out := new(ListCryptoKeysResponse) 2317 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...) 2318 if err != nil { 2319 return nil, err 2320 } 2321 return out, nil 2322} 2323 2324func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) { 2325 out := new(ListCryptoKeyVersionsResponse) 2326 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...) 2327 if err != nil { 2328 return nil, err 2329 } 2330 return out, nil 2331} 2332 2333func (c *keyManagementServiceClient) ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) { 2334 out := new(ListImportJobsResponse) 2335 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", in, out, opts...) 2336 if err != nil { 2337 return nil, err 2338 } 2339 return out, nil 2340} 2341 2342func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 2343 out := new(KeyRing) 2344 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...) 2345 if err != nil { 2346 return nil, err 2347 } 2348 return out, nil 2349} 2350 2351func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2352 out := new(CryptoKey) 2353 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...) 2354 if err != nil { 2355 return nil, err 2356 } 2357 return out, nil 2358} 2359 2360func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2361 out := new(CryptoKeyVersion) 2362 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...) 2363 if err != nil { 2364 return nil, err 2365 } 2366 return out, nil 2367} 2368 2369func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) { 2370 out := new(PublicKey) 2371 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...) 2372 if err != nil { 2373 return nil, err 2374 } 2375 return out, nil 2376} 2377 2378func (c *keyManagementServiceClient) GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { 2379 out := new(ImportJob) 2380 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetImportJob", in, out, opts...) 2381 if err != nil { 2382 return nil, err 2383 } 2384 return out, nil 2385} 2386 2387func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 2388 out := new(KeyRing) 2389 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...) 2390 if err != nil { 2391 return nil, err 2392 } 2393 return out, nil 2394} 2395 2396func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2397 out := new(CryptoKey) 2398 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...) 2399 if err != nil { 2400 return nil, err 2401 } 2402 return out, nil 2403} 2404 2405func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2406 out := new(CryptoKeyVersion) 2407 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...) 2408 if err != nil { 2409 return nil, err 2410 } 2411 return out, nil 2412} 2413 2414func (c *keyManagementServiceClient) ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2415 out := new(CryptoKeyVersion) 2416 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", in, out, opts...) 2417 if err != nil { 2418 return nil, err 2419 } 2420 return out, nil 2421} 2422 2423func (c *keyManagementServiceClient) CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { 2424 out := new(ImportJob) 2425 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", in, out, opts...) 2426 if err != nil { 2427 return nil, err 2428 } 2429 return out, nil 2430} 2431 2432func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2433 out := new(CryptoKey) 2434 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...) 2435 if err != nil { 2436 return nil, err 2437 } 2438 return out, nil 2439} 2440 2441func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2442 out := new(CryptoKeyVersion) 2443 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...) 2444 if err != nil { 2445 return nil, err 2446 } 2447 return out, nil 2448} 2449 2450func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) { 2451 out := new(EncryptResponse) 2452 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...) 2453 if err != nil { 2454 return nil, err 2455 } 2456 return out, nil 2457} 2458 2459func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) { 2460 out := new(DecryptResponse) 2461 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...) 2462 if err != nil { 2463 return nil, err 2464 } 2465 return out, nil 2466} 2467 2468func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) { 2469 out := new(AsymmetricSignResponse) 2470 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...) 2471 if err != nil { 2472 return nil, err 2473 } 2474 return out, nil 2475} 2476 2477func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) { 2478 out := new(AsymmetricDecryptResponse) 2479 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...) 2480 if err != nil { 2481 return nil, err 2482 } 2483 return out, nil 2484} 2485 2486func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2487 out := new(CryptoKey) 2488 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...) 2489 if err != nil { 2490 return nil, err 2491 } 2492 return out, nil 2493} 2494 2495func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2496 out := new(CryptoKeyVersion) 2497 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...) 2498 if err != nil { 2499 return nil, err 2500 } 2501 return out, nil 2502} 2503 2504func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2505 out := new(CryptoKeyVersion) 2506 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...) 2507 if err != nil { 2508 return nil, err 2509 } 2510 return out, nil 2511} 2512 2513// KeyManagementServiceServer is the server API for KeyManagementService service. 2514type KeyManagementServiceServer interface { 2515 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2516 ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error) 2517 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2518 ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) 2519 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2520 ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) 2521 // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2522 ListImportJobs(context.Context, *ListImportJobsRequest) (*ListImportJobsResponse, error) 2523 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2524 GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error) 2525 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its 2526 // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2527 GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error) 2528 // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2529 GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2530 // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2531 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2532 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or 2533 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2534 GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error) 2535 // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2536 GetImportJob(context.Context, *GetImportJobRequest) (*ImportJob, error) 2537 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. 2538 CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error) 2539 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2540 // 2541 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2542 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2543 // are required. 2544 CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error) 2545 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2546 // 2547 // The server will assign the next sequential id. If unset, 2548 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2549 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2550 CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2551 // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the 2552 // wrapped key material provided in the request. 2553 // 2554 // The version ID will be assigned the next sequential id within the 2555 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2556 ImportCryptoKeyVersion(context.Context, *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2557 // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2558 // 2559 // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. 2560 CreateImportJob(context.Context, *CreateImportJobRequest) (*ImportJob, error) 2561 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2562 UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error) 2563 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. 2564 // 2565 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2566 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and 2567 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this 2568 // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to 2569 // move between other states. 2570 UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2571 // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 2572 // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2573 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2574 Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error) 2575 // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2576 // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2577 Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error) 2578 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2579 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2580 // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2581 AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error) 2582 // Decrypts data that was encrypted with a public key retrieved from 2583 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2584 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. 2585 AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) 2586 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2587 // 2588 // Returns an error if called on an asymmetric key. 2589 UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) 2590 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. 2591 // 2592 // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2593 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2594 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 2595 // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2596 // will be changed to 2597 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key 2598 // material will be irrevocably destroyed. 2599 // 2600 // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, 2601 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. 2602 DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2603 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2604 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2605 // state. 2606 // 2607 // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2608 // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2609 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. 2610 RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2611} 2612 2613// UnimplementedKeyManagementServiceServer can be embedded to have forward compatible implementations. 2614type UnimplementedKeyManagementServiceServer struct { 2615} 2616 2617func (*UnimplementedKeyManagementServiceServer) ListKeyRings(ctx context.Context, req *ListKeyRingsRequest) (*ListKeyRingsResponse, error) { 2618 return nil, status.Errorf(codes.Unimplemented, "method ListKeyRings not implemented") 2619} 2620func (*UnimplementedKeyManagementServiceServer) ListCryptoKeys(ctx context.Context, req *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) { 2621 return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeys not implemented") 2622} 2623func (*UnimplementedKeyManagementServiceServer) ListCryptoKeyVersions(ctx context.Context, req *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) { 2624 return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeyVersions not implemented") 2625} 2626func (*UnimplementedKeyManagementServiceServer) ListImportJobs(ctx context.Context, req *ListImportJobsRequest) (*ListImportJobsResponse, error) { 2627 return nil, status.Errorf(codes.Unimplemented, "method ListImportJobs not implemented") 2628} 2629func (*UnimplementedKeyManagementServiceServer) GetKeyRing(ctx context.Context, req *GetKeyRingRequest) (*KeyRing, error) { 2630 return nil, status.Errorf(codes.Unimplemented, "method GetKeyRing not implemented") 2631} 2632func (*UnimplementedKeyManagementServiceServer) GetCryptoKey(ctx context.Context, req *GetCryptoKeyRequest) (*CryptoKey, error) { 2633 return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKey not implemented") 2634} 2635func (*UnimplementedKeyManagementServiceServer) GetCryptoKeyVersion(ctx context.Context, req *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2636 return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKeyVersion not implemented") 2637} 2638func (*UnimplementedKeyManagementServiceServer) GetPublicKey(ctx context.Context, req *GetPublicKeyRequest) (*PublicKey, error) { 2639 return nil, status.Errorf(codes.Unimplemented, "method GetPublicKey not implemented") 2640} 2641func (*UnimplementedKeyManagementServiceServer) GetImportJob(ctx context.Context, req *GetImportJobRequest) (*ImportJob, error) { 2642 return nil, status.Errorf(codes.Unimplemented, "method GetImportJob not implemented") 2643} 2644func (*UnimplementedKeyManagementServiceServer) CreateKeyRing(ctx context.Context, req *CreateKeyRingRequest) (*KeyRing, error) { 2645 return nil, status.Errorf(codes.Unimplemented, "method CreateKeyRing not implemented") 2646} 2647func (*UnimplementedKeyManagementServiceServer) CreateCryptoKey(ctx context.Context, req *CreateCryptoKeyRequest) (*CryptoKey, error) { 2648 return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKey not implemented") 2649} 2650func (*UnimplementedKeyManagementServiceServer) CreateCryptoKeyVersion(ctx context.Context, req *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2651 return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKeyVersion not implemented") 2652} 2653func (*UnimplementedKeyManagementServiceServer) ImportCryptoKeyVersion(ctx context.Context, req *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2654 return nil, status.Errorf(codes.Unimplemented, "method ImportCryptoKeyVersion not implemented") 2655} 2656func (*UnimplementedKeyManagementServiceServer) CreateImportJob(ctx context.Context, req *CreateImportJobRequest) (*ImportJob, error) { 2657 return nil, status.Errorf(codes.Unimplemented, "method CreateImportJob not implemented") 2658} 2659func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKey(ctx context.Context, req *UpdateCryptoKeyRequest) (*CryptoKey, error) { 2660 return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKey not implemented") 2661} 2662func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyVersion(ctx context.Context, req *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2663 return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyVersion not implemented") 2664} 2665func (*UnimplementedKeyManagementServiceServer) Encrypt(ctx context.Context, req *EncryptRequest) (*EncryptResponse, error) { 2666 return nil, status.Errorf(codes.Unimplemented, "method Encrypt not implemented") 2667} 2668func (*UnimplementedKeyManagementServiceServer) Decrypt(ctx context.Context, req *DecryptRequest) (*DecryptResponse, error) { 2669 return nil, status.Errorf(codes.Unimplemented, "method Decrypt not implemented") 2670} 2671func (*UnimplementedKeyManagementServiceServer) AsymmetricSign(ctx context.Context, req *AsymmetricSignRequest) (*AsymmetricSignResponse, error) { 2672 return nil, status.Errorf(codes.Unimplemented, "method AsymmetricSign not implemented") 2673} 2674func (*UnimplementedKeyManagementServiceServer) AsymmetricDecrypt(ctx context.Context, req *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) { 2675 return nil, status.Errorf(codes.Unimplemented, "method AsymmetricDecrypt not implemented") 2676} 2677func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) { 2678 return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyPrimaryVersion not implemented") 2679} 2680func (*UnimplementedKeyManagementServiceServer) DestroyCryptoKeyVersion(ctx context.Context, req *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2681 return nil, status.Errorf(codes.Unimplemented, "method DestroyCryptoKeyVersion not implemented") 2682} 2683func (*UnimplementedKeyManagementServiceServer) RestoreCryptoKeyVersion(ctx context.Context, req *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2684 return nil, status.Errorf(codes.Unimplemented, "method RestoreCryptoKeyVersion not implemented") 2685} 2686 2687func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) { 2688 s.RegisterService(&_KeyManagementService_serviceDesc, srv) 2689} 2690 2691func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2692 in := new(ListKeyRingsRequest) 2693 if err := dec(in); err != nil { 2694 return nil, err 2695 } 2696 if interceptor == nil { 2697 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in) 2698 } 2699 info := &grpc.UnaryServerInfo{ 2700 Server: srv, 2701 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", 2702 } 2703 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2704 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest)) 2705 } 2706 return interceptor(ctx, in, info, handler) 2707} 2708 2709func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2710 in := new(ListCryptoKeysRequest) 2711 if err := dec(in); err != nil { 2712 return nil, err 2713 } 2714 if interceptor == nil { 2715 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in) 2716 } 2717 info := &grpc.UnaryServerInfo{ 2718 Server: srv, 2719 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", 2720 } 2721 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2722 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest)) 2723 } 2724 return interceptor(ctx, in, info, handler) 2725} 2726 2727func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2728 in := new(ListCryptoKeyVersionsRequest) 2729 if err := dec(in); err != nil { 2730 return nil, err 2731 } 2732 if interceptor == nil { 2733 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in) 2734 } 2735 info := &grpc.UnaryServerInfo{ 2736 Server: srv, 2737 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", 2738 } 2739 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2740 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest)) 2741 } 2742 return interceptor(ctx, in, info, handler) 2743} 2744 2745func _KeyManagementService_ListImportJobs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2746 in := new(ListImportJobsRequest) 2747 if err := dec(in); err != nil { 2748 return nil, err 2749 } 2750 if interceptor == nil { 2751 return srv.(KeyManagementServiceServer).ListImportJobs(ctx, in) 2752 } 2753 info := &grpc.UnaryServerInfo{ 2754 Server: srv, 2755 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", 2756 } 2757 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2758 return srv.(KeyManagementServiceServer).ListImportJobs(ctx, req.(*ListImportJobsRequest)) 2759 } 2760 return interceptor(ctx, in, info, handler) 2761} 2762 2763func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2764 in := new(GetKeyRingRequest) 2765 if err := dec(in); err != nil { 2766 return nil, err 2767 } 2768 if interceptor == nil { 2769 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in) 2770 } 2771 info := &grpc.UnaryServerInfo{ 2772 Server: srv, 2773 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", 2774 } 2775 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2776 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest)) 2777 } 2778 return interceptor(ctx, in, info, handler) 2779} 2780 2781func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2782 in := new(GetCryptoKeyRequest) 2783 if err := dec(in); err != nil { 2784 return nil, err 2785 } 2786 if interceptor == nil { 2787 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in) 2788 } 2789 info := &grpc.UnaryServerInfo{ 2790 Server: srv, 2791 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", 2792 } 2793 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2794 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest)) 2795 } 2796 return interceptor(ctx, in, info, handler) 2797} 2798 2799func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2800 in := new(GetCryptoKeyVersionRequest) 2801 if err := dec(in); err != nil { 2802 return nil, err 2803 } 2804 if interceptor == nil { 2805 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in) 2806 } 2807 info := &grpc.UnaryServerInfo{ 2808 Server: srv, 2809 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", 2810 } 2811 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2812 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest)) 2813 } 2814 return interceptor(ctx, in, info, handler) 2815} 2816 2817func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2818 in := new(GetPublicKeyRequest) 2819 if err := dec(in); err != nil { 2820 return nil, err 2821 } 2822 if interceptor == nil { 2823 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in) 2824 } 2825 info := &grpc.UnaryServerInfo{ 2826 Server: srv, 2827 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", 2828 } 2829 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2830 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest)) 2831 } 2832 return interceptor(ctx, in, info, handler) 2833} 2834 2835func _KeyManagementService_GetImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2836 in := new(GetImportJobRequest) 2837 if err := dec(in); err != nil { 2838 return nil, err 2839 } 2840 if interceptor == nil { 2841 return srv.(KeyManagementServiceServer).GetImportJob(ctx, in) 2842 } 2843 info := &grpc.UnaryServerInfo{ 2844 Server: srv, 2845 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetImportJob", 2846 } 2847 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2848 return srv.(KeyManagementServiceServer).GetImportJob(ctx, req.(*GetImportJobRequest)) 2849 } 2850 return interceptor(ctx, in, info, handler) 2851} 2852 2853func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2854 in := new(CreateKeyRingRequest) 2855 if err := dec(in); err != nil { 2856 return nil, err 2857 } 2858 if interceptor == nil { 2859 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in) 2860 } 2861 info := &grpc.UnaryServerInfo{ 2862 Server: srv, 2863 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", 2864 } 2865 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2866 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest)) 2867 } 2868 return interceptor(ctx, in, info, handler) 2869} 2870 2871func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2872 in := new(CreateCryptoKeyRequest) 2873 if err := dec(in); err != nil { 2874 return nil, err 2875 } 2876 if interceptor == nil { 2877 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in) 2878 } 2879 info := &grpc.UnaryServerInfo{ 2880 Server: srv, 2881 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", 2882 } 2883 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2884 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest)) 2885 } 2886 return interceptor(ctx, in, info, handler) 2887} 2888 2889func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2890 in := new(CreateCryptoKeyVersionRequest) 2891 if err := dec(in); err != nil { 2892 return nil, err 2893 } 2894 if interceptor == nil { 2895 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in) 2896 } 2897 info := &grpc.UnaryServerInfo{ 2898 Server: srv, 2899 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", 2900 } 2901 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2902 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest)) 2903 } 2904 return interceptor(ctx, in, info, handler) 2905} 2906 2907func _KeyManagementService_ImportCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2908 in := new(ImportCryptoKeyVersionRequest) 2909 if err := dec(in); err != nil { 2910 return nil, err 2911 } 2912 if interceptor == nil { 2913 return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, in) 2914 } 2915 info := &grpc.UnaryServerInfo{ 2916 Server: srv, 2917 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", 2918 } 2919 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2920 return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, req.(*ImportCryptoKeyVersionRequest)) 2921 } 2922 return interceptor(ctx, in, info, handler) 2923} 2924 2925func _KeyManagementService_CreateImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2926 in := new(CreateImportJobRequest) 2927 if err := dec(in); err != nil { 2928 return nil, err 2929 } 2930 if interceptor == nil { 2931 return srv.(KeyManagementServiceServer).CreateImportJob(ctx, in) 2932 } 2933 info := &grpc.UnaryServerInfo{ 2934 Server: srv, 2935 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", 2936 } 2937 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2938 return srv.(KeyManagementServiceServer).CreateImportJob(ctx, req.(*CreateImportJobRequest)) 2939 } 2940 return interceptor(ctx, in, info, handler) 2941} 2942 2943func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2944 in := new(UpdateCryptoKeyRequest) 2945 if err := dec(in); err != nil { 2946 return nil, err 2947 } 2948 if interceptor == nil { 2949 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in) 2950 } 2951 info := &grpc.UnaryServerInfo{ 2952 Server: srv, 2953 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", 2954 } 2955 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2956 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest)) 2957 } 2958 return interceptor(ctx, in, info, handler) 2959} 2960 2961func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2962 in := new(UpdateCryptoKeyVersionRequest) 2963 if err := dec(in); err != nil { 2964 return nil, err 2965 } 2966 if interceptor == nil { 2967 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in) 2968 } 2969 info := &grpc.UnaryServerInfo{ 2970 Server: srv, 2971 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", 2972 } 2973 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2974 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest)) 2975 } 2976 return interceptor(ctx, in, info, handler) 2977} 2978 2979func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2980 in := new(EncryptRequest) 2981 if err := dec(in); err != nil { 2982 return nil, err 2983 } 2984 if interceptor == nil { 2985 return srv.(KeyManagementServiceServer).Encrypt(ctx, in) 2986 } 2987 info := &grpc.UnaryServerInfo{ 2988 Server: srv, 2989 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt", 2990 } 2991 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2992 return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest)) 2993 } 2994 return interceptor(ctx, in, info, handler) 2995} 2996 2997func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2998 in := new(DecryptRequest) 2999 if err := dec(in); err != nil { 3000 return nil, err 3001 } 3002 if interceptor == nil { 3003 return srv.(KeyManagementServiceServer).Decrypt(ctx, in) 3004 } 3005 info := &grpc.UnaryServerInfo{ 3006 Server: srv, 3007 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt", 3008 } 3009 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3010 return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest)) 3011 } 3012 return interceptor(ctx, in, info, handler) 3013} 3014 3015func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3016 in := new(AsymmetricSignRequest) 3017 if err := dec(in); err != nil { 3018 return nil, err 3019 } 3020 if interceptor == nil { 3021 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in) 3022 } 3023 info := &grpc.UnaryServerInfo{ 3024 Server: srv, 3025 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", 3026 } 3027 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3028 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest)) 3029 } 3030 return interceptor(ctx, in, info, handler) 3031} 3032 3033func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3034 in := new(AsymmetricDecryptRequest) 3035 if err := dec(in); err != nil { 3036 return nil, err 3037 } 3038 if interceptor == nil { 3039 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in) 3040 } 3041 info := &grpc.UnaryServerInfo{ 3042 Server: srv, 3043 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", 3044 } 3045 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3046 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest)) 3047 } 3048 return interceptor(ctx, in, info, handler) 3049} 3050 3051func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3052 in := new(UpdateCryptoKeyPrimaryVersionRequest) 3053 if err := dec(in); err != nil { 3054 return nil, err 3055 } 3056 if interceptor == nil { 3057 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in) 3058 } 3059 info := &grpc.UnaryServerInfo{ 3060 Server: srv, 3061 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", 3062 } 3063 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3064 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest)) 3065 } 3066 return interceptor(ctx, in, info, handler) 3067} 3068 3069func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3070 in := new(DestroyCryptoKeyVersionRequest) 3071 if err := dec(in); err != nil { 3072 return nil, err 3073 } 3074 if interceptor == nil { 3075 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in) 3076 } 3077 info := &grpc.UnaryServerInfo{ 3078 Server: srv, 3079 FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", 3080 } 3081 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3082 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest)) 3083 } 3084 return interceptor(ctx, in, info, handler) 3085} 3086 3087func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3088 in := new(RestoreCryptoKeyVersionRequest) 3089 if err := dec(in); err != nil { 3090 return nil, err 3091 } 3092 if interceptor == nil { 3093 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in) 3094 } 3095 info := &grpc.UnaryServerInfo{ 3096 Server: srv, 3097 FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", 3098 } 3099 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3100 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest)) 3101 } 3102 return interceptor(ctx, in, info, handler) 3103} 3104 3105var _KeyManagementService_serviceDesc = grpc.ServiceDesc{ 3106 ServiceName: "google.cloud.kms.v1.KeyManagementService", 3107 HandlerType: (*KeyManagementServiceServer)(nil), 3108 Methods: []grpc.MethodDesc{ 3109 { 3110 MethodName: "ListKeyRings", 3111 Handler: _KeyManagementService_ListKeyRings_Handler, 3112 }, 3113 { 3114 MethodName: "ListCryptoKeys", 3115 Handler: _KeyManagementService_ListCryptoKeys_Handler, 3116 }, 3117 { 3118 MethodName: "ListCryptoKeyVersions", 3119 Handler: _KeyManagementService_ListCryptoKeyVersions_Handler, 3120 }, 3121 { 3122 MethodName: "ListImportJobs", 3123 Handler: _KeyManagementService_ListImportJobs_Handler, 3124 }, 3125 { 3126 MethodName: "GetKeyRing", 3127 Handler: _KeyManagementService_GetKeyRing_Handler, 3128 }, 3129 { 3130 MethodName: "GetCryptoKey", 3131 Handler: _KeyManagementService_GetCryptoKey_Handler, 3132 }, 3133 { 3134 MethodName: "GetCryptoKeyVersion", 3135 Handler: _KeyManagementService_GetCryptoKeyVersion_Handler, 3136 }, 3137 { 3138 MethodName: "GetPublicKey", 3139 Handler: _KeyManagementService_GetPublicKey_Handler, 3140 }, 3141 { 3142 MethodName: "GetImportJob", 3143 Handler: _KeyManagementService_GetImportJob_Handler, 3144 }, 3145 { 3146 MethodName: "CreateKeyRing", 3147 Handler: _KeyManagementService_CreateKeyRing_Handler, 3148 }, 3149 { 3150 MethodName: "CreateCryptoKey", 3151 Handler: _KeyManagementService_CreateCryptoKey_Handler, 3152 }, 3153 { 3154 MethodName: "CreateCryptoKeyVersion", 3155 Handler: _KeyManagementService_CreateCryptoKeyVersion_Handler, 3156 }, 3157 { 3158 MethodName: "ImportCryptoKeyVersion", 3159 Handler: _KeyManagementService_ImportCryptoKeyVersion_Handler, 3160 }, 3161 { 3162 MethodName: "CreateImportJob", 3163 Handler: _KeyManagementService_CreateImportJob_Handler, 3164 }, 3165 { 3166 MethodName: "UpdateCryptoKey", 3167 Handler: _KeyManagementService_UpdateCryptoKey_Handler, 3168 }, 3169 { 3170 MethodName: "UpdateCryptoKeyVersion", 3171 Handler: _KeyManagementService_UpdateCryptoKeyVersion_Handler, 3172 }, 3173 { 3174 MethodName: "Encrypt", 3175 Handler: _KeyManagementService_Encrypt_Handler, 3176 }, 3177 { 3178 MethodName: "Decrypt", 3179 Handler: _KeyManagementService_Decrypt_Handler, 3180 }, 3181 { 3182 MethodName: "AsymmetricSign", 3183 Handler: _KeyManagementService_AsymmetricSign_Handler, 3184 }, 3185 { 3186 MethodName: "AsymmetricDecrypt", 3187 Handler: _KeyManagementService_AsymmetricDecrypt_Handler, 3188 }, 3189 { 3190 MethodName: "UpdateCryptoKeyPrimaryVersion", 3191 Handler: _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler, 3192 }, 3193 { 3194 MethodName: "DestroyCryptoKeyVersion", 3195 Handler: _KeyManagementService_DestroyCryptoKeyVersion_Handler, 3196 }, 3197 { 3198 MethodName: "RestoreCryptoKeyVersion", 3199 Handler: _KeyManagementService_RestoreCryptoKeyVersion_Handler, 3200 }, 3201 }, 3202 Streams: []grpc.StreamDesc{}, 3203 Metadata: "google/cloud/kms/v1/service.proto", 3204} 3205