1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/kms/v1/service.proto 3 4package kms 5 6import ( 7 context "context" 8 fmt "fmt" 9 math "math" 10 11 proto "github.com/golang/protobuf/proto" 12 _ "google.golang.org/genproto/googleapis/api/annotations" 13 field_mask "google.golang.org/genproto/protobuf/field_mask" 14 grpc "google.golang.org/grpc" 15 codes "google.golang.org/grpc/codes" 16 status "google.golang.org/grpc/status" 17) 18 19// Reference imports to suppress errors if they are not otherwise used. 20var _ = proto.Marshal 21var _ = fmt.Errorf 22var _ = math.Inf 23 24// This is a compile-time assertion to ensure that this generated file 25// is compatible with the proto package it is being compiled against. 26// A compilation error at this line likely means your copy of the 27// proto package needs to be updated. 28const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 29 30// Request message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 31type ListKeyRingsRequest struct { 32 // Required. The resource name of the location associated with the 33 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. 34 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 35 // Optional. Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to include in the 36 // response. Further [KeyRings][google.cloud.kms.v1.KeyRing] can subsequently be obtained by 37 // including the [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] in a subsequent 38 // request. If unspecified, the server will pick an appropriate default. 39 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 40 // Optional. Optional pagination token, returned earlier via 41 // [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token]. 42 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 43 // Optional. Only include resources that match the filter in the response. For 44 // more information, see 45 // [Sorting and filtering list 46 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 47 Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` 48 // Optional. Specify how the results should be sorted. If not specified, the 49 // results will be sorted in the default order. For more information, see 50 // [Sorting and filtering list 51 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 52 OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 53 XXX_NoUnkeyedLiteral struct{} `json:"-"` 54 XXX_unrecognized []byte `json:"-"` 55 XXX_sizecache int32 `json:"-"` 56} 57 58func (m *ListKeyRingsRequest) Reset() { *m = ListKeyRingsRequest{} } 59func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) } 60func (*ListKeyRingsRequest) ProtoMessage() {} 61func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) { 62 return fileDescriptor_723aeaeb61739a25, []int{0} 63} 64 65func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error { 66 return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b) 67} 68func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 69 return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic) 70} 71func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) { 72 xxx_messageInfo_ListKeyRingsRequest.Merge(m, src) 73} 74func (m *ListKeyRingsRequest) XXX_Size() int { 75 return xxx_messageInfo_ListKeyRingsRequest.Size(m) 76} 77func (m *ListKeyRingsRequest) XXX_DiscardUnknown() { 78 xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m) 79} 80 81var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo 82 83func (m *ListKeyRingsRequest) GetParent() string { 84 if m != nil { 85 return m.Parent 86 } 87 return "" 88} 89 90func (m *ListKeyRingsRequest) GetPageSize() int32 { 91 if m != nil { 92 return m.PageSize 93 } 94 return 0 95} 96 97func (m *ListKeyRingsRequest) GetPageToken() string { 98 if m != nil { 99 return m.PageToken 100 } 101 return "" 102} 103 104func (m *ListKeyRingsRequest) GetFilter() string { 105 if m != nil { 106 return m.Filter 107 } 108 return "" 109} 110 111func (m *ListKeyRingsRequest) GetOrderBy() string { 112 if m != nil { 113 return m.OrderBy 114 } 115 return "" 116} 117 118// Request message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 119type ListCryptoKeysRequest struct { 120 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format 121 // `projects/*/locations/*/keyRings/*`. 122 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 123 // Optional. Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] to include in the 124 // response. Further [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by 125 // including the [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] in a subsequent 126 // request. If unspecified, the server will pick an appropriate default. 127 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 128 // Optional. Optional pagination token, returned earlier via 129 // [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token]. 130 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 131 // The fields of the primary version to include in the response. 132 VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"` 133 // Optional. Only include resources that match the filter in the response. For 134 // more information, see 135 // [Sorting and filtering list 136 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 137 Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` 138 // Optional. Specify how the results should be sorted. If not specified, the 139 // results will be sorted in the default order. For more information, see 140 // [Sorting and filtering list 141 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 142 OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 143 XXX_NoUnkeyedLiteral struct{} `json:"-"` 144 XXX_unrecognized []byte `json:"-"` 145 XXX_sizecache int32 `json:"-"` 146} 147 148func (m *ListCryptoKeysRequest) Reset() { *m = ListCryptoKeysRequest{} } 149func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) } 150func (*ListCryptoKeysRequest) ProtoMessage() {} 151func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) { 152 return fileDescriptor_723aeaeb61739a25, []int{1} 153} 154 155func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error { 156 return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b) 157} 158func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 159 return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic) 160} 161func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) { 162 xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src) 163} 164func (m *ListCryptoKeysRequest) XXX_Size() int { 165 return xxx_messageInfo_ListCryptoKeysRequest.Size(m) 166} 167func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() { 168 xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m) 169} 170 171var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo 172 173func (m *ListCryptoKeysRequest) GetParent() string { 174 if m != nil { 175 return m.Parent 176 } 177 return "" 178} 179 180func (m *ListCryptoKeysRequest) GetPageSize() int32 { 181 if m != nil { 182 return m.PageSize 183 } 184 return 0 185} 186 187func (m *ListCryptoKeysRequest) GetPageToken() string { 188 if m != nil { 189 return m.PageToken 190 } 191 return "" 192} 193 194func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView { 195 if m != nil { 196 return m.VersionView 197 } 198 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 199} 200 201func (m *ListCryptoKeysRequest) GetFilter() string { 202 if m != nil { 203 return m.Filter 204 } 205 return "" 206} 207 208func (m *ListCryptoKeysRequest) GetOrderBy() string { 209 if m != nil { 210 return m.OrderBy 211 } 212 return "" 213} 214 215// Request message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 216type ListCryptoKeyVersionsRequest struct { 217 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format 218 // `projects/*/locations/*/keyRings/*/cryptoKeys/*`. 219 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 220 // Optional. Optional limit on the number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to 221 // include in the response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] can 222 // subsequently be obtained by including the 223 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] in a subsequent request. 224 // If unspecified, the server will pick an appropriate default. 225 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 226 // Optional. Optional pagination token, returned earlier via 227 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token]. 228 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 229 // The fields to include in the response. 230 View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"` 231 // Optional. Only include resources that match the filter in the response. For 232 // more information, see 233 // [Sorting and filtering list 234 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 235 Filter string `protobuf:"bytes,5,opt,name=filter,proto3" json:"filter,omitempty"` 236 // Optional. Specify how the results should be sorted. If not specified, the 237 // results will be sorted in the default order. For more information, see 238 // [Sorting and filtering list 239 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 240 OrderBy string `protobuf:"bytes,6,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 241 XXX_NoUnkeyedLiteral struct{} `json:"-"` 242 XXX_unrecognized []byte `json:"-"` 243 XXX_sizecache int32 `json:"-"` 244} 245 246func (m *ListCryptoKeyVersionsRequest) Reset() { *m = ListCryptoKeyVersionsRequest{} } 247func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) } 248func (*ListCryptoKeyVersionsRequest) ProtoMessage() {} 249func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) { 250 return fileDescriptor_723aeaeb61739a25, []int{2} 251} 252 253func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error { 254 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b) 255} 256func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 257 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic) 258} 259func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) { 260 xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src) 261} 262func (m *ListCryptoKeyVersionsRequest) XXX_Size() int { 263 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m) 264} 265func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() { 266 xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m) 267} 268 269var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo 270 271func (m *ListCryptoKeyVersionsRequest) GetParent() string { 272 if m != nil { 273 return m.Parent 274 } 275 return "" 276} 277 278func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 { 279 if m != nil { 280 return m.PageSize 281 } 282 return 0 283} 284 285func (m *ListCryptoKeyVersionsRequest) GetPageToken() string { 286 if m != nil { 287 return m.PageToken 288 } 289 return "" 290} 291 292func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView { 293 if m != nil { 294 return m.View 295 } 296 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 297} 298 299func (m *ListCryptoKeyVersionsRequest) GetFilter() string { 300 if m != nil { 301 return m.Filter 302 } 303 return "" 304} 305 306func (m *ListCryptoKeyVersionsRequest) GetOrderBy() string { 307 if m != nil { 308 return m.OrderBy 309 } 310 return "" 311} 312 313// Request message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. 314type ListImportJobsRequest struct { 315 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] to list, in the format 316 // `projects/*/locations/*/keyRings/*`. 317 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 318 // Optional. Optional limit on the number of [ImportJobs][google.cloud.kms.v1.ImportJob] to include in the 319 // response. Further [ImportJobs][google.cloud.kms.v1.ImportJob] can subsequently be obtained by 320 // including the [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token] in a subsequent 321 // request. If unspecified, the server will pick an appropriate default. 322 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 323 // Optional. Optional pagination token, returned earlier via 324 // [ListImportJobsResponse.next_page_token][google.cloud.kms.v1.ListImportJobsResponse.next_page_token]. 325 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 326 // Optional. Only include resources that match the filter in the response. For 327 // more information, see 328 // [Sorting and filtering list 329 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 330 Filter string `protobuf:"bytes,4,opt,name=filter,proto3" json:"filter,omitempty"` 331 // Optional. Specify how the results should be sorted. If not specified, the 332 // results will be sorted in the default order. For more information, see 333 // [Sorting and filtering list 334 // results](https://cloud.google.com/kms/docs/sorting-and-filtering). 335 OrderBy string `protobuf:"bytes,5,opt,name=order_by,json=orderBy,proto3" json:"order_by,omitempty"` 336 XXX_NoUnkeyedLiteral struct{} `json:"-"` 337 XXX_unrecognized []byte `json:"-"` 338 XXX_sizecache int32 `json:"-"` 339} 340 341func (m *ListImportJobsRequest) Reset() { *m = ListImportJobsRequest{} } 342func (m *ListImportJobsRequest) String() string { return proto.CompactTextString(m) } 343func (*ListImportJobsRequest) ProtoMessage() {} 344func (*ListImportJobsRequest) Descriptor() ([]byte, []int) { 345 return fileDescriptor_723aeaeb61739a25, []int{3} 346} 347 348func (m *ListImportJobsRequest) XXX_Unmarshal(b []byte) error { 349 return xxx_messageInfo_ListImportJobsRequest.Unmarshal(m, b) 350} 351func (m *ListImportJobsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 352 return xxx_messageInfo_ListImportJobsRequest.Marshal(b, m, deterministic) 353} 354func (m *ListImportJobsRequest) XXX_Merge(src proto.Message) { 355 xxx_messageInfo_ListImportJobsRequest.Merge(m, src) 356} 357func (m *ListImportJobsRequest) XXX_Size() int { 358 return xxx_messageInfo_ListImportJobsRequest.Size(m) 359} 360func (m *ListImportJobsRequest) XXX_DiscardUnknown() { 361 xxx_messageInfo_ListImportJobsRequest.DiscardUnknown(m) 362} 363 364var xxx_messageInfo_ListImportJobsRequest proto.InternalMessageInfo 365 366func (m *ListImportJobsRequest) GetParent() string { 367 if m != nil { 368 return m.Parent 369 } 370 return "" 371} 372 373func (m *ListImportJobsRequest) GetPageSize() int32 { 374 if m != nil { 375 return m.PageSize 376 } 377 return 0 378} 379 380func (m *ListImportJobsRequest) GetPageToken() string { 381 if m != nil { 382 return m.PageToken 383 } 384 return "" 385} 386 387func (m *ListImportJobsRequest) GetFilter() string { 388 if m != nil { 389 return m.Filter 390 } 391 return "" 392} 393 394func (m *ListImportJobsRequest) GetOrderBy() string { 395 if m != nil { 396 return m.OrderBy 397 } 398 return "" 399} 400 401// Response message for [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 402type ListKeyRingsResponse struct { 403 // The list of [KeyRings][google.cloud.kms.v1.KeyRing]. 404 KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"` 405 // A token to retrieve next page of results. Pass this value in 406 // [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] to retrieve the next page of results. 407 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 408 // The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched the query. 409 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 410 XXX_NoUnkeyedLiteral struct{} `json:"-"` 411 XXX_unrecognized []byte `json:"-"` 412 XXX_sizecache int32 `json:"-"` 413} 414 415func (m *ListKeyRingsResponse) Reset() { *m = ListKeyRingsResponse{} } 416func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) } 417func (*ListKeyRingsResponse) ProtoMessage() {} 418func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) { 419 return fileDescriptor_723aeaeb61739a25, []int{4} 420} 421 422func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error { 423 return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b) 424} 425func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 426 return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic) 427} 428func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) { 429 xxx_messageInfo_ListKeyRingsResponse.Merge(m, src) 430} 431func (m *ListKeyRingsResponse) XXX_Size() int { 432 return xxx_messageInfo_ListKeyRingsResponse.Size(m) 433} 434func (m *ListKeyRingsResponse) XXX_DiscardUnknown() { 435 xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m) 436} 437 438var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo 439 440func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing { 441 if m != nil { 442 return m.KeyRings 443 } 444 return nil 445} 446 447func (m *ListKeyRingsResponse) GetNextPageToken() string { 448 if m != nil { 449 return m.NextPageToken 450 } 451 return "" 452} 453 454func (m *ListKeyRingsResponse) GetTotalSize() int32 { 455 if m != nil { 456 return m.TotalSize 457 } 458 return 0 459} 460 461// Response message for [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 462type ListCryptoKeysResponse struct { 463 // The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 464 CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"` 465 // A token to retrieve next page of results. Pass this value in 466 // [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] to retrieve the next page of results. 467 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 468 // The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that matched the query. 469 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 470 XXX_NoUnkeyedLiteral struct{} `json:"-"` 471 XXX_unrecognized []byte `json:"-"` 472 XXX_sizecache int32 `json:"-"` 473} 474 475func (m *ListCryptoKeysResponse) Reset() { *m = ListCryptoKeysResponse{} } 476func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) } 477func (*ListCryptoKeysResponse) ProtoMessage() {} 478func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) { 479 return fileDescriptor_723aeaeb61739a25, []int{5} 480} 481 482func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error { 483 return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b) 484} 485func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 486 return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic) 487} 488func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) { 489 xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src) 490} 491func (m *ListCryptoKeysResponse) XXX_Size() int { 492 return xxx_messageInfo_ListCryptoKeysResponse.Size(m) 493} 494func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() { 495 xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m) 496} 497 498var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo 499 500func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey { 501 if m != nil { 502 return m.CryptoKeys 503 } 504 return nil 505} 506 507func (m *ListCryptoKeysResponse) GetNextPageToken() string { 508 if m != nil { 509 return m.NextPageToken 510 } 511 return "" 512} 513 514func (m *ListCryptoKeysResponse) GetTotalSize() int32 { 515 if m != nil { 516 return m.TotalSize 517 } 518 return 0 519} 520 521// Response message for [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 522type ListCryptoKeyVersionsResponse struct { 523 // The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 524 CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"` 525 // A token to retrieve next page of results. Pass this value in 526 // [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] to retrieve the next page of 527 // results. 528 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 529 // The total number of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the 530 // query. 531 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 532 XXX_NoUnkeyedLiteral struct{} `json:"-"` 533 XXX_unrecognized []byte `json:"-"` 534 XXX_sizecache int32 `json:"-"` 535} 536 537func (m *ListCryptoKeyVersionsResponse) Reset() { *m = ListCryptoKeyVersionsResponse{} } 538func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) } 539func (*ListCryptoKeyVersionsResponse) ProtoMessage() {} 540func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) { 541 return fileDescriptor_723aeaeb61739a25, []int{6} 542} 543 544func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error { 545 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b) 546} 547func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 548 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic) 549} 550func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) { 551 xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src) 552} 553func (m *ListCryptoKeyVersionsResponse) XXX_Size() int { 554 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m) 555} 556func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() { 557 xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m) 558} 559 560var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo 561 562func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion { 563 if m != nil { 564 return m.CryptoKeyVersions 565 } 566 return nil 567} 568 569func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string { 570 if m != nil { 571 return m.NextPageToken 572 } 573 return "" 574} 575 576func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 { 577 if m != nil { 578 return m.TotalSize 579 } 580 return 0 581} 582 583// Response message for [KeyManagementService.ListImportJobs][google.cloud.kms.v1.KeyManagementService.ListImportJobs]. 584type ListImportJobsResponse struct { 585 // The list of [ImportJobs][google.cloud.kms.v1.ImportJob]. 586 ImportJobs []*ImportJob `protobuf:"bytes,1,rep,name=import_jobs,json=importJobs,proto3" json:"import_jobs,omitempty"` 587 // A token to retrieve next page of results. Pass this value in 588 // [ListImportJobsRequest.page_token][google.cloud.kms.v1.ListImportJobsRequest.page_token] to retrieve the next page of results. 589 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 590 // The total number of [ImportJobs][google.cloud.kms.v1.ImportJob] that matched the query. 591 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 592 XXX_NoUnkeyedLiteral struct{} `json:"-"` 593 XXX_unrecognized []byte `json:"-"` 594 XXX_sizecache int32 `json:"-"` 595} 596 597func (m *ListImportJobsResponse) Reset() { *m = ListImportJobsResponse{} } 598func (m *ListImportJobsResponse) String() string { return proto.CompactTextString(m) } 599func (*ListImportJobsResponse) ProtoMessage() {} 600func (*ListImportJobsResponse) Descriptor() ([]byte, []int) { 601 return fileDescriptor_723aeaeb61739a25, []int{7} 602} 603 604func (m *ListImportJobsResponse) XXX_Unmarshal(b []byte) error { 605 return xxx_messageInfo_ListImportJobsResponse.Unmarshal(m, b) 606} 607func (m *ListImportJobsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 608 return xxx_messageInfo_ListImportJobsResponse.Marshal(b, m, deterministic) 609} 610func (m *ListImportJobsResponse) XXX_Merge(src proto.Message) { 611 xxx_messageInfo_ListImportJobsResponse.Merge(m, src) 612} 613func (m *ListImportJobsResponse) XXX_Size() int { 614 return xxx_messageInfo_ListImportJobsResponse.Size(m) 615} 616func (m *ListImportJobsResponse) XXX_DiscardUnknown() { 617 xxx_messageInfo_ListImportJobsResponse.DiscardUnknown(m) 618} 619 620var xxx_messageInfo_ListImportJobsResponse proto.InternalMessageInfo 621 622func (m *ListImportJobsResponse) GetImportJobs() []*ImportJob { 623 if m != nil { 624 return m.ImportJobs 625 } 626 return nil 627} 628 629func (m *ListImportJobsResponse) GetNextPageToken() string { 630 if m != nil { 631 return m.NextPageToken 632 } 633 return "" 634} 635 636func (m *ListImportJobsResponse) GetTotalSize() int32 { 637 if m != nil { 638 return m.TotalSize 639 } 640 return 0 641} 642 643// Request message for [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing]. 644type GetKeyRingRequest struct { 645 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] to get. 646 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 647 XXX_NoUnkeyedLiteral struct{} `json:"-"` 648 XXX_unrecognized []byte `json:"-"` 649 XXX_sizecache int32 `json:"-"` 650} 651 652func (m *GetKeyRingRequest) Reset() { *m = GetKeyRingRequest{} } 653func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) } 654func (*GetKeyRingRequest) ProtoMessage() {} 655func (*GetKeyRingRequest) Descriptor() ([]byte, []int) { 656 return fileDescriptor_723aeaeb61739a25, []int{8} 657} 658 659func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error { 660 return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b) 661} 662func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 663 return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic) 664} 665func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) { 666 xxx_messageInfo_GetKeyRingRequest.Merge(m, src) 667} 668func (m *GetKeyRingRequest) XXX_Size() int { 669 return xxx_messageInfo_GetKeyRingRequest.Size(m) 670} 671func (m *GetKeyRingRequest) XXX_DiscardUnknown() { 672 xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m) 673} 674 675var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo 676 677func (m *GetKeyRingRequest) GetName() string { 678 if m != nil { 679 return m.Name 680 } 681 return "" 682} 683 684// Request message for [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey]. 685type GetCryptoKeyRequest struct { 686 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to get. 687 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 688 XXX_NoUnkeyedLiteral struct{} `json:"-"` 689 XXX_unrecognized []byte `json:"-"` 690 XXX_sizecache int32 `json:"-"` 691} 692 693func (m *GetCryptoKeyRequest) Reset() { *m = GetCryptoKeyRequest{} } 694func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 695func (*GetCryptoKeyRequest) ProtoMessage() {} 696func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) { 697 return fileDescriptor_723aeaeb61739a25, []int{9} 698} 699 700func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 701 return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b) 702} 703func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 704 return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic) 705} 706func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) { 707 xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src) 708} 709func (m *GetCryptoKeyRequest) XXX_Size() int { 710 return xxx_messageInfo_GetCryptoKeyRequest.Size(m) 711} 712func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() { 713 xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m) 714} 715 716var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo 717 718func (m *GetCryptoKeyRequest) GetName() string { 719 if m != nil { 720 return m.Name 721 } 722 return "" 723} 724 725// Request message for [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion]. 726type GetCryptoKeyVersionRequest struct { 727 // Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get. 728 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 729 XXX_NoUnkeyedLiteral struct{} `json:"-"` 730 XXX_unrecognized []byte `json:"-"` 731 XXX_sizecache int32 `json:"-"` 732} 733 734func (m *GetCryptoKeyVersionRequest) Reset() { *m = GetCryptoKeyVersionRequest{} } 735func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 736func (*GetCryptoKeyVersionRequest) ProtoMessage() {} 737func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 738 return fileDescriptor_723aeaeb61739a25, []int{10} 739} 740 741func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 742 return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b) 743} 744func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 745 return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic) 746} 747func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 748 xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src) 749} 750func (m *GetCryptoKeyVersionRequest) XXX_Size() int { 751 return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m) 752} 753func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() { 754 xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m) 755} 756 757var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo 758 759func (m *GetCryptoKeyVersionRequest) GetName() string { 760 if m != nil { 761 return m.Name 762 } 763 return "" 764} 765 766// Request message for [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 767type GetPublicKeyRequest struct { 768 // Required. The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to 769 // get. 770 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 771 XXX_NoUnkeyedLiteral struct{} `json:"-"` 772 XXX_unrecognized []byte `json:"-"` 773 XXX_sizecache int32 `json:"-"` 774} 775 776func (m *GetPublicKeyRequest) Reset() { *m = GetPublicKeyRequest{} } 777func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) } 778func (*GetPublicKeyRequest) ProtoMessage() {} 779func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) { 780 return fileDescriptor_723aeaeb61739a25, []int{11} 781} 782 783func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error { 784 return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b) 785} 786func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 787 return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic) 788} 789func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) { 790 xxx_messageInfo_GetPublicKeyRequest.Merge(m, src) 791} 792func (m *GetPublicKeyRequest) XXX_Size() int { 793 return xxx_messageInfo_GetPublicKeyRequest.Size(m) 794} 795func (m *GetPublicKeyRequest) XXX_DiscardUnknown() { 796 xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m) 797} 798 799var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo 800 801func (m *GetPublicKeyRequest) GetName() string { 802 if m != nil { 803 return m.Name 804 } 805 return "" 806} 807 808// Request message for [KeyManagementService.GetImportJob][google.cloud.kms.v1.KeyManagementService.GetImportJob]. 809type GetImportJobRequest struct { 810 // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] to get. 811 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 812 XXX_NoUnkeyedLiteral struct{} `json:"-"` 813 XXX_unrecognized []byte `json:"-"` 814 XXX_sizecache int32 `json:"-"` 815} 816 817func (m *GetImportJobRequest) Reset() { *m = GetImportJobRequest{} } 818func (m *GetImportJobRequest) String() string { return proto.CompactTextString(m) } 819func (*GetImportJobRequest) ProtoMessage() {} 820func (*GetImportJobRequest) Descriptor() ([]byte, []int) { 821 return fileDescriptor_723aeaeb61739a25, []int{12} 822} 823 824func (m *GetImportJobRequest) XXX_Unmarshal(b []byte) error { 825 return xxx_messageInfo_GetImportJobRequest.Unmarshal(m, b) 826} 827func (m *GetImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 828 return xxx_messageInfo_GetImportJobRequest.Marshal(b, m, deterministic) 829} 830func (m *GetImportJobRequest) XXX_Merge(src proto.Message) { 831 xxx_messageInfo_GetImportJobRequest.Merge(m, src) 832} 833func (m *GetImportJobRequest) XXX_Size() int { 834 return xxx_messageInfo_GetImportJobRequest.Size(m) 835} 836func (m *GetImportJobRequest) XXX_DiscardUnknown() { 837 xxx_messageInfo_GetImportJobRequest.DiscardUnknown(m) 838} 839 840var xxx_messageInfo_GetImportJobRequest proto.InternalMessageInfo 841 842func (m *GetImportJobRequest) GetName() string { 843 if m != nil { 844 return m.Name 845 } 846 return "" 847} 848 849// Request message for [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing]. 850type CreateKeyRingRequest struct { 851 // Required. The resource name of the location associated with the 852 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format `projects/*/locations/*`. 853 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 854 // Required. It must be unique within a location and match the regular 855 // expression `[a-zA-Z0-9_-]{1,63}` 856 KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"` 857 // Required. A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values. 858 KeyRing *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"` 859 XXX_NoUnkeyedLiteral struct{} `json:"-"` 860 XXX_unrecognized []byte `json:"-"` 861 XXX_sizecache int32 `json:"-"` 862} 863 864func (m *CreateKeyRingRequest) Reset() { *m = CreateKeyRingRequest{} } 865func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) } 866func (*CreateKeyRingRequest) ProtoMessage() {} 867func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) { 868 return fileDescriptor_723aeaeb61739a25, []int{13} 869} 870 871func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error { 872 return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b) 873} 874func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 875 return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic) 876} 877func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) { 878 xxx_messageInfo_CreateKeyRingRequest.Merge(m, src) 879} 880func (m *CreateKeyRingRequest) XXX_Size() int { 881 return xxx_messageInfo_CreateKeyRingRequest.Size(m) 882} 883func (m *CreateKeyRingRequest) XXX_DiscardUnknown() { 884 xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m) 885} 886 887var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo 888 889func (m *CreateKeyRingRequest) GetParent() string { 890 if m != nil { 891 return m.Parent 892 } 893 return "" 894} 895 896func (m *CreateKeyRingRequest) GetKeyRingId() string { 897 if m != nil { 898 return m.KeyRingId 899 } 900 return "" 901} 902 903func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing { 904 if m != nil { 905 return m.KeyRing 906 } 907 return nil 908} 909 910// Request message for [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey]. 911type CreateCryptoKeyRequest struct { 912 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing associated with the 913 // [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 914 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 915 // Required. It must be unique within a KeyRing and match the regular 916 // expression `[a-zA-Z0-9_-]{1,63}` 917 CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"` 918 // Required. A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values. 919 CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 920 // If set to true, the request will create a [CryptoKey][google.cloud.kms.v1.CryptoKey] without any 921 // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. You must manually call 922 // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or 923 // [ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion] 924 // before you can use this [CryptoKey][google.cloud.kms.v1.CryptoKey]. 925 SkipInitialVersionCreation bool `protobuf:"varint,5,opt,name=skip_initial_version_creation,json=skipInitialVersionCreation,proto3" json:"skip_initial_version_creation,omitempty"` 926 XXX_NoUnkeyedLiteral struct{} `json:"-"` 927 XXX_unrecognized []byte `json:"-"` 928 XXX_sizecache int32 `json:"-"` 929} 930 931func (m *CreateCryptoKeyRequest) Reset() { *m = CreateCryptoKeyRequest{} } 932func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 933func (*CreateCryptoKeyRequest) ProtoMessage() {} 934func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) { 935 return fileDescriptor_723aeaeb61739a25, []int{14} 936} 937 938func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 939 return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b) 940} 941func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 942 return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic) 943} 944func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) { 945 xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src) 946} 947func (m *CreateCryptoKeyRequest) XXX_Size() int { 948 return xxx_messageInfo_CreateCryptoKeyRequest.Size(m) 949} 950func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() { 951 xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m) 952} 953 954var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo 955 956func (m *CreateCryptoKeyRequest) GetParent() string { 957 if m != nil { 958 return m.Parent 959 } 960 return "" 961} 962 963func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string { 964 if m != nil { 965 return m.CryptoKeyId 966 } 967 return "" 968} 969 970func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 971 if m != nil { 972 return m.CryptoKey 973 } 974 return nil 975} 976 977func (m *CreateCryptoKeyRequest) GetSkipInitialVersionCreation() bool { 978 if m != nil { 979 return m.SkipInitialVersionCreation 980 } 981 return false 982} 983 984// Request message for [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion]. 985type CreateCryptoKeyVersionRequest struct { 986 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with 987 // the [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 988 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 989 // Required. A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial field values. 990 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 991 XXX_NoUnkeyedLiteral struct{} `json:"-"` 992 XXX_unrecognized []byte `json:"-"` 993 XXX_sizecache int32 `json:"-"` 994} 995 996func (m *CreateCryptoKeyVersionRequest) Reset() { *m = CreateCryptoKeyVersionRequest{} } 997func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 998func (*CreateCryptoKeyVersionRequest) ProtoMessage() {} 999func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1000 return fileDescriptor_723aeaeb61739a25, []int{15} 1001} 1002 1003func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1004 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b) 1005} 1006func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1007 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1008} 1009func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1010 xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src) 1011} 1012func (m *CreateCryptoKeyVersionRequest) XXX_Size() int { 1013 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m) 1014} 1015func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1016 xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m) 1017} 1018 1019var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo 1020 1021func (m *CreateCryptoKeyVersionRequest) GetParent() string { 1022 if m != nil { 1023 return m.Parent 1024 } 1025 return "" 1026} 1027 1028func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 1029 if m != nil { 1030 return m.CryptoKeyVersion 1031 } 1032 return nil 1033} 1034 1035// Request message for [KeyManagementService.ImportCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.ImportCryptoKeyVersion]. 1036type ImportCryptoKeyVersionRequest struct { 1037 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to 1038 // be imported into. 1039 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 1040 // Required. The [algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] of 1041 // the key being imported. This does not need to match the 1042 // [version_template][google.cloud.kms.v1.CryptoKey.version_template] of the [CryptoKey][google.cloud.kms.v1.CryptoKey] this 1043 // version imports into. 1044 Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` 1045 // Required. The [name][google.cloud.kms.v1.ImportJob.name] of the [ImportJob][google.cloud.kms.v1.ImportJob] that was used to 1046 // wrap this key material. 1047 ImportJob string `protobuf:"bytes,4,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` 1048 // Required. The incoming wrapped key material that is to be imported. 1049 // 1050 // Types that are valid to be assigned to WrappedKeyMaterial: 1051 // *ImportCryptoKeyVersionRequest_RsaAesWrappedKey 1052 WrappedKeyMaterial isImportCryptoKeyVersionRequest_WrappedKeyMaterial `protobuf_oneof:"wrapped_key_material"` 1053 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1054 XXX_unrecognized []byte `json:"-"` 1055 XXX_sizecache int32 `json:"-"` 1056} 1057 1058func (m *ImportCryptoKeyVersionRequest) Reset() { *m = ImportCryptoKeyVersionRequest{} } 1059func (m *ImportCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1060func (*ImportCryptoKeyVersionRequest) ProtoMessage() {} 1061func (*ImportCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1062 return fileDescriptor_723aeaeb61739a25, []int{16} 1063} 1064 1065func (m *ImportCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1066 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Unmarshal(m, b) 1067} 1068func (m *ImportCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1069 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1070} 1071func (m *ImportCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1072 xxx_messageInfo_ImportCryptoKeyVersionRequest.Merge(m, src) 1073} 1074func (m *ImportCryptoKeyVersionRequest) XXX_Size() int { 1075 return xxx_messageInfo_ImportCryptoKeyVersionRequest.Size(m) 1076} 1077func (m *ImportCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1078 xxx_messageInfo_ImportCryptoKeyVersionRequest.DiscardUnknown(m) 1079} 1080 1081var xxx_messageInfo_ImportCryptoKeyVersionRequest proto.InternalMessageInfo 1082 1083func (m *ImportCryptoKeyVersionRequest) GetParent() string { 1084 if m != nil { 1085 return m.Parent 1086 } 1087 return "" 1088} 1089 1090func (m *ImportCryptoKeyVersionRequest) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { 1091 if m != nil { 1092 return m.Algorithm 1093 } 1094 return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED 1095} 1096 1097func (m *ImportCryptoKeyVersionRequest) GetImportJob() string { 1098 if m != nil { 1099 return m.ImportJob 1100 } 1101 return "" 1102} 1103 1104type isImportCryptoKeyVersionRequest_WrappedKeyMaterial interface { 1105 isImportCryptoKeyVersionRequest_WrappedKeyMaterial() 1106} 1107 1108type ImportCryptoKeyVersionRequest_RsaAesWrappedKey struct { 1109 RsaAesWrappedKey []byte `protobuf:"bytes,5,opt,name=rsa_aes_wrapped_key,json=rsaAesWrappedKey,proto3,oneof"` 1110} 1111 1112func (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey) isImportCryptoKeyVersionRequest_WrappedKeyMaterial() { 1113} 1114 1115func (m *ImportCryptoKeyVersionRequest) GetWrappedKeyMaterial() isImportCryptoKeyVersionRequest_WrappedKeyMaterial { 1116 if m != nil { 1117 return m.WrappedKeyMaterial 1118 } 1119 return nil 1120} 1121 1122func (m *ImportCryptoKeyVersionRequest) GetRsaAesWrappedKey() []byte { 1123 if x, ok := m.GetWrappedKeyMaterial().(*ImportCryptoKeyVersionRequest_RsaAesWrappedKey); ok { 1124 return x.RsaAesWrappedKey 1125 } 1126 return nil 1127} 1128 1129// XXX_OneofWrappers is for the internal use of the proto package. 1130func (*ImportCryptoKeyVersionRequest) XXX_OneofWrappers() []interface{} { 1131 return []interface{}{ 1132 (*ImportCryptoKeyVersionRequest_RsaAesWrappedKey)(nil), 1133 } 1134} 1135 1136// Request message for [KeyManagementService.CreateImportJob][google.cloud.kms.v1.KeyManagementService.CreateImportJob]. 1137type CreateImportJobRequest struct { 1138 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the [KeyRing][google.cloud.kms.v1.KeyRing] associated with the 1139 // [ImportJobs][google.cloud.kms.v1.ImportJob]. 1140 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 1141 // Required. It must be unique within a KeyRing and match the regular 1142 // expression `[a-zA-Z0-9_-]{1,63}` 1143 ImportJobId string `protobuf:"bytes,2,opt,name=import_job_id,json=importJobId,proto3" json:"import_job_id,omitempty"` 1144 // Required. An [ImportJob][google.cloud.kms.v1.ImportJob] with initial field values. 1145 ImportJob *ImportJob `protobuf:"bytes,3,opt,name=import_job,json=importJob,proto3" json:"import_job,omitempty"` 1146 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1147 XXX_unrecognized []byte `json:"-"` 1148 XXX_sizecache int32 `json:"-"` 1149} 1150 1151func (m *CreateImportJobRequest) Reset() { *m = CreateImportJobRequest{} } 1152func (m *CreateImportJobRequest) String() string { return proto.CompactTextString(m) } 1153func (*CreateImportJobRequest) ProtoMessage() {} 1154func (*CreateImportJobRequest) Descriptor() ([]byte, []int) { 1155 return fileDescriptor_723aeaeb61739a25, []int{17} 1156} 1157 1158func (m *CreateImportJobRequest) XXX_Unmarshal(b []byte) error { 1159 return xxx_messageInfo_CreateImportJobRequest.Unmarshal(m, b) 1160} 1161func (m *CreateImportJobRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1162 return xxx_messageInfo_CreateImportJobRequest.Marshal(b, m, deterministic) 1163} 1164func (m *CreateImportJobRequest) XXX_Merge(src proto.Message) { 1165 xxx_messageInfo_CreateImportJobRequest.Merge(m, src) 1166} 1167func (m *CreateImportJobRequest) XXX_Size() int { 1168 return xxx_messageInfo_CreateImportJobRequest.Size(m) 1169} 1170func (m *CreateImportJobRequest) XXX_DiscardUnknown() { 1171 xxx_messageInfo_CreateImportJobRequest.DiscardUnknown(m) 1172} 1173 1174var xxx_messageInfo_CreateImportJobRequest proto.InternalMessageInfo 1175 1176func (m *CreateImportJobRequest) GetParent() string { 1177 if m != nil { 1178 return m.Parent 1179 } 1180 return "" 1181} 1182 1183func (m *CreateImportJobRequest) GetImportJobId() string { 1184 if m != nil { 1185 return m.ImportJobId 1186 } 1187 return "" 1188} 1189 1190func (m *CreateImportJobRequest) GetImportJob() *ImportJob { 1191 if m != nil { 1192 return m.ImportJob 1193 } 1194 return nil 1195} 1196 1197// Request message for [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey]. 1198type UpdateCryptoKeyRequest struct { 1199 // Required. [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values. 1200 CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 1201 // Required. List of fields to be updated in this request. 1202 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 1203 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1204 XXX_unrecognized []byte `json:"-"` 1205 XXX_sizecache int32 `json:"-"` 1206} 1207 1208func (m *UpdateCryptoKeyRequest) Reset() { *m = UpdateCryptoKeyRequest{} } 1209func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 1210func (*UpdateCryptoKeyRequest) ProtoMessage() {} 1211func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) { 1212 return fileDescriptor_723aeaeb61739a25, []int{18} 1213} 1214 1215func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 1216 return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b) 1217} 1218func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1219 return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic) 1220} 1221func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) { 1222 xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src) 1223} 1224func (m *UpdateCryptoKeyRequest) XXX_Size() int { 1225 return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m) 1226} 1227func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() { 1228 xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m) 1229} 1230 1231var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo 1232 1233func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 1234 if m != nil { 1235 return m.CryptoKey 1236 } 1237 return nil 1238} 1239 1240func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask { 1241 if m != nil { 1242 return m.UpdateMask 1243 } 1244 return nil 1245} 1246 1247// Request message for [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion]. 1248type UpdateCryptoKeyVersionRequest struct { 1249 // Required. [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated values. 1250 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 1251 // Required. List of fields to be updated in this request. 1252 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 1253 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1254 XXX_unrecognized []byte `json:"-"` 1255 XXX_sizecache int32 `json:"-"` 1256} 1257 1258func (m *UpdateCryptoKeyVersionRequest) Reset() { *m = UpdateCryptoKeyVersionRequest{} } 1259func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1260func (*UpdateCryptoKeyVersionRequest) ProtoMessage() {} 1261func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1262 return fileDescriptor_723aeaeb61739a25, []int{19} 1263} 1264 1265func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1266 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b) 1267} 1268func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1269 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1270} 1271func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1272 xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src) 1273} 1274func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int { 1275 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m) 1276} 1277func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1278 xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m) 1279} 1280 1281var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo 1282 1283func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 1284 if m != nil { 1285 return m.CryptoKeyVersion 1286 } 1287 return nil 1288} 1289 1290func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask { 1291 if m != nil { 1292 return m.UpdateMask 1293 } 1294 return nil 1295} 1296 1297// Request message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1298type EncryptRequest struct { 1299 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] or [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1300 // to use for encryption. 1301 // 1302 // If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server will use its 1303 // [primary version][google.cloud.kms.v1.CryptoKey.primary]. 1304 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1305 // Required. The data to encrypt. Must be no larger than 64KiB. 1306 // 1307 // The maximum size depends on the key version's 1308 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For 1309 // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the plaintext must be no larger 1310 // than 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the 1311 // plaintext and additional_authenticated_data fields must be no larger than 1312 // 8KiB. 1313 Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1314 // Optional. Optional data that, if specified, must also be provided during decryption 1315 // through [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data]. 1316 // 1317 // The maximum size depends on the key version's 1318 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. For 1319 // [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD must be no larger than 1320 // 64KiB. For [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of the 1321 // plaintext and additional_authenticated_data fields must be no larger than 1322 // 8KiB. 1323 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 1324 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1325 XXX_unrecognized []byte `json:"-"` 1326 XXX_sizecache int32 `json:"-"` 1327} 1328 1329func (m *EncryptRequest) Reset() { *m = EncryptRequest{} } 1330func (m *EncryptRequest) String() string { return proto.CompactTextString(m) } 1331func (*EncryptRequest) ProtoMessage() {} 1332func (*EncryptRequest) Descriptor() ([]byte, []int) { 1333 return fileDescriptor_723aeaeb61739a25, []int{20} 1334} 1335 1336func (m *EncryptRequest) XXX_Unmarshal(b []byte) error { 1337 return xxx_messageInfo_EncryptRequest.Unmarshal(m, b) 1338} 1339func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1340 return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic) 1341} 1342func (m *EncryptRequest) XXX_Merge(src proto.Message) { 1343 xxx_messageInfo_EncryptRequest.Merge(m, src) 1344} 1345func (m *EncryptRequest) XXX_Size() int { 1346 return xxx_messageInfo_EncryptRequest.Size(m) 1347} 1348func (m *EncryptRequest) XXX_DiscardUnknown() { 1349 xxx_messageInfo_EncryptRequest.DiscardUnknown(m) 1350} 1351 1352var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo 1353 1354func (m *EncryptRequest) GetName() string { 1355 if m != nil { 1356 return m.Name 1357 } 1358 return "" 1359} 1360 1361func (m *EncryptRequest) GetPlaintext() []byte { 1362 if m != nil { 1363 return m.Plaintext 1364 } 1365 return nil 1366} 1367 1368func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte { 1369 if m != nil { 1370 return m.AdditionalAuthenticatedData 1371 } 1372 return nil 1373} 1374 1375// Request message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1376type DecryptRequest struct { 1377 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption. 1378 // The server will choose the appropriate version. 1379 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1380 // Required. The encrypted data originally returned in 1381 // [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext]. 1382 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1383 // Optional. Optional data that must match the data originally supplied in 1384 // [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data]. 1385 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 1386 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1387 XXX_unrecognized []byte `json:"-"` 1388 XXX_sizecache int32 `json:"-"` 1389} 1390 1391func (m *DecryptRequest) Reset() { *m = DecryptRequest{} } 1392func (m *DecryptRequest) String() string { return proto.CompactTextString(m) } 1393func (*DecryptRequest) ProtoMessage() {} 1394func (*DecryptRequest) Descriptor() ([]byte, []int) { 1395 return fileDescriptor_723aeaeb61739a25, []int{21} 1396} 1397 1398func (m *DecryptRequest) XXX_Unmarshal(b []byte) error { 1399 return xxx_messageInfo_DecryptRequest.Unmarshal(m, b) 1400} 1401func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1402 return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic) 1403} 1404func (m *DecryptRequest) XXX_Merge(src proto.Message) { 1405 xxx_messageInfo_DecryptRequest.Merge(m, src) 1406} 1407func (m *DecryptRequest) XXX_Size() int { 1408 return xxx_messageInfo_DecryptRequest.Size(m) 1409} 1410func (m *DecryptRequest) XXX_DiscardUnknown() { 1411 xxx_messageInfo_DecryptRequest.DiscardUnknown(m) 1412} 1413 1414var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo 1415 1416func (m *DecryptRequest) GetName() string { 1417 if m != nil { 1418 return m.Name 1419 } 1420 return "" 1421} 1422 1423func (m *DecryptRequest) GetCiphertext() []byte { 1424 if m != nil { 1425 return m.Ciphertext 1426 } 1427 return nil 1428} 1429 1430func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte { 1431 if m != nil { 1432 return m.AdditionalAuthenticatedData 1433 } 1434 return nil 1435} 1436 1437// Request message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1438type AsymmetricSignRequest struct { 1439 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing. 1440 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1441 // Required. The digest of the data to sign. The digest must be produced with 1442 // the same digest algorithm as specified by the key version's 1443 // [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. 1444 Digest *Digest `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"` 1445 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1446 XXX_unrecognized []byte `json:"-"` 1447 XXX_sizecache int32 `json:"-"` 1448} 1449 1450func (m *AsymmetricSignRequest) Reset() { *m = AsymmetricSignRequest{} } 1451func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) } 1452func (*AsymmetricSignRequest) ProtoMessage() {} 1453func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) { 1454 return fileDescriptor_723aeaeb61739a25, []int{22} 1455} 1456 1457func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error { 1458 return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b) 1459} 1460func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1461 return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic) 1462} 1463func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) { 1464 xxx_messageInfo_AsymmetricSignRequest.Merge(m, src) 1465} 1466func (m *AsymmetricSignRequest) XXX_Size() int { 1467 return xxx_messageInfo_AsymmetricSignRequest.Size(m) 1468} 1469func (m *AsymmetricSignRequest) XXX_DiscardUnknown() { 1470 xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m) 1471} 1472 1473var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo 1474 1475func (m *AsymmetricSignRequest) GetName() string { 1476 if m != nil { 1477 return m.Name 1478 } 1479 return "" 1480} 1481 1482func (m *AsymmetricSignRequest) GetDigest() *Digest { 1483 if m != nil { 1484 return m.Digest 1485 } 1486 return nil 1487} 1488 1489// Request message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1490type AsymmetricDecryptRequest struct { 1491 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for 1492 // decryption. 1493 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1494 // Required. The data encrypted with the named [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public 1495 // key using OAEP. 1496 Ciphertext []byte `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1497 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1498 XXX_unrecognized []byte `json:"-"` 1499 XXX_sizecache int32 `json:"-"` 1500} 1501 1502func (m *AsymmetricDecryptRequest) Reset() { *m = AsymmetricDecryptRequest{} } 1503func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) } 1504func (*AsymmetricDecryptRequest) ProtoMessage() {} 1505func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) { 1506 return fileDescriptor_723aeaeb61739a25, []int{23} 1507} 1508 1509func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error { 1510 return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b) 1511} 1512func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1513 return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic) 1514} 1515func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) { 1516 xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src) 1517} 1518func (m *AsymmetricDecryptRequest) XXX_Size() int { 1519 return xxx_messageInfo_AsymmetricDecryptRequest.Size(m) 1520} 1521func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() { 1522 xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m) 1523} 1524 1525var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo 1526 1527func (m *AsymmetricDecryptRequest) GetName() string { 1528 if m != nil { 1529 return m.Name 1530 } 1531 return "" 1532} 1533 1534func (m *AsymmetricDecryptRequest) GetCiphertext() []byte { 1535 if m != nil { 1536 return m.Ciphertext 1537 } 1538 return nil 1539} 1540 1541// Response message for [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1542type DecryptResponse struct { 1543 // The decrypted data originally supplied in [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext]. 1544 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1545 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1546 XXX_unrecognized []byte `json:"-"` 1547 XXX_sizecache int32 `json:"-"` 1548} 1549 1550func (m *DecryptResponse) Reset() { *m = DecryptResponse{} } 1551func (m *DecryptResponse) String() string { return proto.CompactTextString(m) } 1552func (*DecryptResponse) ProtoMessage() {} 1553func (*DecryptResponse) Descriptor() ([]byte, []int) { 1554 return fileDescriptor_723aeaeb61739a25, []int{24} 1555} 1556 1557func (m *DecryptResponse) XXX_Unmarshal(b []byte) error { 1558 return xxx_messageInfo_DecryptResponse.Unmarshal(m, b) 1559} 1560func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1561 return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic) 1562} 1563func (m *DecryptResponse) XXX_Merge(src proto.Message) { 1564 xxx_messageInfo_DecryptResponse.Merge(m, src) 1565} 1566func (m *DecryptResponse) XXX_Size() int { 1567 return xxx_messageInfo_DecryptResponse.Size(m) 1568} 1569func (m *DecryptResponse) XXX_DiscardUnknown() { 1570 xxx_messageInfo_DecryptResponse.DiscardUnknown(m) 1571} 1572 1573var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo 1574 1575func (m *DecryptResponse) GetPlaintext() []byte { 1576 if m != nil { 1577 return m.Plaintext 1578 } 1579 return nil 1580} 1581 1582// Response message for [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1583type EncryptResponse struct { 1584 // The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in encryption. Check 1585 // this field to verify that the intended resource was used for encryption. 1586 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1587 // The encrypted data. 1588 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1589 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1590 XXX_unrecognized []byte `json:"-"` 1591 XXX_sizecache int32 `json:"-"` 1592} 1593 1594func (m *EncryptResponse) Reset() { *m = EncryptResponse{} } 1595func (m *EncryptResponse) String() string { return proto.CompactTextString(m) } 1596func (*EncryptResponse) ProtoMessage() {} 1597func (*EncryptResponse) Descriptor() ([]byte, []int) { 1598 return fileDescriptor_723aeaeb61739a25, []int{25} 1599} 1600 1601func (m *EncryptResponse) XXX_Unmarshal(b []byte) error { 1602 return xxx_messageInfo_EncryptResponse.Unmarshal(m, b) 1603} 1604func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1605 return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic) 1606} 1607func (m *EncryptResponse) XXX_Merge(src proto.Message) { 1608 xxx_messageInfo_EncryptResponse.Merge(m, src) 1609} 1610func (m *EncryptResponse) XXX_Size() int { 1611 return xxx_messageInfo_EncryptResponse.Size(m) 1612} 1613func (m *EncryptResponse) XXX_DiscardUnknown() { 1614 xxx_messageInfo_EncryptResponse.DiscardUnknown(m) 1615} 1616 1617var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo 1618 1619func (m *EncryptResponse) GetName() string { 1620 if m != nil { 1621 return m.Name 1622 } 1623 return "" 1624} 1625 1626func (m *EncryptResponse) GetCiphertext() []byte { 1627 if m != nil { 1628 return m.Ciphertext 1629 } 1630 return nil 1631} 1632 1633// Response message for [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1634type AsymmetricSignResponse struct { 1635 // The created signature. 1636 Signature []byte `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"` 1637 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1638 XXX_unrecognized []byte `json:"-"` 1639 XXX_sizecache int32 `json:"-"` 1640} 1641 1642func (m *AsymmetricSignResponse) Reset() { *m = AsymmetricSignResponse{} } 1643func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) } 1644func (*AsymmetricSignResponse) ProtoMessage() {} 1645func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) { 1646 return fileDescriptor_723aeaeb61739a25, []int{26} 1647} 1648 1649func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error { 1650 return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b) 1651} 1652func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1653 return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic) 1654} 1655func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) { 1656 xxx_messageInfo_AsymmetricSignResponse.Merge(m, src) 1657} 1658func (m *AsymmetricSignResponse) XXX_Size() int { 1659 return xxx_messageInfo_AsymmetricSignResponse.Size(m) 1660} 1661func (m *AsymmetricSignResponse) XXX_DiscardUnknown() { 1662 xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m) 1663} 1664 1665var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo 1666 1667func (m *AsymmetricSignResponse) GetSignature() []byte { 1668 if m != nil { 1669 return m.Signature 1670 } 1671 return nil 1672} 1673 1674// Response message for [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1675type AsymmetricDecryptResponse struct { 1676 // The decrypted data originally encrypted with the matching public key. 1677 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1678 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1679 XXX_unrecognized []byte `json:"-"` 1680 XXX_sizecache int32 `json:"-"` 1681} 1682 1683func (m *AsymmetricDecryptResponse) Reset() { *m = AsymmetricDecryptResponse{} } 1684func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) } 1685func (*AsymmetricDecryptResponse) ProtoMessage() {} 1686func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) { 1687 return fileDescriptor_723aeaeb61739a25, []int{27} 1688} 1689 1690func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error { 1691 return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b) 1692} 1693func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1694 return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic) 1695} 1696func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) { 1697 xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src) 1698} 1699func (m *AsymmetricDecryptResponse) XXX_Size() int { 1700 return xxx_messageInfo_AsymmetricDecryptResponse.Size(m) 1701} 1702func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() { 1703 xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m) 1704} 1705 1706var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo 1707 1708func (m *AsymmetricDecryptResponse) GetPlaintext() []byte { 1709 if m != nil { 1710 return m.Plaintext 1711 } 1712 return nil 1713} 1714 1715// Request message for [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. 1716type UpdateCryptoKeyPrimaryVersionRequest struct { 1717 // Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to update. 1718 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1719 // Required. The id of the child [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary. 1720 CryptoKeyVersionId string `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"` 1721 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1722 XXX_unrecognized []byte `json:"-"` 1723 XXX_sizecache int32 `json:"-"` 1724} 1725 1726func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset() { *m = UpdateCryptoKeyPrimaryVersionRequest{} } 1727func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) } 1728func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage() {} 1729func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) { 1730 return fileDescriptor_723aeaeb61739a25, []int{28} 1731} 1732 1733func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error { 1734 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b) 1735} 1736func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1737 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic) 1738} 1739func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) { 1740 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src) 1741} 1742func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int { 1743 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m) 1744} 1745func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() { 1746 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m) 1747} 1748 1749var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo 1750 1751func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string { 1752 if m != nil { 1753 return m.Name 1754 } 1755 return "" 1756} 1757 1758func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string { 1759 if m != nil { 1760 return m.CryptoKeyVersionId 1761 } 1762 return "" 1763} 1764 1765// Request message for [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]. 1766type DestroyCryptoKeyVersionRequest struct { 1767 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy. 1768 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1769 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1770 XXX_unrecognized []byte `json:"-"` 1771 XXX_sizecache int32 `json:"-"` 1772} 1773 1774func (m *DestroyCryptoKeyVersionRequest) Reset() { *m = DestroyCryptoKeyVersionRequest{} } 1775func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1776func (*DestroyCryptoKeyVersionRequest) ProtoMessage() {} 1777func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1778 return fileDescriptor_723aeaeb61739a25, []int{29} 1779} 1780 1781func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1782 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b) 1783} 1784func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1785 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1786} 1787func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1788 xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src) 1789} 1790func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int { 1791 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m) 1792} 1793func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1794 xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m) 1795} 1796 1797var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo 1798 1799func (m *DestroyCryptoKeyVersionRequest) GetName() string { 1800 if m != nil { 1801 return m.Name 1802 } 1803 return "" 1804} 1805 1806// Request message for [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]. 1807type RestoreCryptoKeyVersionRequest struct { 1808 // Required. The resource name of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore. 1809 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1810 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1811 XXX_unrecognized []byte `json:"-"` 1812 XXX_sizecache int32 `json:"-"` 1813} 1814 1815func (m *RestoreCryptoKeyVersionRequest) Reset() { *m = RestoreCryptoKeyVersionRequest{} } 1816func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1817func (*RestoreCryptoKeyVersionRequest) ProtoMessage() {} 1818func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1819 return fileDescriptor_723aeaeb61739a25, []int{30} 1820} 1821 1822func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1823 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b) 1824} 1825func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1826 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1827} 1828func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1829 xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src) 1830} 1831func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int { 1832 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m) 1833} 1834func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1835 xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m) 1836} 1837 1838var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo 1839 1840func (m *RestoreCryptoKeyVersionRequest) GetName() string { 1841 if m != nil { 1842 return m.Name 1843 } 1844 return "" 1845} 1846 1847// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest. 1848type Digest struct { 1849 // Required. The message digest. 1850 // 1851 // Types that are valid to be assigned to Digest: 1852 // *Digest_Sha256 1853 // *Digest_Sha384 1854 // *Digest_Sha512 1855 Digest isDigest_Digest `protobuf_oneof:"digest"` 1856 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1857 XXX_unrecognized []byte `json:"-"` 1858 XXX_sizecache int32 `json:"-"` 1859} 1860 1861func (m *Digest) Reset() { *m = Digest{} } 1862func (m *Digest) String() string { return proto.CompactTextString(m) } 1863func (*Digest) ProtoMessage() {} 1864func (*Digest) Descriptor() ([]byte, []int) { 1865 return fileDescriptor_723aeaeb61739a25, []int{31} 1866} 1867 1868func (m *Digest) XXX_Unmarshal(b []byte) error { 1869 return xxx_messageInfo_Digest.Unmarshal(m, b) 1870} 1871func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1872 return xxx_messageInfo_Digest.Marshal(b, m, deterministic) 1873} 1874func (m *Digest) XXX_Merge(src proto.Message) { 1875 xxx_messageInfo_Digest.Merge(m, src) 1876} 1877func (m *Digest) XXX_Size() int { 1878 return xxx_messageInfo_Digest.Size(m) 1879} 1880func (m *Digest) XXX_DiscardUnknown() { 1881 xxx_messageInfo_Digest.DiscardUnknown(m) 1882} 1883 1884var xxx_messageInfo_Digest proto.InternalMessageInfo 1885 1886type isDigest_Digest interface { 1887 isDigest_Digest() 1888} 1889 1890type Digest_Sha256 struct { 1891 Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"` 1892} 1893 1894type Digest_Sha384 struct { 1895 Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"` 1896} 1897 1898type Digest_Sha512 struct { 1899 Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"` 1900} 1901 1902func (*Digest_Sha256) isDigest_Digest() {} 1903 1904func (*Digest_Sha384) isDigest_Digest() {} 1905 1906func (*Digest_Sha512) isDigest_Digest() {} 1907 1908func (m *Digest) GetDigest() isDigest_Digest { 1909 if m != nil { 1910 return m.Digest 1911 } 1912 return nil 1913} 1914 1915func (m *Digest) GetSha256() []byte { 1916 if x, ok := m.GetDigest().(*Digest_Sha256); ok { 1917 return x.Sha256 1918 } 1919 return nil 1920} 1921 1922func (m *Digest) GetSha384() []byte { 1923 if x, ok := m.GetDigest().(*Digest_Sha384); ok { 1924 return x.Sha384 1925 } 1926 return nil 1927} 1928 1929func (m *Digest) GetSha512() []byte { 1930 if x, ok := m.GetDigest().(*Digest_Sha512); ok { 1931 return x.Sha512 1932 } 1933 return nil 1934} 1935 1936// XXX_OneofWrappers is for the internal use of the proto package. 1937func (*Digest) XXX_OneofWrappers() []interface{} { 1938 return []interface{}{ 1939 (*Digest_Sha256)(nil), 1940 (*Digest_Sha384)(nil), 1941 (*Digest_Sha512)(nil), 1942 } 1943} 1944 1945// Cloud KMS metadata for the given [google.cloud.location.Location][google.cloud.location.Location]. 1946type LocationMetadata struct { 1947 // Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with 1948 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] 1949 // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this location. 1950 HsmAvailable bool `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"` 1951 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1952 XXX_unrecognized []byte `json:"-"` 1953 XXX_sizecache int32 `json:"-"` 1954} 1955 1956func (m *LocationMetadata) Reset() { *m = LocationMetadata{} } 1957func (m *LocationMetadata) String() string { return proto.CompactTextString(m) } 1958func (*LocationMetadata) ProtoMessage() {} 1959func (*LocationMetadata) Descriptor() ([]byte, []int) { 1960 return fileDescriptor_723aeaeb61739a25, []int{32} 1961} 1962 1963func (m *LocationMetadata) XXX_Unmarshal(b []byte) error { 1964 return xxx_messageInfo_LocationMetadata.Unmarshal(m, b) 1965} 1966func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1967 return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic) 1968} 1969func (m *LocationMetadata) XXX_Merge(src proto.Message) { 1970 xxx_messageInfo_LocationMetadata.Merge(m, src) 1971} 1972func (m *LocationMetadata) XXX_Size() int { 1973 return xxx_messageInfo_LocationMetadata.Size(m) 1974} 1975func (m *LocationMetadata) XXX_DiscardUnknown() { 1976 xxx_messageInfo_LocationMetadata.DiscardUnknown(m) 1977} 1978 1979var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo 1980 1981func (m *LocationMetadata) GetHsmAvailable() bool { 1982 if m != nil { 1983 return m.HsmAvailable 1984 } 1985 return false 1986} 1987 1988func init() { 1989 proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest") 1990 proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest") 1991 proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest") 1992 proto.RegisterType((*ListImportJobsRequest)(nil), "google.cloud.kms.v1.ListImportJobsRequest") 1993 proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse") 1994 proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse") 1995 proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse") 1996 proto.RegisterType((*ListImportJobsResponse)(nil), "google.cloud.kms.v1.ListImportJobsResponse") 1997 proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest") 1998 proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest") 1999 proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest") 2000 proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest") 2001 proto.RegisterType((*GetImportJobRequest)(nil), "google.cloud.kms.v1.GetImportJobRequest") 2002 proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest") 2003 proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest") 2004 proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest") 2005 proto.RegisterType((*ImportCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.ImportCryptoKeyVersionRequest") 2006 proto.RegisterType((*CreateImportJobRequest)(nil), "google.cloud.kms.v1.CreateImportJobRequest") 2007 proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest") 2008 proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest") 2009 proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest") 2010 proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest") 2011 proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest") 2012 proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest") 2013 proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse") 2014 proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse") 2015 proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse") 2016 proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse") 2017 proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest") 2018 proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest") 2019 proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest") 2020 proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest") 2021 proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata") 2022} 2023 2024func init() { 2025 proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25) 2026} 2027 2028var fileDescriptor_723aeaeb61739a25 = []byte{ 2029 // 2304 bytes of a gzipped FileDescriptorProto 2030 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xcc, 0x5a, 0xcd, 0x6f, 0x1b, 0xc7, 2031 0x15, 0xcf, 0xd0, 0xb6, 0x2c, 0x3d, 0xc9, 0x92, 0x3d, 0xb2, 0x65, 0x99, 0xb6, 0x64, 0x7b, 0x95, 2032 0x3a, 0xb6, 0xe2, 0x70, 0x2b, 0x3a, 0x76, 0x6d, 0xba, 0x86, 0xbb, 0xb2, 0x12, 0x5b, 0x51, 0x9c, 2033 0x0a, 0xf4, 0x57, 0x9b, 0xaa, 0xdd, 0x8c, 0xc8, 0x11, 0xb5, 0x21, 0x77, 0x97, 0xd9, 0x5d, 0x52, 2034 0x61, 0xda, 0x5c, 0x0a, 0xa4, 0x40, 0x81, 0x02, 0x3d, 0xe4, 0xd0, 0x02, 0x45, 0x8a, 0xa2, 0xc7, 2035 0x5e, 0x9b, 0xf6, 0xd0, 0x0f, 0xa0, 0xa7, 0x1e, 0xd2, 0x43, 0xd1, 0x8f, 0x93, 0x02, 0x04, 0x3e, 2036 0xf4, 0x0f, 0x28, 0x7a, 0x2a, 0xda, 0x4b, 0xb0, 0x33, 0xb3, 0x9f, 0xdc, 0x25, 0x29, 0x6a, 0x0d, 2037 0xe4, 0x66, 0xce, 0xbe, 0x79, 0xf3, 0xfb, 0xbd, 0x79, 0xef, 0xcd, 0xcc, 0xcf, 0x82, 0xf3, 0x35, 2038 0xd3, 0xac, 0x35, 0xa8, 0x5c, 0x69, 0x98, 0xad, 0xaa, 0x5c, 0xd7, 0x6d, 0xb9, 0xbd, 0x24, 0xdb, 2039 0xd4, 0x6a, 0x6b, 0x15, 0x5a, 0x68, 0x5a, 0xa6, 0x63, 0xe2, 0x69, 0x6e, 0x52, 0x60, 0x26, 0x85, 2040 0xba, 0x6e, 0x17, 0xda, 0x4b, 0xf9, 0x33, 0x62, 0x1e, 0x69, 0x6a, 0x32, 0x31, 0x0c, 0xd3, 0x21, 2041 0x8e, 0x66, 0x1a, 0x36, 0x9f, 0x92, 0x3f, 0x19, 0xfa, 0x5a, 0x69, 0x68, 0xd4, 0x70, 0xc4, 0x87, 2042 0xb3, 0xa1, 0x0f, 0x5b, 0x1a, 0x6d, 0x54, 0xd5, 0x4d, 0xba, 0x4d, 0xda, 0x9a, 0x69, 0x09, 0x83, 2043 0x53, 0x21, 0x03, 0x8b, 0xda, 0x66, 0xcb, 0xf2, 0x70, 0xe4, 0x17, 0x92, 0xa0, 0x7a, 0x36, 0xde, 2044 0xca, 0xe7, 0x84, 0x11, 0xfb, 0xb5, 0xd9, 0xda, 0x12, 0xab, 0xe8, 0xc4, 0xae, 0x73, 0x0b, 0xe9, 2045 0x53, 0x04, 0xd3, 0xaf, 0x6b, 0xb6, 0xb3, 0x46, 0x3b, 0x65, 0xcd, 0xa8, 0xd9, 0x65, 0xfa, 0x4e, 2046 0x8b, 0xda, 0x0e, 0x56, 0x60, 0xa4, 0x49, 0x2c, 0x6a, 0x38, 0xb3, 0xe8, 0x1c, 0xba, 0x38, 0xb6, 2047 0x7c, 0xe9, 0xa9, 0x92, 0xfb, 0x9f, 0xb2, 0x00, 0xe7, 0x1b, 0x66, 0x45, 0x90, 0xe3, 0xbe, 0x49, 2048 0x53, 0xb3, 0x0b, 0x15, 0x53, 0x97, 0x5f, 0x17, 0x1f, 0xca, 0x62, 0x22, 0x3e, 0x07, 0x63, 0x4d, 2049 0x52, 0xa3, 0xaa, 0xad, 0xbd, 0x47, 0x67, 0x73, 0xe7, 0xd0, 0xc5, 0x43, 0xcb, 0x07, 0x9e, 0x2a, 2050 0xa8, 0x3c, 0xea, 0x8e, 0x3e, 0xd0, 0xde, 0xa3, 0x58, 0x02, 0x60, 0x16, 0x8e, 0x59, 0xa7, 0xc6, 2051 0xec, 0x01, 0xb6, 0x10, 0x33, 0x61, 0x13, 0x1f, 0xba, 0xa3, 0xf8, 0x34, 0x8c, 0x6c, 0x69, 0x0d, 2052 0x87, 0x5a, 0xb3, 0x07, 0x83, 0xef, 0x62, 0x08, 0xcf, 0xc3, 0xa8, 0x69, 0x55, 0xa9, 0xa5, 0x6e, 2053 0x76, 0x66, 0x0f, 0x05, 0x9f, 0x0f, 0xb3, 0xc1, 0xe5, 0x8e, 0xf4, 0xbb, 0x1c, 0x9c, 0x70, 0xd9, 2054 0xdd, 0xb1, 0x3a, 0x4d, 0xc7, 0x5c, 0xa3, 0x1d, 0x9f, 0xdf, 0xed, 0x18, 0xbf, 0x17, 0x18, 0xbf, 2055 0xf3, 0x70, 0x96, 0xc5, 0xd3, 0xdd, 0xd6, 0x18, 0x3d, 0x11, 0xa0, 0x8c, 0xd9, 0x7d, 0x1b, 0x26, 2056 0xda, 0xd4, 0xb2, 0x35, 0xd3, 0x50, 0xdb, 0x1a, 0xdd, 0x61, 0x1c, 0x27, 0x8b, 0xa5, 0x42, 0x42, 2057 0x92, 0x15, 0x7c, 0x12, 0x8f, 0xf9, 0x8c, 0xae, 0x81, 0xc7, 0x1a, 0xdd, 0x29, 0x8f, 0xb7, 0x83, 2058 0x1f, 0xa1, 0xe0, 0x1d, 0xea, 0x1d, 0xbc, 0x91, 0x84, 0xe0, 0x7d, 0x9c, 0x83, 0x33, 0x91, 0xe0, 2059 0x89, 0x65, 0xfa, 0xe7, 0x48, 0x5a, 0x0c, 0x7d, 0x4f, 0x19, 0x47, 0xf1, 0x0d, 0x38, 0x98, 0x51, 2060 0xf4, 0x98, 0x9f, 0xfd, 0x85, 0xed, 0x53, 0xc4, 0x73, 0x6e, 0x55, 0x6f, 0x9a, 0x96, 0xf3, 0x9a, 2061 0xb9, 0xf9, 0x45, 0xcb, 0xb9, 0x7d, 0x55, 0xd4, 0x4f, 0x11, 0x1c, 0x8f, 0xf6, 0x0b, 0xbb, 0x69, 2062 0x1a, 0x36, 0xc5, 0x37, 0x60, 0xac, 0x4e, 0x3b, 0xaa, 0xe5, 0x0e, 0xce, 0xa2, 0x73, 0x07, 0x2e, 2063 0x8e, 0x17, 0xcf, 0x24, 0x6e, 0x84, 0x47, 0x6a, 0xb4, 0x2e, 0x5c, 0xe0, 0x0b, 0x30, 0x65, 0xd0, 2064 0x77, 0x1d, 0x35, 0x84, 0xdc, 0x25, 0x37, 0x56, 0x3e, 0xe2, 0x0e, 0xaf, 0xfb, 0xc0, 0xe7, 0x00, 2065 0x1c, 0xd3, 0x21, 0x0d, 0xce, 0xdf, 0x25, 0x77, 0xa8, 0x3c, 0xc6, 0x46, 0x5c, 0xee, 0xd2, 0x2f, 2066 0x10, 0xcc, 0xc4, 0x8b, 0x5d, 0x80, 0xbb, 0x0d, 0xe3, 0x15, 0x36, 0xaa, 0xd6, 0x69, 0xc7, 0x83, 2067 0x37, 0xdf, 0x3b, 0x4f, 0xca, 0x50, 0xf1, 0x1d, 0x65, 0x05, 0xf1, 0x8f, 0x08, 0xe6, 0x52, 0x4a, 2068 0x4a, 0x20, 0x7d, 0x04, 0xd3, 0x01, 0x52, 0x55, 0xd4, 0xb2, 0x87, 0xf8, 0x4b, 0x03, 0x65, 0x76, 2069 0xf9, 0x58, 0x25, 0xee, 0x3e, 0xeb, 0x10, 0x87, 0x73, 0x3b, 0x08, 0xb1, 0xc6, 0x46, 0xd5, 0xb7, 2070 0xcd, 0xcd, 0xde, 0x21, 0xf6, 0x67, 0x97, 0x41, 0xf3, 0x1d, 0x65, 0x05, 0x71, 0x1d, 0x8e, 0xdd, 2071 0xa5, 0x5e, 0x7a, 0x7a, 0x95, 0x77, 0x13, 0x0e, 0x1a, 0x44, 0xa7, 0x7b, 0xad, 0x3b, 0x36, 0x49, 2072 0x7a, 0x08, 0xd3, 0x77, 0x69, 0xb0, 0x65, 0x9e, 0xcf, 0x5b, 0x11, 0x9f, 0x7b, 0xe8, 0x7d, 0xdc, 2073 0xeb, 0x26, 0xe4, 0xc3, 0x5e, 0xbd, 0xbd, 0x13, 0xce, 0x57, 0x22, 0xce, 0xbf, 0xcc, 0x9c, 0x2f, 2074 0xc2, 0xc5, 0xbe, 0xce, 0x3d, 0x37, 0x7c, 0x8d, 0x6f, 0x31, 0xe4, 0xeb, 0xad, 0xcd, 0x86, 0x56, 2075 0x09, 0x21, 0xcf, 0xc6, 0x39, 0x0f, 0x4b, 0xb0, 0x97, 0xc3, 0x85, 0x25, 0x98, 0xcf, 0xbd, 0xfe, 2076 0x01, 0xc1, 0xf1, 0x3b, 0x16, 0x25, 0x0e, 0x8d, 0x6d, 0x61, 0x06, 0x17, 0x92, 0x05, 0x18, 0xf7, 2077 0x5a, 0x94, 0xaa, 0x55, 0x79, 0x76, 0xb9, 0xed, 0x2d, 0x57, 0x1e, 0x13, 0xbd, 0x68, 0xb5, 0x8a, 2078 0xbf, 0x0a, 0xa3, 0x9e, 0x11, 0x4b, 0xae, 0x3e, 0x6d, 0x8c, 0xcf, 0x3f, 0x2c, 0xe6, 0x4b, 0x3f, 2079 0xcc, 0xc1, 0x0c, 0x87, 0xdf, 0x95, 0x2f, 0xfb, 0xee, 0xfe, 0x2f, 0xc0, 0x91, 0x50, 0x6b, 0x88, 2080 0x12, 0x18, 0xf7, 0x4b, 0x7e, 0xb5, 0x8a, 0x97, 0x01, 0x02, 0x43, 0x41, 0xa2, 0x4f, 0xb3, 0x13, 2081 0x61, 0xf0, 0xbd, 0x60, 0x05, 0xe6, 0xec, 0xba, 0xd6, 0x54, 0x35, 0x43, 0x73, 0x34, 0xd2, 0xf0, 2082 0x3a, 0x91, 0x5a, 0x71, 0xc9, 0x69, 0xa6, 0xc1, 0x0e, 0x87, 0xd1, 0x72, 0xde, 0x35, 0x5a, 0xe5, 2083 0x36, 0x22, 0x3d, 0xee, 0x08, 0x0b, 0x77, 0x2b, 0xe7, 0x62, 0xb1, 0x88, 0x65, 0x79, 0x06, 0x17, 2084 0x88, 0x6f, 0x00, 0xee, 0xee, 0x97, 0x2c, 0x32, 0x83, 0xb6, 0x4b, 0x4e, 0xfd, 0x68, 0xbc, 0x67, 2085 0x4a, 0xbf, 0xce, 0xc1, 0x1c, 0xcf, 0xce, 0x67, 0x08, 0x7f, 0x13, 0xc6, 0x48, 0xa3, 0x66, 0x5a, 2086 0x9a, 0xb3, 0xad, 0x33, 0xd4, 0x93, 0xc5, 0xdb, 0xc3, 0x5d, 0x5f, 0x14, 0xcf, 0x8d, 0xd8, 0x4a, 2087 0xdf, 0xad, 0x7b, 0x27, 0x08, 0x3a, 0x73, 0x70, 0xe6, 0xe7, 0xca, 0x63, 0x7e, 0xf7, 0xc5, 0x32, 2088 0x4c, 0x5b, 0x36, 0x51, 0x09, 0xb5, 0xd5, 0x1d, 0x8b, 0x34, 0x9b, 0xb4, 0xca, 0x72, 0xc7, 0xdd, 2089 0xe4, 0x89, 0x7b, 0xcf, 0x95, 0x8f, 0x5a, 0x36, 0x51, 0xa8, 0xfd, 0x84, 0x7f, 0x72, 0xf3, 0x65, 2090 0x06, 0x8e, 0x87, 0x0c, 0x55, 0x9d, 0x38, 0xd4, 0xd2, 0x48, 0x43, 0xfa, 0x33, 0xf2, 0x0a, 0xa0, 2091 0xab, 0x33, 0x64, 0x51, 0x00, 0x01, 0x91, 0x78, 0x01, 0xf8, 0x5c, 0x78, 0x01, 0x84, 0x18, 0xf7, 2092 0x2a, 0x00, 0x1f, 0x64, 0x3c, 0x22, 0xd2, 0xcf, 0x11, 0xcc, 0x3c, 0x6a, 0x56, 0x93, 0x2a, 0x39, 2093 0x5a, 0x5f, 0x68, 0xa8, 0xfa, 0xfa, 0x1a, 0x8c, 0xb7, 0x98, 0x77, 0xf6, 0x18, 0x13, 0x09, 0x9b, 2094 0xf7, 0x9c, 0x78, 0xef, 0xb5, 0xc2, 0xab, 0xee, 0x7b, 0xed, 0x3e, 0xb1, 0xeb, 0xdc, 0x01, 0xf0, 2095 0x39, 0xee, 0x80, 0xf4, 0x7b, 0x04, 0x73, 0x31, 0x80, 0xb1, 0xfc, 0x4c, 0xae, 0x0d, 0xb4, 0xff, 2096 0xda, 0xc8, 0x00, 0xfd, 0xcf, 0x10, 0x4c, 0xbe, 0x62, 0x30, 0xc7, 0x1e, 0xdc, 0xb9, 0xc8, 0xc9, 2097 0x31, 0xc6, 0xb2, 0xe3, 0x00, 0xa0, 0x45, 0x7e, 0x32, 0xe0, 0xf3, 0x30, 0xd6, 0x6c, 0x10, 0xcd, 2098 0x70, 0xe8, 0xbb, 0x0e, 0x5b, 0x71, 0x42, 0x04, 0xd5, 0x1f, 0xc5, 0x77, 0x61, 0x8e, 0x54, 0xab, 2099 0x9a, 0xdb, 0x7d, 0x48, 0x43, 0x25, 0x2d, 0x67, 0x9b, 0x1a, 0x8e, 0x56, 0x21, 0x0e, 0xad, 0xaa, 2100 0x55, 0xe2, 0x10, 0x96, 0x0a, 0x13, 0xfc, 0x46, 0x7b, 0x3a, 0xb0, 0x54, 0xc2, 0x86, 0x2b, 0xc4, 2101 0x21, 0xee, 0x3d, 0x6d, 0x72, 0x85, 0x46, 0xd0, 0xed, 0xef, 0xb8, 0xc7, 0x0b, 0x00, 0x15, 0xad, 2102 0xb9, 0x4d, 0xad, 0x38, 0xfc, 0xd0, 0x70, 0x76, 0xf8, 0x7f, 0x82, 0xe0, 0x84, 0x62, 0x77, 0x74, 2103 0x9d, 0x3a, 0x96, 0x56, 0x79, 0xa0, 0xd5, 0xb2, 0xbd, 0x58, 0xe0, 0xeb, 0x30, 0x52, 0xd5, 0x6a, 2104 0xd4, 0x76, 0x44, 0x71, 0x9d, 0x4e, 0xcc, 0xa6, 0x15, 0x66, 0xc2, 0x69, 0x0a, 0x7b, 0xe9, 0x03, 2105 0x04, 0xb3, 0x01, 0xb2, 0x58, 0x8c, 0xb3, 0x01, 0x17, 0x0d, 0xf5, 0x81, 0xc4, 0x50, 0x4b, 0x32, 2106 0x4c, 0xf9, 0x8b, 0x8b, 0x1b, 0xec, 0x99, 0x70, 0x82, 0xb9, 0x10, 0x26, 0x42, 0xb9, 0x25, 0xbd, 2107 0x02, 0x53, 0x7e, 0xbe, 0x8a, 0x09, 0x38, 0x0c, 0x57, 0x2c, 0x3e, 0xdf, 0xbd, 0xcf, 0x91, 0x75, 2108 0xaf, 0xc1, 0x4c, 0x7c, 0x63, 0x82, 0xe5, 0x6d, 0xad, 0x66, 0x10, 0xa7, 0x65, 0x51, 0x6f, 0x79, 2109 0x7f, 0x40, 0xba, 0x01, 0xa7, 0x12, 0xc2, 0x36, 0x10, 0xf2, 0x8f, 0x10, 0x3c, 0x1f, 0x6b, 0x14, 2110 0xeb, 0x96, 0xa6, 0x13, 0x2b, 0xde, 0x2f, 0xf6, 0x99, 0xe2, 0xd7, 0xe0, 0x44, 0x77, 0xbb, 0x89, 2111 0xb5, 0x69, 0x1c, 0x6f, 0x25, 0xab, 0x55, 0x69, 0x0b, 0xe6, 0x57, 0xa8, 0xed, 0x58, 0x66, 0xe7, 2112 0xd9, 0xde, 0x86, 0xb7, 0x60, 0xbe, 0x4c, 0x6d, 0xc7, 0xb4, 0xe8, 0xb3, 0x5d, 0xe7, 0x2d, 0x18, 2113 0xe1, 0x99, 0x8f, 0x67, 0x61, 0xc4, 0xde, 0x26, 0xc5, 0xab, 0xd7, 0xf8, 0xa6, 0xdc, 0x7b, 0xae, 2114 0x2c, 0x7e, 0x8b, 0x2f, 0x57, 0xae, 0xbf, 0xcc, 0x53, 0x44, 0x7c, 0xb9, 0x72, 0xfd, 0x65, 0xf1, 2115 0xe5, 0xea, 0x52, 0x91, 0x67, 0xae, 0xf8, 0x72, 0x75, 0xa9, 0xb8, 0x3c, 0xea, 0x15, 0x9d, 0xf4, 2116 0x15, 0x38, 0xea, 0x5d, 0x6e, 0xef, 0x53, 0x87, 0xb8, 0xad, 0x01, 0x2f, 0xc0, 0x91, 0x6d, 0x5b, 2117 0x57, 0x49, 0x9b, 0x68, 0x0d, 0xb2, 0xd9, 0xe0, 0x24, 0x46, 0xcb, 0x13, 0xdb, 0xb6, 0xae, 0x78, 2118 0x63, 0xc5, 0x1f, 0x5c, 0x80, 0xe3, 0x6b, 0xb4, 0x73, 0x9f, 0x18, 0xa4, 0x46, 0x75, 0x6a, 0x38, 2119 0x0f, 0xb8, 0xb6, 0x89, 0x7f, 0x89, 0x60, 0x22, 0xfc, 0xac, 0xc7, 0x17, 0x13, 0x2b, 0x3a, 0x41, 2120 0x29, 0xcc, 0x5f, 0x1a, 0xc0, 0x92, 0xe7, 0xa9, 0x74, 0x6b, 0x57, 0x11, 0x67, 0xf9, 0xf7, 0xff, 2121 0xf1, 0xaf, 0x0f, 0x73, 0x05, 0x7c, 0x59, 0x6e, 0x2f, 0xc9, 0xdf, 0xe5, 0x43, 0xb7, 0x9a, 0x96, 2122 0xf9, 0x36, 0xad, 0x38, 0xb6, 0xbc, 0x28, 0xfb, 0x77, 0x7a, 0x79, 0xf1, 0x7d, 0xd9, 0xd7, 0x09, 2123 0x7e, 0x83, 0x60, 0x32, 0xfa, 0xc0, 0xc7, 0x8b, 0xa9, 0x8b, 0x77, 0x49, 0x7e, 0xf9, 0x17, 0x07, 2124 0xb2, 0x15, 0x50, 0x5f, 0x8b, 0x42, 0xbd, 0x89, 0x6f, 0xf4, 0x87, 0xea, 0x23, 0x75, 0x51, 0x87, 2125 0xc4, 0x83, 0xcf, 0x50, 0x4c, 0x85, 0xf4, 0x9f, 0xe5, 0x4b, 0xfd, 0x21, 0xc5, 0x44, 0xb7, 0x7c, 2126 0x71, 0x2f, 0x53, 0x04, 0x99, 0xef, 0x44, 0xc9, 0x7c, 0x1d, 0xdf, 0xdf, 0x13, 0x99, 0x10, 0x97, 2127 0x08, 0x33, 0x9f, 0x86, 0xb7, 0x31, 0x81, 0x2c, 0xd0, 0x63, 0x63, 0xba, 0x74, 0xb1, 0x1e, 0x1b, 2128 0xd3, 0xad, 0x33, 0xec, 0x7f, 0x63, 0x42, 0x92, 0xc3, 0x8f, 0x11, 0x40, 0x20, 0x16, 0xe0, 0x0b, 2129 0x89, 0x38, 0xba, 0xd4, 0x84, 0x7c, 0xcf, 0x07, 0xa1, 0x74, 0x73, 0x57, 0x61, 0x7d, 0x20, 0x92, 2130 0xe2, 0xee, 0xc0, 0x00, 0xe0, 0x58, 0x1d, 0x86, 0x65, 0x81, 0x94, 0x3a, 0x4c, 0xd0, 0x23, 0xf2, 2131 0x7d, 0x6e, 0xa0, 0xd2, 0xbd, 0x30, 0x2e, 0x2f, 0x6c, 0x83, 0xe1, 0x8a, 0x26, 0x00, 0xfe, 0x0b, 2132 0x8a, 0x2a, 0x22, 0xde, 0xad, 0x50, 0xee, 0x8b, 0x35, 0xda, 0x6f, 0xf3, 0x83, 0x5d, 0x42, 0xa5, 2133 0x8d, 0x30, 0x72, 0x2f, 0x79, 0x87, 0x40, 0xde, 0x9d, 0xb9, 0x2e, 0x9b, 0x3f, 0xf1, 0x90, 0xfb, 2134 0x2a, 0x49, 0x7a, 0xc8, 0xe3, 0x42, 0x4a, 0x4a, 0xc8, 0x7d, 0x33, 0x69, 0x2b, 0x0c, 0xfc, 0x9b, 2135 0xf8, 0x49, 0xa6, 0xc0, 0xe5, 0xa6, 0x8f, 0x58, 0x64, 0x8d, 0x5f, 0x2d, 0xe9, 0x14, 0xe2, 0x8f, 2136 0xb2, 0x7c, 0x9f, 0x67, 0xd1, 0xbe, 0xb2, 0x26, 0xa8, 0x34, 0x37, 0xce, 0xbf, 0x45, 0x70, 0x24, 2137 0xa2, 0xec, 0xe0, 0x4b, 0x29, 0xdb, 0xdf, 0xad, 0xfe, 0xf4, 0x29, 0xb9, 0x8d, 0x5d, 0xe5, 0x34, 2138 0x6f, 0x00, 0x97, 0x43, 0x02, 0x8f, 0xff, 0x6f, 0x86, 0xfd, 0xba, 0xb4, 0xa7, 0xc3, 0xa6, 0xe4, 2139 0xab, 0x40, 0xf8, 0xaf, 0x08, 0xa6, 0x62, 0x3a, 0x06, 0x7e, 0xb1, 0x07, 0xf4, 0x3d, 0x57, 0xa6, 2140 0xb9, 0xab, 0x9c, 0x15, 0xf0, 0x23, 0x02, 0x4f, 0xe8, 0x17, 0xa3, 0x70, 0x57, 0x1a, 0xfe, 0x10, 2141 0x2a, 0x85, 0x9e, 0xac, 0xf8, 0xff, 0xa8, 0x4b, 0xa5, 0xf2, 0x6a, 0xb8, 0x38, 0x08, 0xb1, 0xe1, 2142 0xca, 0xf8, 0x03, 0xb4, 0xab, 0x9c, 0xea, 0xe6, 0x29, 0x2e, 0x8a, 0x8c, 0x61, 0x45, 0xca, 0xf6, 2143 0x64, 0x2a, 0x25, 0x3c, 0x80, 0xf1, 0x3f, 0x11, 0xcc, 0x24, 0x0b, 0x3b, 0x29, 0xec, 0x7b, 0xaa, 2144 0x40, 0x83, 0xb2, 0x57, 0x79, 0x13, 0x90, 0x1e, 0x66, 0x4b, 0x90, 0xd7, 0x58, 0x09, 0x2d, 0x86, 2145 0xd2, 0x34, 0xe8, 0x03, 0xbd, 0xd2, 0x74, 0xcf, 0xad, 0x20, 0x94, 0xa6, 0x11, 0x19, 0x26, 0xf4, 2146 0x6b, 0xc8, 0x34, 0x0d, 0x1a, 0x45, 0x29, 0x24, 0xdc, 0xe0, 0xbf, 0x21, 0x98, 0x8a, 0x3d, 0x5c, 2147 0x52, 0x18, 0x25, 0x0b, 0x35, 0x7d, 0x0b, 0xef, 0x9d, 0x5d, 0x65, 0x26, 0x48, 0x90, 0xcb, 0x21, 2148 0x49, 0x83, 0x11, 0x29, 0x17, 0x57, 0x18, 0x91, 0xc0, 0xa4, 0x30, 0xcc, 0x79, 0x19, 0x29, 0xbd, 2149 0x0f, 0x73, 0x5d, 0xb2, 0x52, 0xef, 0xe4, 0xeb, 0x29, 0xf1, 0x0c, 0x9a, 0x7c, 0x1f, 0xa1, 0x5d, 2150 0x65, 0xbe, 0xbb, 0x14, 0xba, 0x18, 0xb7, 0x8b, 0x6f, 0xc5, 0x18, 0x7b, 0xa6, 0x85, 0xac, 0x8e, 2151 0xad, 0xc4, 0x92, 0xfc, 0x18, 0xc1, 0x61, 0xf1, 0xba, 0xc6, 0x0b, 0x89, 0x94, 0xa2, 0x5a, 0x51, 2152 0xfe, 0xf9, 0xde, 0x46, 0xc1, 0xbd, 0x77, 0xd2, 0xc5, 0x7d, 0xd9, 0x7f, 0x0c, 0x8b, 0x04, 0x5d, 2153 0x1e, 0xf6, 0x24, 0x5e, 0x7c, 0xbf, 0x44, 0xf9, 0x22, 0x6e, 0xc9, 0xb9, 0xb0, 0xc5, 0x5b, 0x3c, 2154 0x05, 0x76, 0x54, 0xe0, 0x48, 0x81, 0x1d, 0x7b, 0xce, 0xbb, 0xb0, 0xa7, 0x18, 0xec, 0x40, 0x37, 2155 0x60, 0xb8, 0x5f, 0x95, 0x94, 0xa1, 0x2f, 0x6d, 0xa5, 0x2a, 0xf5, 0x61, 0x3f, 0x45, 0x30, 0x19, 2156 0x15, 0x21, 0x52, 0xae, 0xeb, 0x89, 0x12, 0x52, 0xca, 0x75, 0x3d, 0x59, 0xd5, 0x90, 0x5a, 0xbb, 2157 0xca, 0x38, 0xe3, 0xc2, 0x9f, 0xae, 0x8c, 0x07, 0x91, 0x36, 0x32, 0xbd, 0x09, 0x95, 0x48, 0x64, 2158 0x6d, 0x97, 0xe2, 0xbf, 0x11, 0x1c, 0xeb, 0xd2, 0x4b, 0xf0, 0x4b, 0x7d, 0x90, 0xc7, 0x76, 0xab, 2159 0x30, 0xa8, 0xb9, 0xe0, 0xfa, 0xbd, 0x94, 0x7d, 0xab, 0x4a, 0xea, 0xb3, 0xe2, 0xbb, 0x12, 0xec, 2160 0xea, 0x7f, 0xba, 0xf5, 0xe0, 0xa8, 0xcc, 0x83, 0x6f, 0x0c, 0xd2, 0x60, 0x12, 0xa5, 0xa1, 0xbe, 2161 0x9d, 0xb4, 0xbd, 0xab, 0xe4, 0x39, 0xf5, 0x24, 0x05, 0x88, 0x45, 0xe1, 0x81, 0xf4, 0xc6, 0xf0, 2162 0xd9, 0xcb, 0x1b, 0x55, 0x14, 0x9b, 0x4b, 0xfa, 0x33, 0x04, 0x27, 0x53, 0xc4, 0x23, 0x7c, 0x25, 2163 0xa5, 0xd8, 0x7a, 0x49, 0x4d, 0x83, 0x36, 0xd4, 0x5a, 0xf8, 0x5a, 0xfc, 0xa6, 0xf4, 0x28, 0xdb, 2164 0xfd, 0xad, 0x72, 0x8c, 0x1e, 0xc1, 0x14, 0xd5, 0x2a, 0x85, 0x60, 0x6f, 0x8d, 0xeb, 0x8b, 0x41, 2165 0xd0, 0xe2, 0x18, 0x4b, 0x68, 0x31, 0xef, 0x7c, 0xa2, 0x9c, 0x4c, 0x11, 0xd8, 0xfe, 0xae, 0x3c, 2166 0xd9, 0x76, 0x9c, 0xa6, 0x5d, 0x92, 0xe5, 0x9d, 0x9d, 0x9d, 0xb8, 0xfa, 0x46, 0x5a, 0xce, 0x36, 2167 0xff, 0xeb, 0xb7, 0x97, 0x9a, 0x0d, 0xe2, 0x6c, 0x99, 0x96, 0x7e, 0x79, 0x20, 0xf3, 0xba, 0x6e, 2168 0x2f, 0xff, 0x08, 0xc1, 0xc9, 0x8a, 0xa9, 0x27, 0xc5, 0x62, 0x79, 0x74, 0x4d, 0xb7, 0xd7, 0x2d, 2169 0xd3, 0x31, 0xd7, 0xd1, 0x9b, 0xd7, 0x84, 0x41, 0xcd, 0x6c, 0x10, 0xa3, 0x56, 0x30, 0xad, 0x9a, 2170 0x5c, 0xa3, 0x06, 0xfb, 0x0f, 0x0e, 0x39, 0x58, 0x20, 0xf2, 0x47, 0x78, 0x37, 0xeb, 0xba, 0xfd, 2171 0x5f, 0x84, 0x7e, 0x95, 0x9b, 0xbe, 0xcb, 0xe7, 0xde, 0x61, 0xce, 0xd7, 0x74, 0xbb, 0xf0, 0x78, 2172 0xe9, 0x13, 0x6f, 0x74, 0x83, 0x8d, 0x6e, 0xac, 0xe9, 0xf6, 0xc6, 0xe3, 0xa5, 0xcd, 0x11, 0xe6, 2173 0xf1, 0xca, 0xe7, 0x01, 0x00, 0x00, 0xff, 0xff, 0x07, 0x13, 0xb6, 0xbb, 0x80, 0x28, 0x00, 0x00, 2174} 2175 2176// Reference imports to suppress errors if they are not otherwise used. 2177var _ context.Context 2178var _ grpc.ClientConnInterface 2179 2180// This is a compile-time assertion to ensure that this generated file 2181// is compatible with the grpc package it is being compiled against. 2182const _ = grpc.SupportPackageIsVersion6 2183 2184// KeyManagementServiceClient is the client API for KeyManagementService service. 2185// 2186// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 2187type KeyManagementServiceClient interface { 2188 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2189 ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) 2190 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2191 ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) 2192 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2193 ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) 2194 // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2195 ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) 2196 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2197 GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 2198 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its 2199 // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2200 GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2201 // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2202 GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2203 // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2204 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2205 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or 2206 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2207 GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) 2208 // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2209 GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) 2210 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. 2211 CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 2212 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2213 // 2214 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2215 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2216 // are required. 2217 CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2218 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2219 // 2220 // The server will assign the next sequential id. If unset, 2221 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2222 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2223 CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2224 // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the 2225 // wrapped key material provided in the request. 2226 // 2227 // The version ID will be assigned the next sequential id within the 2228 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2229 ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2230 // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2231 // 2232 // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. 2233 CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) 2234 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2235 UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2236 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. 2237 // 2238 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2239 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and 2240 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this 2241 // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to 2242 // move between other states. 2243 UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2244 // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 2245 // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2246 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2247 Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) 2248 // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2249 // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2250 Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) 2251 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2252 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2253 // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2254 AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) 2255 // Decrypts data that was encrypted with a public key retrieved from 2256 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2257 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. 2258 AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) 2259 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2260 // 2261 // Returns an error if called on an asymmetric key. 2262 UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) 2263 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. 2264 // 2265 // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2266 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2267 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 2268 // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2269 // will be changed to 2270 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key 2271 // material will be irrevocably destroyed. 2272 // 2273 // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, 2274 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. 2275 DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2276 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2277 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2278 // state. 2279 // 2280 // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2281 // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2282 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. 2283 RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 2284} 2285 2286type keyManagementServiceClient struct { 2287 cc grpc.ClientConnInterface 2288} 2289 2290func NewKeyManagementServiceClient(cc grpc.ClientConnInterface) KeyManagementServiceClient { 2291 return &keyManagementServiceClient{cc} 2292} 2293 2294func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) { 2295 out := new(ListKeyRingsResponse) 2296 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...) 2297 if err != nil { 2298 return nil, err 2299 } 2300 return out, nil 2301} 2302 2303func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) { 2304 out := new(ListCryptoKeysResponse) 2305 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...) 2306 if err != nil { 2307 return nil, err 2308 } 2309 return out, nil 2310} 2311 2312func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) { 2313 out := new(ListCryptoKeyVersionsResponse) 2314 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...) 2315 if err != nil { 2316 return nil, err 2317 } 2318 return out, nil 2319} 2320 2321func (c *keyManagementServiceClient) ListImportJobs(ctx context.Context, in *ListImportJobsRequest, opts ...grpc.CallOption) (*ListImportJobsResponse, error) { 2322 out := new(ListImportJobsResponse) 2323 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", in, out, opts...) 2324 if err != nil { 2325 return nil, err 2326 } 2327 return out, nil 2328} 2329 2330func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 2331 out := new(KeyRing) 2332 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...) 2333 if err != nil { 2334 return nil, err 2335 } 2336 return out, nil 2337} 2338 2339func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2340 out := new(CryptoKey) 2341 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...) 2342 if err != nil { 2343 return nil, err 2344 } 2345 return out, nil 2346} 2347 2348func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2349 out := new(CryptoKeyVersion) 2350 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...) 2351 if err != nil { 2352 return nil, err 2353 } 2354 return out, nil 2355} 2356 2357func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) { 2358 out := new(PublicKey) 2359 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...) 2360 if err != nil { 2361 return nil, err 2362 } 2363 return out, nil 2364} 2365 2366func (c *keyManagementServiceClient) GetImportJob(ctx context.Context, in *GetImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { 2367 out := new(ImportJob) 2368 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetImportJob", in, out, opts...) 2369 if err != nil { 2370 return nil, err 2371 } 2372 return out, nil 2373} 2374 2375func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 2376 out := new(KeyRing) 2377 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...) 2378 if err != nil { 2379 return nil, err 2380 } 2381 return out, nil 2382} 2383 2384func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2385 out := new(CryptoKey) 2386 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...) 2387 if err != nil { 2388 return nil, err 2389 } 2390 return out, nil 2391} 2392 2393func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2394 out := new(CryptoKeyVersion) 2395 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...) 2396 if err != nil { 2397 return nil, err 2398 } 2399 return out, nil 2400} 2401 2402func (c *keyManagementServiceClient) ImportCryptoKeyVersion(ctx context.Context, in *ImportCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2403 out := new(CryptoKeyVersion) 2404 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", in, out, opts...) 2405 if err != nil { 2406 return nil, err 2407 } 2408 return out, nil 2409} 2410 2411func (c *keyManagementServiceClient) CreateImportJob(ctx context.Context, in *CreateImportJobRequest, opts ...grpc.CallOption) (*ImportJob, error) { 2412 out := new(ImportJob) 2413 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", in, out, opts...) 2414 if err != nil { 2415 return nil, err 2416 } 2417 return out, nil 2418} 2419 2420func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2421 out := new(CryptoKey) 2422 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...) 2423 if err != nil { 2424 return nil, err 2425 } 2426 return out, nil 2427} 2428 2429func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2430 out := new(CryptoKeyVersion) 2431 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...) 2432 if err != nil { 2433 return nil, err 2434 } 2435 return out, nil 2436} 2437 2438func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) { 2439 out := new(EncryptResponse) 2440 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...) 2441 if err != nil { 2442 return nil, err 2443 } 2444 return out, nil 2445} 2446 2447func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) { 2448 out := new(DecryptResponse) 2449 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...) 2450 if err != nil { 2451 return nil, err 2452 } 2453 return out, nil 2454} 2455 2456func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) { 2457 out := new(AsymmetricSignResponse) 2458 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...) 2459 if err != nil { 2460 return nil, err 2461 } 2462 return out, nil 2463} 2464 2465func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) { 2466 out := new(AsymmetricDecryptResponse) 2467 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...) 2468 if err != nil { 2469 return nil, err 2470 } 2471 return out, nil 2472} 2473 2474func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2475 out := new(CryptoKey) 2476 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...) 2477 if err != nil { 2478 return nil, err 2479 } 2480 return out, nil 2481} 2482 2483func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2484 out := new(CryptoKeyVersion) 2485 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...) 2486 if err != nil { 2487 return nil, err 2488 } 2489 return out, nil 2490} 2491 2492func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2493 out := new(CryptoKeyVersion) 2494 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...) 2495 if err != nil { 2496 return nil, err 2497 } 2498 return out, nil 2499} 2500 2501// KeyManagementServiceServer is the server API for KeyManagementService service. 2502type KeyManagementServiceServer interface { 2503 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2504 ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error) 2505 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2506 ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) 2507 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2508 ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) 2509 // Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2510 ListImportJobs(context.Context, *ListImportJobsRequest) (*ListImportJobsResponse, error) 2511 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2512 GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error) 2513 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as well as its 2514 // [primary][google.cloud.kms.v1.CryptoKey.primary] [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2515 GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error) 2516 // Returns metadata for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2517 GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2518 // Returns the public key for the given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2519 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2520 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] or 2521 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2522 GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error) 2523 // Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2524 GetImportJob(context.Context, *GetImportJobRequest) (*ImportJob, error) 2525 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and Location. 2526 CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error) 2527 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2528 // 2529 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2530 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2531 // are required. 2532 CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error) 2533 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2534 // 2535 // The server will assign the next sequential id. If unset, 2536 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2537 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2538 CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2539 // Imports a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] into an existing [CryptoKey][google.cloud.kms.v1.CryptoKey] using the 2540 // wrapped key material provided in the request. 2541 // 2542 // The version ID will be assigned the next sequential id within the 2543 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2544 ImportCryptoKeyVersion(context.Context, *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2545 // Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a [KeyRing][google.cloud.kms.v1.KeyRing]. 2546 // 2547 // [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is required. 2548 CreateImportJob(context.Context, *CreateImportJobRequest) (*ImportJob, error) 2549 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2550 UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error) 2551 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s metadata. 2552 // 2553 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2554 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] and 2555 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] using this 2556 // method. See [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] and [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] to 2557 // move between other states. 2558 UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2559 // Encrypts data, so that it can only be recovered by a call to [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 2560 // The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2561 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2562 Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error) 2563 // Decrypts data that was protected by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2564 // must be [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2565 Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error) 2566 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2567 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2568 // key retrieved from [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2569 AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error) 2570 // Decrypts data that was encrypted with a public key retrieved from 2571 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2572 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT. 2573 AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) 2574 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2575 // 2576 // Returns an error if called on an asymmetric key. 2577 UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) 2578 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction. 2579 // 2580 // Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2581 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2582 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24 2583 // hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2584 // will be changed to 2585 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key 2586 // material will be irrevocably destroyed. 2587 // 2588 // Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached, 2589 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process. 2590 DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2591 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2592 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2593 // state. 2594 // 2595 // Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state] 2596 // will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2597 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared. 2598 RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2599} 2600 2601// UnimplementedKeyManagementServiceServer can be embedded to have forward compatible implementations. 2602type UnimplementedKeyManagementServiceServer struct { 2603} 2604 2605func (*UnimplementedKeyManagementServiceServer) ListKeyRings(ctx context.Context, req *ListKeyRingsRequest) (*ListKeyRingsResponse, error) { 2606 return nil, status.Errorf(codes.Unimplemented, "method ListKeyRings not implemented") 2607} 2608func (*UnimplementedKeyManagementServiceServer) ListCryptoKeys(ctx context.Context, req *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) { 2609 return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeys not implemented") 2610} 2611func (*UnimplementedKeyManagementServiceServer) ListCryptoKeyVersions(ctx context.Context, req *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) { 2612 return nil, status.Errorf(codes.Unimplemented, "method ListCryptoKeyVersions not implemented") 2613} 2614func (*UnimplementedKeyManagementServiceServer) ListImportJobs(ctx context.Context, req *ListImportJobsRequest) (*ListImportJobsResponse, error) { 2615 return nil, status.Errorf(codes.Unimplemented, "method ListImportJobs not implemented") 2616} 2617func (*UnimplementedKeyManagementServiceServer) GetKeyRing(ctx context.Context, req *GetKeyRingRequest) (*KeyRing, error) { 2618 return nil, status.Errorf(codes.Unimplemented, "method GetKeyRing not implemented") 2619} 2620func (*UnimplementedKeyManagementServiceServer) GetCryptoKey(ctx context.Context, req *GetCryptoKeyRequest) (*CryptoKey, error) { 2621 return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKey not implemented") 2622} 2623func (*UnimplementedKeyManagementServiceServer) GetCryptoKeyVersion(ctx context.Context, req *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2624 return nil, status.Errorf(codes.Unimplemented, "method GetCryptoKeyVersion not implemented") 2625} 2626func (*UnimplementedKeyManagementServiceServer) GetPublicKey(ctx context.Context, req *GetPublicKeyRequest) (*PublicKey, error) { 2627 return nil, status.Errorf(codes.Unimplemented, "method GetPublicKey not implemented") 2628} 2629func (*UnimplementedKeyManagementServiceServer) GetImportJob(ctx context.Context, req *GetImportJobRequest) (*ImportJob, error) { 2630 return nil, status.Errorf(codes.Unimplemented, "method GetImportJob not implemented") 2631} 2632func (*UnimplementedKeyManagementServiceServer) CreateKeyRing(ctx context.Context, req *CreateKeyRingRequest) (*KeyRing, error) { 2633 return nil, status.Errorf(codes.Unimplemented, "method CreateKeyRing not implemented") 2634} 2635func (*UnimplementedKeyManagementServiceServer) CreateCryptoKey(ctx context.Context, req *CreateCryptoKeyRequest) (*CryptoKey, error) { 2636 return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKey not implemented") 2637} 2638func (*UnimplementedKeyManagementServiceServer) CreateCryptoKeyVersion(ctx context.Context, req *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2639 return nil, status.Errorf(codes.Unimplemented, "method CreateCryptoKeyVersion not implemented") 2640} 2641func (*UnimplementedKeyManagementServiceServer) ImportCryptoKeyVersion(ctx context.Context, req *ImportCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2642 return nil, status.Errorf(codes.Unimplemented, "method ImportCryptoKeyVersion not implemented") 2643} 2644func (*UnimplementedKeyManagementServiceServer) CreateImportJob(ctx context.Context, req *CreateImportJobRequest) (*ImportJob, error) { 2645 return nil, status.Errorf(codes.Unimplemented, "method CreateImportJob not implemented") 2646} 2647func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKey(ctx context.Context, req *UpdateCryptoKeyRequest) (*CryptoKey, error) { 2648 return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKey not implemented") 2649} 2650func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyVersion(ctx context.Context, req *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2651 return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyVersion not implemented") 2652} 2653func (*UnimplementedKeyManagementServiceServer) Encrypt(ctx context.Context, req *EncryptRequest) (*EncryptResponse, error) { 2654 return nil, status.Errorf(codes.Unimplemented, "method Encrypt not implemented") 2655} 2656func (*UnimplementedKeyManagementServiceServer) Decrypt(ctx context.Context, req *DecryptRequest) (*DecryptResponse, error) { 2657 return nil, status.Errorf(codes.Unimplemented, "method Decrypt not implemented") 2658} 2659func (*UnimplementedKeyManagementServiceServer) AsymmetricSign(ctx context.Context, req *AsymmetricSignRequest) (*AsymmetricSignResponse, error) { 2660 return nil, status.Errorf(codes.Unimplemented, "method AsymmetricSign not implemented") 2661} 2662func (*UnimplementedKeyManagementServiceServer) AsymmetricDecrypt(ctx context.Context, req *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) { 2663 return nil, status.Errorf(codes.Unimplemented, "method AsymmetricDecrypt not implemented") 2664} 2665func (*UnimplementedKeyManagementServiceServer) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) { 2666 return nil, status.Errorf(codes.Unimplemented, "method UpdateCryptoKeyPrimaryVersion not implemented") 2667} 2668func (*UnimplementedKeyManagementServiceServer) DestroyCryptoKeyVersion(ctx context.Context, req *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2669 return nil, status.Errorf(codes.Unimplemented, "method DestroyCryptoKeyVersion not implemented") 2670} 2671func (*UnimplementedKeyManagementServiceServer) RestoreCryptoKeyVersion(ctx context.Context, req *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) { 2672 return nil, status.Errorf(codes.Unimplemented, "method RestoreCryptoKeyVersion not implemented") 2673} 2674 2675func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) { 2676 s.RegisterService(&_KeyManagementService_serviceDesc, srv) 2677} 2678 2679func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2680 in := new(ListKeyRingsRequest) 2681 if err := dec(in); err != nil { 2682 return nil, err 2683 } 2684 if interceptor == nil { 2685 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in) 2686 } 2687 info := &grpc.UnaryServerInfo{ 2688 Server: srv, 2689 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", 2690 } 2691 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2692 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest)) 2693 } 2694 return interceptor(ctx, in, info, handler) 2695} 2696 2697func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2698 in := new(ListCryptoKeysRequest) 2699 if err := dec(in); err != nil { 2700 return nil, err 2701 } 2702 if interceptor == nil { 2703 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in) 2704 } 2705 info := &grpc.UnaryServerInfo{ 2706 Server: srv, 2707 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", 2708 } 2709 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2710 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest)) 2711 } 2712 return interceptor(ctx, in, info, handler) 2713} 2714 2715func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2716 in := new(ListCryptoKeyVersionsRequest) 2717 if err := dec(in); err != nil { 2718 return nil, err 2719 } 2720 if interceptor == nil { 2721 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in) 2722 } 2723 info := &grpc.UnaryServerInfo{ 2724 Server: srv, 2725 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", 2726 } 2727 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2728 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest)) 2729 } 2730 return interceptor(ctx, in, info, handler) 2731} 2732 2733func _KeyManagementService_ListImportJobs_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2734 in := new(ListImportJobsRequest) 2735 if err := dec(in); err != nil { 2736 return nil, err 2737 } 2738 if interceptor == nil { 2739 return srv.(KeyManagementServiceServer).ListImportJobs(ctx, in) 2740 } 2741 info := &grpc.UnaryServerInfo{ 2742 Server: srv, 2743 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListImportJobs", 2744 } 2745 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2746 return srv.(KeyManagementServiceServer).ListImportJobs(ctx, req.(*ListImportJobsRequest)) 2747 } 2748 return interceptor(ctx, in, info, handler) 2749} 2750 2751func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2752 in := new(GetKeyRingRequest) 2753 if err := dec(in); err != nil { 2754 return nil, err 2755 } 2756 if interceptor == nil { 2757 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in) 2758 } 2759 info := &grpc.UnaryServerInfo{ 2760 Server: srv, 2761 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", 2762 } 2763 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2764 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest)) 2765 } 2766 return interceptor(ctx, in, info, handler) 2767} 2768 2769func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2770 in := new(GetCryptoKeyRequest) 2771 if err := dec(in); err != nil { 2772 return nil, err 2773 } 2774 if interceptor == nil { 2775 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in) 2776 } 2777 info := &grpc.UnaryServerInfo{ 2778 Server: srv, 2779 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", 2780 } 2781 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2782 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest)) 2783 } 2784 return interceptor(ctx, in, info, handler) 2785} 2786 2787func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2788 in := new(GetCryptoKeyVersionRequest) 2789 if err := dec(in); err != nil { 2790 return nil, err 2791 } 2792 if interceptor == nil { 2793 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in) 2794 } 2795 info := &grpc.UnaryServerInfo{ 2796 Server: srv, 2797 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", 2798 } 2799 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2800 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest)) 2801 } 2802 return interceptor(ctx, in, info, handler) 2803} 2804 2805func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2806 in := new(GetPublicKeyRequest) 2807 if err := dec(in); err != nil { 2808 return nil, err 2809 } 2810 if interceptor == nil { 2811 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in) 2812 } 2813 info := &grpc.UnaryServerInfo{ 2814 Server: srv, 2815 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", 2816 } 2817 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2818 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest)) 2819 } 2820 return interceptor(ctx, in, info, handler) 2821} 2822 2823func _KeyManagementService_GetImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2824 in := new(GetImportJobRequest) 2825 if err := dec(in); err != nil { 2826 return nil, err 2827 } 2828 if interceptor == nil { 2829 return srv.(KeyManagementServiceServer).GetImportJob(ctx, in) 2830 } 2831 info := &grpc.UnaryServerInfo{ 2832 Server: srv, 2833 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetImportJob", 2834 } 2835 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2836 return srv.(KeyManagementServiceServer).GetImportJob(ctx, req.(*GetImportJobRequest)) 2837 } 2838 return interceptor(ctx, in, info, handler) 2839} 2840 2841func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2842 in := new(CreateKeyRingRequest) 2843 if err := dec(in); err != nil { 2844 return nil, err 2845 } 2846 if interceptor == nil { 2847 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in) 2848 } 2849 info := &grpc.UnaryServerInfo{ 2850 Server: srv, 2851 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", 2852 } 2853 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2854 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest)) 2855 } 2856 return interceptor(ctx, in, info, handler) 2857} 2858 2859func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2860 in := new(CreateCryptoKeyRequest) 2861 if err := dec(in); err != nil { 2862 return nil, err 2863 } 2864 if interceptor == nil { 2865 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in) 2866 } 2867 info := &grpc.UnaryServerInfo{ 2868 Server: srv, 2869 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", 2870 } 2871 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2872 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest)) 2873 } 2874 return interceptor(ctx, in, info, handler) 2875} 2876 2877func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2878 in := new(CreateCryptoKeyVersionRequest) 2879 if err := dec(in); err != nil { 2880 return nil, err 2881 } 2882 if interceptor == nil { 2883 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in) 2884 } 2885 info := &grpc.UnaryServerInfo{ 2886 Server: srv, 2887 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", 2888 } 2889 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2890 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest)) 2891 } 2892 return interceptor(ctx, in, info, handler) 2893} 2894 2895func _KeyManagementService_ImportCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2896 in := new(ImportCryptoKeyVersionRequest) 2897 if err := dec(in); err != nil { 2898 return nil, err 2899 } 2900 if interceptor == nil { 2901 return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, in) 2902 } 2903 info := &grpc.UnaryServerInfo{ 2904 Server: srv, 2905 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ImportCryptoKeyVersion", 2906 } 2907 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2908 return srv.(KeyManagementServiceServer).ImportCryptoKeyVersion(ctx, req.(*ImportCryptoKeyVersionRequest)) 2909 } 2910 return interceptor(ctx, in, info, handler) 2911} 2912 2913func _KeyManagementService_CreateImportJob_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2914 in := new(CreateImportJobRequest) 2915 if err := dec(in); err != nil { 2916 return nil, err 2917 } 2918 if interceptor == nil { 2919 return srv.(KeyManagementServiceServer).CreateImportJob(ctx, in) 2920 } 2921 info := &grpc.UnaryServerInfo{ 2922 Server: srv, 2923 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateImportJob", 2924 } 2925 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2926 return srv.(KeyManagementServiceServer).CreateImportJob(ctx, req.(*CreateImportJobRequest)) 2927 } 2928 return interceptor(ctx, in, info, handler) 2929} 2930 2931func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2932 in := new(UpdateCryptoKeyRequest) 2933 if err := dec(in); err != nil { 2934 return nil, err 2935 } 2936 if interceptor == nil { 2937 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in) 2938 } 2939 info := &grpc.UnaryServerInfo{ 2940 Server: srv, 2941 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", 2942 } 2943 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2944 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest)) 2945 } 2946 return interceptor(ctx, in, info, handler) 2947} 2948 2949func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2950 in := new(UpdateCryptoKeyVersionRequest) 2951 if err := dec(in); err != nil { 2952 return nil, err 2953 } 2954 if interceptor == nil { 2955 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in) 2956 } 2957 info := &grpc.UnaryServerInfo{ 2958 Server: srv, 2959 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", 2960 } 2961 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2962 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest)) 2963 } 2964 return interceptor(ctx, in, info, handler) 2965} 2966 2967func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2968 in := new(EncryptRequest) 2969 if err := dec(in); err != nil { 2970 return nil, err 2971 } 2972 if interceptor == nil { 2973 return srv.(KeyManagementServiceServer).Encrypt(ctx, in) 2974 } 2975 info := &grpc.UnaryServerInfo{ 2976 Server: srv, 2977 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt", 2978 } 2979 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2980 return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest)) 2981 } 2982 return interceptor(ctx, in, info, handler) 2983} 2984 2985func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2986 in := new(DecryptRequest) 2987 if err := dec(in); err != nil { 2988 return nil, err 2989 } 2990 if interceptor == nil { 2991 return srv.(KeyManagementServiceServer).Decrypt(ctx, in) 2992 } 2993 info := &grpc.UnaryServerInfo{ 2994 Server: srv, 2995 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt", 2996 } 2997 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2998 return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest)) 2999 } 3000 return interceptor(ctx, in, info, handler) 3001} 3002 3003func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3004 in := new(AsymmetricSignRequest) 3005 if err := dec(in); err != nil { 3006 return nil, err 3007 } 3008 if interceptor == nil { 3009 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in) 3010 } 3011 info := &grpc.UnaryServerInfo{ 3012 Server: srv, 3013 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", 3014 } 3015 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3016 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest)) 3017 } 3018 return interceptor(ctx, in, info, handler) 3019} 3020 3021func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3022 in := new(AsymmetricDecryptRequest) 3023 if err := dec(in); err != nil { 3024 return nil, err 3025 } 3026 if interceptor == nil { 3027 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in) 3028 } 3029 info := &grpc.UnaryServerInfo{ 3030 Server: srv, 3031 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", 3032 } 3033 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3034 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest)) 3035 } 3036 return interceptor(ctx, in, info, handler) 3037} 3038 3039func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3040 in := new(UpdateCryptoKeyPrimaryVersionRequest) 3041 if err := dec(in); err != nil { 3042 return nil, err 3043 } 3044 if interceptor == nil { 3045 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in) 3046 } 3047 info := &grpc.UnaryServerInfo{ 3048 Server: srv, 3049 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", 3050 } 3051 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3052 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest)) 3053 } 3054 return interceptor(ctx, in, info, handler) 3055} 3056 3057func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3058 in := new(DestroyCryptoKeyVersionRequest) 3059 if err := dec(in); err != nil { 3060 return nil, err 3061 } 3062 if interceptor == nil { 3063 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in) 3064 } 3065 info := &grpc.UnaryServerInfo{ 3066 Server: srv, 3067 FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", 3068 } 3069 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3070 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest)) 3071 } 3072 return interceptor(ctx, in, info, handler) 3073} 3074 3075func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 3076 in := new(RestoreCryptoKeyVersionRequest) 3077 if err := dec(in); err != nil { 3078 return nil, err 3079 } 3080 if interceptor == nil { 3081 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in) 3082 } 3083 info := &grpc.UnaryServerInfo{ 3084 Server: srv, 3085 FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", 3086 } 3087 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 3088 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest)) 3089 } 3090 return interceptor(ctx, in, info, handler) 3091} 3092 3093var _KeyManagementService_serviceDesc = grpc.ServiceDesc{ 3094 ServiceName: "google.cloud.kms.v1.KeyManagementService", 3095 HandlerType: (*KeyManagementServiceServer)(nil), 3096 Methods: []grpc.MethodDesc{ 3097 { 3098 MethodName: "ListKeyRings", 3099 Handler: _KeyManagementService_ListKeyRings_Handler, 3100 }, 3101 { 3102 MethodName: "ListCryptoKeys", 3103 Handler: _KeyManagementService_ListCryptoKeys_Handler, 3104 }, 3105 { 3106 MethodName: "ListCryptoKeyVersions", 3107 Handler: _KeyManagementService_ListCryptoKeyVersions_Handler, 3108 }, 3109 { 3110 MethodName: "ListImportJobs", 3111 Handler: _KeyManagementService_ListImportJobs_Handler, 3112 }, 3113 { 3114 MethodName: "GetKeyRing", 3115 Handler: _KeyManagementService_GetKeyRing_Handler, 3116 }, 3117 { 3118 MethodName: "GetCryptoKey", 3119 Handler: _KeyManagementService_GetCryptoKey_Handler, 3120 }, 3121 { 3122 MethodName: "GetCryptoKeyVersion", 3123 Handler: _KeyManagementService_GetCryptoKeyVersion_Handler, 3124 }, 3125 { 3126 MethodName: "GetPublicKey", 3127 Handler: _KeyManagementService_GetPublicKey_Handler, 3128 }, 3129 { 3130 MethodName: "GetImportJob", 3131 Handler: _KeyManagementService_GetImportJob_Handler, 3132 }, 3133 { 3134 MethodName: "CreateKeyRing", 3135 Handler: _KeyManagementService_CreateKeyRing_Handler, 3136 }, 3137 { 3138 MethodName: "CreateCryptoKey", 3139 Handler: _KeyManagementService_CreateCryptoKey_Handler, 3140 }, 3141 { 3142 MethodName: "CreateCryptoKeyVersion", 3143 Handler: _KeyManagementService_CreateCryptoKeyVersion_Handler, 3144 }, 3145 { 3146 MethodName: "ImportCryptoKeyVersion", 3147 Handler: _KeyManagementService_ImportCryptoKeyVersion_Handler, 3148 }, 3149 { 3150 MethodName: "CreateImportJob", 3151 Handler: _KeyManagementService_CreateImportJob_Handler, 3152 }, 3153 { 3154 MethodName: "UpdateCryptoKey", 3155 Handler: _KeyManagementService_UpdateCryptoKey_Handler, 3156 }, 3157 { 3158 MethodName: "UpdateCryptoKeyVersion", 3159 Handler: _KeyManagementService_UpdateCryptoKeyVersion_Handler, 3160 }, 3161 { 3162 MethodName: "Encrypt", 3163 Handler: _KeyManagementService_Encrypt_Handler, 3164 }, 3165 { 3166 MethodName: "Decrypt", 3167 Handler: _KeyManagementService_Decrypt_Handler, 3168 }, 3169 { 3170 MethodName: "AsymmetricSign", 3171 Handler: _KeyManagementService_AsymmetricSign_Handler, 3172 }, 3173 { 3174 MethodName: "AsymmetricDecrypt", 3175 Handler: _KeyManagementService_AsymmetricDecrypt_Handler, 3176 }, 3177 { 3178 MethodName: "UpdateCryptoKeyPrimaryVersion", 3179 Handler: _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler, 3180 }, 3181 { 3182 MethodName: "DestroyCryptoKeyVersion", 3183 Handler: _KeyManagementService_DestroyCryptoKeyVersion_Handler, 3184 }, 3185 { 3186 MethodName: "RestoreCryptoKeyVersion", 3187 Handler: _KeyManagementService_RestoreCryptoKeyVersion_Handler, 3188 }, 3189 }, 3190 Streams: []grpc.StreamDesc{}, 3191 Metadata: "google/cloud/kms/v1/service.proto", 3192} 3193