1// Code generated by protoc-gen-go. DO NOT EDIT. 2// source: google/cloud/kms/v1/service.proto 3 4package kms 5 6import ( 7 context "context" 8 fmt "fmt" 9 math "math" 10 11 proto "github.com/golang/protobuf/proto" 12 _ "github.com/golang/protobuf/ptypes/struct" 13 _ "github.com/golang/protobuf/ptypes/wrappers" 14 _ "google.golang.org/genproto/googleapis/api/annotations" 15 field_mask "google.golang.org/genproto/protobuf/field_mask" 16 grpc "google.golang.org/grpc" 17) 18 19// Reference imports to suppress errors if they are not otherwise used. 20var _ = proto.Marshal 21var _ = fmt.Errorf 22var _ = math.Inf 23 24// This is a compile-time assertion to ensure that this generated file 25// is compatible with the proto package it is being compiled against. 26// A compilation error at this line likely means your copy of the 27// proto package needs to be updated. 28const _ = proto.ProtoPackageIsVersion3 // please upgrade the proto package 29 30// Request message for 31// [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 32type ListKeyRingsRequest struct { 33 // Required. The resource name of the location associated with the 34 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format 35 // `projects/*/locations/*`. 36 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 37 // Optional limit on the number of [KeyRings][google.cloud.kms.v1.KeyRing] to 38 // include in the response. Further [KeyRings][google.cloud.kms.v1.KeyRing] 39 // can subsequently be obtained by including the 40 // [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token] 41 // in a subsequent request. If unspecified, the server will pick an 42 // appropriate default. 43 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 44 // Optional pagination token, returned earlier via 45 // [ListKeyRingsResponse.next_page_token][google.cloud.kms.v1.ListKeyRingsResponse.next_page_token]. 46 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 47 XXX_NoUnkeyedLiteral struct{} `json:"-"` 48 XXX_unrecognized []byte `json:"-"` 49 XXX_sizecache int32 `json:"-"` 50} 51 52func (m *ListKeyRingsRequest) Reset() { *m = ListKeyRingsRequest{} } 53func (m *ListKeyRingsRequest) String() string { return proto.CompactTextString(m) } 54func (*ListKeyRingsRequest) ProtoMessage() {} 55func (*ListKeyRingsRequest) Descriptor() ([]byte, []int) { 56 return fileDescriptor_723aeaeb61739a25, []int{0} 57} 58 59func (m *ListKeyRingsRequest) XXX_Unmarshal(b []byte) error { 60 return xxx_messageInfo_ListKeyRingsRequest.Unmarshal(m, b) 61} 62func (m *ListKeyRingsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 63 return xxx_messageInfo_ListKeyRingsRequest.Marshal(b, m, deterministic) 64} 65func (m *ListKeyRingsRequest) XXX_Merge(src proto.Message) { 66 xxx_messageInfo_ListKeyRingsRequest.Merge(m, src) 67} 68func (m *ListKeyRingsRequest) XXX_Size() int { 69 return xxx_messageInfo_ListKeyRingsRequest.Size(m) 70} 71func (m *ListKeyRingsRequest) XXX_DiscardUnknown() { 72 xxx_messageInfo_ListKeyRingsRequest.DiscardUnknown(m) 73} 74 75var xxx_messageInfo_ListKeyRingsRequest proto.InternalMessageInfo 76 77func (m *ListKeyRingsRequest) GetParent() string { 78 if m != nil { 79 return m.Parent 80 } 81 return "" 82} 83 84func (m *ListKeyRingsRequest) GetPageSize() int32 { 85 if m != nil { 86 return m.PageSize 87 } 88 return 0 89} 90 91func (m *ListKeyRingsRequest) GetPageToken() string { 92 if m != nil { 93 return m.PageToken 94 } 95 return "" 96} 97 98// Request message for 99// [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 100type ListCryptoKeysRequest struct { 101 // Required. The resource name of the [KeyRing][google.cloud.kms.v1.KeyRing] 102 // to list, in the format `projects/*/locations/*/keyRings/*`. 103 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 104 // Optional limit on the number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] 105 // to include in the response. Further 106 // [CryptoKeys][google.cloud.kms.v1.CryptoKey] can subsequently be obtained by 107 // including the 108 // [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token] 109 // in a subsequent request. If unspecified, the server will pick an 110 // appropriate default. 111 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 112 // Optional pagination token, returned earlier via 113 // [ListCryptoKeysResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeysResponse.next_page_token]. 114 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 115 // The fields of the primary version to include in the response. 116 VersionView CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=version_view,json=versionView,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"version_view,omitempty"` 117 XXX_NoUnkeyedLiteral struct{} `json:"-"` 118 XXX_unrecognized []byte `json:"-"` 119 XXX_sizecache int32 `json:"-"` 120} 121 122func (m *ListCryptoKeysRequest) Reset() { *m = ListCryptoKeysRequest{} } 123func (m *ListCryptoKeysRequest) String() string { return proto.CompactTextString(m) } 124func (*ListCryptoKeysRequest) ProtoMessage() {} 125func (*ListCryptoKeysRequest) Descriptor() ([]byte, []int) { 126 return fileDescriptor_723aeaeb61739a25, []int{1} 127} 128 129func (m *ListCryptoKeysRequest) XXX_Unmarshal(b []byte) error { 130 return xxx_messageInfo_ListCryptoKeysRequest.Unmarshal(m, b) 131} 132func (m *ListCryptoKeysRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 133 return xxx_messageInfo_ListCryptoKeysRequest.Marshal(b, m, deterministic) 134} 135func (m *ListCryptoKeysRequest) XXX_Merge(src proto.Message) { 136 xxx_messageInfo_ListCryptoKeysRequest.Merge(m, src) 137} 138func (m *ListCryptoKeysRequest) XXX_Size() int { 139 return xxx_messageInfo_ListCryptoKeysRequest.Size(m) 140} 141func (m *ListCryptoKeysRequest) XXX_DiscardUnknown() { 142 xxx_messageInfo_ListCryptoKeysRequest.DiscardUnknown(m) 143} 144 145var xxx_messageInfo_ListCryptoKeysRequest proto.InternalMessageInfo 146 147func (m *ListCryptoKeysRequest) GetParent() string { 148 if m != nil { 149 return m.Parent 150 } 151 return "" 152} 153 154func (m *ListCryptoKeysRequest) GetPageSize() int32 { 155 if m != nil { 156 return m.PageSize 157 } 158 return 0 159} 160 161func (m *ListCryptoKeysRequest) GetPageToken() string { 162 if m != nil { 163 return m.PageToken 164 } 165 return "" 166} 167 168func (m *ListCryptoKeysRequest) GetVersionView() CryptoKeyVersion_CryptoKeyVersionView { 169 if m != nil { 170 return m.VersionView 171 } 172 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 173} 174 175// Request message for 176// [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 177type ListCryptoKeyVersionsRequest struct { 178 // Required. The resource name of the 179 // [CryptoKey][google.cloud.kms.v1.CryptoKey] to list, in the format 180 // `projects/*/locations/*/keyRings/*/cryptoKeys/*`. 181 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 182 // Optional limit on the number of 183 // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] to include in the 184 // response. Further [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] 185 // can subsequently be obtained by including the 186 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token] 187 // in a subsequent request. If unspecified, the server will pick an 188 // appropriate default. 189 PageSize int32 `protobuf:"varint,2,opt,name=page_size,json=pageSize,proto3" json:"page_size,omitempty"` 190 // Optional pagination token, returned earlier via 191 // [ListCryptoKeyVersionsResponse.next_page_token][google.cloud.kms.v1.ListCryptoKeyVersionsResponse.next_page_token]. 192 PageToken string `protobuf:"bytes,3,opt,name=page_token,json=pageToken,proto3" json:"page_token,omitempty"` 193 // The fields to include in the response. 194 View CryptoKeyVersion_CryptoKeyVersionView `protobuf:"varint,4,opt,name=view,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView" json:"view,omitempty"` 195 XXX_NoUnkeyedLiteral struct{} `json:"-"` 196 XXX_unrecognized []byte `json:"-"` 197 XXX_sizecache int32 `json:"-"` 198} 199 200func (m *ListCryptoKeyVersionsRequest) Reset() { *m = ListCryptoKeyVersionsRequest{} } 201func (m *ListCryptoKeyVersionsRequest) String() string { return proto.CompactTextString(m) } 202func (*ListCryptoKeyVersionsRequest) ProtoMessage() {} 203func (*ListCryptoKeyVersionsRequest) Descriptor() ([]byte, []int) { 204 return fileDescriptor_723aeaeb61739a25, []int{2} 205} 206 207func (m *ListCryptoKeyVersionsRequest) XXX_Unmarshal(b []byte) error { 208 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Unmarshal(m, b) 209} 210func (m *ListCryptoKeyVersionsRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 211 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Marshal(b, m, deterministic) 212} 213func (m *ListCryptoKeyVersionsRequest) XXX_Merge(src proto.Message) { 214 xxx_messageInfo_ListCryptoKeyVersionsRequest.Merge(m, src) 215} 216func (m *ListCryptoKeyVersionsRequest) XXX_Size() int { 217 return xxx_messageInfo_ListCryptoKeyVersionsRequest.Size(m) 218} 219func (m *ListCryptoKeyVersionsRequest) XXX_DiscardUnknown() { 220 xxx_messageInfo_ListCryptoKeyVersionsRequest.DiscardUnknown(m) 221} 222 223var xxx_messageInfo_ListCryptoKeyVersionsRequest proto.InternalMessageInfo 224 225func (m *ListCryptoKeyVersionsRequest) GetParent() string { 226 if m != nil { 227 return m.Parent 228 } 229 return "" 230} 231 232func (m *ListCryptoKeyVersionsRequest) GetPageSize() int32 { 233 if m != nil { 234 return m.PageSize 235 } 236 return 0 237} 238 239func (m *ListCryptoKeyVersionsRequest) GetPageToken() string { 240 if m != nil { 241 return m.PageToken 242 } 243 return "" 244} 245 246func (m *ListCryptoKeyVersionsRequest) GetView() CryptoKeyVersion_CryptoKeyVersionView { 247 if m != nil { 248 return m.View 249 } 250 return CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED 251} 252 253// Response message for 254// [KeyManagementService.ListKeyRings][google.cloud.kms.v1.KeyManagementService.ListKeyRings]. 255type ListKeyRingsResponse struct { 256 // The list of [KeyRings][google.cloud.kms.v1.KeyRing]. 257 KeyRings []*KeyRing `protobuf:"bytes,1,rep,name=key_rings,json=keyRings,proto3" json:"key_rings,omitempty"` 258 // A token to retrieve next page of results. Pass this value in 259 // [ListKeyRingsRequest.page_token][google.cloud.kms.v1.ListKeyRingsRequest.page_token] 260 // to retrieve the next page of results. 261 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 262 // The total number of [KeyRings][google.cloud.kms.v1.KeyRing] that matched 263 // the query. 264 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 265 XXX_NoUnkeyedLiteral struct{} `json:"-"` 266 XXX_unrecognized []byte `json:"-"` 267 XXX_sizecache int32 `json:"-"` 268} 269 270func (m *ListKeyRingsResponse) Reset() { *m = ListKeyRingsResponse{} } 271func (m *ListKeyRingsResponse) String() string { return proto.CompactTextString(m) } 272func (*ListKeyRingsResponse) ProtoMessage() {} 273func (*ListKeyRingsResponse) Descriptor() ([]byte, []int) { 274 return fileDescriptor_723aeaeb61739a25, []int{3} 275} 276 277func (m *ListKeyRingsResponse) XXX_Unmarshal(b []byte) error { 278 return xxx_messageInfo_ListKeyRingsResponse.Unmarshal(m, b) 279} 280func (m *ListKeyRingsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 281 return xxx_messageInfo_ListKeyRingsResponse.Marshal(b, m, deterministic) 282} 283func (m *ListKeyRingsResponse) XXX_Merge(src proto.Message) { 284 xxx_messageInfo_ListKeyRingsResponse.Merge(m, src) 285} 286func (m *ListKeyRingsResponse) XXX_Size() int { 287 return xxx_messageInfo_ListKeyRingsResponse.Size(m) 288} 289func (m *ListKeyRingsResponse) XXX_DiscardUnknown() { 290 xxx_messageInfo_ListKeyRingsResponse.DiscardUnknown(m) 291} 292 293var xxx_messageInfo_ListKeyRingsResponse proto.InternalMessageInfo 294 295func (m *ListKeyRingsResponse) GetKeyRings() []*KeyRing { 296 if m != nil { 297 return m.KeyRings 298 } 299 return nil 300} 301 302func (m *ListKeyRingsResponse) GetNextPageToken() string { 303 if m != nil { 304 return m.NextPageToken 305 } 306 return "" 307} 308 309func (m *ListKeyRingsResponse) GetTotalSize() int32 { 310 if m != nil { 311 return m.TotalSize 312 } 313 return 0 314} 315 316// Response message for 317// [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. 318type ListCryptoKeysResponse struct { 319 // The list of [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 320 CryptoKeys []*CryptoKey `protobuf:"bytes,1,rep,name=crypto_keys,json=cryptoKeys,proto3" json:"crypto_keys,omitempty"` 321 // A token to retrieve next page of results. Pass this value in 322 // [ListCryptoKeysRequest.page_token][google.cloud.kms.v1.ListCryptoKeysRequest.page_token] 323 // to retrieve the next page of results. 324 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 325 // The total number of [CryptoKeys][google.cloud.kms.v1.CryptoKey] that 326 // matched the query. 327 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 328 XXX_NoUnkeyedLiteral struct{} `json:"-"` 329 XXX_unrecognized []byte `json:"-"` 330 XXX_sizecache int32 `json:"-"` 331} 332 333func (m *ListCryptoKeysResponse) Reset() { *m = ListCryptoKeysResponse{} } 334func (m *ListCryptoKeysResponse) String() string { return proto.CompactTextString(m) } 335func (*ListCryptoKeysResponse) ProtoMessage() {} 336func (*ListCryptoKeysResponse) Descriptor() ([]byte, []int) { 337 return fileDescriptor_723aeaeb61739a25, []int{4} 338} 339 340func (m *ListCryptoKeysResponse) XXX_Unmarshal(b []byte) error { 341 return xxx_messageInfo_ListCryptoKeysResponse.Unmarshal(m, b) 342} 343func (m *ListCryptoKeysResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 344 return xxx_messageInfo_ListCryptoKeysResponse.Marshal(b, m, deterministic) 345} 346func (m *ListCryptoKeysResponse) XXX_Merge(src proto.Message) { 347 xxx_messageInfo_ListCryptoKeysResponse.Merge(m, src) 348} 349func (m *ListCryptoKeysResponse) XXX_Size() int { 350 return xxx_messageInfo_ListCryptoKeysResponse.Size(m) 351} 352func (m *ListCryptoKeysResponse) XXX_DiscardUnknown() { 353 xxx_messageInfo_ListCryptoKeysResponse.DiscardUnknown(m) 354} 355 356var xxx_messageInfo_ListCryptoKeysResponse proto.InternalMessageInfo 357 358func (m *ListCryptoKeysResponse) GetCryptoKeys() []*CryptoKey { 359 if m != nil { 360 return m.CryptoKeys 361 } 362 return nil 363} 364 365func (m *ListCryptoKeysResponse) GetNextPageToken() string { 366 if m != nil { 367 return m.NextPageToken 368 } 369 return "" 370} 371 372func (m *ListCryptoKeysResponse) GetTotalSize() int32 { 373 if m != nil { 374 return m.TotalSize 375 } 376 return 0 377} 378 379// Response message for 380// [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions]. 381type ListCryptoKeyVersionsResponse struct { 382 // The list of [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 383 CryptoKeyVersions []*CryptoKeyVersion `protobuf:"bytes,1,rep,name=crypto_key_versions,json=cryptoKeyVersions,proto3" json:"crypto_key_versions,omitempty"` 384 // A token to retrieve next page of results. Pass this value in 385 // [ListCryptoKeyVersionsRequest.page_token][google.cloud.kms.v1.ListCryptoKeyVersionsRequest.page_token] 386 // to retrieve the next page of results. 387 NextPageToken string `protobuf:"bytes,2,opt,name=next_page_token,json=nextPageToken,proto3" json:"next_page_token,omitempty"` 388 // The total number of 389 // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] that matched the 390 // query. 391 TotalSize int32 `protobuf:"varint,3,opt,name=total_size,json=totalSize,proto3" json:"total_size,omitempty"` 392 XXX_NoUnkeyedLiteral struct{} `json:"-"` 393 XXX_unrecognized []byte `json:"-"` 394 XXX_sizecache int32 `json:"-"` 395} 396 397func (m *ListCryptoKeyVersionsResponse) Reset() { *m = ListCryptoKeyVersionsResponse{} } 398func (m *ListCryptoKeyVersionsResponse) String() string { return proto.CompactTextString(m) } 399func (*ListCryptoKeyVersionsResponse) ProtoMessage() {} 400func (*ListCryptoKeyVersionsResponse) Descriptor() ([]byte, []int) { 401 return fileDescriptor_723aeaeb61739a25, []int{5} 402} 403 404func (m *ListCryptoKeyVersionsResponse) XXX_Unmarshal(b []byte) error { 405 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Unmarshal(m, b) 406} 407func (m *ListCryptoKeyVersionsResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 408 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Marshal(b, m, deterministic) 409} 410func (m *ListCryptoKeyVersionsResponse) XXX_Merge(src proto.Message) { 411 xxx_messageInfo_ListCryptoKeyVersionsResponse.Merge(m, src) 412} 413func (m *ListCryptoKeyVersionsResponse) XXX_Size() int { 414 return xxx_messageInfo_ListCryptoKeyVersionsResponse.Size(m) 415} 416func (m *ListCryptoKeyVersionsResponse) XXX_DiscardUnknown() { 417 xxx_messageInfo_ListCryptoKeyVersionsResponse.DiscardUnknown(m) 418} 419 420var xxx_messageInfo_ListCryptoKeyVersionsResponse proto.InternalMessageInfo 421 422func (m *ListCryptoKeyVersionsResponse) GetCryptoKeyVersions() []*CryptoKeyVersion { 423 if m != nil { 424 return m.CryptoKeyVersions 425 } 426 return nil 427} 428 429func (m *ListCryptoKeyVersionsResponse) GetNextPageToken() string { 430 if m != nil { 431 return m.NextPageToken 432 } 433 return "" 434} 435 436func (m *ListCryptoKeyVersionsResponse) GetTotalSize() int32 { 437 if m != nil { 438 return m.TotalSize 439 } 440 return 0 441} 442 443// Request message for 444// [KeyManagementService.GetKeyRing][google.cloud.kms.v1.KeyManagementService.GetKeyRing]. 445type GetKeyRingRequest struct { 446 // The [name][google.cloud.kms.v1.KeyRing.name] of the 447 // [KeyRing][google.cloud.kms.v1.KeyRing] to get. 448 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 449 XXX_NoUnkeyedLiteral struct{} `json:"-"` 450 XXX_unrecognized []byte `json:"-"` 451 XXX_sizecache int32 `json:"-"` 452} 453 454func (m *GetKeyRingRequest) Reset() { *m = GetKeyRingRequest{} } 455func (m *GetKeyRingRequest) String() string { return proto.CompactTextString(m) } 456func (*GetKeyRingRequest) ProtoMessage() {} 457func (*GetKeyRingRequest) Descriptor() ([]byte, []int) { 458 return fileDescriptor_723aeaeb61739a25, []int{6} 459} 460 461func (m *GetKeyRingRequest) XXX_Unmarshal(b []byte) error { 462 return xxx_messageInfo_GetKeyRingRequest.Unmarshal(m, b) 463} 464func (m *GetKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 465 return xxx_messageInfo_GetKeyRingRequest.Marshal(b, m, deterministic) 466} 467func (m *GetKeyRingRequest) XXX_Merge(src proto.Message) { 468 xxx_messageInfo_GetKeyRingRequest.Merge(m, src) 469} 470func (m *GetKeyRingRequest) XXX_Size() int { 471 return xxx_messageInfo_GetKeyRingRequest.Size(m) 472} 473func (m *GetKeyRingRequest) XXX_DiscardUnknown() { 474 xxx_messageInfo_GetKeyRingRequest.DiscardUnknown(m) 475} 476 477var xxx_messageInfo_GetKeyRingRequest proto.InternalMessageInfo 478 479func (m *GetKeyRingRequest) GetName() string { 480 if m != nil { 481 return m.Name 482 } 483 return "" 484} 485 486// Request message for 487// [KeyManagementService.GetCryptoKey][google.cloud.kms.v1.KeyManagementService.GetCryptoKey]. 488type GetCryptoKeyRequest struct { 489 // The [name][google.cloud.kms.v1.CryptoKey.name] of the 490 // [CryptoKey][google.cloud.kms.v1.CryptoKey] to get. 491 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 492 XXX_NoUnkeyedLiteral struct{} `json:"-"` 493 XXX_unrecognized []byte `json:"-"` 494 XXX_sizecache int32 `json:"-"` 495} 496 497func (m *GetCryptoKeyRequest) Reset() { *m = GetCryptoKeyRequest{} } 498func (m *GetCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 499func (*GetCryptoKeyRequest) ProtoMessage() {} 500func (*GetCryptoKeyRequest) Descriptor() ([]byte, []int) { 501 return fileDescriptor_723aeaeb61739a25, []int{7} 502} 503 504func (m *GetCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 505 return xxx_messageInfo_GetCryptoKeyRequest.Unmarshal(m, b) 506} 507func (m *GetCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 508 return xxx_messageInfo_GetCryptoKeyRequest.Marshal(b, m, deterministic) 509} 510func (m *GetCryptoKeyRequest) XXX_Merge(src proto.Message) { 511 xxx_messageInfo_GetCryptoKeyRequest.Merge(m, src) 512} 513func (m *GetCryptoKeyRequest) XXX_Size() int { 514 return xxx_messageInfo_GetCryptoKeyRequest.Size(m) 515} 516func (m *GetCryptoKeyRequest) XXX_DiscardUnknown() { 517 xxx_messageInfo_GetCryptoKeyRequest.DiscardUnknown(m) 518} 519 520var xxx_messageInfo_GetCryptoKeyRequest proto.InternalMessageInfo 521 522func (m *GetCryptoKeyRequest) GetName() string { 523 if m != nil { 524 return m.Name 525 } 526 return "" 527} 528 529// Request message for 530// [KeyManagementService.GetCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.GetCryptoKeyVersion]. 531type GetCryptoKeyVersionRequest struct { 532 // The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the 533 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to get. 534 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 535 XXX_NoUnkeyedLiteral struct{} `json:"-"` 536 XXX_unrecognized []byte `json:"-"` 537 XXX_sizecache int32 `json:"-"` 538} 539 540func (m *GetCryptoKeyVersionRequest) Reset() { *m = GetCryptoKeyVersionRequest{} } 541func (m *GetCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 542func (*GetCryptoKeyVersionRequest) ProtoMessage() {} 543func (*GetCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 544 return fileDescriptor_723aeaeb61739a25, []int{8} 545} 546 547func (m *GetCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 548 return xxx_messageInfo_GetCryptoKeyVersionRequest.Unmarshal(m, b) 549} 550func (m *GetCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 551 return xxx_messageInfo_GetCryptoKeyVersionRequest.Marshal(b, m, deterministic) 552} 553func (m *GetCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 554 xxx_messageInfo_GetCryptoKeyVersionRequest.Merge(m, src) 555} 556func (m *GetCryptoKeyVersionRequest) XXX_Size() int { 557 return xxx_messageInfo_GetCryptoKeyVersionRequest.Size(m) 558} 559func (m *GetCryptoKeyVersionRequest) XXX_DiscardUnknown() { 560 xxx_messageInfo_GetCryptoKeyVersionRequest.DiscardUnknown(m) 561} 562 563var xxx_messageInfo_GetCryptoKeyVersionRequest proto.InternalMessageInfo 564 565func (m *GetCryptoKeyVersionRequest) GetName() string { 566 if m != nil { 567 return m.Name 568 } 569 return "" 570} 571 572// Request message for 573// [KeyManagementService.GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 574type GetPublicKeyRequest struct { 575 // The [name][google.cloud.kms.v1.CryptoKeyVersion.name] of the 576 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] public key to get. 577 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 578 XXX_NoUnkeyedLiteral struct{} `json:"-"` 579 XXX_unrecognized []byte `json:"-"` 580 XXX_sizecache int32 `json:"-"` 581} 582 583func (m *GetPublicKeyRequest) Reset() { *m = GetPublicKeyRequest{} } 584func (m *GetPublicKeyRequest) String() string { return proto.CompactTextString(m) } 585func (*GetPublicKeyRequest) ProtoMessage() {} 586func (*GetPublicKeyRequest) Descriptor() ([]byte, []int) { 587 return fileDescriptor_723aeaeb61739a25, []int{9} 588} 589 590func (m *GetPublicKeyRequest) XXX_Unmarshal(b []byte) error { 591 return xxx_messageInfo_GetPublicKeyRequest.Unmarshal(m, b) 592} 593func (m *GetPublicKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 594 return xxx_messageInfo_GetPublicKeyRequest.Marshal(b, m, deterministic) 595} 596func (m *GetPublicKeyRequest) XXX_Merge(src proto.Message) { 597 xxx_messageInfo_GetPublicKeyRequest.Merge(m, src) 598} 599func (m *GetPublicKeyRequest) XXX_Size() int { 600 return xxx_messageInfo_GetPublicKeyRequest.Size(m) 601} 602func (m *GetPublicKeyRequest) XXX_DiscardUnknown() { 603 xxx_messageInfo_GetPublicKeyRequest.DiscardUnknown(m) 604} 605 606var xxx_messageInfo_GetPublicKeyRequest proto.InternalMessageInfo 607 608func (m *GetPublicKeyRequest) GetName() string { 609 if m != nil { 610 return m.Name 611 } 612 return "" 613} 614 615// Request message for 616// [KeyManagementService.CreateKeyRing][google.cloud.kms.v1.KeyManagementService.CreateKeyRing]. 617type CreateKeyRingRequest struct { 618 // Required. The resource name of the location associated with the 619 // [KeyRings][google.cloud.kms.v1.KeyRing], in the format 620 // `projects/*/locations/*`. 621 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 622 // Required. It must be unique within a location and match the regular 623 // expression `[a-zA-Z0-9_-]{1,63}` 624 KeyRingId string `protobuf:"bytes,2,opt,name=key_ring_id,json=keyRingId,proto3" json:"key_ring_id,omitempty"` 625 // A [KeyRing][google.cloud.kms.v1.KeyRing] with initial field values. 626 KeyRing *KeyRing `protobuf:"bytes,3,opt,name=key_ring,json=keyRing,proto3" json:"key_ring,omitempty"` 627 XXX_NoUnkeyedLiteral struct{} `json:"-"` 628 XXX_unrecognized []byte `json:"-"` 629 XXX_sizecache int32 `json:"-"` 630} 631 632func (m *CreateKeyRingRequest) Reset() { *m = CreateKeyRingRequest{} } 633func (m *CreateKeyRingRequest) String() string { return proto.CompactTextString(m) } 634func (*CreateKeyRingRequest) ProtoMessage() {} 635func (*CreateKeyRingRequest) Descriptor() ([]byte, []int) { 636 return fileDescriptor_723aeaeb61739a25, []int{10} 637} 638 639func (m *CreateKeyRingRequest) XXX_Unmarshal(b []byte) error { 640 return xxx_messageInfo_CreateKeyRingRequest.Unmarshal(m, b) 641} 642func (m *CreateKeyRingRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 643 return xxx_messageInfo_CreateKeyRingRequest.Marshal(b, m, deterministic) 644} 645func (m *CreateKeyRingRequest) XXX_Merge(src proto.Message) { 646 xxx_messageInfo_CreateKeyRingRequest.Merge(m, src) 647} 648func (m *CreateKeyRingRequest) XXX_Size() int { 649 return xxx_messageInfo_CreateKeyRingRequest.Size(m) 650} 651func (m *CreateKeyRingRequest) XXX_DiscardUnknown() { 652 xxx_messageInfo_CreateKeyRingRequest.DiscardUnknown(m) 653} 654 655var xxx_messageInfo_CreateKeyRingRequest proto.InternalMessageInfo 656 657func (m *CreateKeyRingRequest) GetParent() string { 658 if m != nil { 659 return m.Parent 660 } 661 return "" 662} 663 664func (m *CreateKeyRingRequest) GetKeyRingId() string { 665 if m != nil { 666 return m.KeyRingId 667 } 668 return "" 669} 670 671func (m *CreateKeyRingRequest) GetKeyRing() *KeyRing { 672 if m != nil { 673 return m.KeyRing 674 } 675 return nil 676} 677 678// Request message for 679// [KeyManagementService.CreateCryptoKey][google.cloud.kms.v1.KeyManagementService.CreateCryptoKey]. 680type CreateCryptoKeyRequest struct { 681 // Required. The [name][google.cloud.kms.v1.KeyRing.name] of the KeyRing 682 // associated with the [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 683 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 684 // Required. It must be unique within a KeyRing and match the regular 685 // expression `[a-zA-Z0-9_-]{1,63}` 686 CryptoKeyId string `protobuf:"bytes,2,opt,name=crypto_key_id,json=cryptoKeyId,proto3" json:"crypto_key_id,omitempty"` 687 // A [CryptoKey][google.cloud.kms.v1.CryptoKey] with initial field values. 688 CryptoKey *CryptoKey `protobuf:"bytes,3,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 689 XXX_NoUnkeyedLiteral struct{} `json:"-"` 690 XXX_unrecognized []byte `json:"-"` 691 XXX_sizecache int32 `json:"-"` 692} 693 694func (m *CreateCryptoKeyRequest) Reset() { *m = CreateCryptoKeyRequest{} } 695func (m *CreateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 696func (*CreateCryptoKeyRequest) ProtoMessage() {} 697func (*CreateCryptoKeyRequest) Descriptor() ([]byte, []int) { 698 return fileDescriptor_723aeaeb61739a25, []int{11} 699} 700 701func (m *CreateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 702 return xxx_messageInfo_CreateCryptoKeyRequest.Unmarshal(m, b) 703} 704func (m *CreateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 705 return xxx_messageInfo_CreateCryptoKeyRequest.Marshal(b, m, deterministic) 706} 707func (m *CreateCryptoKeyRequest) XXX_Merge(src proto.Message) { 708 xxx_messageInfo_CreateCryptoKeyRequest.Merge(m, src) 709} 710func (m *CreateCryptoKeyRequest) XXX_Size() int { 711 return xxx_messageInfo_CreateCryptoKeyRequest.Size(m) 712} 713func (m *CreateCryptoKeyRequest) XXX_DiscardUnknown() { 714 xxx_messageInfo_CreateCryptoKeyRequest.DiscardUnknown(m) 715} 716 717var xxx_messageInfo_CreateCryptoKeyRequest proto.InternalMessageInfo 718 719func (m *CreateCryptoKeyRequest) GetParent() string { 720 if m != nil { 721 return m.Parent 722 } 723 return "" 724} 725 726func (m *CreateCryptoKeyRequest) GetCryptoKeyId() string { 727 if m != nil { 728 return m.CryptoKeyId 729 } 730 return "" 731} 732 733func (m *CreateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 734 if m != nil { 735 return m.CryptoKey 736 } 737 return nil 738} 739 740// Request message for 741// [KeyManagementService.CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion]. 742type CreateCryptoKeyVersionRequest struct { 743 // Required. The [name][google.cloud.kms.v1.CryptoKey.name] of the 744 // [CryptoKey][google.cloud.kms.v1.CryptoKey] associated with the 745 // [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 746 Parent string `protobuf:"bytes,1,opt,name=parent,proto3" json:"parent,omitempty"` 747 // A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with initial 748 // field values. 749 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,2,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 750 XXX_NoUnkeyedLiteral struct{} `json:"-"` 751 XXX_unrecognized []byte `json:"-"` 752 XXX_sizecache int32 `json:"-"` 753} 754 755func (m *CreateCryptoKeyVersionRequest) Reset() { *m = CreateCryptoKeyVersionRequest{} } 756func (m *CreateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 757func (*CreateCryptoKeyVersionRequest) ProtoMessage() {} 758func (*CreateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 759 return fileDescriptor_723aeaeb61739a25, []int{12} 760} 761 762func (m *CreateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 763 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Unmarshal(m, b) 764} 765func (m *CreateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 766 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 767} 768func (m *CreateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 769 xxx_messageInfo_CreateCryptoKeyVersionRequest.Merge(m, src) 770} 771func (m *CreateCryptoKeyVersionRequest) XXX_Size() int { 772 return xxx_messageInfo_CreateCryptoKeyVersionRequest.Size(m) 773} 774func (m *CreateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 775 xxx_messageInfo_CreateCryptoKeyVersionRequest.DiscardUnknown(m) 776} 777 778var xxx_messageInfo_CreateCryptoKeyVersionRequest proto.InternalMessageInfo 779 780func (m *CreateCryptoKeyVersionRequest) GetParent() string { 781 if m != nil { 782 return m.Parent 783 } 784 return "" 785} 786 787func (m *CreateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 788 if m != nil { 789 return m.CryptoKeyVersion 790 } 791 return nil 792} 793 794// Request message for 795// [KeyManagementService.UpdateCryptoKey][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKey]. 796type UpdateCryptoKeyRequest struct { 797 // [CryptoKey][google.cloud.kms.v1.CryptoKey] with updated values. 798 CryptoKey *CryptoKey `protobuf:"bytes,1,opt,name=crypto_key,json=cryptoKey,proto3" json:"crypto_key,omitempty"` 799 // Required list of fields to be updated in this request. 800 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 801 XXX_NoUnkeyedLiteral struct{} `json:"-"` 802 XXX_unrecognized []byte `json:"-"` 803 XXX_sizecache int32 `json:"-"` 804} 805 806func (m *UpdateCryptoKeyRequest) Reset() { *m = UpdateCryptoKeyRequest{} } 807func (m *UpdateCryptoKeyRequest) String() string { return proto.CompactTextString(m) } 808func (*UpdateCryptoKeyRequest) ProtoMessage() {} 809func (*UpdateCryptoKeyRequest) Descriptor() ([]byte, []int) { 810 return fileDescriptor_723aeaeb61739a25, []int{13} 811} 812 813func (m *UpdateCryptoKeyRequest) XXX_Unmarshal(b []byte) error { 814 return xxx_messageInfo_UpdateCryptoKeyRequest.Unmarshal(m, b) 815} 816func (m *UpdateCryptoKeyRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 817 return xxx_messageInfo_UpdateCryptoKeyRequest.Marshal(b, m, deterministic) 818} 819func (m *UpdateCryptoKeyRequest) XXX_Merge(src proto.Message) { 820 xxx_messageInfo_UpdateCryptoKeyRequest.Merge(m, src) 821} 822func (m *UpdateCryptoKeyRequest) XXX_Size() int { 823 return xxx_messageInfo_UpdateCryptoKeyRequest.Size(m) 824} 825func (m *UpdateCryptoKeyRequest) XXX_DiscardUnknown() { 826 xxx_messageInfo_UpdateCryptoKeyRequest.DiscardUnknown(m) 827} 828 829var xxx_messageInfo_UpdateCryptoKeyRequest proto.InternalMessageInfo 830 831func (m *UpdateCryptoKeyRequest) GetCryptoKey() *CryptoKey { 832 if m != nil { 833 return m.CryptoKey 834 } 835 return nil 836} 837 838func (m *UpdateCryptoKeyRequest) GetUpdateMask() *field_mask.FieldMask { 839 if m != nil { 840 return m.UpdateMask 841 } 842 return nil 843} 844 845// Request message for 846// [KeyManagementService.UpdateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyVersion]. 847type UpdateCryptoKeyVersionRequest struct { 848 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with updated 849 // values. 850 CryptoKeyVersion *CryptoKeyVersion `protobuf:"bytes,1,opt,name=crypto_key_version,json=cryptoKeyVersion,proto3" json:"crypto_key_version,omitempty"` 851 // Required list of fields to be updated in this request. 852 UpdateMask *field_mask.FieldMask `protobuf:"bytes,2,opt,name=update_mask,json=updateMask,proto3" json:"update_mask,omitempty"` 853 XXX_NoUnkeyedLiteral struct{} `json:"-"` 854 XXX_unrecognized []byte `json:"-"` 855 XXX_sizecache int32 `json:"-"` 856} 857 858func (m *UpdateCryptoKeyVersionRequest) Reset() { *m = UpdateCryptoKeyVersionRequest{} } 859func (m *UpdateCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 860func (*UpdateCryptoKeyVersionRequest) ProtoMessage() {} 861func (*UpdateCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 862 return fileDescriptor_723aeaeb61739a25, []int{14} 863} 864 865func (m *UpdateCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 866 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Unmarshal(m, b) 867} 868func (m *UpdateCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 869 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Marshal(b, m, deterministic) 870} 871func (m *UpdateCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 872 xxx_messageInfo_UpdateCryptoKeyVersionRequest.Merge(m, src) 873} 874func (m *UpdateCryptoKeyVersionRequest) XXX_Size() int { 875 return xxx_messageInfo_UpdateCryptoKeyVersionRequest.Size(m) 876} 877func (m *UpdateCryptoKeyVersionRequest) XXX_DiscardUnknown() { 878 xxx_messageInfo_UpdateCryptoKeyVersionRequest.DiscardUnknown(m) 879} 880 881var xxx_messageInfo_UpdateCryptoKeyVersionRequest proto.InternalMessageInfo 882 883func (m *UpdateCryptoKeyVersionRequest) GetCryptoKeyVersion() *CryptoKeyVersion { 884 if m != nil { 885 return m.CryptoKeyVersion 886 } 887 return nil 888} 889 890func (m *UpdateCryptoKeyVersionRequest) GetUpdateMask() *field_mask.FieldMask { 891 if m != nil { 892 return m.UpdateMask 893 } 894 return nil 895} 896 897// Request message for 898// [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 899type EncryptRequest struct { 900 // Required. The resource name of the 901 // [CryptoKey][google.cloud.kms.v1.CryptoKey] or 902 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for 903 // encryption. 904 // 905 // If a [CryptoKey][google.cloud.kms.v1.CryptoKey] is specified, the server 906 // will use its [primary version][google.cloud.kms.v1.CryptoKey.primary]. 907 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 908 // Required. The data to encrypt. Must be no larger than 64KiB. 909 // 910 // The maximum size depends on the key version's 911 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. 912 // For [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the 913 // plaintext must be no larger than 64KiB. For 914 // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of 915 // the plaintext and additional_authenticated_data fields must be no larger 916 // than 8KiB. 917 Plaintext []byte `protobuf:"bytes,2,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 918 // Optional data that, if specified, must also be provided during decryption 919 // through 920 // [DecryptRequest.additional_authenticated_data][google.cloud.kms.v1.DecryptRequest.additional_authenticated_data]. 921 // 922 // The maximum size depends on the key version's 923 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level]. 924 // For [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE] keys, the AAD 925 // must be no larger than 64KiB. For 926 // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] keys, the combined length of 927 // the plaintext and additional_authenticated_data fields must be no larger 928 // than 8KiB. 929 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 930 XXX_NoUnkeyedLiteral struct{} `json:"-"` 931 XXX_unrecognized []byte `json:"-"` 932 XXX_sizecache int32 `json:"-"` 933} 934 935func (m *EncryptRequest) Reset() { *m = EncryptRequest{} } 936func (m *EncryptRequest) String() string { return proto.CompactTextString(m) } 937func (*EncryptRequest) ProtoMessage() {} 938func (*EncryptRequest) Descriptor() ([]byte, []int) { 939 return fileDescriptor_723aeaeb61739a25, []int{15} 940} 941 942func (m *EncryptRequest) XXX_Unmarshal(b []byte) error { 943 return xxx_messageInfo_EncryptRequest.Unmarshal(m, b) 944} 945func (m *EncryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 946 return xxx_messageInfo_EncryptRequest.Marshal(b, m, deterministic) 947} 948func (m *EncryptRequest) XXX_Merge(src proto.Message) { 949 xxx_messageInfo_EncryptRequest.Merge(m, src) 950} 951func (m *EncryptRequest) XXX_Size() int { 952 return xxx_messageInfo_EncryptRequest.Size(m) 953} 954func (m *EncryptRequest) XXX_DiscardUnknown() { 955 xxx_messageInfo_EncryptRequest.DiscardUnknown(m) 956} 957 958var xxx_messageInfo_EncryptRequest proto.InternalMessageInfo 959 960func (m *EncryptRequest) GetName() string { 961 if m != nil { 962 return m.Name 963 } 964 return "" 965} 966 967func (m *EncryptRequest) GetPlaintext() []byte { 968 if m != nil { 969 return m.Plaintext 970 } 971 return nil 972} 973 974func (m *EncryptRequest) GetAdditionalAuthenticatedData() []byte { 975 if m != nil { 976 return m.AdditionalAuthenticatedData 977 } 978 return nil 979} 980 981// Request message for 982// [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 983type DecryptRequest struct { 984 // Required. The resource name of the 985 // [CryptoKey][google.cloud.kms.v1.CryptoKey] to use for decryption. The 986 // server will choose the appropriate version. 987 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 988 // Required. The encrypted data originally returned in 989 // [EncryptResponse.ciphertext][google.cloud.kms.v1.EncryptResponse.ciphertext]. 990 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 991 // Optional data that must match the data originally supplied in 992 // [EncryptRequest.additional_authenticated_data][google.cloud.kms.v1.EncryptRequest.additional_authenticated_data]. 993 AdditionalAuthenticatedData []byte `protobuf:"bytes,3,opt,name=additional_authenticated_data,json=additionalAuthenticatedData,proto3" json:"additional_authenticated_data,omitempty"` 994 XXX_NoUnkeyedLiteral struct{} `json:"-"` 995 XXX_unrecognized []byte `json:"-"` 996 XXX_sizecache int32 `json:"-"` 997} 998 999func (m *DecryptRequest) Reset() { *m = DecryptRequest{} } 1000func (m *DecryptRequest) String() string { return proto.CompactTextString(m) } 1001func (*DecryptRequest) ProtoMessage() {} 1002func (*DecryptRequest) Descriptor() ([]byte, []int) { 1003 return fileDescriptor_723aeaeb61739a25, []int{16} 1004} 1005 1006func (m *DecryptRequest) XXX_Unmarshal(b []byte) error { 1007 return xxx_messageInfo_DecryptRequest.Unmarshal(m, b) 1008} 1009func (m *DecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1010 return xxx_messageInfo_DecryptRequest.Marshal(b, m, deterministic) 1011} 1012func (m *DecryptRequest) XXX_Merge(src proto.Message) { 1013 xxx_messageInfo_DecryptRequest.Merge(m, src) 1014} 1015func (m *DecryptRequest) XXX_Size() int { 1016 return xxx_messageInfo_DecryptRequest.Size(m) 1017} 1018func (m *DecryptRequest) XXX_DiscardUnknown() { 1019 xxx_messageInfo_DecryptRequest.DiscardUnknown(m) 1020} 1021 1022var xxx_messageInfo_DecryptRequest proto.InternalMessageInfo 1023 1024func (m *DecryptRequest) GetName() string { 1025 if m != nil { 1026 return m.Name 1027 } 1028 return "" 1029} 1030 1031func (m *DecryptRequest) GetCiphertext() []byte { 1032 if m != nil { 1033 return m.Ciphertext 1034 } 1035 return nil 1036} 1037 1038func (m *DecryptRequest) GetAdditionalAuthenticatedData() []byte { 1039 if m != nil { 1040 return m.AdditionalAuthenticatedData 1041 } 1042 return nil 1043} 1044 1045// Request message for 1046// [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1047type AsymmetricSignRequest struct { 1048 // Required. The resource name of the 1049 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for 1050 // signing. 1051 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1052 // Required. The digest of the data to sign. The digest must be produced with 1053 // the same digest algorithm as specified by the key version's 1054 // [algorithm][google.cloud.kms.v1.CryptoKeyVersion.algorithm]. 1055 Digest *Digest `protobuf:"bytes,3,opt,name=digest,proto3" json:"digest,omitempty"` 1056 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1057 XXX_unrecognized []byte `json:"-"` 1058 XXX_sizecache int32 `json:"-"` 1059} 1060 1061func (m *AsymmetricSignRequest) Reset() { *m = AsymmetricSignRequest{} } 1062func (m *AsymmetricSignRequest) String() string { return proto.CompactTextString(m) } 1063func (*AsymmetricSignRequest) ProtoMessage() {} 1064func (*AsymmetricSignRequest) Descriptor() ([]byte, []int) { 1065 return fileDescriptor_723aeaeb61739a25, []int{17} 1066} 1067 1068func (m *AsymmetricSignRequest) XXX_Unmarshal(b []byte) error { 1069 return xxx_messageInfo_AsymmetricSignRequest.Unmarshal(m, b) 1070} 1071func (m *AsymmetricSignRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1072 return xxx_messageInfo_AsymmetricSignRequest.Marshal(b, m, deterministic) 1073} 1074func (m *AsymmetricSignRequest) XXX_Merge(src proto.Message) { 1075 xxx_messageInfo_AsymmetricSignRequest.Merge(m, src) 1076} 1077func (m *AsymmetricSignRequest) XXX_Size() int { 1078 return xxx_messageInfo_AsymmetricSignRequest.Size(m) 1079} 1080func (m *AsymmetricSignRequest) XXX_DiscardUnknown() { 1081 xxx_messageInfo_AsymmetricSignRequest.DiscardUnknown(m) 1082} 1083 1084var xxx_messageInfo_AsymmetricSignRequest proto.InternalMessageInfo 1085 1086func (m *AsymmetricSignRequest) GetName() string { 1087 if m != nil { 1088 return m.Name 1089 } 1090 return "" 1091} 1092 1093func (m *AsymmetricSignRequest) GetDigest() *Digest { 1094 if m != nil { 1095 return m.Digest 1096 } 1097 return nil 1098} 1099 1100// Request message for 1101// [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1102type AsymmetricDecryptRequest struct { 1103 // Required. The resource name of the 1104 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for 1105 // decryption. 1106 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1107 // Required. The data encrypted with the named 1108 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s public key using 1109 // OAEP. 1110 Ciphertext []byte `protobuf:"bytes,3,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1111 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1112 XXX_unrecognized []byte `json:"-"` 1113 XXX_sizecache int32 `json:"-"` 1114} 1115 1116func (m *AsymmetricDecryptRequest) Reset() { *m = AsymmetricDecryptRequest{} } 1117func (m *AsymmetricDecryptRequest) String() string { return proto.CompactTextString(m) } 1118func (*AsymmetricDecryptRequest) ProtoMessage() {} 1119func (*AsymmetricDecryptRequest) Descriptor() ([]byte, []int) { 1120 return fileDescriptor_723aeaeb61739a25, []int{18} 1121} 1122 1123func (m *AsymmetricDecryptRequest) XXX_Unmarshal(b []byte) error { 1124 return xxx_messageInfo_AsymmetricDecryptRequest.Unmarshal(m, b) 1125} 1126func (m *AsymmetricDecryptRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1127 return xxx_messageInfo_AsymmetricDecryptRequest.Marshal(b, m, deterministic) 1128} 1129func (m *AsymmetricDecryptRequest) XXX_Merge(src proto.Message) { 1130 xxx_messageInfo_AsymmetricDecryptRequest.Merge(m, src) 1131} 1132func (m *AsymmetricDecryptRequest) XXX_Size() int { 1133 return xxx_messageInfo_AsymmetricDecryptRequest.Size(m) 1134} 1135func (m *AsymmetricDecryptRequest) XXX_DiscardUnknown() { 1136 xxx_messageInfo_AsymmetricDecryptRequest.DiscardUnknown(m) 1137} 1138 1139var xxx_messageInfo_AsymmetricDecryptRequest proto.InternalMessageInfo 1140 1141func (m *AsymmetricDecryptRequest) GetName() string { 1142 if m != nil { 1143 return m.Name 1144 } 1145 return "" 1146} 1147 1148func (m *AsymmetricDecryptRequest) GetCiphertext() []byte { 1149 if m != nil { 1150 return m.Ciphertext 1151 } 1152 return nil 1153} 1154 1155// Response message for 1156// [KeyManagementService.Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. 1157type DecryptResponse struct { 1158 // The decrypted data originally supplied in 1159 // [EncryptRequest.plaintext][google.cloud.kms.v1.EncryptRequest.plaintext]. 1160 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1161 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1162 XXX_unrecognized []byte `json:"-"` 1163 XXX_sizecache int32 `json:"-"` 1164} 1165 1166func (m *DecryptResponse) Reset() { *m = DecryptResponse{} } 1167func (m *DecryptResponse) String() string { return proto.CompactTextString(m) } 1168func (*DecryptResponse) ProtoMessage() {} 1169func (*DecryptResponse) Descriptor() ([]byte, []int) { 1170 return fileDescriptor_723aeaeb61739a25, []int{19} 1171} 1172 1173func (m *DecryptResponse) XXX_Unmarshal(b []byte) error { 1174 return xxx_messageInfo_DecryptResponse.Unmarshal(m, b) 1175} 1176func (m *DecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1177 return xxx_messageInfo_DecryptResponse.Marshal(b, m, deterministic) 1178} 1179func (m *DecryptResponse) XXX_Merge(src proto.Message) { 1180 xxx_messageInfo_DecryptResponse.Merge(m, src) 1181} 1182func (m *DecryptResponse) XXX_Size() int { 1183 return xxx_messageInfo_DecryptResponse.Size(m) 1184} 1185func (m *DecryptResponse) XXX_DiscardUnknown() { 1186 xxx_messageInfo_DecryptResponse.DiscardUnknown(m) 1187} 1188 1189var xxx_messageInfo_DecryptResponse proto.InternalMessageInfo 1190 1191func (m *DecryptResponse) GetPlaintext() []byte { 1192 if m != nil { 1193 return m.Plaintext 1194 } 1195 return nil 1196} 1197 1198// Response message for 1199// [KeyManagementService.Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1200type EncryptResponse struct { 1201 // The resource name of the 1202 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] used in 1203 // encryption. 1204 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1205 // The encrypted data. 1206 Ciphertext []byte `protobuf:"bytes,2,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"` 1207 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1208 XXX_unrecognized []byte `json:"-"` 1209 XXX_sizecache int32 `json:"-"` 1210} 1211 1212func (m *EncryptResponse) Reset() { *m = EncryptResponse{} } 1213func (m *EncryptResponse) String() string { return proto.CompactTextString(m) } 1214func (*EncryptResponse) ProtoMessage() {} 1215func (*EncryptResponse) Descriptor() ([]byte, []int) { 1216 return fileDescriptor_723aeaeb61739a25, []int{20} 1217} 1218 1219func (m *EncryptResponse) XXX_Unmarshal(b []byte) error { 1220 return xxx_messageInfo_EncryptResponse.Unmarshal(m, b) 1221} 1222func (m *EncryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1223 return xxx_messageInfo_EncryptResponse.Marshal(b, m, deterministic) 1224} 1225func (m *EncryptResponse) XXX_Merge(src proto.Message) { 1226 xxx_messageInfo_EncryptResponse.Merge(m, src) 1227} 1228func (m *EncryptResponse) XXX_Size() int { 1229 return xxx_messageInfo_EncryptResponse.Size(m) 1230} 1231func (m *EncryptResponse) XXX_DiscardUnknown() { 1232 xxx_messageInfo_EncryptResponse.DiscardUnknown(m) 1233} 1234 1235var xxx_messageInfo_EncryptResponse proto.InternalMessageInfo 1236 1237func (m *EncryptResponse) GetName() string { 1238 if m != nil { 1239 return m.Name 1240 } 1241 return "" 1242} 1243 1244func (m *EncryptResponse) GetCiphertext() []byte { 1245 if m != nil { 1246 return m.Ciphertext 1247 } 1248 return nil 1249} 1250 1251// Response message for 1252// [KeyManagementService.AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign]. 1253type AsymmetricSignResponse struct { 1254 // The created signature. 1255 Signature []byte `protobuf:"bytes,1,opt,name=signature,proto3" json:"signature,omitempty"` 1256 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1257 XXX_unrecognized []byte `json:"-"` 1258 XXX_sizecache int32 `json:"-"` 1259} 1260 1261func (m *AsymmetricSignResponse) Reset() { *m = AsymmetricSignResponse{} } 1262func (m *AsymmetricSignResponse) String() string { return proto.CompactTextString(m) } 1263func (*AsymmetricSignResponse) ProtoMessage() {} 1264func (*AsymmetricSignResponse) Descriptor() ([]byte, []int) { 1265 return fileDescriptor_723aeaeb61739a25, []int{21} 1266} 1267 1268func (m *AsymmetricSignResponse) XXX_Unmarshal(b []byte) error { 1269 return xxx_messageInfo_AsymmetricSignResponse.Unmarshal(m, b) 1270} 1271func (m *AsymmetricSignResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1272 return xxx_messageInfo_AsymmetricSignResponse.Marshal(b, m, deterministic) 1273} 1274func (m *AsymmetricSignResponse) XXX_Merge(src proto.Message) { 1275 xxx_messageInfo_AsymmetricSignResponse.Merge(m, src) 1276} 1277func (m *AsymmetricSignResponse) XXX_Size() int { 1278 return xxx_messageInfo_AsymmetricSignResponse.Size(m) 1279} 1280func (m *AsymmetricSignResponse) XXX_DiscardUnknown() { 1281 xxx_messageInfo_AsymmetricSignResponse.DiscardUnknown(m) 1282} 1283 1284var xxx_messageInfo_AsymmetricSignResponse proto.InternalMessageInfo 1285 1286func (m *AsymmetricSignResponse) GetSignature() []byte { 1287 if m != nil { 1288 return m.Signature 1289 } 1290 return nil 1291} 1292 1293// Response message for 1294// [KeyManagementService.AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt]. 1295type AsymmetricDecryptResponse struct { 1296 // The decrypted data originally encrypted with the matching public key. 1297 Plaintext []byte `protobuf:"bytes,1,opt,name=plaintext,proto3" json:"plaintext,omitempty"` 1298 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1299 XXX_unrecognized []byte `json:"-"` 1300 XXX_sizecache int32 `json:"-"` 1301} 1302 1303func (m *AsymmetricDecryptResponse) Reset() { *m = AsymmetricDecryptResponse{} } 1304func (m *AsymmetricDecryptResponse) String() string { return proto.CompactTextString(m) } 1305func (*AsymmetricDecryptResponse) ProtoMessage() {} 1306func (*AsymmetricDecryptResponse) Descriptor() ([]byte, []int) { 1307 return fileDescriptor_723aeaeb61739a25, []int{22} 1308} 1309 1310func (m *AsymmetricDecryptResponse) XXX_Unmarshal(b []byte) error { 1311 return xxx_messageInfo_AsymmetricDecryptResponse.Unmarshal(m, b) 1312} 1313func (m *AsymmetricDecryptResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1314 return xxx_messageInfo_AsymmetricDecryptResponse.Marshal(b, m, deterministic) 1315} 1316func (m *AsymmetricDecryptResponse) XXX_Merge(src proto.Message) { 1317 xxx_messageInfo_AsymmetricDecryptResponse.Merge(m, src) 1318} 1319func (m *AsymmetricDecryptResponse) XXX_Size() int { 1320 return xxx_messageInfo_AsymmetricDecryptResponse.Size(m) 1321} 1322func (m *AsymmetricDecryptResponse) XXX_DiscardUnknown() { 1323 xxx_messageInfo_AsymmetricDecryptResponse.DiscardUnknown(m) 1324} 1325 1326var xxx_messageInfo_AsymmetricDecryptResponse proto.InternalMessageInfo 1327 1328func (m *AsymmetricDecryptResponse) GetPlaintext() []byte { 1329 if m != nil { 1330 return m.Plaintext 1331 } 1332 return nil 1333} 1334 1335// Request message for 1336// [KeyManagementService.UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. 1337type UpdateCryptoKeyPrimaryVersionRequest struct { 1338 // The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to 1339 // update. 1340 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1341 // The id of the child 1342 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary. 1343 CryptoKeyVersionId string `protobuf:"bytes,2,opt,name=crypto_key_version_id,json=cryptoKeyVersionId,proto3" json:"crypto_key_version_id,omitempty"` 1344 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1345 XXX_unrecognized []byte `json:"-"` 1346 XXX_sizecache int32 `json:"-"` 1347} 1348 1349func (m *UpdateCryptoKeyPrimaryVersionRequest) Reset() { *m = UpdateCryptoKeyPrimaryVersionRequest{} } 1350func (m *UpdateCryptoKeyPrimaryVersionRequest) String() string { return proto.CompactTextString(m) } 1351func (*UpdateCryptoKeyPrimaryVersionRequest) ProtoMessage() {} 1352func (*UpdateCryptoKeyPrimaryVersionRequest) Descriptor() ([]byte, []int) { 1353 return fileDescriptor_723aeaeb61739a25, []int{23} 1354} 1355 1356func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Unmarshal(b []byte) error { 1357 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Unmarshal(m, b) 1358} 1359func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1360 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Marshal(b, m, deterministic) 1361} 1362func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Merge(src proto.Message) { 1363 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Merge(m, src) 1364} 1365func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_Size() int { 1366 return xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.Size(m) 1367} 1368func (m *UpdateCryptoKeyPrimaryVersionRequest) XXX_DiscardUnknown() { 1369 xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest.DiscardUnknown(m) 1370} 1371 1372var xxx_messageInfo_UpdateCryptoKeyPrimaryVersionRequest proto.InternalMessageInfo 1373 1374func (m *UpdateCryptoKeyPrimaryVersionRequest) GetName() string { 1375 if m != nil { 1376 return m.Name 1377 } 1378 return "" 1379} 1380 1381func (m *UpdateCryptoKeyPrimaryVersionRequest) GetCryptoKeyVersionId() string { 1382 if m != nil { 1383 return m.CryptoKeyVersionId 1384 } 1385 return "" 1386} 1387 1388// Request message for 1389// [KeyManagementService.DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion]. 1390type DestroyCryptoKeyVersionRequest struct { 1391 // The resource name of the 1392 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy. 1393 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1394 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1395 XXX_unrecognized []byte `json:"-"` 1396 XXX_sizecache int32 `json:"-"` 1397} 1398 1399func (m *DestroyCryptoKeyVersionRequest) Reset() { *m = DestroyCryptoKeyVersionRequest{} } 1400func (m *DestroyCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1401func (*DestroyCryptoKeyVersionRequest) ProtoMessage() {} 1402func (*DestroyCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1403 return fileDescriptor_723aeaeb61739a25, []int{24} 1404} 1405 1406func (m *DestroyCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1407 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Unmarshal(m, b) 1408} 1409func (m *DestroyCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1410 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1411} 1412func (m *DestroyCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1413 xxx_messageInfo_DestroyCryptoKeyVersionRequest.Merge(m, src) 1414} 1415func (m *DestroyCryptoKeyVersionRequest) XXX_Size() int { 1416 return xxx_messageInfo_DestroyCryptoKeyVersionRequest.Size(m) 1417} 1418func (m *DestroyCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1419 xxx_messageInfo_DestroyCryptoKeyVersionRequest.DiscardUnknown(m) 1420} 1421 1422var xxx_messageInfo_DestroyCryptoKeyVersionRequest proto.InternalMessageInfo 1423 1424func (m *DestroyCryptoKeyVersionRequest) GetName() string { 1425 if m != nil { 1426 return m.Name 1427 } 1428 return "" 1429} 1430 1431// Request message for 1432// [KeyManagementService.RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]. 1433type RestoreCryptoKeyVersionRequest struct { 1434 // The resource name of the 1435 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore. 1436 Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` 1437 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1438 XXX_unrecognized []byte `json:"-"` 1439 XXX_sizecache int32 `json:"-"` 1440} 1441 1442func (m *RestoreCryptoKeyVersionRequest) Reset() { *m = RestoreCryptoKeyVersionRequest{} } 1443func (m *RestoreCryptoKeyVersionRequest) String() string { return proto.CompactTextString(m) } 1444func (*RestoreCryptoKeyVersionRequest) ProtoMessage() {} 1445func (*RestoreCryptoKeyVersionRequest) Descriptor() ([]byte, []int) { 1446 return fileDescriptor_723aeaeb61739a25, []int{25} 1447} 1448 1449func (m *RestoreCryptoKeyVersionRequest) XXX_Unmarshal(b []byte) error { 1450 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Unmarshal(m, b) 1451} 1452func (m *RestoreCryptoKeyVersionRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1453 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Marshal(b, m, deterministic) 1454} 1455func (m *RestoreCryptoKeyVersionRequest) XXX_Merge(src proto.Message) { 1456 xxx_messageInfo_RestoreCryptoKeyVersionRequest.Merge(m, src) 1457} 1458func (m *RestoreCryptoKeyVersionRequest) XXX_Size() int { 1459 return xxx_messageInfo_RestoreCryptoKeyVersionRequest.Size(m) 1460} 1461func (m *RestoreCryptoKeyVersionRequest) XXX_DiscardUnknown() { 1462 xxx_messageInfo_RestoreCryptoKeyVersionRequest.DiscardUnknown(m) 1463} 1464 1465var xxx_messageInfo_RestoreCryptoKeyVersionRequest proto.InternalMessageInfo 1466 1467func (m *RestoreCryptoKeyVersionRequest) GetName() string { 1468 if m != nil { 1469 return m.Name 1470 } 1471 return "" 1472} 1473 1474// A [Digest][google.cloud.kms.v1.Digest] holds a cryptographic message digest. 1475type Digest struct { 1476 // Required. The message digest. 1477 // 1478 // Types that are valid to be assigned to Digest: 1479 // *Digest_Sha256 1480 // *Digest_Sha384 1481 // *Digest_Sha512 1482 Digest isDigest_Digest `protobuf_oneof:"digest"` 1483 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1484 XXX_unrecognized []byte `json:"-"` 1485 XXX_sizecache int32 `json:"-"` 1486} 1487 1488func (m *Digest) Reset() { *m = Digest{} } 1489func (m *Digest) String() string { return proto.CompactTextString(m) } 1490func (*Digest) ProtoMessage() {} 1491func (*Digest) Descriptor() ([]byte, []int) { 1492 return fileDescriptor_723aeaeb61739a25, []int{26} 1493} 1494 1495func (m *Digest) XXX_Unmarshal(b []byte) error { 1496 return xxx_messageInfo_Digest.Unmarshal(m, b) 1497} 1498func (m *Digest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1499 return xxx_messageInfo_Digest.Marshal(b, m, deterministic) 1500} 1501func (m *Digest) XXX_Merge(src proto.Message) { 1502 xxx_messageInfo_Digest.Merge(m, src) 1503} 1504func (m *Digest) XXX_Size() int { 1505 return xxx_messageInfo_Digest.Size(m) 1506} 1507func (m *Digest) XXX_DiscardUnknown() { 1508 xxx_messageInfo_Digest.DiscardUnknown(m) 1509} 1510 1511var xxx_messageInfo_Digest proto.InternalMessageInfo 1512 1513type isDigest_Digest interface { 1514 isDigest_Digest() 1515} 1516 1517type Digest_Sha256 struct { 1518 Sha256 []byte `protobuf:"bytes,1,opt,name=sha256,proto3,oneof"` 1519} 1520 1521type Digest_Sha384 struct { 1522 Sha384 []byte `protobuf:"bytes,2,opt,name=sha384,proto3,oneof"` 1523} 1524 1525type Digest_Sha512 struct { 1526 Sha512 []byte `protobuf:"bytes,3,opt,name=sha512,proto3,oneof"` 1527} 1528 1529func (*Digest_Sha256) isDigest_Digest() {} 1530 1531func (*Digest_Sha384) isDigest_Digest() {} 1532 1533func (*Digest_Sha512) isDigest_Digest() {} 1534 1535func (m *Digest) GetDigest() isDigest_Digest { 1536 if m != nil { 1537 return m.Digest 1538 } 1539 return nil 1540} 1541 1542func (m *Digest) GetSha256() []byte { 1543 if x, ok := m.GetDigest().(*Digest_Sha256); ok { 1544 return x.Sha256 1545 } 1546 return nil 1547} 1548 1549func (m *Digest) GetSha384() []byte { 1550 if x, ok := m.GetDigest().(*Digest_Sha384); ok { 1551 return x.Sha384 1552 } 1553 return nil 1554} 1555 1556func (m *Digest) GetSha512() []byte { 1557 if x, ok := m.GetDigest().(*Digest_Sha512); ok { 1558 return x.Sha512 1559 } 1560 return nil 1561} 1562 1563// XXX_OneofWrappers is for the internal use of the proto package. 1564func (*Digest) XXX_OneofWrappers() []interface{} { 1565 return []interface{}{ 1566 (*Digest_Sha256)(nil), 1567 (*Digest_Sha384)(nil), 1568 (*Digest_Sha512)(nil), 1569 } 1570} 1571 1572// Cloud KMS metadata for the given 1573// [google.cloud.location.Location][google.cloud.location.Location]. 1574type LocationMetadata struct { 1575 // Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with 1576 // [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] 1577 // [HSM][google.cloud.kms.v1.ProtectionLevel.HSM] can be created in this 1578 // location. 1579 HsmAvailable bool `protobuf:"varint,1,opt,name=hsm_available,json=hsmAvailable,proto3" json:"hsm_available,omitempty"` 1580 XXX_NoUnkeyedLiteral struct{} `json:"-"` 1581 XXX_unrecognized []byte `json:"-"` 1582 XXX_sizecache int32 `json:"-"` 1583} 1584 1585func (m *LocationMetadata) Reset() { *m = LocationMetadata{} } 1586func (m *LocationMetadata) String() string { return proto.CompactTextString(m) } 1587func (*LocationMetadata) ProtoMessage() {} 1588func (*LocationMetadata) Descriptor() ([]byte, []int) { 1589 return fileDescriptor_723aeaeb61739a25, []int{27} 1590} 1591 1592func (m *LocationMetadata) XXX_Unmarshal(b []byte) error { 1593 return xxx_messageInfo_LocationMetadata.Unmarshal(m, b) 1594} 1595func (m *LocationMetadata) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { 1596 return xxx_messageInfo_LocationMetadata.Marshal(b, m, deterministic) 1597} 1598func (m *LocationMetadata) XXX_Merge(src proto.Message) { 1599 xxx_messageInfo_LocationMetadata.Merge(m, src) 1600} 1601func (m *LocationMetadata) XXX_Size() int { 1602 return xxx_messageInfo_LocationMetadata.Size(m) 1603} 1604func (m *LocationMetadata) XXX_DiscardUnknown() { 1605 xxx_messageInfo_LocationMetadata.DiscardUnknown(m) 1606} 1607 1608var xxx_messageInfo_LocationMetadata proto.InternalMessageInfo 1609 1610func (m *LocationMetadata) GetHsmAvailable() bool { 1611 if m != nil { 1612 return m.HsmAvailable 1613 } 1614 return false 1615} 1616 1617func init() { 1618 proto.RegisterType((*ListKeyRingsRequest)(nil), "google.cloud.kms.v1.ListKeyRingsRequest") 1619 proto.RegisterType((*ListCryptoKeysRequest)(nil), "google.cloud.kms.v1.ListCryptoKeysRequest") 1620 proto.RegisterType((*ListCryptoKeyVersionsRequest)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsRequest") 1621 proto.RegisterType((*ListKeyRingsResponse)(nil), "google.cloud.kms.v1.ListKeyRingsResponse") 1622 proto.RegisterType((*ListCryptoKeysResponse)(nil), "google.cloud.kms.v1.ListCryptoKeysResponse") 1623 proto.RegisterType((*ListCryptoKeyVersionsResponse)(nil), "google.cloud.kms.v1.ListCryptoKeyVersionsResponse") 1624 proto.RegisterType((*GetKeyRingRequest)(nil), "google.cloud.kms.v1.GetKeyRingRequest") 1625 proto.RegisterType((*GetCryptoKeyRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyRequest") 1626 proto.RegisterType((*GetCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.GetCryptoKeyVersionRequest") 1627 proto.RegisterType((*GetPublicKeyRequest)(nil), "google.cloud.kms.v1.GetPublicKeyRequest") 1628 proto.RegisterType((*CreateKeyRingRequest)(nil), "google.cloud.kms.v1.CreateKeyRingRequest") 1629 proto.RegisterType((*CreateCryptoKeyRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyRequest") 1630 proto.RegisterType((*CreateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.CreateCryptoKeyVersionRequest") 1631 proto.RegisterType((*UpdateCryptoKeyRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyRequest") 1632 proto.RegisterType((*UpdateCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyVersionRequest") 1633 proto.RegisterType((*EncryptRequest)(nil), "google.cloud.kms.v1.EncryptRequest") 1634 proto.RegisterType((*DecryptRequest)(nil), "google.cloud.kms.v1.DecryptRequest") 1635 proto.RegisterType((*AsymmetricSignRequest)(nil), "google.cloud.kms.v1.AsymmetricSignRequest") 1636 proto.RegisterType((*AsymmetricDecryptRequest)(nil), "google.cloud.kms.v1.AsymmetricDecryptRequest") 1637 proto.RegisterType((*DecryptResponse)(nil), "google.cloud.kms.v1.DecryptResponse") 1638 proto.RegisterType((*EncryptResponse)(nil), "google.cloud.kms.v1.EncryptResponse") 1639 proto.RegisterType((*AsymmetricSignResponse)(nil), "google.cloud.kms.v1.AsymmetricSignResponse") 1640 proto.RegisterType((*AsymmetricDecryptResponse)(nil), "google.cloud.kms.v1.AsymmetricDecryptResponse") 1641 proto.RegisterType((*UpdateCryptoKeyPrimaryVersionRequest)(nil), "google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest") 1642 proto.RegisterType((*DestroyCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.DestroyCryptoKeyVersionRequest") 1643 proto.RegisterType((*RestoreCryptoKeyVersionRequest)(nil), "google.cloud.kms.v1.RestoreCryptoKeyVersionRequest") 1644 proto.RegisterType((*Digest)(nil), "google.cloud.kms.v1.Digest") 1645 proto.RegisterType((*LocationMetadata)(nil), "google.cloud.kms.v1.LocationMetadata") 1646} 1647 1648func init() { proto.RegisterFile("google/cloud/kms/v1/service.proto", fileDescriptor_723aeaeb61739a25) } 1649 1650var fileDescriptor_723aeaeb61739a25 = []byte{ 1651 // 1666 bytes of a gzipped FileDescriptorProto 1652 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xc4, 0x59, 0xcd, 0x73, 0x1b, 0xc5, 1653 0x12, 0x7f, 0x63, 0xe7, 0x39, 0x76, 0xfb, 0x2b, 0x19, 0x27, 0x8e, 0x9f, 0x62, 0xbb, 0xfc, 0x26, 1654 0x79, 0x79, 0x8e, 0x03, 0x12, 0x92, 0x9d, 0x0f, 0x2b, 0x15, 0x28, 0x3b, 0x4e, 0x4c, 0xca, 0x71, 1655 0x70, 0xad, 0xb1, 0x21, 0x29, 0x53, 0xf2, 0x58, 0x3b, 0x91, 0x37, 0xd2, 0xee, 0x8a, 0xdd, 0x95, 1656 0x12, 0x05, 0x72, 0xe1, 0x00, 0x39, 0xe4, 0x16, 0x0e, 0xa1, 0xb8, 0x50, 0x70, 0xa3, 0xe0, 0xc0, 1657 0x0d, 0x0e, 0x5c, 0x28, 0x4e, 0xa9, 0xe2, 0x02, 0x95, 0xe2, 0x96, 0x13, 0xff, 0x00, 0x37, 0x8e, 1658 0xd4, 0xce, 0xce, 0xae, 0xb4, 0xab, 0x5d, 0x7d, 0x45, 0x29, 0x6e, 0xde, 0x99, 0x9e, 0x9e, 0xdf, 1659 0xaf, 0xfb, 0x37, 0x33, 0xdd, 0x32, 0xfc, 0x37, 0xa7, 0xeb, 0xb9, 0x02, 0x4b, 0x64, 0x0b, 0x7a, 1660 0x49, 0x4e, 0xe4, 0x55, 0x33, 0x51, 0x4e, 0x26, 0x4c, 0x66, 0x94, 0x95, 0x2c, 0x8b, 0x17, 0x0d, 1661 0xdd, 0xd2, 0xf1, 0x98, 0x63, 0x12, 0xe7, 0x26, 0xf1, 0xbc, 0x6a, 0xc6, 0xcb, 0xc9, 0xd8, 0xa4, 1662 0x58, 0x47, 0x8b, 0x4a, 0x82, 0x6a, 0x9a, 0x6e, 0x51, 0x4b, 0xd1, 0x35, 0xd3, 0x59, 0x12, 0x3b, 1663 0x11, 0xe6, 0xd5, 0x60, 0xa6, 0x5e, 0x32, 0xb2, 0xcc, 0x35, 0x9a, 0x11, 0x46, 0xfc, 0x6b, 0xaf, 1664 0x74, 0x3b, 0x71, 0x5b, 0x61, 0x05, 0x39, 0xa3, 0x52, 0x33, 0x2f, 0x2c, 0x26, 0x83, 0x16, 0xa6, 1665 0x65, 0x94, 0xb2, 0x96, 0x98, 0x9d, 0x0e, 0xce, 0xde, 0x35, 0x68, 0xb1, 0xc8, 0x0c, 0xe1, 0x9f, 1666 0x28, 0x30, 0x76, 0x5d, 0x31, 0xad, 0x35, 0x56, 0x91, 0x14, 0x2d, 0x67, 0x4a, 0xec, 0xfd, 0x12, 1667 0x33, 0x2d, 0x3c, 0x0e, 0x7d, 0x45, 0x6a, 0x30, 0xcd, 0x9a, 0x40, 0x33, 0x68, 0x76, 0x40, 0x12, 1668 0x5f, 0xf8, 0x38, 0x0c, 0x14, 0x69, 0x8e, 0x65, 0x4c, 0xe5, 0x3e, 0x9b, 0xe8, 0x99, 0x41, 0xb3, 1669 0xff, 0x96, 0xfa, 0xed, 0x81, 0x4d, 0xe5, 0x3e, 0xc3, 0x53, 0x00, 0x7c, 0xd2, 0xd2, 0xf3, 0x4c, 1670 0x9b, 0xe8, 0xe5, 0x0b, 0xb9, 0xf9, 0xdb, 0xf6, 0x00, 0x79, 0x8a, 0xe0, 0xa8, 0xbd, 0xd7, 0x65, 1671 0xa3, 0x52, 0xb4, 0xf4, 0x35, 0x56, 0x79, 0x99, 0xbb, 0xe1, 0xf7, 0x60, 0xa8, 0xcc, 0x0c, 0x53, 1672 0xd1, 0xb5, 0x4c, 0x59, 0x61, 0x77, 0x27, 0x0e, 0xcc, 0xa0, 0xd9, 0x91, 0x54, 0x3a, 0x1e, 0x92, 1673 0xa7, 0xb8, 0x87, 0x68, 0xdb, 0x59, 0x51, 0x37, 0xb0, 0xad, 0xb0, 0xbb, 0xd2, 0x60, 0xb9, 0xfa, 1674 0x41, 0x7e, 0x42, 0x30, 0xe9, 0x23, 0x23, 0x2c, 0x5f, 0x2a, 0xa7, 0x1b, 0x70, 0xa0, 0x4b, 0x5c, 1675 0xb8, 0x1f, 0xf2, 0x04, 0xc1, 0x11, 0x7f, 0xf6, 0xcd, 0xa2, 0xae, 0x99, 0x0c, 0x2f, 0xc2, 0x40, 1676 0x9e, 0x55, 0x32, 0x86, 0x3d, 0x38, 0x81, 0x66, 0x7a, 0x67, 0x07, 0x53, 0x93, 0xa1, 0xbb, 0x89, 1677 0x95, 0x52, 0x7f, 0x5e, 0xb8, 0xc0, 0xa7, 0x60, 0x54, 0x63, 0xf7, 0xac, 0x4c, 0x0d, 0x8f, 0x1e, 1678 0xce, 0x63, 0xd8, 0x1e, 0xde, 0xf0, 0xb8, 0x4c, 0x01, 0x58, 0xba, 0x45, 0x0b, 0x4e, 0x20, 0x7a, 1679 0x79, 0x20, 0x06, 0xf8, 0x88, 0x1d, 0x09, 0xf2, 0x05, 0x82, 0xf1, 0xa0, 0x58, 0x04, 0xb8, 0x37, 1680 0x60, 0x30, 0xcb, 0x47, 0x33, 0x79, 0x56, 0x71, 0xe1, 0x4d, 0x37, 0x0e, 0x86, 0x04, 0x59, 0xcf, 1681 0x51, 0xb7, 0x20, 0xfe, 0x88, 0x60, 0x2a, 0x42, 0x02, 0x02, 0xe9, 0x16, 0x8c, 0x55, 0x91, 0x66, 1682 0x84, 0x7c, 0x5c, 0xc4, 0xff, 0x6b, 0x29, 0x7d, 0xd2, 0xe1, 0x6c, 0xd0, 0x7d, 0xb7, 0xf0, 0xff, 1683 0x1f, 0x0e, 0xaf, 0x32, 0x37, 0xf7, 0xae, 0x6c, 0x31, 0x1c, 0xd0, 0xa8, 0xca, 0x84, 0x68, 0xf9, 1684 0xdf, 0xe4, 0x34, 0x8c, 0xad, 0xb2, 0x2a, 0xcd, 0x46, 0xa6, 0xaf, 0x41, 0xac, 0xd6, 0xd4, 0x25, 1685 0xd1, 0xd4, 0xf9, 0x46, 0x69, 0xaf, 0xa0, 0x64, 0x9b, 0x38, 0xff, 0x04, 0xc1, 0x91, 0xcb, 0x06, 1686 0xa3, 0x16, 0x0b, 0x80, 0x8e, 0x3a, 0x6b, 0xd3, 0x30, 0xe8, 0xca, 0x38, 0xa3, 0xc8, 0x22, 0x48, 1687 0x03, 0x42, 0xaa, 0xd7, 0x64, 0x7c, 0x1e, 0xfa, 0xdd, 0x79, 0x1e, 0x9e, 0x66, 0x2a, 0x3f, 0x28, 1688 0x96, 0x92, 0xc7, 0x08, 0xc6, 0x1d, 0x24, 0x75, 0x51, 0x89, 0xc2, 0x42, 0x60, 0xb8, 0x46, 0x0b, 1689 0x1e, 0x9a, 0x41, 0x2f, 0xbd, 0xd7, 0x64, 0x7c, 0x09, 0xa0, 0x6a, 0x23, 0x10, 0x35, 0x13, 0xf6, 1690 0x80, 0xe7, 0x80, 0x3c, 0x42, 0x30, 0x15, 0x40, 0x15, 0x48, 0x40, 0x14, 0xb8, 0x4d, 0xc0, 0xf5, 1691 0x42, 0xe5, 0x08, 0x5b, 0xd6, 0xe9, 0xa1, 0xa0, 0x4e, 0xc9, 0xa7, 0x08, 0xc6, 0xb7, 0x8a, 0x72, 1692 0x58, 0x90, 0xfc, 0x44, 0x51, 0x9b, 0x44, 0xf1, 0x45, 0x18, 0x2c, 0x71, 0xc7, 0xfc, 0x1d, 0x14, 1693 0x38, 0x63, 0xee, 0x7a, 0xf7, 0xa9, 0x8b, 0x5f, 0xb5, 0x9f, 0xca, 0x75, 0x6a, 0xe6, 0x25, 0x70, 1694 0xcc, 0xed, 0xbf, 0xc9, 0x77, 0x08, 0xa6, 0x02, 0xb0, 0x02, 0x51, 0x0a, 0x8f, 0x06, 0x7a, 0xa1, 1695 0x68, 0xbc, 0x18, 0xe6, 0x8f, 0x11, 0x8c, 0x5c, 0xd1, 0xb8, 0xcf, 0x06, 0x07, 0x04, 0x4f, 0xc2, 1696 0x40, 0xb1, 0x40, 0x15, 0xcd, 0x62, 0xf7, 0x2c, 0xbe, 0xc3, 0x90, 0x54, 0x1d, 0xc0, 0xcb, 0x30, 1697 0x45, 0x65, 0x59, 0xb1, 0x4b, 0x10, 0x5a, 0xc8, 0xd0, 0x92, 0xb5, 0xcf, 0x34, 0x4b, 0xc9, 0x52, 1698 0x8b, 0xc9, 0x19, 0x99, 0x5a, 0x94, 0x0b, 0x6e, 0x48, 0x3a, 0x5e, 0x35, 0x5a, 0xaa, 0xb5, 0x59, 1699 0xa1, 0x16, 0x25, 0x0f, 0x11, 0x8c, 0xac, 0xb0, 0xa6, 0x40, 0xa6, 0x01, 0xb2, 0x4a, 0x71, 0x9f, 1700 0x19, 0x35, 0x48, 0x6a, 0x46, 0xba, 0x02, 0x65, 0x17, 0x8e, 0x2e, 0x99, 0x15, 0x55, 0x65, 0x96, 1701 0xa1, 0x64, 0x37, 0x95, 0x5c, 0xa3, 0x5b, 0x06, 0xcf, 0x43, 0x9f, 0xac, 0xe4, 0x98, 0x69, 0x89, 1702 0x53, 0x75, 0x3c, 0x34, 0x8d, 0x2b, 0xdc, 0x44, 0x12, 0xa6, 0xe4, 0x06, 0x4c, 0x54, 0x77, 0x68, 1703 0x9b, 0x75, 0x6f, 0x90, 0x35, 0x49, 0xc0, 0xa8, 0xe7, 0x45, 0xbc, 0x10, 0xbe, 0x8c, 0xa1, 0x40, 1704 0xc6, 0xc8, 0x15, 0x18, 0xf5, 0xb2, 0x2e, 0x16, 0x74, 0x10, 0x6d, 0x72, 0x0e, 0xc6, 0x83, 0x91, 1705 0xaa, 0x6e, 0x6f, 0x2a, 0x39, 0x8d, 0x5a, 0x25, 0x83, 0xb9, 0xdb, 0x7b, 0x03, 0x64, 0x11, 0xfe, 1706 0x13, 0xc2, 0xbf, 0x25, 0xe4, 0x2a, 0x9c, 0x0c, 0x9c, 0xb1, 0x0d, 0x43, 0x51, 0xa9, 0xd1, 0xc2, 1707 0x8b, 0x80, 0x93, 0x70, 0xb4, 0xfe, 0xf8, 0x55, 0x6f, 0x4c, 0x1c, 0x3c, 0x5a, 0xd7, 0x64, 0xb2, 1708 0x00, 0xd3, 0x2b, 0xcc, 0xb4, 0x0c, 0xbd, 0xd2, 0xce, 0xd3, 0xb3, 0x00, 0xd3, 0x12, 0x33, 0x2d, 1709 0xdd, 0x60, 0xed, 0xac, 0xda, 0x85, 0x3e, 0x47, 0x27, 0x78, 0x02, 0xfa, 0xcc, 0x7d, 0x9a, 0x3a, 1710 0x7b, 0xce, 0xe1, 0xff, 0xe6, 0xbf, 0x24, 0xf1, 0x2d, 0x66, 0xe6, 0x2f, 0x2c, 0x38, 0xd9, 0x10, 1711 0x33, 0xf3, 0x17, 0x16, 0xc4, 0xcc, 0xd9, 0x64, 0xca, 0xd1, 0x87, 0x98, 0x39, 0x9b, 0x4c, 0x2d, 1712 0xf7, 0xbb, 0x12, 0x25, 0xe7, 0xe1, 0xd0, 0x75, 0x3d, 0xcb, 0x7b, 0x85, 0x75, 0x66, 0x51, 0xfb, 1713 0x40, 0xe0, 0x13, 0x30, 0xbc, 0x6f, 0xaa, 0x19, 0x5a, 0xa6, 0x4a, 0x81, 0xee, 0x15, 0x1c, 0x48, 1714 0xfd, 0xd2, 0xd0, 0xbe, 0xa9, 0x2e, 0xb9, 0x63, 0xa9, 0x5f, 0x26, 0xe1, 0xc8, 0x1a, 0xab, 0xac, 1715 0x53, 0x8d, 0xe6, 0x98, 0xca, 0x34, 0x6b, 0xd3, 0xe9, 0x51, 0xf0, 0x67, 0x08, 0x86, 0x6a, 0x0b, 1716 0x3d, 0x3c, 0x1b, 0xaa, 0xff, 0x90, 0x4e, 0x20, 0x76, 0xba, 0x05, 0x4b, 0x47, 0x12, 0x64, 0xe1, 1717 0xa3, 0xdf, 0xfe, 0x78, 0xdc, 0x13, 0xc7, 0xaf, 0xd8, 0x8d, 0xcc, 0x07, 0xce, 0xd3, 0x72, 0xa9, 1718 0x68, 0xe8, 0x77, 0x58, 0xd6, 0x32, 0x13, 0x73, 0x89, 0x82, 0x20, 0x65, 0x26, 0xe6, 0x1e, 0x24, 1719 0xbc, 0x82, 0xf1, 0x1b, 0x04, 0x23, 0xfe, 0x4a, 0x0f, 0xcf, 0x45, 0xee, 0x59, 0xd7, 0x3b, 0xc4, 1720 0xce, 0xb4, 0x64, 0x2b, 0x10, 0x2e, 0x71, 0x84, 0x17, 0xf1, 0x62, 0x73, 0x84, 0x1e, 0x40, 0x1b, 1721 0x6c, 0x4d, 0xf1, 0xf8, 0x2c, 0xd8, 0xc5, 0x78, 0x65, 0x59, 0xb2, 0x39, 0x92, 0x40, 0x93, 0x10, 1722 0x4b, 0xb5, 0xb3, 0x44, 0x70, 0xd8, 0xe2, 0x1c, 0xde, 0xc2, 0xeb, 0x6d, 0x71, 0xa8, 0xa1, 0xe0, 1723 0x23, 0xe4, 0xa1, 0x7f, 0x88, 0x00, 0xaa, 0xe5, 0x20, 0x3e, 0x15, 0x8a, 0xac, 0xae, 0x5e, 0x8c, 1724 0x35, 0x2c, 0x98, 0x02, 0x8a, 0xb0, 0x8f, 0x4f, 0x0b, 0xd1, 0xc6, 0x9f, 0x23, 0x18, 0xaa, 0xad, 1725 0x22, 0x23, 0xd4, 0x1a, 0x52, 0x93, 0xc6, 0x9a, 0x14, 0x11, 0x01, 0x01, 0xb4, 0x06, 0xc8, 0x1f, 1726 0x3a, 0xfc, 0x33, 0xf2, 0x97, 0xc3, 0xee, 0x03, 0x9f, 0x68, 0x0a, 0xd2, 0x7f, 0xb9, 0xc4, 0x5a, 1727 0x2b, 0x25, 0x02, 0xf9, 0xee, 0x00, 0x72, 0x7d, 0xb2, 0x6d, 0x1a, 0x3f, 0x38, 0x41, 0xf6, 0x0a, 1728 0xef, 0xe8, 0x20, 0x07, 0x6b, 0xf3, 0x88, 0x20, 0x7b, 0x66, 0x24, 0xc3, 0x11, 0xdf, 0xc4, 0xef, 1729 0x74, 0x15, 0x71, 0xa2, 0xe8, 0x41, 0x7d, 0x82, 0x60, 0xd8, 0xd7, 0x08, 0xe0, 0xd3, 0x11, 0xb1, 1730 0xac, 0x6f, 0x16, 0x9a, 0x28, 0xf6, 0x75, 0x8e, 0xfd, 0x02, 0x69, 0xeb, 0x0e, 0x4b, 0x7b, 0x6d, 1731 0x04, 0xfe, 0x16, 0xc1, 0x68, 0xa0, 0x06, 0xc7, 0x67, 0x1a, 0x80, 0x6b, 0x5b, 0xc1, 0xeb, 0x1c, 1732 0xe0, 0x2a, 0xe9, 0xfc, 0x0a, 0x4b, 0xd7, 0xd4, 0xde, 0xf8, 0x79, 0x7d, 0x27, 0xe3, 0x0a, 0x3a, 1733 0xd5, 0x0a, 0xec, 0xce, 0x34, 0xad, 0x70, 0x12, 0x59, 0xd2, 0xdd, 0x3b, 0x2c, 0x1d, 0x52, 0xb6, 1734 0xe3, 0xef, 0x11, 0x8c, 0x06, 0x4a, 0x91, 0x88, 0x84, 0x84, 0xf7, 0x2a, 0x4d, 0x13, 0xf2, 0x2e, 1735 0xe7, 0x22, 0xa5, 0x56, 0x38, 0x97, 0x2a, 0x82, 0x78, 0x27, 0xb7, 0x8b, 0x2f, 0x37, 0x7f, 0xd6, 1736 0x37, 0x50, 0x8d, 0x73, 0xd3, 0xb0, 0xad, 0x69, 0x35, 0x37, 0x1f, 0x72, 0x3e, 0xe5, 0xd4, 0x6e, 1737 0x80, 0x8f, 0x1b, 0xd1, 0x78, 0xb7, 0x0e, 0x74, 0x68, 0xba, 0xbe, 0x42, 0x70, 0x50, 0xd4, 0xbc, 1738 0xf8, 0x44, 0x28, 0x60, 0x7f, 0x1f, 0x14, 0x3b, 0xd9, 0xd8, 0x48, 0x3c, 0x9a, 0xee, 0xa9, 0x59, 1739 0xee, 0xf4, 0x4a, 0x9a, 0x7b, 0x90, 0x66, 0x8e, 0xcf, 0x34, 0x9a, 0xc3, 0x5f, 0x22, 0x38, 0x28, 1740 0x0a, 0xe2, 0x08, 0x94, 0xfe, 0x76, 0x21, 0x02, 0x65, 0xa0, 0xa6, 0x26, 0xd7, 0x39, 0xca, 0xab, 1741 0x64, 0xa9, 0xe3, 0xd7, 0x29, 0x2d, 0x33, 0x0f, 0xe4, 0xaf, 0x08, 0x46, 0xfc, 0x75, 0x7f, 0x44, 1742 0x61, 0x15, 0xda, 0x46, 0x45, 0x14, 0x56, 0xe1, 0x8d, 0x04, 0xc9, 0x71, 0xe4, 0x94, 0xec, 0x74, 1743 0xf5, 0xca, 0x4f, 0x53, 0xdf, 0x6e, 0x36, 0xa9, 0xe7, 0x08, 0x0e, 0xd7, 0x35, 0x25, 0xf8, 0xd5, 1744 0x26, 0x58, 0x03, 0xd9, 0x88, 0xb7, 0x6a, 0x2e, 0xd8, 0xdd, 0xe1, 0xec, 0x64, 0x92, 0x79, 0x59, 1745 0xec, 0x56, 0xaa, 0x59, 0x7b, 0x56, 0xff, 0xf3, 0x84, 0xbf, 0x75, 0xc2, 0x8b, 0xad, 0x9c, 0xfd, 1746 0xd0, 0x76, 0xab, 0xe9, 0x5d, 0x76, 0x93, 0x13, 0xdd, 0x24, 0x37, 0x3a, 0x17, 0xa0, 0xf3, 0xab, 1747 0x85, 0x7f, 0x7b, 0x9b, 0xd7, 0xef, 0x08, 0x8e, 0x45, 0xf4, 0x68, 0x78, 0x3e, 0xe2, 0x74, 0x34, 1748 0xea, 0xe8, 0x5a, 0xbd, 0xce, 0x76, 0x39, 0xa5, 0x5b, 0x64, 0xab, 0xbb, 0xb9, 0x93, 0x1d, 0x70, 1749 0x2e, 0xb3, 0x88, 0x3e, 0x32, 0x82, 0x59, 0xe3, 0xae, 0xf3, 0x1f, 0x66, 0x66, 0x38, 0xe0, 0xd2, 1750 0x68, 0x6e, 0xf9, 0x11, 0x82, 0x63, 0x59, 0x5d, 0x0d, 0x83, 0xb3, 0xdc, 0xbf, 0xa6, 0x9a, 0x1b, 1751 0x86, 0x6e, 0xe9, 0x1b, 0xe8, 0xd6, 0x39, 0x61, 0x90, 0xd3, 0x0b, 0x54, 0xcb, 0xc5, 0x75, 0x23, 1752 0x97, 0xc8, 0x31, 0x8d, 0xff, 0xa6, 0x95, 0x70, 0xa6, 0x68, 0x51, 0x31, 0x7d, 0xff, 0xe8, 0xba, 1753 0x98, 0x57, 0xcd, 0xbf, 0x10, 0xfa, 0xba, 0x67, 0x6c, 0xd5, 0x59, 0x7b, 0x99, 0x3b, 0x5f, 0x53, 1754 0xcd, 0xf8, 0x76, 0xf2, 0xa9, 0x3b, 0xba, 0xc3, 0x47, 0x77, 0xd6, 0x54, 0x73, 0x67, 0x3b, 0xb9, 1755 0xd7, 0xc7, 0x3d, 0xce, 0xff, 0x1d, 0x00, 0x00, 0xff, 0xff, 0xac, 0x72, 0x95, 0x44, 0x8f, 0x1b, 1756 0x00, 0x00, 1757} 1758 1759// Reference imports to suppress errors if they are not otherwise used. 1760var _ context.Context 1761var _ grpc.ClientConn 1762 1763// This is a compile-time assertion to ensure that this generated file 1764// is compatible with the grpc package it is being compiled against. 1765const _ = grpc.SupportPackageIsVersion4 1766 1767// KeyManagementServiceClient is the client API for KeyManagementService service. 1768// 1769// For semantics around ctx use and closing/ending streaming RPCs, please refer to https://godoc.org/google.golang.org/grpc#ClientConn.NewStream. 1770type KeyManagementServiceClient interface { 1771 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 1772 ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) 1773 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 1774 ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) 1775 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 1776 ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) 1777 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 1778 GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 1779 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as 1780 // well as its [primary][google.cloud.kms.v1.CryptoKey.primary] 1781 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1782 GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 1783 // Returns metadata for a given 1784 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1785 GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 1786 // Returns the public key for the given 1787 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 1788 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1789 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] 1790 // or 1791 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 1792 GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) 1793 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and 1794 // Location. 1795 CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) 1796 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a 1797 // [KeyRing][google.cloud.kms.v1.KeyRing]. 1798 // 1799 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 1800 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 1801 // are required. 1802 CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 1803 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a 1804 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 1805 // 1806 // The server will assign the next sequential id. If unset, 1807 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 1808 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 1809 CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 1810 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 1811 UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) 1812 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s 1813 // metadata. 1814 // 1815 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 1816 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] 1817 // and 1818 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] 1819 // using this method. See 1820 // [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] 1821 // and 1822 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 1823 // to move between other states. 1824 UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 1825 // Encrypts data, so that it can only be recovered by a call to 1826 // [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The 1827 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1828 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 1829 Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) 1830 // Decrypts data that was protected by 1831 // [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The 1832 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1833 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 1834 Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) 1835 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1836 // with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 1837 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 1838 // key retrieved from 1839 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 1840 AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) 1841 // Decrypts data that was encrypted with a public key retrieved from 1842 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] 1843 // corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1844 // with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 1845 // ASYMMETRIC_DECRYPT. 1846 AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) 1847 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that 1848 // will be used in 1849 // [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1850 // 1851 // Returns an error if called on an asymmetric key. 1852 UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) 1853 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for 1854 // destruction. 1855 // 1856 // Upon calling this method, 1857 // [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will 1858 // be set to 1859 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 1860 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 1861 // be set to a time 24 hours in the future, at which point the 1862 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be changed to 1863 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], 1864 // and the key material will be irrevocably destroyed. 1865 // 1866 // Before the 1867 // [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is 1868 // reached, 1869 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 1870 // may be called to reverse the process. 1871 DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 1872 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 1873 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 1874 // state. 1875 // 1876 // Upon restoration of the CryptoKeyVersion, 1877 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 1878 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 1879 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 1880 // be cleared. 1881 RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) 1882} 1883 1884type keyManagementServiceClient struct { 1885 cc *grpc.ClientConn 1886} 1887 1888func NewKeyManagementServiceClient(cc *grpc.ClientConn) KeyManagementServiceClient { 1889 return &keyManagementServiceClient{cc} 1890} 1891 1892func (c *keyManagementServiceClient) ListKeyRings(ctx context.Context, in *ListKeyRingsRequest, opts ...grpc.CallOption) (*ListKeyRingsResponse, error) { 1893 out := new(ListKeyRingsResponse) 1894 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", in, out, opts...) 1895 if err != nil { 1896 return nil, err 1897 } 1898 return out, nil 1899} 1900 1901func (c *keyManagementServiceClient) ListCryptoKeys(ctx context.Context, in *ListCryptoKeysRequest, opts ...grpc.CallOption) (*ListCryptoKeysResponse, error) { 1902 out := new(ListCryptoKeysResponse) 1903 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", in, out, opts...) 1904 if err != nil { 1905 return nil, err 1906 } 1907 return out, nil 1908} 1909 1910func (c *keyManagementServiceClient) ListCryptoKeyVersions(ctx context.Context, in *ListCryptoKeyVersionsRequest, opts ...grpc.CallOption) (*ListCryptoKeyVersionsResponse, error) { 1911 out := new(ListCryptoKeyVersionsResponse) 1912 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", in, out, opts...) 1913 if err != nil { 1914 return nil, err 1915 } 1916 return out, nil 1917} 1918 1919func (c *keyManagementServiceClient) GetKeyRing(ctx context.Context, in *GetKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 1920 out := new(KeyRing) 1921 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", in, out, opts...) 1922 if err != nil { 1923 return nil, err 1924 } 1925 return out, nil 1926} 1927 1928func (c *keyManagementServiceClient) GetCryptoKey(ctx context.Context, in *GetCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 1929 out := new(CryptoKey) 1930 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", in, out, opts...) 1931 if err != nil { 1932 return nil, err 1933 } 1934 return out, nil 1935} 1936 1937func (c *keyManagementServiceClient) GetCryptoKeyVersion(ctx context.Context, in *GetCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 1938 out := new(CryptoKeyVersion) 1939 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", in, out, opts...) 1940 if err != nil { 1941 return nil, err 1942 } 1943 return out, nil 1944} 1945 1946func (c *keyManagementServiceClient) GetPublicKey(ctx context.Context, in *GetPublicKeyRequest, opts ...grpc.CallOption) (*PublicKey, error) { 1947 out := new(PublicKey) 1948 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", in, out, opts...) 1949 if err != nil { 1950 return nil, err 1951 } 1952 return out, nil 1953} 1954 1955func (c *keyManagementServiceClient) CreateKeyRing(ctx context.Context, in *CreateKeyRingRequest, opts ...grpc.CallOption) (*KeyRing, error) { 1956 out := new(KeyRing) 1957 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", in, out, opts...) 1958 if err != nil { 1959 return nil, err 1960 } 1961 return out, nil 1962} 1963 1964func (c *keyManagementServiceClient) CreateCryptoKey(ctx context.Context, in *CreateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 1965 out := new(CryptoKey) 1966 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", in, out, opts...) 1967 if err != nil { 1968 return nil, err 1969 } 1970 return out, nil 1971} 1972 1973func (c *keyManagementServiceClient) CreateCryptoKeyVersion(ctx context.Context, in *CreateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 1974 out := new(CryptoKeyVersion) 1975 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", in, out, opts...) 1976 if err != nil { 1977 return nil, err 1978 } 1979 return out, nil 1980} 1981 1982func (c *keyManagementServiceClient) UpdateCryptoKey(ctx context.Context, in *UpdateCryptoKeyRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 1983 out := new(CryptoKey) 1984 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", in, out, opts...) 1985 if err != nil { 1986 return nil, err 1987 } 1988 return out, nil 1989} 1990 1991func (c *keyManagementServiceClient) UpdateCryptoKeyVersion(ctx context.Context, in *UpdateCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 1992 out := new(CryptoKeyVersion) 1993 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", in, out, opts...) 1994 if err != nil { 1995 return nil, err 1996 } 1997 return out, nil 1998} 1999 2000func (c *keyManagementServiceClient) Encrypt(ctx context.Context, in *EncryptRequest, opts ...grpc.CallOption) (*EncryptResponse, error) { 2001 out := new(EncryptResponse) 2002 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Encrypt", in, out, opts...) 2003 if err != nil { 2004 return nil, err 2005 } 2006 return out, nil 2007} 2008 2009func (c *keyManagementServiceClient) Decrypt(ctx context.Context, in *DecryptRequest, opts ...grpc.CallOption) (*DecryptResponse, error) { 2010 out := new(DecryptResponse) 2011 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/Decrypt", in, out, opts...) 2012 if err != nil { 2013 return nil, err 2014 } 2015 return out, nil 2016} 2017 2018func (c *keyManagementServiceClient) AsymmetricSign(ctx context.Context, in *AsymmetricSignRequest, opts ...grpc.CallOption) (*AsymmetricSignResponse, error) { 2019 out := new(AsymmetricSignResponse) 2020 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", in, out, opts...) 2021 if err != nil { 2022 return nil, err 2023 } 2024 return out, nil 2025} 2026 2027func (c *keyManagementServiceClient) AsymmetricDecrypt(ctx context.Context, in *AsymmetricDecryptRequest, opts ...grpc.CallOption) (*AsymmetricDecryptResponse, error) { 2028 out := new(AsymmetricDecryptResponse) 2029 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", in, out, opts...) 2030 if err != nil { 2031 return nil, err 2032 } 2033 return out, nil 2034} 2035 2036func (c *keyManagementServiceClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, in *UpdateCryptoKeyPrimaryVersionRequest, opts ...grpc.CallOption) (*CryptoKey, error) { 2037 out := new(CryptoKey) 2038 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", in, out, opts...) 2039 if err != nil { 2040 return nil, err 2041 } 2042 return out, nil 2043} 2044 2045func (c *keyManagementServiceClient) DestroyCryptoKeyVersion(ctx context.Context, in *DestroyCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2046 out := new(CryptoKeyVersion) 2047 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", in, out, opts...) 2048 if err != nil { 2049 return nil, err 2050 } 2051 return out, nil 2052} 2053 2054func (c *keyManagementServiceClient) RestoreCryptoKeyVersion(ctx context.Context, in *RestoreCryptoKeyVersionRequest, opts ...grpc.CallOption) (*CryptoKeyVersion, error) { 2055 out := new(CryptoKeyVersion) 2056 err := c.cc.Invoke(ctx, "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", in, out, opts...) 2057 if err != nil { 2058 return nil, err 2059 } 2060 return out, nil 2061} 2062 2063// KeyManagementServiceServer is the server API for KeyManagementService service. 2064type KeyManagementServiceServer interface { 2065 // Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2066 ListKeyRings(context.Context, *ListKeyRingsRequest) (*ListKeyRingsResponse, error) 2067 // Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2068 ListCryptoKeys(context.Context, *ListCryptoKeysRequest) (*ListCryptoKeysResponse, error) 2069 // Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2070 ListCryptoKeyVersions(context.Context, *ListCryptoKeyVersionsRequest) (*ListCryptoKeyVersionsResponse, error) 2071 // Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2072 GetKeyRing(context.Context, *GetKeyRingRequest) (*KeyRing, error) 2073 // Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as 2074 // well as its [primary][google.cloud.kms.v1.CryptoKey.primary] 2075 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2076 GetCryptoKey(context.Context, *GetCryptoKeyRequest) (*CryptoKey, error) 2077 // Returns metadata for a given 2078 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2079 GetCryptoKeyVersion(context.Context, *GetCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2080 // Returns the public key for the given 2081 // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2082 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2083 // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] 2084 // or 2085 // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2086 GetPublicKey(context.Context, *GetPublicKeyRequest) (*PublicKey, error) 2087 // Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and 2088 // Location. 2089 CreateKeyRing(context.Context, *CreateKeyRingRequest) (*KeyRing, error) 2090 // Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a 2091 // [KeyRing][google.cloud.kms.v1.KeyRing]. 2092 // 2093 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2094 // [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2095 // are required. 2096 CreateCryptoKey(context.Context, *CreateCryptoKeyRequest) (*CryptoKey, error) 2097 // Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a 2098 // [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2099 // 2100 // The server will assign the next sequential id. If unset, 2101 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2102 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2103 CreateCryptoKeyVersion(context.Context, *CreateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2104 // Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2105 UpdateCryptoKey(context.Context, *UpdateCryptoKeyRequest) (*CryptoKey, error) 2106 // Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s 2107 // metadata. 2108 // 2109 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2110 // [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] 2111 // and 2112 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] 2113 // using this method. See 2114 // [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] 2115 // and 2116 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 2117 // to move between other states. 2118 UpdateCryptoKeyVersion(context.Context, *UpdateCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2119 // Encrypts data, so that it can only be recovered by a call to 2120 // [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The 2121 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2122 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2123 Encrypt(context.Context, *EncryptRequest) (*EncryptResponse, error) 2124 // Decrypts data that was protected by 2125 // [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The 2126 // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2127 // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2128 Decrypt(context.Context, *DecryptRequest) (*DecryptResponse, error) 2129 // Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2130 // with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2131 // ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2132 // key retrieved from 2133 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2134 AsymmetricSign(context.Context, *AsymmetricSignRequest) (*AsymmetricSignResponse, error) 2135 // Decrypts data that was encrypted with a public key retrieved from 2136 // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] 2137 // corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2138 // with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2139 // ASYMMETRIC_DECRYPT. 2140 AsymmetricDecrypt(context.Context, *AsymmetricDecryptRequest) (*AsymmetricDecryptResponse, error) 2141 // Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that 2142 // will be used in 2143 // [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2144 // 2145 // Returns an error if called on an asymmetric key. 2146 UpdateCryptoKeyPrimaryVersion(context.Context, *UpdateCryptoKeyPrimaryVersionRequest) (*CryptoKey, error) 2147 // Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for 2148 // destruction. 2149 // 2150 // Upon calling this method, 2151 // [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will 2152 // be set to 2153 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2154 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 2155 // be set to a time 24 hours in the future, at which point the 2156 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be changed to 2157 // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], 2158 // and the key material will be irrevocably destroyed. 2159 // 2160 // Before the 2161 // [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is 2162 // reached, 2163 // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 2164 // may be called to reverse the process. 2165 DestroyCryptoKeyVersion(context.Context, *DestroyCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2166 // Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2167 // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2168 // state. 2169 // 2170 // Upon restoration of the CryptoKeyVersion, 2171 // [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2172 // [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2173 // and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 2174 // be cleared. 2175 RestoreCryptoKeyVersion(context.Context, *RestoreCryptoKeyVersionRequest) (*CryptoKeyVersion, error) 2176} 2177 2178func RegisterKeyManagementServiceServer(s *grpc.Server, srv KeyManagementServiceServer) { 2179 s.RegisterService(&_KeyManagementService_serviceDesc, srv) 2180} 2181 2182func _KeyManagementService_ListKeyRings_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2183 in := new(ListKeyRingsRequest) 2184 if err := dec(in); err != nil { 2185 return nil, err 2186 } 2187 if interceptor == nil { 2188 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, in) 2189 } 2190 info := &grpc.UnaryServerInfo{ 2191 Server: srv, 2192 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListKeyRings", 2193 } 2194 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2195 return srv.(KeyManagementServiceServer).ListKeyRings(ctx, req.(*ListKeyRingsRequest)) 2196 } 2197 return interceptor(ctx, in, info, handler) 2198} 2199 2200func _KeyManagementService_ListCryptoKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2201 in := new(ListCryptoKeysRequest) 2202 if err := dec(in); err != nil { 2203 return nil, err 2204 } 2205 if interceptor == nil { 2206 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, in) 2207 } 2208 info := &grpc.UnaryServerInfo{ 2209 Server: srv, 2210 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeys", 2211 } 2212 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2213 return srv.(KeyManagementServiceServer).ListCryptoKeys(ctx, req.(*ListCryptoKeysRequest)) 2214 } 2215 return interceptor(ctx, in, info, handler) 2216} 2217 2218func _KeyManagementService_ListCryptoKeyVersions_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2219 in := new(ListCryptoKeyVersionsRequest) 2220 if err := dec(in); err != nil { 2221 return nil, err 2222 } 2223 if interceptor == nil { 2224 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, in) 2225 } 2226 info := &grpc.UnaryServerInfo{ 2227 Server: srv, 2228 FullMethod: "/google.cloud.kms.v1.KeyManagementService/ListCryptoKeyVersions", 2229 } 2230 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2231 return srv.(KeyManagementServiceServer).ListCryptoKeyVersions(ctx, req.(*ListCryptoKeyVersionsRequest)) 2232 } 2233 return interceptor(ctx, in, info, handler) 2234} 2235 2236func _KeyManagementService_GetKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2237 in := new(GetKeyRingRequest) 2238 if err := dec(in); err != nil { 2239 return nil, err 2240 } 2241 if interceptor == nil { 2242 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, in) 2243 } 2244 info := &grpc.UnaryServerInfo{ 2245 Server: srv, 2246 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetKeyRing", 2247 } 2248 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2249 return srv.(KeyManagementServiceServer).GetKeyRing(ctx, req.(*GetKeyRingRequest)) 2250 } 2251 return interceptor(ctx, in, info, handler) 2252} 2253 2254func _KeyManagementService_GetCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2255 in := new(GetCryptoKeyRequest) 2256 if err := dec(in); err != nil { 2257 return nil, err 2258 } 2259 if interceptor == nil { 2260 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, in) 2261 } 2262 info := &grpc.UnaryServerInfo{ 2263 Server: srv, 2264 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKey", 2265 } 2266 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2267 return srv.(KeyManagementServiceServer).GetCryptoKey(ctx, req.(*GetCryptoKeyRequest)) 2268 } 2269 return interceptor(ctx, in, info, handler) 2270} 2271 2272func _KeyManagementService_GetCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2273 in := new(GetCryptoKeyVersionRequest) 2274 if err := dec(in); err != nil { 2275 return nil, err 2276 } 2277 if interceptor == nil { 2278 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, in) 2279 } 2280 info := &grpc.UnaryServerInfo{ 2281 Server: srv, 2282 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetCryptoKeyVersion", 2283 } 2284 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2285 return srv.(KeyManagementServiceServer).GetCryptoKeyVersion(ctx, req.(*GetCryptoKeyVersionRequest)) 2286 } 2287 return interceptor(ctx, in, info, handler) 2288} 2289 2290func _KeyManagementService_GetPublicKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2291 in := new(GetPublicKeyRequest) 2292 if err := dec(in); err != nil { 2293 return nil, err 2294 } 2295 if interceptor == nil { 2296 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, in) 2297 } 2298 info := &grpc.UnaryServerInfo{ 2299 Server: srv, 2300 FullMethod: "/google.cloud.kms.v1.KeyManagementService/GetPublicKey", 2301 } 2302 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2303 return srv.(KeyManagementServiceServer).GetPublicKey(ctx, req.(*GetPublicKeyRequest)) 2304 } 2305 return interceptor(ctx, in, info, handler) 2306} 2307 2308func _KeyManagementService_CreateKeyRing_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2309 in := new(CreateKeyRingRequest) 2310 if err := dec(in); err != nil { 2311 return nil, err 2312 } 2313 if interceptor == nil { 2314 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, in) 2315 } 2316 info := &grpc.UnaryServerInfo{ 2317 Server: srv, 2318 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateKeyRing", 2319 } 2320 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2321 return srv.(KeyManagementServiceServer).CreateKeyRing(ctx, req.(*CreateKeyRingRequest)) 2322 } 2323 return interceptor(ctx, in, info, handler) 2324} 2325 2326func _KeyManagementService_CreateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2327 in := new(CreateCryptoKeyRequest) 2328 if err := dec(in); err != nil { 2329 return nil, err 2330 } 2331 if interceptor == nil { 2332 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, in) 2333 } 2334 info := &grpc.UnaryServerInfo{ 2335 Server: srv, 2336 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKey", 2337 } 2338 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2339 return srv.(KeyManagementServiceServer).CreateCryptoKey(ctx, req.(*CreateCryptoKeyRequest)) 2340 } 2341 return interceptor(ctx, in, info, handler) 2342} 2343 2344func _KeyManagementService_CreateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2345 in := new(CreateCryptoKeyVersionRequest) 2346 if err := dec(in); err != nil { 2347 return nil, err 2348 } 2349 if interceptor == nil { 2350 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, in) 2351 } 2352 info := &grpc.UnaryServerInfo{ 2353 Server: srv, 2354 FullMethod: "/google.cloud.kms.v1.KeyManagementService/CreateCryptoKeyVersion", 2355 } 2356 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2357 return srv.(KeyManagementServiceServer).CreateCryptoKeyVersion(ctx, req.(*CreateCryptoKeyVersionRequest)) 2358 } 2359 return interceptor(ctx, in, info, handler) 2360} 2361 2362func _KeyManagementService_UpdateCryptoKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2363 in := new(UpdateCryptoKeyRequest) 2364 if err := dec(in); err != nil { 2365 return nil, err 2366 } 2367 if interceptor == nil { 2368 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, in) 2369 } 2370 info := &grpc.UnaryServerInfo{ 2371 Server: srv, 2372 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKey", 2373 } 2374 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2375 return srv.(KeyManagementServiceServer).UpdateCryptoKey(ctx, req.(*UpdateCryptoKeyRequest)) 2376 } 2377 return interceptor(ctx, in, info, handler) 2378} 2379 2380func _KeyManagementService_UpdateCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2381 in := new(UpdateCryptoKeyVersionRequest) 2382 if err := dec(in); err != nil { 2383 return nil, err 2384 } 2385 if interceptor == nil { 2386 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, in) 2387 } 2388 info := &grpc.UnaryServerInfo{ 2389 Server: srv, 2390 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyVersion", 2391 } 2392 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2393 return srv.(KeyManagementServiceServer).UpdateCryptoKeyVersion(ctx, req.(*UpdateCryptoKeyVersionRequest)) 2394 } 2395 return interceptor(ctx, in, info, handler) 2396} 2397 2398func _KeyManagementService_Encrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2399 in := new(EncryptRequest) 2400 if err := dec(in); err != nil { 2401 return nil, err 2402 } 2403 if interceptor == nil { 2404 return srv.(KeyManagementServiceServer).Encrypt(ctx, in) 2405 } 2406 info := &grpc.UnaryServerInfo{ 2407 Server: srv, 2408 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Encrypt", 2409 } 2410 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2411 return srv.(KeyManagementServiceServer).Encrypt(ctx, req.(*EncryptRequest)) 2412 } 2413 return interceptor(ctx, in, info, handler) 2414} 2415 2416func _KeyManagementService_Decrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2417 in := new(DecryptRequest) 2418 if err := dec(in); err != nil { 2419 return nil, err 2420 } 2421 if interceptor == nil { 2422 return srv.(KeyManagementServiceServer).Decrypt(ctx, in) 2423 } 2424 info := &grpc.UnaryServerInfo{ 2425 Server: srv, 2426 FullMethod: "/google.cloud.kms.v1.KeyManagementService/Decrypt", 2427 } 2428 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2429 return srv.(KeyManagementServiceServer).Decrypt(ctx, req.(*DecryptRequest)) 2430 } 2431 return interceptor(ctx, in, info, handler) 2432} 2433 2434func _KeyManagementService_AsymmetricSign_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2435 in := new(AsymmetricSignRequest) 2436 if err := dec(in); err != nil { 2437 return nil, err 2438 } 2439 if interceptor == nil { 2440 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, in) 2441 } 2442 info := &grpc.UnaryServerInfo{ 2443 Server: srv, 2444 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricSign", 2445 } 2446 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2447 return srv.(KeyManagementServiceServer).AsymmetricSign(ctx, req.(*AsymmetricSignRequest)) 2448 } 2449 return interceptor(ctx, in, info, handler) 2450} 2451 2452func _KeyManagementService_AsymmetricDecrypt_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2453 in := new(AsymmetricDecryptRequest) 2454 if err := dec(in); err != nil { 2455 return nil, err 2456 } 2457 if interceptor == nil { 2458 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, in) 2459 } 2460 info := &grpc.UnaryServerInfo{ 2461 Server: srv, 2462 FullMethod: "/google.cloud.kms.v1.KeyManagementService/AsymmetricDecrypt", 2463 } 2464 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2465 return srv.(KeyManagementServiceServer).AsymmetricDecrypt(ctx, req.(*AsymmetricDecryptRequest)) 2466 } 2467 return interceptor(ctx, in, info, handler) 2468} 2469 2470func _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2471 in := new(UpdateCryptoKeyPrimaryVersionRequest) 2472 if err := dec(in); err != nil { 2473 return nil, err 2474 } 2475 if interceptor == nil { 2476 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, in) 2477 } 2478 info := &grpc.UnaryServerInfo{ 2479 Server: srv, 2480 FullMethod: "/google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion", 2481 } 2482 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2483 return srv.(KeyManagementServiceServer).UpdateCryptoKeyPrimaryVersion(ctx, req.(*UpdateCryptoKeyPrimaryVersionRequest)) 2484 } 2485 return interceptor(ctx, in, info, handler) 2486} 2487 2488func _KeyManagementService_DestroyCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2489 in := new(DestroyCryptoKeyVersionRequest) 2490 if err := dec(in); err != nil { 2491 return nil, err 2492 } 2493 if interceptor == nil { 2494 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, in) 2495 } 2496 info := &grpc.UnaryServerInfo{ 2497 Server: srv, 2498 FullMethod: "/google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion", 2499 } 2500 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2501 return srv.(KeyManagementServiceServer).DestroyCryptoKeyVersion(ctx, req.(*DestroyCryptoKeyVersionRequest)) 2502 } 2503 return interceptor(ctx, in, info, handler) 2504} 2505 2506func _KeyManagementService_RestoreCryptoKeyVersion_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { 2507 in := new(RestoreCryptoKeyVersionRequest) 2508 if err := dec(in); err != nil { 2509 return nil, err 2510 } 2511 if interceptor == nil { 2512 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, in) 2513 } 2514 info := &grpc.UnaryServerInfo{ 2515 Server: srv, 2516 FullMethod: "/google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion", 2517 } 2518 handler := func(ctx context.Context, req interface{}) (interface{}, error) { 2519 return srv.(KeyManagementServiceServer).RestoreCryptoKeyVersion(ctx, req.(*RestoreCryptoKeyVersionRequest)) 2520 } 2521 return interceptor(ctx, in, info, handler) 2522} 2523 2524var _KeyManagementService_serviceDesc = grpc.ServiceDesc{ 2525 ServiceName: "google.cloud.kms.v1.KeyManagementService", 2526 HandlerType: (*KeyManagementServiceServer)(nil), 2527 Methods: []grpc.MethodDesc{ 2528 { 2529 MethodName: "ListKeyRings", 2530 Handler: _KeyManagementService_ListKeyRings_Handler, 2531 }, 2532 { 2533 MethodName: "ListCryptoKeys", 2534 Handler: _KeyManagementService_ListCryptoKeys_Handler, 2535 }, 2536 { 2537 MethodName: "ListCryptoKeyVersions", 2538 Handler: _KeyManagementService_ListCryptoKeyVersions_Handler, 2539 }, 2540 { 2541 MethodName: "GetKeyRing", 2542 Handler: _KeyManagementService_GetKeyRing_Handler, 2543 }, 2544 { 2545 MethodName: "GetCryptoKey", 2546 Handler: _KeyManagementService_GetCryptoKey_Handler, 2547 }, 2548 { 2549 MethodName: "GetCryptoKeyVersion", 2550 Handler: _KeyManagementService_GetCryptoKeyVersion_Handler, 2551 }, 2552 { 2553 MethodName: "GetPublicKey", 2554 Handler: _KeyManagementService_GetPublicKey_Handler, 2555 }, 2556 { 2557 MethodName: "CreateKeyRing", 2558 Handler: _KeyManagementService_CreateKeyRing_Handler, 2559 }, 2560 { 2561 MethodName: "CreateCryptoKey", 2562 Handler: _KeyManagementService_CreateCryptoKey_Handler, 2563 }, 2564 { 2565 MethodName: "CreateCryptoKeyVersion", 2566 Handler: _KeyManagementService_CreateCryptoKeyVersion_Handler, 2567 }, 2568 { 2569 MethodName: "UpdateCryptoKey", 2570 Handler: _KeyManagementService_UpdateCryptoKey_Handler, 2571 }, 2572 { 2573 MethodName: "UpdateCryptoKeyVersion", 2574 Handler: _KeyManagementService_UpdateCryptoKeyVersion_Handler, 2575 }, 2576 { 2577 MethodName: "Encrypt", 2578 Handler: _KeyManagementService_Encrypt_Handler, 2579 }, 2580 { 2581 MethodName: "Decrypt", 2582 Handler: _KeyManagementService_Decrypt_Handler, 2583 }, 2584 { 2585 MethodName: "AsymmetricSign", 2586 Handler: _KeyManagementService_AsymmetricSign_Handler, 2587 }, 2588 { 2589 MethodName: "AsymmetricDecrypt", 2590 Handler: _KeyManagementService_AsymmetricDecrypt_Handler, 2591 }, 2592 { 2593 MethodName: "UpdateCryptoKeyPrimaryVersion", 2594 Handler: _KeyManagementService_UpdateCryptoKeyPrimaryVersion_Handler, 2595 }, 2596 { 2597 MethodName: "DestroyCryptoKeyVersion", 2598 Handler: _KeyManagementService_DestroyCryptoKeyVersion_Handler, 2599 }, 2600 { 2601 MethodName: "RestoreCryptoKeyVersion", 2602 Handler: _KeyManagementService_RestoreCryptoKeyVersion_Handler, 2603 }, 2604 }, 2605 Streams: []grpc.StreamDesc{}, 2606 Metadata: "google/cloud/kms/v1/service.proto", 2607} 2608