| // Code generated by protoc-gen-go. DO NOT EDIT. |
| // source: google/cloud/kms/v1/resources.proto |
| |
| package kms |
| |
| import ( |
| fmt "fmt" |
| proto "github.com/golang/protobuf/proto" |
| duration "github.com/golang/protobuf/ptypes/duration" |
| timestamp "github.com/golang/protobuf/ptypes/timestamp" |
| _ "google.golang.org/genproto/googleapis/api/annotations" |
| math "math" |
| ) |
| |
| // Reference imports to suppress errors if they are not otherwise used. |
| var _ = proto.Marshal |
| var _ = fmt.Errorf |
| var _ = math.Inf |
| |
| // This is a compile-time assertion to ensure that this generated file |
| // is compatible with the proto package it is being compiled against. |
| // A compilation error at this line likely means your copy of the |
| // proto package needs to be updated. |
| const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package |
| |
| // [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] specifies how cryptographic operations are performed. |
| type ProtectionLevel int32 |
| |
| const ( |
| // Not specified. |
| ProtectionLevel_PROTECTION_LEVEL_UNSPECIFIED ProtectionLevel = 0 |
| // Crypto operations are performed in software. |
| ProtectionLevel_SOFTWARE ProtectionLevel = 1 |
| // Crypto operations are performed in a Hardware Security Module. |
| ProtectionLevel_HSM ProtectionLevel = 2 |
| ) |
| |
| var ProtectionLevel_name = map[int32]string{ |
| 0: "PROTECTION_LEVEL_UNSPECIFIED", |
| 1: "SOFTWARE", |
| 2: "HSM", |
| } |
| |
| var ProtectionLevel_value = map[string]int32{ |
| "PROTECTION_LEVEL_UNSPECIFIED": 0, |
| "SOFTWARE": 1, |
| "HSM": 2, |
| } |
| |
| func (x ProtectionLevel) String() string { |
| return proto.EnumName(ProtectionLevel_name, int32(x)) |
| } |
| |
| func (ProtectionLevel) EnumDescriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{0} |
| } |
| |
| // [CryptoKeyPurpose][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose] describes the cryptographic capabilities of a |
| // [CryptoKey][google.cloud.kms.v1.CryptoKey]. A given key can only be used for the operations allowed by |
| // its purpose. |
| type CryptoKey_CryptoKeyPurpose int32 |
| |
| const ( |
| // Not specified. |
| CryptoKey_CRYPTO_KEY_PURPOSE_UNSPECIFIED CryptoKey_CryptoKeyPurpose = 0 |
| // [CryptoKeys][google.cloud.kms.v1.CryptoKey] with this purpose may be used with |
| // [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt] and |
| // [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. |
| CryptoKey_ENCRYPT_DECRYPT CryptoKey_CryptoKeyPurpose = 1 |
| // [CryptoKeys][google.cloud.kms.v1.CryptoKey] with this purpose may be used with |
| // [AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign] and |
| // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. |
| CryptoKey_ASYMMETRIC_SIGN CryptoKey_CryptoKeyPurpose = 5 |
| // [CryptoKeys][google.cloud.kms.v1.CryptoKey] with this purpose may be used with |
| // [AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt] and |
| // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. |
| CryptoKey_ASYMMETRIC_DECRYPT CryptoKey_CryptoKeyPurpose = 6 |
| ) |
| |
| var CryptoKey_CryptoKeyPurpose_name = map[int32]string{ |
| 0: "CRYPTO_KEY_PURPOSE_UNSPECIFIED", |
| 1: "ENCRYPT_DECRYPT", |
| 5: "ASYMMETRIC_SIGN", |
| 6: "ASYMMETRIC_DECRYPT", |
| } |
| |
| var CryptoKey_CryptoKeyPurpose_value = map[string]int32{ |
| "CRYPTO_KEY_PURPOSE_UNSPECIFIED": 0, |
| "ENCRYPT_DECRYPT": 1, |
| "ASYMMETRIC_SIGN": 5, |
| "ASYMMETRIC_DECRYPT": 6, |
| } |
| |
| func (x CryptoKey_CryptoKeyPurpose) String() string { |
| return proto.EnumName(CryptoKey_CryptoKeyPurpose_name, int32(x)) |
| } |
| |
| func (CryptoKey_CryptoKeyPurpose) EnumDescriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{1, 0} |
| } |
| |
| // Attestion formats provided by the HSM. |
| type KeyOperationAttestation_AttestationFormat int32 |
| |
| const ( |
| KeyOperationAttestation_ATTESTATION_FORMAT_UNSPECIFIED KeyOperationAttestation_AttestationFormat = 0 |
| // Cavium HSM attestation compressed with gzip. Note that this format is |
| // defined by Cavium and subject to change at any time. |
| KeyOperationAttestation_CAVIUM_V1_COMPRESSED KeyOperationAttestation_AttestationFormat = 3 |
| ) |
| |
| var KeyOperationAttestation_AttestationFormat_name = map[int32]string{ |
| 0: "ATTESTATION_FORMAT_UNSPECIFIED", |
| 3: "CAVIUM_V1_COMPRESSED", |
| } |
| |
| var KeyOperationAttestation_AttestationFormat_value = map[string]int32{ |
| "ATTESTATION_FORMAT_UNSPECIFIED": 0, |
| "CAVIUM_V1_COMPRESSED": 3, |
| } |
| |
| func (x KeyOperationAttestation_AttestationFormat) String() string { |
| return proto.EnumName(KeyOperationAttestation_AttestationFormat_name, int32(x)) |
| } |
| |
| func (KeyOperationAttestation_AttestationFormat) EnumDescriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{3, 0} |
| } |
| |
| // The algorithm of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], indicating what |
| // parameters must be used for each cryptographic operation. |
| // |
| // The |
| // [GOOGLE_SYMMETRIC_ENCRYPTION][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm.GOOGLE_SYMMETRIC_ENCRYPTION] |
| // algorithm is usable with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. |
| // |
| // Algorithms beginning with "RSA_SIGN_" are usable with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN]. |
| // |
| // The fields in the name after "RSA_SIGN_" correspond to the following |
| // parameters: padding algorithm, modulus bit length, and digest algorithm. |
| // |
| // For PSS, the salt length used is equal to the length of digest |
| // algorithm. For example, |
| // [RSA_SIGN_PSS_2048_SHA256][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256] |
| // will use PSS with a salt length of 256 bits or 32 bytes. |
| // |
| // Algorithms beginning with "RSA_DECRYPT_" are usable with |
| // [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. |
| // |
| // The fields in the name after "RSA_DECRYPT_" correspond to the following |
| // parameters: padding algorithm, modulus bit length, and digest algorithm. |
| // |
| // Algorithms beginning with "EC_SIGN_" are usable with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN]. |
| // |
| // The fields in the name after "EC_SIGN_" correspond to the following |
| // parameters: elliptic curve, digest algorithm. |
| type CryptoKeyVersion_CryptoKeyVersionAlgorithm int32 |
| |
| const ( |
| // Not specified. |
| CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED CryptoKeyVersion_CryptoKeyVersionAlgorithm = 0 |
| // Creates symmetric encryption keys. |
| CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION CryptoKeyVersion_CryptoKeyVersionAlgorithm = 1 |
| // RSASSA-PSS 2048 bit key with a SHA256 digest. |
| CryptoKeyVersion_RSA_SIGN_PSS_2048_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 2 |
| // RSASSA-PSS 3072 bit key with a SHA256 digest. |
| CryptoKeyVersion_RSA_SIGN_PSS_3072_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 3 |
| // RSASSA-PSS 4096 bit key with a SHA256 digest. |
| CryptoKeyVersion_RSA_SIGN_PSS_4096_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 4 |
| // RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest. |
| CryptoKeyVersion_RSA_SIGN_PKCS1_2048_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 5 |
| // RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest. |
| CryptoKeyVersion_RSA_SIGN_PKCS1_3072_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 6 |
| // RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest. |
| CryptoKeyVersion_RSA_SIGN_PKCS1_4096_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 7 |
| // RSAES-OAEP 2048 bit key with a SHA256 digest. |
| CryptoKeyVersion_RSA_DECRYPT_OAEP_2048_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 8 |
| // RSAES-OAEP 3072 bit key with a SHA256 digest. |
| CryptoKeyVersion_RSA_DECRYPT_OAEP_3072_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 9 |
| // RSAES-OAEP 4096 bit key with a SHA256 digest. |
| CryptoKeyVersion_RSA_DECRYPT_OAEP_4096_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 10 |
| // ECDSA on the NIST P-256 curve with a SHA256 digest. |
| CryptoKeyVersion_EC_SIGN_P256_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 12 |
| // ECDSA on the NIST P-384 curve with a SHA384 digest. |
| CryptoKeyVersion_EC_SIGN_P384_SHA384 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 13 |
| ) |
| |
| var CryptoKeyVersion_CryptoKeyVersionAlgorithm_name = map[int32]string{ |
| 0: "CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED", |
| 1: "GOOGLE_SYMMETRIC_ENCRYPTION", |
| 2: "RSA_SIGN_PSS_2048_SHA256", |
| 3: "RSA_SIGN_PSS_3072_SHA256", |
| 4: "RSA_SIGN_PSS_4096_SHA256", |
| 5: "RSA_SIGN_PKCS1_2048_SHA256", |
| 6: "RSA_SIGN_PKCS1_3072_SHA256", |
| 7: "RSA_SIGN_PKCS1_4096_SHA256", |
| 8: "RSA_DECRYPT_OAEP_2048_SHA256", |
| 9: "RSA_DECRYPT_OAEP_3072_SHA256", |
| 10: "RSA_DECRYPT_OAEP_4096_SHA256", |
| 12: "EC_SIGN_P256_SHA256", |
| 13: "EC_SIGN_P384_SHA384", |
| } |
| |
| var CryptoKeyVersion_CryptoKeyVersionAlgorithm_value = map[string]int32{ |
| "CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED": 0, |
| "GOOGLE_SYMMETRIC_ENCRYPTION": 1, |
| "RSA_SIGN_PSS_2048_SHA256": 2, |
| "RSA_SIGN_PSS_3072_SHA256": 3, |
| "RSA_SIGN_PSS_4096_SHA256": 4, |
| "RSA_SIGN_PKCS1_2048_SHA256": 5, |
| "RSA_SIGN_PKCS1_3072_SHA256": 6, |
| "RSA_SIGN_PKCS1_4096_SHA256": 7, |
| "RSA_DECRYPT_OAEP_2048_SHA256": 8, |
| "RSA_DECRYPT_OAEP_3072_SHA256": 9, |
| "RSA_DECRYPT_OAEP_4096_SHA256": 10, |
| "EC_SIGN_P256_SHA256": 12, |
| "EC_SIGN_P384_SHA384": 13, |
| } |
| |
| func (x CryptoKeyVersion_CryptoKeyVersionAlgorithm) String() string { |
| return proto.EnumName(CryptoKeyVersion_CryptoKeyVersionAlgorithm_name, int32(x)) |
| } |
| |
| func (CryptoKeyVersion_CryptoKeyVersionAlgorithm) EnumDescriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{4, 0} |
| } |
| |
| // The state of a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], indicating if it can be used. |
| type CryptoKeyVersion_CryptoKeyVersionState int32 |
| |
| const ( |
| // Not specified. |
| CryptoKeyVersion_CRYPTO_KEY_VERSION_STATE_UNSPECIFIED CryptoKeyVersion_CryptoKeyVersionState = 0 |
| // This version is still being generated. It may not be used, enabled, |
| // disabled, or destroyed yet. Cloud KMS will automatically mark this |
| // version [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] as soon as the version is ready. |
| CryptoKeyVersion_PENDING_GENERATION CryptoKeyVersion_CryptoKeyVersionState = 5 |
| // This version may be used for cryptographic operations. |
| CryptoKeyVersion_ENABLED CryptoKeyVersion_CryptoKeyVersionState = 1 |
| // This version may not be used, but the key material is still available, |
| // and the version can be placed back into the [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] state. |
| CryptoKeyVersion_DISABLED CryptoKeyVersion_CryptoKeyVersionState = 2 |
| // This version is destroyed, and the key material is no longer stored. |
| // A version may not leave this state once entered. |
| CryptoKeyVersion_DESTROYED CryptoKeyVersion_CryptoKeyVersionState = 3 |
| // This version is scheduled for destruction, and will be destroyed soon. |
| // Call |
| // [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] |
| // to put it back into the [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] state. |
| CryptoKeyVersion_DESTROY_SCHEDULED CryptoKeyVersion_CryptoKeyVersionState = 4 |
| ) |
| |
| var CryptoKeyVersion_CryptoKeyVersionState_name = map[int32]string{ |
| 0: "CRYPTO_KEY_VERSION_STATE_UNSPECIFIED", |
| 5: "PENDING_GENERATION", |
| 1: "ENABLED", |
| 2: "DISABLED", |
| 3: "DESTROYED", |
| 4: "DESTROY_SCHEDULED", |
| } |
| |
| var CryptoKeyVersion_CryptoKeyVersionState_value = map[string]int32{ |
| "CRYPTO_KEY_VERSION_STATE_UNSPECIFIED": 0, |
| "PENDING_GENERATION": 5, |
| "ENABLED": 1, |
| "DISABLED": 2, |
| "DESTROYED": 3, |
| "DESTROY_SCHEDULED": 4, |
| } |
| |
| func (x CryptoKeyVersion_CryptoKeyVersionState) String() string { |
| return proto.EnumName(CryptoKeyVersion_CryptoKeyVersionState_name, int32(x)) |
| } |
| |
| func (CryptoKeyVersion_CryptoKeyVersionState) EnumDescriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{4, 1} |
| } |
| |
| // A view for [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]s. Controls the level of detail returned |
| // for [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] in |
| // [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions] and |
| // [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys]. |
| type CryptoKeyVersion_CryptoKeyVersionView int32 |
| |
| const ( |
| // Default view for each [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. Does not include |
| // the [attestation][google.cloud.kms.v1.CryptoKeyVersion.attestation] field. |
| CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED CryptoKeyVersion_CryptoKeyVersionView = 0 |
| // Provides all fields in each [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], including the |
| // [attestation][google.cloud.kms.v1.CryptoKeyVersion.attestation]. |
| CryptoKeyVersion_FULL CryptoKeyVersion_CryptoKeyVersionView = 1 |
| ) |
| |
| var CryptoKeyVersion_CryptoKeyVersionView_name = map[int32]string{ |
| 0: "CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED", |
| 1: "FULL", |
| } |
| |
| var CryptoKeyVersion_CryptoKeyVersionView_value = map[string]int32{ |
| "CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED": 0, |
| "FULL": 1, |
| } |
| |
| func (x CryptoKeyVersion_CryptoKeyVersionView) String() string { |
| return proto.EnumName(CryptoKeyVersion_CryptoKeyVersionView_name, int32(x)) |
| } |
| |
| func (CryptoKeyVersion_CryptoKeyVersionView) EnumDescriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{4, 2} |
| } |
| |
| // A [KeyRing][google.cloud.kms.v1.KeyRing] is a toplevel logical grouping of [CryptoKeys][google.cloud.kms.v1.CryptoKey]. |
| type KeyRing struct { |
| // Output only. The resource name for the [KeyRing][google.cloud.kms.v1.KeyRing] in the format |
| // `projects/*/locations/*/keyRings/*`. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Output only. The time at which this [KeyRing][google.cloud.kms.v1.KeyRing] was created. |
| CreateTime *timestamp.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *KeyRing) Reset() { *m = KeyRing{} } |
| func (m *KeyRing) String() string { return proto.CompactTextString(m) } |
| func (*KeyRing) ProtoMessage() {} |
| func (*KeyRing) Descriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{0} |
| } |
| |
| func (m *KeyRing) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_KeyRing.Unmarshal(m, b) |
| } |
| func (m *KeyRing) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_KeyRing.Marshal(b, m, deterministic) |
| } |
| func (m *KeyRing) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_KeyRing.Merge(m, src) |
| } |
| func (m *KeyRing) XXX_Size() int { |
| return xxx_messageInfo_KeyRing.Size(m) |
| } |
| func (m *KeyRing) XXX_DiscardUnknown() { |
| xxx_messageInfo_KeyRing.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_KeyRing proto.InternalMessageInfo |
| |
| func (m *KeyRing) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *KeyRing) GetCreateTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.CreateTime |
| } |
| return nil |
| } |
| |
| // A [CryptoKey][google.cloud.kms.v1.CryptoKey] represents a logical key that can be used for cryptographic |
| // operations. |
| // |
| // A [CryptoKey][google.cloud.kms.v1.CryptoKey] is made up of one or more [versions][google.cloud.kms.v1.CryptoKeyVersion], which |
| // represent the actual key material used in cryptographic operations. |
| type CryptoKey struct { |
| // Output only. The resource name for this [CryptoKey][google.cloud.kms.v1.CryptoKey] in the format |
| // `projects/*/locations/*/keyRings/*/cryptoKeys/*`. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // Output only. A copy of the "primary" [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that will be used |
| // by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt] when this [CryptoKey][google.cloud.kms.v1.CryptoKey] is given |
| // in [EncryptRequest.name][google.cloud.kms.v1.EncryptRequest.name]. |
| // |
| // The [CryptoKey][google.cloud.kms.v1.CryptoKey]'s primary version can be updated via |
| // [UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]. |
| // |
| // All keys with [purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT] have a |
| // primary. For other keys, this field will be omitted. |
| Primary *CryptoKeyVersion `protobuf:"bytes,2,opt,name=primary,proto3" json:"primary,omitempty"` |
| // The immutable purpose of this [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| Purpose CryptoKey_CryptoKeyPurpose `protobuf:"varint,3,opt,name=purpose,proto3,enum=google.cloud.kms.v1.CryptoKey_CryptoKeyPurpose" json:"purpose,omitempty"` |
| // Output only. The time at which this [CryptoKey][google.cloud.kms.v1.CryptoKey] was created. |
| CreateTime *timestamp.Timestamp `protobuf:"bytes,5,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"` |
| // At [next_rotation_time][google.cloud.kms.v1.CryptoKey.next_rotation_time], the Key Management Service will automatically: |
| // |
| // 1. Create a new version of this [CryptoKey][google.cloud.kms.v1.CryptoKey]. |
| // 2. Mark the new version as primary. |
| // |
| // Key rotations performed manually via |
| // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] and |
| // [UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion] |
| // do not affect [next_rotation_time][google.cloud.kms.v1.CryptoKey.next_rotation_time]. |
| // |
| // Keys with [purpose][google.cloud.kms.v1.CryptoKey.purpose] |
| // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT] support |
| // automatic rotation. For other keys, this field must be omitted. |
| NextRotationTime *timestamp.Timestamp `protobuf:"bytes,7,opt,name=next_rotation_time,json=nextRotationTime,proto3" json:"next_rotation_time,omitempty"` |
| // Controls the rate of automatic rotation. |
| // |
| // Types that are valid to be assigned to RotationSchedule: |
| // *CryptoKey_RotationPeriod |
| RotationSchedule isCryptoKey_RotationSchedule `protobuf_oneof:"rotation_schedule"` |
| // A template describing settings for new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] instances. |
| // The properties of new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] instances created by either |
| // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or |
| // auto-rotation are controlled by this template. |
| VersionTemplate *CryptoKeyVersionTemplate `protobuf:"bytes,11,opt,name=version_template,json=versionTemplate,proto3" json:"version_template,omitempty"` |
| // Labels with user-defined metadata. For more information, see |
| // [Labeling Keys](/kms/docs/labeling-keys). |
| Labels map[string]string `protobuf:"bytes,10,rep,name=labels,proto3" json:"labels,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CryptoKey) Reset() { *m = CryptoKey{} } |
| func (m *CryptoKey) String() string { return proto.CompactTextString(m) } |
| func (*CryptoKey) ProtoMessage() {} |
| func (*CryptoKey) Descriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{1} |
| } |
| |
| func (m *CryptoKey) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CryptoKey.Unmarshal(m, b) |
| } |
| func (m *CryptoKey) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CryptoKey.Marshal(b, m, deterministic) |
| } |
| func (m *CryptoKey) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CryptoKey.Merge(m, src) |
| } |
| func (m *CryptoKey) XXX_Size() int { |
| return xxx_messageInfo_CryptoKey.Size(m) |
| } |
| func (m *CryptoKey) XXX_DiscardUnknown() { |
| xxx_messageInfo_CryptoKey.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CryptoKey proto.InternalMessageInfo |
| |
| func (m *CryptoKey) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *CryptoKey) GetPrimary() *CryptoKeyVersion { |
| if m != nil { |
| return m.Primary |
| } |
| return nil |
| } |
| |
| func (m *CryptoKey) GetPurpose() CryptoKey_CryptoKeyPurpose { |
| if m != nil { |
| return m.Purpose |
| } |
| return CryptoKey_CRYPTO_KEY_PURPOSE_UNSPECIFIED |
| } |
| |
| func (m *CryptoKey) GetCreateTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.CreateTime |
| } |
| return nil |
| } |
| |
| func (m *CryptoKey) GetNextRotationTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.NextRotationTime |
| } |
| return nil |
| } |
| |
| type isCryptoKey_RotationSchedule interface { |
| isCryptoKey_RotationSchedule() |
| } |
| |
| type CryptoKey_RotationPeriod struct { |
| RotationPeriod *duration.Duration `protobuf:"bytes,8,opt,name=rotation_period,json=rotationPeriod,proto3,oneof"` |
| } |
| |
| func (*CryptoKey_RotationPeriod) isCryptoKey_RotationSchedule() {} |
| |
| func (m *CryptoKey) GetRotationSchedule() isCryptoKey_RotationSchedule { |
| if m != nil { |
| return m.RotationSchedule |
| } |
| return nil |
| } |
| |
| func (m *CryptoKey) GetRotationPeriod() *duration.Duration { |
| if x, ok := m.GetRotationSchedule().(*CryptoKey_RotationPeriod); ok { |
| return x.RotationPeriod |
| } |
| return nil |
| } |
| |
| func (m *CryptoKey) GetVersionTemplate() *CryptoKeyVersionTemplate { |
| if m != nil { |
| return m.VersionTemplate |
| } |
| return nil |
| } |
| |
| func (m *CryptoKey) GetLabels() map[string]string { |
| if m != nil { |
| return m.Labels |
| } |
| return nil |
| } |
| |
| // XXX_OneofFuncs is for the internal use of the proto package. |
| func (*CryptoKey) XXX_OneofFuncs() (func(msg proto.Message, b *proto.Buffer) error, func(msg proto.Message, tag, wire int, b *proto.Buffer) (bool, error), func(msg proto.Message) (n int), []interface{}) { |
| return _CryptoKey_OneofMarshaler, _CryptoKey_OneofUnmarshaler, _CryptoKey_OneofSizer, []interface{}{ |
| (*CryptoKey_RotationPeriod)(nil), |
| } |
| } |
| |
| func _CryptoKey_OneofMarshaler(msg proto.Message, b *proto.Buffer) error { |
| m := msg.(*CryptoKey) |
| // rotation_schedule |
| switch x := m.RotationSchedule.(type) { |
| case *CryptoKey_RotationPeriod: |
| b.EncodeVarint(8<<3 | proto.WireBytes) |
| if err := b.EncodeMessage(x.RotationPeriod); err != nil { |
| return err |
| } |
| case nil: |
| default: |
| return fmt.Errorf("CryptoKey.RotationSchedule has unexpected type %T", x) |
| } |
| return nil |
| } |
| |
| func _CryptoKey_OneofUnmarshaler(msg proto.Message, tag, wire int, b *proto.Buffer) (bool, error) { |
| m := msg.(*CryptoKey) |
| switch tag { |
| case 8: // rotation_schedule.rotation_period |
| if wire != proto.WireBytes { |
| return true, proto.ErrInternalBadWireType |
| } |
| msg := new(duration.Duration) |
| err := b.DecodeMessage(msg) |
| m.RotationSchedule = &CryptoKey_RotationPeriod{msg} |
| return true, err |
| default: |
| return false, nil |
| } |
| } |
| |
| func _CryptoKey_OneofSizer(msg proto.Message) (n int) { |
| m := msg.(*CryptoKey) |
| // rotation_schedule |
| switch x := m.RotationSchedule.(type) { |
| case *CryptoKey_RotationPeriod: |
| s := proto.Size(x.RotationPeriod) |
| n += 1 // tag and wire |
| n += proto.SizeVarint(uint64(s)) |
| n += s |
| case nil: |
| default: |
| panic(fmt.Sprintf("proto: unexpected type %T in oneof", x)) |
| } |
| return n |
| } |
| |
| // A [CryptoKeyVersionTemplate][google.cloud.kms.v1.CryptoKeyVersionTemplate] specifies the properties to use when creating |
| // a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], either manually with |
| // [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or |
| // automatically as a result of auto-rotation. |
| type CryptoKeyVersionTemplate struct { |
| // [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] to use when creating a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] based on |
| // this template. Immutable. Defaults to [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE]. |
| ProtectionLevel ProtectionLevel `protobuf:"varint,1,opt,name=protection_level,json=protectionLevel,proto3,enum=google.cloud.kms.v1.ProtectionLevel" json:"protection_level,omitempty"` |
| // Required. [Algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] to use |
| // when creating a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] based on this template. |
| // |
| // For backwards compatibility, GOOGLE_SYMMETRIC_ENCRYPTION is implied if both |
| // this field is omitted and [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] is |
| // [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. |
| Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,3,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CryptoKeyVersionTemplate) Reset() { *m = CryptoKeyVersionTemplate{} } |
| func (m *CryptoKeyVersionTemplate) String() string { return proto.CompactTextString(m) } |
| func (*CryptoKeyVersionTemplate) ProtoMessage() {} |
| func (*CryptoKeyVersionTemplate) Descriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{2} |
| } |
| |
| func (m *CryptoKeyVersionTemplate) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CryptoKeyVersionTemplate.Unmarshal(m, b) |
| } |
| func (m *CryptoKeyVersionTemplate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CryptoKeyVersionTemplate.Marshal(b, m, deterministic) |
| } |
| func (m *CryptoKeyVersionTemplate) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CryptoKeyVersionTemplate.Merge(m, src) |
| } |
| func (m *CryptoKeyVersionTemplate) XXX_Size() int { |
| return xxx_messageInfo_CryptoKeyVersionTemplate.Size(m) |
| } |
| func (m *CryptoKeyVersionTemplate) XXX_DiscardUnknown() { |
| xxx_messageInfo_CryptoKeyVersionTemplate.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CryptoKeyVersionTemplate proto.InternalMessageInfo |
| |
| func (m *CryptoKeyVersionTemplate) GetProtectionLevel() ProtectionLevel { |
| if m != nil { |
| return m.ProtectionLevel |
| } |
| return ProtectionLevel_PROTECTION_LEVEL_UNSPECIFIED |
| } |
| |
| func (m *CryptoKeyVersionTemplate) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { |
| if m != nil { |
| return m.Algorithm |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
| } |
| |
| // Contains an HSM-generated attestation about a key operation. |
| type KeyOperationAttestation struct { |
| // Output only. The format of the attestation data. |
| Format KeyOperationAttestation_AttestationFormat `protobuf:"varint,4,opt,name=format,proto3,enum=google.cloud.kms.v1.KeyOperationAttestation_AttestationFormat" json:"format,omitempty"` |
| // Output only. The attestation data provided by the HSM when the key |
| // operation was performed. |
| Content []byte `protobuf:"bytes,5,opt,name=content,proto3" json:"content,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *KeyOperationAttestation) Reset() { *m = KeyOperationAttestation{} } |
| func (m *KeyOperationAttestation) String() string { return proto.CompactTextString(m) } |
| func (*KeyOperationAttestation) ProtoMessage() {} |
| func (*KeyOperationAttestation) Descriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{3} |
| } |
| |
| func (m *KeyOperationAttestation) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_KeyOperationAttestation.Unmarshal(m, b) |
| } |
| func (m *KeyOperationAttestation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_KeyOperationAttestation.Marshal(b, m, deterministic) |
| } |
| func (m *KeyOperationAttestation) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_KeyOperationAttestation.Merge(m, src) |
| } |
| func (m *KeyOperationAttestation) XXX_Size() int { |
| return xxx_messageInfo_KeyOperationAttestation.Size(m) |
| } |
| func (m *KeyOperationAttestation) XXX_DiscardUnknown() { |
| xxx_messageInfo_KeyOperationAttestation.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_KeyOperationAttestation proto.InternalMessageInfo |
| |
| func (m *KeyOperationAttestation) GetFormat() KeyOperationAttestation_AttestationFormat { |
| if m != nil { |
| return m.Format |
| } |
| return KeyOperationAttestation_ATTESTATION_FORMAT_UNSPECIFIED |
| } |
| |
| func (m *KeyOperationAttestation) GetContent() []byte { |
| if m != nil { |
| return m.Content |
| } |
| return nil |
| } |
| |
| // A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents an individual cryptographic key, and the |
| // associated key material. |
| // |
| // An [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] version can be |
| // used for cryptographic operations. |
| // |
| // For security reasons, the raw cryptographic key material represented by a |
| // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] can never be viewed or exported. It can only be used to |
| // encrypt, decrypt, or sign data when an authorized user or application invokes |
| // Cloud KMS. |
| type CryptoKeyVersion struct { |
| // Output only. The resource name for this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the format |
| // `projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*`. |
| Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"` |
| // The current state of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. |
| State CryptoKeyVersion_CryptoKeyVersionState `protobuf:"varint,3,opt,name=state,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionState" json:"state,omitempty"` |
| // Output only. The [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] describing how crypto operations are |
| // performed with this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. |
| ProtectionLevel ProtectionLevel `protobuf:"varint,7,opt,name=protection_level,json=protectionLevel,proto3,enum=google.cloud.kms.v1.ProtectionLevel" json:"protection_level,omitempty"` |
| // Output only. The [CryptoKeyVersionAlgorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] that this |
| // [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] supports. |
| Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,10,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` |
| // Output only. Statement that was generated and signed by the HSM at key |
| // creation time. Use this statement to verify attributes of the key as stored |
| // on the HSM, independently of Google. Only provided for key versions with |
| // [protection_level][google.cloud.kms.v1.CryptoKeyVersion.protection_level] [HSM][google.cloud.kms.v1.ProtectionLevel.HSM]. |
| Attestation *KeyOperationAttestation `protobuf:"bytes,8,opt,name=attestation,proto3" json:"attestation,omitempty"` |
| // Output only. The time at which this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] was created. |
| CreateTime *timestamp.Timestamp `protobuf:"bytes,4,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"` |
| // Output only. The time this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s key material was |
| // generated. |
| GenerateTime *timestamp.Timestamp `protobuf:"bytes,11,opt,name=generate_time,json=generateTime,proto3" json:"generate_time,omitempty"` |
| // Output only. The time this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s key material is scheduled |
| // for destruction. Only present if [state][google.cloud.kms.v1.CryptoKeyVersion.state] is |
| // [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]. |
| DestroyTime *timestamp.Timestamp `protobuf:"bytes,5,opt,name=destroy_time,json=destroyTime,proto3" json:"destroy_time,omitempty"` |
| // Output only. The time this CryptoKeyVersion's key material was |
| // destroyed. Only present if [state][google.cloud.kms.v1.CryptoKeyVersion.state] is |
| // [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED]. |
| DestroyEventTime *timestamp.Timestamp `protobuf:"bytes,6,opt,name=destroy_event_time,json=destroyEventTime,proto3" json:"destroy_event_time,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *CryptoKeyVersion) Reset() { *m = CryptoKeyVersion{} } |
| func (m *CryptoKeyVersion) String() string { return proto.CompactTextString(m) } |
| func (*CryptoKeyVersion) ProtoMessage() {} |
| func (*CryptoKeyVersion) Descriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{4} |
| } |
| |
| func (m *CryptoKeyVersion) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_CryptoKeyVersion.Unmarshal(m, b) |
| } |
| func (m *CryptoKeyVersion) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_CryptoKeyVersion.Marshal(b, m, deterministic) |
| } |
| func (m *CryptoKeyVersion) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_CryptoKeyVersion.Merge(m, src) |
| } |
| func (m *CryptoKeyVersion) XXX_Size() int { |
| return xxx_messageInfo_CryptoKeyVersion.Size(m) |
| } |
| func (m *CryptoKeyVersion) XXX_DiscardUnknown() { |
| xxx_messageInfo_CryptoKeyVersion.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_CryptoKeyVersion proto.InternalMessageInfo |
| |
| func (m *CryptoKeyVersion) GetName() string { |
| if m != nil { |
| return m.Name |
| } |
| return "" |
| } |
| |
| func (m *CryptoKeyVersion) GetState() CryptoKeyVersion_CryptoKeyVersionState { |
| if m != nil { |
| return m.State |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_STATE_UNSPECIFIED |
| } |
| |
| func (m *CryptoKeyVersion) GetProtectionLevel() ProtectionLevel { |
| if m != nil { |
| return m.ProtectionLevel |
| } |
| return ProtectionLevel_PROTECTION_LEVEL_UNSPECIFIED |
| } |
| |
| func (m *CryptoKeyVersion) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { |
| if m != nil { |
| return m.Algorithm |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
| } |
| |
| func (m *CryptoKeyVersion) GetAttestation() *KeyOperationAttestation { |
| if m != nil { |
| return m.Attestation |
| } |
| return nil |
| } |
| |
| func (m *CryptoKeyVersion) GetCreateTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.CreateTime |
| } |
| return nil |
| } |
| |
| func (m *CryptoKeyVersion) GetGenerateTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.GenerateTime |
| } |
| return nil |
| } |
| |
| func (m *CryptoKeyVersion) GetDestroyTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.DestroyTime |
| } |
| return nil |
| } |
| |
| func (m *CryptoKeyVersion) GetDestroyEventTime() *timestamp.Timestamp { |
| if m != nil { |
| return m.DestroyEventTime |
| } |
| return nil |
| } |
| |
| // The public key for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. Obtained via |
| // [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. |
| type PublicKey struct { |
| // The public key, encoded in PEM format. For more information, see the |
| // [RFC 7468](https://tools.ietf.org/html/rfc7468) sections for |
| // [General Considerations](https://tools.ietf.org/html/rfc7468#section-2) and |
| // [Textual Encoding of Subject Public Key Info] |
| // (https://tools.ietf.org/html/rfc7468#section-13). |
| Pem string `protobuf:"bytes,1,opt,name=pem,proto3" json:"pem,omitempty"` |
| // The [Algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] associated |
| // with this key. |
| Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"` |
| XXX_NoUnkeyedLiteral struct{} `json:"-"` |
| XXX_unrecognized []byte `json:"-"` |
| XXX_sizecache int32 `json:"-"` |
| } |
| |
| func (m *PublicKey) Reset() { *m = PublicKey{} } |
| func (m *PublicKey) String() string { return proto.CompactTextString(m) } |
| func (*PublicKey) ProtoMessage() {} |
| func (*PublicKey) Descriptor() ([]byte, []int) { |
| return fileDescriptor_e40e1384d35a80c5, []int{5} |
| } |
| |
| func (m *PublicKey) XXX_Unmarshal(b []byte) error { |
| return xxx_messageInfo_PublicKey.Unmarshal(m, b) |
| } |
| func (m *PublicKey) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) { |
| return xxx_messageInfo_PublicKey.Marshal(b, m, deterministic) |
| } |
| func (m *PublicKey) XXX_Merge(src proto.Message) { |
| xxx_messageInfo_PublicKey.Merge(m, src) |
| } |
| func (m *PublicKey) XXX_Size() int { |
| return xxx_messageInfo_PublicKey.Size(m) |
| } |
| func (m *PublicKey) XXX_DiscardUnknown() { |
| xxx_messageInfo_PublicKey.DiscardUnknown(m) |
| } |
| |
| var xxx_messageInfo_PublicKey proto.InternalMessageInfo |
| |
| func (m *PublicKey) GetPem() string { |
| if m != nil { |
| return m.Pem |
| } |
| return "" |
| } |
| |
| func (m *PublicKey) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm { |
| if m != nil { |
| return m.Algorithm |
| } |
| return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
| } |
| |
| func init() { |
| proto.RegisterEnum("google.cloud.kms.v1.ProtectionLevel", ProtectionLevel_name, ProtectionLevel_value) |
| proto.RegisterEnum("google.cloud.kms.v1.CryptoKey_CryptoKeyPurpose", CryptoKey_CryptoKeyPurpose_name, CryptoKey_CryptoKeyPurpose_value) |
| proto.RegisterEnum("google.cloud.kms.v1.KeyOperationAttestation_AttestationFormat", KeyOperationAttestation_AttestationFormat_name, KeyOperationAttestation_AttestationFormat_value) |
| proto.RegisterEnum("google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm", CryptoKeyVersion_CryptoKeyVersionAlgorithm_name, CryptoKeyVersion_CryptoKeyVersionAlgorithm_value) |
| proto.RegisterEnum("google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionState", CryptoKeyVersion_CryptoKeyVersionState_name, CryptoKeyVersion_CryptoKeyVersionState_value) |
| proto.RegisterEnum("google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView", CryptoKeyVersion_CryptoKeyVersionView_name, CryptoKeyVersion_CryptoKeyVersionView_value) |
| proto.RegisterType((*KeyRing)(nil), "google.cloud.kms.v1.KeyRing") |
| proto.RegisterType((*CryptoKey)(nil), "google.cloud.kms.v1.CryptoKey") |
| proto.RegisterMapType((map[string]string)(nil), "google.cloud.kms.v1.CryptoKey.LabelsEntry") |
| proto.RegisterType((*CryptoKeyVersionTemplate)(nil), "google.cloud.kms.v1.CryptoKeyVersionTemplate") |
| proto.RegisterType((*KeyOperationAttestation)(nil), "google.cloud.kms.v1.KeyOperationAttestation") |
| proto.RegisterType((*CryptoKeyVersion)(nil), "google.cloud.kms.v1.CryptoKeyVersion") |
| proto.RegisterType((*PublicKey)(nil), "google.cloud.kms.v1.PublicKey") |
| } |
| |
| func init() { |
| proto.RegisterFile("google/cloud/kms/v1/resources.proto", fileDescriptor_e40e1384d35a80c5) |
| } |
| |
| var fileDescriptor_e40e1384d35a80c5 = []byte{ |
| // 1197 bytes of a gzipped FileDescriptorProto |
| 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xac, 0x56, 0x5d, 0x6e, 0xdb, 0x46, |
| 0x10, 0x0e, 0x25, 0xcb, 0xb2, 0x46, 0x4e, 0x4c, 0xaf, 0xf3, 0xa3, 0xb8, 0x41, 0x62, 0x28, 0x29, |
| 0x6a, 0x04, 0xa9, 0x14, 0xcb, 0x4e, 0xea, 0x34, 0x68, 0x03, 0x5a, 0x5a, 0x4b, 0xac, 0x7e, 0xc8, |
| 0x2c, 0x69, 0xa5, 0x0e, 0x52, 0x10, 0xb4, 0xbc, 0x51, 0x04, 0x8b, 0x3f, 0x20, 0x29, 0x35, 0x02, |
| 0x7a, 0x8d, 0xbe, 0xf4, 0x02, 0x05, 0x7a, 0x86, 0x9e, 0x20, 0x87, 0x28, 0x7a, 0x8c, 0x3e, 0x16, |
| 0x5c, 0x2e, 0x6d, 0x49, 0x66, 0xea, 0xa4, 0xf0, 0x93, 0x76, 0x67, 0xe6, 0xfb, 0x66, 0x34, 0x33, |
| 0xfc, 0x48, 0xb8, 0xdf, 0x77, 0x9c, 0xfe, 0x90, 0x96, 0x7b, 0x43, 0x67, 0x74, 0x5c, 0x3e, 0xb1, |
| 0xfc, 0xf2, 0x78, 0xab, 0xec, 0x51, 0xdf, 0x19, 0x79, 0x3d, 0xea, 0x97, 0x5c, 0xcf, 0x09, 0x1c, |
| 0xb4, 0x16, 0x05, 0x95, 0x58, 0x50, 0xe9, 0xc4, 0xf2, 0x4b, 0xe3, 0xad, 0xf5, 0x3b, 0x1c, 0x69, |
| 0xba, 0x83, 0xb2, 0x69, 0xdb, 0x4e, 0x60, 0x06, 0x03, 0xc7, 0xe6, 0x90, 0xf5, 0xbb, 0xdc, 0xcb, |
| 0x6e, 0x47, 0xa3, 0xb7, 0xe5, 0xe3, 0x91, 0xc7, 0x02, 0xb8, 0xff, 0xde, 0xbc, 0x3f, 0x18, 0x58, |
| 0xd4, 0x0f, 0x4c, 0xcb, 0x8d, 0x02, 0x8a, 0xaf, 0x21, 0xdb, 0xa4, 0x13, 0x32, 0xb0, 0xfb, 0x08, |
| 0xc1, 0x82, 0x6d, 0x5a, 0xb4, 0x20, 0x6c, 0x08, 0x9b, 0x39, 0xc2, 0xce, 0xe8, 0x39, 0xe4, 0x7b, |
| 0x1e, 0x35, 0x03, 0x6a, 0x84, 0xc0, 0x42, 0x6a, 0x43, 0xd8, 0xcc, 0x57, 0xd6, 0x4b, 0xbc, 0xd0, |
| 0x98, 0xb5, 0xa4, 0xc7, 0xac, 0x04, 0xa2, 0xf0, 0xd0, 0x50, 0xfc, 0x3b, 0x03, 0xb9, 0xaa, 0x37, |
| 0x71, 0x03, 0xa7, 0x49, 0x27, 0x89, 0xf4, 0x2f, 0x20, 0xeb, 0x7a, 0x03, 0xcb, 0xf4, 0x26, 0x9c, |
| 0xfa, 0xcb, 0x52, 0x42, 0x0f, 0x4a, 0xa7, 0x24, 0x5d, 0xea, 0xf9, 0x03, 0xc7, 0x26, 0x31, 0x0a, |
| 0xc9, 0x90, 0x75, 0x47, 0x9e, 0xeb, 0xf8, 0xb4, 0x90, 0xde, 0x10, 0x36, 0xaf, 0x55, 0xca, 0xff, |
| 0x4d, 0x70, 0x76, 0x52, 0x23, 0x18, 0x89, 0xf1, 0xf3, 0x7f, 0x35, 0xf3, 0x39, 0x7f, 0x15, 0x35, |
| 0x00, 0xd9, 0xf4, 0x7d, 0x60, 0x78, 0x7c, 0x3e, 0x11, 0x47, 0xf6, 0x42, 0x0e, 0x31, 0x44, 0x11, |
| 0x0e, 0x62, 0x4c, 0x35, 0x58, 0x39, 0x25, 0x71, 0xa9, 0x37, 0x70, 0x8e, 0x0b, 0x4b, 0x8c, 0xe6, |
| 0xf6, 0x39, 0x9a, 0x1a, 0x9f, 0x75, 0xe3, 0x0a, 0xb9, 0x16, 0x63, 0x54, 0x06, 0x41, 0x3f, 0x82, |
| 0x38, 0x8e, 0x7a, 0x65, 0x04, 0xd4, 0x72, 0x87, 0x66, 0x40, 0x0b, 0x79, 0x46, 0xf3, 0xf5, 0x27, |
| 0x75, 0x58, 0xe7, 0x20, 0xb2, 0x32, 0x9e, 0x35, 0xa0, 0x3d, 0x58, 0x1c, 0x9a, 0x47, 0x74, 0xe8, |
| 0x17, 0x60, 0x23, 0xbd, 0x99, 0xaf, 0x3c, 0xbc, 0xa0, 0xe1, 0x2d, 0x16, 0x8c, 0xed, 0xc0, 0x9b, |
| 0x10, 0x8e, 0x5c, 0x7f, 0x06, 0xf9, 0x29, 0x33, 0x12, 0x21, 0x7d, 0x42, 0x27, 0x7c, 0x31, 0xc2, |
| 0x23, 0xba, 0x0e, 0x99, 0xb1, 0x39, 0x1c, 0x45, 0x0b, 0x97, 0x23, 0xd1, 0xe5, 0xdb, 0xd4, 0xae, |
| 0x50, 0x7c, 0x0f, 0xe2, 0xfc, 0x08, 0x51, 0x11, 0xee, 0x56, 0xc9, 0xa1, 0xaa, 0x2b, 0x46, 0x13, |
| 0x1f, 0x1a, 0xea, 0x01, 0x51, 0x15, 0x0d, 0x1b, 0x07, 0x1d, 0x4d, 0xc5, 0x55, 0x79, 0x5f, 0xc6, |
| 0x35, 0xf1, 0x0a, 0x5a, 0x83, 0x15, 0xdc, 0x61, 0x51, 0x46, 0x0d, 0xb3, 0x5f, 0x51, 0x08, 0x8d, |
| 0x92, 0x76, 0xd8, 0x6e, 0x63, 0x9d, 0xc8, 0x55, 0x43, 0x93, 0xeb, 0x1d, 0x31, 0x83, 0x6e, 0x02, |
| 0x9a, 0x32, 0xc6, 0xc1, 0x8b, 0x7b, 0x6b, 0xb0, 0x7a, 0x3a, 0x18, 0xbf, 0xf7, 0x8e, 0x1e, 0x8f, |
| 0x86, 0xb4, 0xf8, 0x41, 0x80, 0xc2, 0xc7, 0x7a, 0x87, 0x14, 0x10, 0xc3, 0x59, 0xd1, 0x1e, 0xc3, |
| 0x0c, 0xe9, 0x98, 0x0e, 0xd9, 0x9f, 0xbc, 0x56, 0x79, 0x90, 0xd8, 0x34, 0xf5, 0x34, 0xb8, 0x15, |
| 0xc6, 0x92, 0x15, 0x77, 0xd6, 0x80, 0x7e, 0x82, 0x9c, 0x39, 0xec, 0x3b, 0xde, 0x20, 0x78, 0x67, |
| 0xf1, 0x7d, 0x7f, 0xf1, 0x49, 0xe3, 0x3c, 0x67, 0x90, 0x62, 0x1a, 0x72, 0xc6, 0x58, 0xfc, 0x4b, |
| 0x80, 0x5b, 0x4d, 0x3a, 0x51, 0x5c, 0x1a, 0xed, 0x95, 0x14, 0x04, 0xe1, 0x9a, 0x86, 0x47, 0xd4, |
| 0x85, 0xc5, 0xb7, 0x8e, 0x67, 0x99, 0x41, 0x61, 0x81, 0xe5, 0xfd, 0x3e, 0x31, 0xef, 0x47, 0xd0, |
| 0xa5, 0xa9, 0xf3, 0x3e, 0x63, 0x21, 0x9c, 0x0d, 0x15, 0x20, 0xdb, 0x73, 0xec, 0x80, 0xda, 0x01, |
| 0x7b, 0xe2, 0x96, 0x49, 0x7c, 0x2d, 0xbe, 0x84, 0xd5, 0x73, 0xb0, 0x70, 0xd4, 0x92, 0xae, 0x63, |
| 0x4d, 0x97, 0x74, 0x59, 0xe9, 0x18, 0xfb, 0x0a, 0x69, 0x4b, 0xfa, 0xdc, 0xa8, 0x0b, 0x70, 0xbd, |
| 0x2a, 0x75, 0xe5, 0x83, 0xb6, 0xd1, 0xdd, 0x32, 0xaa, 0x4a, 0x5b, 0x25, 0x58, 0xd3, 0x70, 0x4d, |
| 0x4c, 0x17, 0x7f, 0x87, 0xa9, 0xed, 0xe1, 0x9d, 0x48, 0xd4, 0xa5, 0x97, 0x90, 0x09, 0xf3, 0xc6, |
| 0xa2, 0xf2, 0xfc, 0xff, 0x35, 0x59, 0x0b, 0x29, 0x48, 0xc4, 0x94, 0xb8, 0x0c, 0xd9, 0x4b, 0x5b, |
| 0x06, 0xb8, 0xec, 0x65, 0x40, 0x1d, 0xc8, 0x9b, 0x67, 0xed, 0xe7, 0x1a, 0xf4, 0xe8, 0x73, 0xa6, |
| 0x4e, 0xa6, 0x09, 0xe6, 0xe5, 0x75, 0xe1, 0xb3, 0xe4, 0xf5, 0x05, 0x5c, 0xed, 0x53, 0x3b, 0x4c, |
| 0xc1, 0xe1, 0xf9, 0x0b, 0xe1, 0xcb, 0x31, 0x80, 0x11, 0x7c, 0x07, 0xcb, 0xc7, 0xd4, 0x0f, 0x3c, |
| 0x67, 0xf2, 0xa9, 0xea, 0x9e, 0xe7, 0xf1, 0xb1, 0xbc, 0xc7, 0x70, 0x3a, 0xa6, 0x76, 0x10, 0x91, |
| 0x2c, 0x5e, 0x2c, 0xef, 0x1c, 0x85, 0x43, 0x10, 0x7b, 0x27, 0xfe, 0x99, 0x86, 0xdb, 0x1f, 0xed, |
| 0x3f, 0x7a, 0x04, 0x9b, 0x53, 0x4a, 0xd6, 0xc5, 0x44, 0x0b, 0xb7, 0x5c, 0x6a, 0xd5, 0x15, 0x22, |
| 0xeb, 0x8d, 0xf6, 0xdc, 0xa2, 0xdf, 0x83, 0x2f, 0xea, 0x8a, 0x52, 0x6f, 0x61, 0xe3, 0x4c, 0xaf, |
| 0xb8, 0xc8, 0xc9, 0x4a, 0x47, 0x14, 0xd0, 0x1d, 0x28, 0x10, 0x4d, 0x62, 0xc2, 0x66, 0xa8, 0x9a, |
| 0x66, 0x54, 0x1e, 0xef, 0xec, 0x1a, 0x5a, 0x43, 0xaa, 0x3c, 0x79, 0x2a, 0xa6, 0xce, 0x79, 0xb7, |
| 0x1f, 0x7f, 0x53, 0x89, 0xbd, 0xe9, 0x73, 0xde, 0x9d, 0xc7, 0xcf, 0x9e, 0xc6, 0xde, 0x05, 0x74, |
| 0x17, 0xd6, 0xcf, 0xbc, 0xcd, 0xaa, 0xb6, 0x35, 0xc3, 0x9d, 0x49, 0xf0, 0x4f, 0xb3, 0x2f, 0x26, |
| 0xf8, 0xa7, 0xf9, 0xb3, 0x68, 0x03, 0xee, 0x84, 0x7e, 0xae, 0xbe, 0x86, 0x22, 0x61, 0x75, 0x26, |
| 0xc3, 0x52, 0x62, 0xc4, 0x74, 0x8e, 0x5c, 0x62, 0xc4, 0x74, 0x16, 0x40, 0xb7, 0x60, 0x0d, 0x57, |
| 0x79, 0x11, 0x95, 0x27, 0xa7, 0x8e, 0xe5, 0x19, 0xc7, 0xf6, 0xee, 0x4e, 0xe8, 0xd8, 0xde, 0xdd, |
| 0x11, 0xaf, 0x16, 0x7f, 0x13, 0xe0, 0x46, 0xe2, 0x63, 0x8e, 0x36, 0xe1, 0x41, 0xc2, 0xe8, 0x42, |
| 0xa1, 0x9a, 0x7f, 0x15, 0xdd, 0x04, 0xa4, 0xe2, 0x4e, 0x4d, 0xee, 0xd4, 0x8d, 0x3a, 0xee, 0x60, |
| 0xc2, 0xa4, 0x4c, 0xcc, 0xa0, 0x3c, 0x64, 0x71, 0x47, 0xda, 0x6b, 0xe1, 0x9a, 0x28, 0xa0, 0x65, |
| 0x58, 0xaa, 0xc9, 0x5a, 0x74, 0x4b, 0xa1, 0xab, 0x90, 0xab, 0x61, 0x4d, 0x27, 0xca, 0x61, 0xa8, |
| 0x63, 0xe8, 0x06, 0xac, 0xf2, 0xab, 0xa1, 0x55, 0x1b, 0xb8, 0x76, 0x10, 0x46, 0x2d, 0x14, 0x65, |
| 0xb8, 0x3e, 0x5f, 0x5b, 0x77, 0x40, 0x7f, 0x46, 0x5f, 0xc1, 0xfd, 0x84, 0xd2, 0xba, 0x32, 0x7e, |
| 0x35, 0x57, 0xd9, 0x12, 0x2c, 0xec, 0x1f, 0xb4, 0x5a, 0xa2, 0x50, 0xfc, 0x05, 0x72, 0xea, 0xe8, |
| 0x68, 0x38, 0xe8, 0x85, 0x5f, 0x6e, 0x22, 0xa4, 0x5d, 0x6a, 0xc5, 0xef, 0x67, 0x97, 0x5a, 0xb3, |
| 0xda, 0x93, 0xba, 0x6c, 0xed, 0x79, 0xf8, 0x03, 0xac, 0xcc, 0xc9, 0x5f, 0x38, 0x4c, 0x95, 0x28, |
| 0x3a, 0xae, 0x32, 0xdd, 0x6f, 0xe1, 0x2e, 0x6e, 0xcd, 0x15, 0xbf, 0x0c, 0x4b, 0x9a, 0xb2, 0xaf, |
| 0xbf, 0x92, 0x08, 0x16, 0x05, 0x94, 0x85, 0x74, 0x43, 0x6b, 0x8b, 0xa9, 0xbd, 0x5f, 0x05, 0xb8, |
| 0xd5, 0x73, 0xac, 0xa4, 0xea, 0xf6, 0x56, 0x9b, 0x96, 0x4f, 0xe2, 0x8f, 0xf0, 0x30, 0xa3, 0xa3, |
| 0x0a, 0xaf, 0x9f, 0xf2, 0xc8, 0xbe, 0x33, 0x34, 0xed, 0x7e, 0xc9, 0xf1, 0xfa, 0xe5, 0x3e, 0xb5, |
| 0xd9, 0xc3, 0x5d, 0x8e, 0x5c, 0xa6, 0x3b, 0xf0, 0x67, 0xbe, 0xe4, 0x9f, 0x9f, 0x58, 0xfe, 0x3f, |
| 0x82, 0xf0, 0x47, 0x6a, 0xad, 0x1e, 0x61, 0xab, 0x2c, 0x4b, 0xd3, 0xf2, 0x4b, 0xdd, 0xad, 0x0f, |
| 0xb1, 0xf5, 0x0d, 0xb3, 0xbe, 0x69, 0x5a, 0xfe, 0x9b, 0xee, 0xd6, 0xd1, 0x22, 0x63, 0xdc, 0xfe, |
| 0x37, 0x00, 0x00, 0xff, 0xff, 0xc8, 0x00, 0x2e, 0x55, 0x1a, 0x0c, 0x00, 0x00, |
| } |