Bumping k8s dependencies to 1.13
This commit is contained in:
972
vendor/google.golang.org/genproto/googleapis/cloud/kms/v1/resources.pb.go
generated
vendored
Normal file
972
vendor/google.golang.org/genproto/googleapis/cloud/kms/v1/resources.pb.go
generated
vendored
Normal file
@@ -0,0 +1,972 @@
|
||||
// Code generated by protoc-gen-go. DO NOT EDIT.
|
||||
// source: google/cloud/kms/v1/resources.proto
|
||||
|
||||
package kms
|
||||
|
||||
import (
|
||||
fmt "fmt"
|
||||
proto "github.com/golang/protobuf/proto"
|
||||
duration "github.com/golang/protobuf/ptypes/duration"
|
||||
timestamp "github.com/golang/protobuf/ptypes/timestamp"
|
||||
_ "google.golang.org/genproto/googleapis/api/annotations"
|
||||
math "math"
|
||||
)
|
||||
|
||||
// Reference imports to suppress errors if they are not otherwise used.
|
||||
var _ = proto.Marshal
|
||||
var _ = fmt.Errorf
|
||||
var _ = math.Inf
|
||||
|
||||
// This is a compile-time assertion to ensure that this generated file
|
||||
// is compatible with the proto package it is being compiled against.
|
||||
// A compilation error at this line likely means your copy of the
|
||||
// proto package needs to be updated.
|
||||
const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
|
||||
|
||||
// [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] specifies how cryptographic operations are performed.
|
||||
type ProtectionLevel int32
|
||||
|
||||
const (
|
||||
// Not specified.
|
||||
ProtectionLevel_PROTECTION_LEVEL_UNSPECIFIED ProtectionLevel = 0
|
||||
// Crypto operations are performed in software.
|
||||
ProtectionLevel_SOFTWARE ProtectionLevel = 1
|
||||
// Crypto operations are performed in a Hardware Security Module.
|
||||
ProtectionLevel_HSM ProtectionLevel = 2
|
||||
)
|
||||
|
||||
var ProtectionLevel_name = map[int32]string{
|
||||
0: "PROTECTION_LEVEL_UNSPECIFIED",
|
||||
1: "SOFTWARE",
|
||||
2: "HSM",
|
||||
}
|
||||
|
||||
var ProtectionLevel_value = map[string]int32{
|
||||
"PROTECTION_LEVEL_UNSPECIFIED": 0,
|
||||
"SOFTWARE": 1,
|
||||
"HSM": 2,
|
||||
}
|
||||
|
||||
func (x ProtectionLevel) String() string {
|
||||
return proto.EnumName(ProtectionLevel_name, int32(x))
|
||||
}
|
||||
|
||||
func (ProtectionLevel) EnumDescriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{0}
|
||||
}
|
||||
|
||||
// [CryptoKeyPurpose][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose] describes the cryptographic capabilities of a
|
||||
// [CryptoKey][google.cloud.kms.v1.CryptoKey]. A given key can only be used for the operations allowed by
|
||||
// its purpose.
|
||||
type CryptoKey_CryptoKeyPurpose int32
|
||||
|
||||
const (
|
||||
// Not specified.
|
||||
CryptoKey_CRYPTO_KEY_PURPOSE_UNSPECIFIED CryptoKey_CryptoKeyPurpose = 0
|
||||
// [CryptoKeys][google.cloud.kms.v1.CryptoKey] with this purpose may be used with
|
||||
// [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt] and
|
||||
// [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt].
|
||||
CryptoKey_ENCRYPT_DECRYPT CryptoKey_CryptoKeyPurpose = 1
|
||||
// [CryptoKeys][google.cloud.kms.v1.CryptoKey] with this purpose may be used with
|
||||
// [AsymmetricSign][google.cloud.kms.v1.KeyManagementService.AsymmetricSign] and
|
||||
// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
||||
CryptoKey_ASYMMETRIC_SIGN CryptoKey_CryptoKeyPurpose = 5
|
||||
// [CryptoKeys][google.cloud.kms.v1.CryptoKey] with this purpose may be used with
|
||||
// [AsymmetricDecrypt][google.cloud.kms.v1.KeyManagementService.AsymmetricDecrypt] and
|
||||
// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
||||
CryptoKey_ASYMMETRIC_DECRYPT CryptoKey_CryptoKeyPurpose = 6
|
||||
)
|
||||
|
||||
var CryptoKey_CryptoKeyPurpose_name = map[int32]string{
|
||||
0: "CRYPTO_KEY_PURPOSE_UNSPECIFIED",
|
||||
1: "ENCRYPT_DECRYPT",
|
||||
5: "ASYMMETRIC_SIGN",
|
||||
6: "ASYMMETRIC_DECRYPT",
|
||||
}
|
||||
|
||||
var CryptoKey_CryptoKeyPurpose_value = map[string]int32{
|
||||
"CRYPTO_KEY_PURPOSE_UNSPECIFIED": 0,
|
||||
"ENCRYPT_DECRYPT": 1,
|
||||
"ASYMMETRIC_SIGN": 5,
|
||||
"ASYMMETRIC_DECRYPT": 6,
|
||||
}
|
||||
|
||||
func (x CryptoKey_CryptoKeyPurpose) String() string {
|
||||
return proto.EnumName(CryptoKey_CryptoKeyPurpose_name, int32(x))
|
||||
}
|
||||
|
||||
func (CryptoKey_CryptoKeyPurpose) EnumDescriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{1, 0}
|
||||
}
|
||||
|
||||
// Attestion formats provided by the HSM.
|
||||
type KeyOperationAttestation_AttestationFormat int32
|
||||
|
||||
const (
|
||||
KeyOperationAttestation_ATTESTATION_FORMAT_UNSPECIFIED KeyOperationAttestation_AttestationFormat = 0
|
||||
// Cavium HSM attestation compressed with gzip. Note that this format is
|
||||
// defined by Cavium and subject to change at any time.
|
||||
KeyOperationAttestation_CAVIUM_V1_COMPRESSED KeyOperationAttestation_AttestationFormat = 3
|
||||
)
|
||||
|
||||
var KeyOperationAttestation_AttestationFormat_name = map[int32]string{
|
||||
0: "ATTESTATION_FORMAT_UNSPECIFIED",
|
||||
3: "CAVIUM_V1_COMPRESSED",
|
||||
}
|
||||
|
||||
var KeyOperationAttestation_AttestationFormat_value = map[string]int32{
|
||||
"ATTESTATION_FORMAT_UNSPECIFIED": 0,
|
||||
"CAVIUM_V1_COMPRESSED": 3,
|
||||
}
|
||||
|
||||
func (x KeyOperationAttestation_AttestationFormat) String() string {
|
||||
return proto.EnumName(KeyOperationAttestation_AttestationFormat_name, int32(x))
|
||||
}
|
||||
|
||||
func (KeyOperationAttestation_AttestationFormat) EnumDescriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{3, 0}
|
||||
}
|
||||
|
||||
// The algorithm of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], indicating what
|
||||
// parameters must be used for each cryptographic operation.
|
||||
//
|
||||
// The
|
||||
// [GOOGLE_SYMMETRIC_ENCRYPTION][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm.GOOGLE_SYMMETRIC_ENCRYPTION]
|
||||
// algorithm is usable with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
||||
// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
||||
//
|
||||
// Algorithms beginning with "RSA_SIGN_" are usable with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
||||
// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN].
|
||||
//
|
||||
// The fields in the name after "RSA_SIGN_" correspond to the following
|
||||
// parameters: padding algorithm, modulus bit length, and digest algorithm.
|
||||
//
|
||||
// For PSS, the salt length used is equal to the length of digest
|
||||
// algorithm. For example,
|
||||
// [RSA_SIGN_PSS_2048_SHA256][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256]
|
||||
// will use PSS with a salt length of 256 bits or 32 bytes.
|
||||
//
|
||||
// Algorithms beginning with "RSA_DECRYPT_" are usable with
|
||||
// [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
||||
// [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT].
|
||||
//
|
||||
// The fields in the name after "RSA_DECRYPT_" correspond to the following
|
||||
// parameters: padding algorithm, modulus bit length, and digest algorithm.
|
||||
//
|
||||
// Algorithms beginning with "EC_SIGN_" are usable with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
||||
// [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN].
|
||||
//
|
||||
// The fields in the name after "EC_SIGN_" correspond to the following
|
||||
// parameters: elliptic curve, digest algorithm.
|
||||
type CryptoKeyVersion_CryptoKeyVersionAlgorithm int32
|
||||
|
||||
const (
|
||||
// Not specified.
|
||||
CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED CryptoKeyVersion_CryptoKeyVersionAlgorithm = 0
|
||||
// Creates symmetric encryption keys.
|
||||
CryptoKeyVersion_GOOGLE_SYMMETRIC_ENCRYPTION CryptoKeyVersion_CryptoKeyVersionAlgorithm = 1
|
||||
// RSASSA-PSS 2048 bit key with a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_SIGN_PSS_2048_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 2
|
||||
// RSASSA-PSS 3072 bit key with a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_SIGN_PSS_3072_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 3
|
||||
// RSASSA-PSS 4096 bit key with a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_SIGN_PSS_4096_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 4
|
||||
// RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_SIGN_PKCS1_2048_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 5
|
||||
// RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_SIGN_PKCS1_3072_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 6
|
||||
// RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_SIGN_PKCS1_4096_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 7
|
||||
// RSAES-OAEP 2048 bit key with a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_DECRYPT_OAEP_2048_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 8
|
||||
// RSAES-OAEP 3072 bit key with a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_DECRYPT_OAEP_3072_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 9
|
||||
// RSAES-OAEP 4096 bit key with a SHA256 digest.
|
||||
CryptoKeyVersion_RSA_DECRYPT_OAEP_4096_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 10
|
||||
// ECDSA on the NIST P-256 curve with a SHA256 digest.
|
||||
CryptoKeyVersion_EC_SIGN_P256_SHA256 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 12
|
||||
// ECDSA on the NIST P-384 curve with a SHA384 digest.
|
||||
CryptoKeyVersion_EC_SIGN_P384_SHA384 CryptoKeyVersion_CryptoKeyVersionAlgorithm = 13
|
||||
)
|
||||
|
||||
var CryptoKeyVersion_CryptoKeyVersionAlgorithm_name = map[int32]string{
|
||||
0: "CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED",
|
||||
1: "GOOGLE_SYMMETRIC_ENCRYPTION",
|
||||
2: "RSA_SIGN_PSS_2048_SHA256",
|
||||
3: "RSA_SIGN_PSS_3072_SHA256",
|
||||
4: "RSA_SIGN_PSS_4096_SHA256",
|
||||
5: "RSA_SIGN_PKCS1_2048_SHA256",
|
||||
6: "RSA_SIGN_PKCS1_3072_SHA256",
|
||||
7: "RSA_SIGN_PKCS1_4096_SHA256",
|
||||
8: "RSA_DECRYPT_OAEP_2048_SHA256",
|
||||
9: "RSA_DECRYPT_OAEP_3072_SHA256",
|
||||
10: "RSA_DECRYPT_OAEP_4096_SHA256",
|
||||
12: "EC_SIGN_P256_SHA256",
|
||||
13: "EC_SIGN_P384_SHA384",
|
||||
}
|
||||
|
||||
var CryptoKeyVersion_CryptoKeyVersionAlgorithm_value = map[string]int32{
|
||||
"CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED": 0,
|
||||
"GOOGLE_SYMMETRIC_ENCRYPTION": 1,
|
||||
"RSA_SIGN_PSS_2048_SHA256": 2,
|
||||
"RSA_SIGN_PSS_3072_SHA256": 3,
|
||||
"RSA_SIGN_PSS_4096_SHA256": 4,
|
||||
"RSA_SIGN_PKCS1_2048_SHA256": 5,
|
||||
"RSA_SIGN_PKCS1_3072_SHA256": 6,
|
||||
"RSA_SIGN_PKCS1_4096_SHA256": 7,
|
||||
"RSA_DECRYPT_OAEP_2048_SHA256": 8,
|
||||
"RSA_DECRYPT_OAEP_3072_SHA256": 9,
|
||||
"RSA_DECRYPT_OAEP_4096_SHA256": 10,
|
||||
"EC_SIGN_P256_SHA256": 12,
|
||||
"EC_SIGN_P384_SHA384": 13,
|
||||
}
|
||||
|
||||
func (x CryptoKeyVersion_CryptoKeyVersionAlgorithm) String() string {
|
||||
return proto.EnumName(CryptoKeyVersion_CryptoKeyVersionAlgorithm_name, int32(x))
|
||||
}
|
||||
|
||||
func (CryptoKeyVersion_CryptoKeyVersionAlgorithm) EnumDescriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{4, 0}
|
||||
}
|
||||
|
||||
// The state of a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], indicating if it can be used.
|
||||
type CryptoKeyVersion_CryptoKeyVersionState int32
|
||||
|
||||
const (
|
||||
// Not specified.
|
||||
CryptoKeyVersion_CRYPTO_KEY_VERSION_STATE_UNSPECIFIED CryptoKeyVersion_CryptoKeyVersionState = 0
|
||||
// This version is still being generated. It may not be used, enabled,
|
||||
// disabled, or destroyed yet. Cloud KMS will automatically mark this
|
||||
// version [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] as soon as the version is ready.
|
||||
CryptoKeyVersion_PENDING_GENERATION CryptoKeyVersion_CryptoKeyVersionState = 5
|
||||
// This version may be used for cryptographic operations.
|
||||
CryptoKeyVersion_ENABLED CryptoKeyVersion_CryptoKeyVersionState = 1
|
||||
// This version may not be used, but the key material is still available,
|
||||
// and the version can be placed back into the [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] state.
|
||||
CryptoKeyVersion_DISABLED CryptoKeyVersion_CryptoKeyVersionState = 2
|
||||
// This version is destroyed, and the key material is no longer stored.
|
||||
// A version may not leave this state once entered.
|
||||
CryptoKeyVersion_DESTROYED CryptoKeyVersion_CryptoKeyVersionState = 3
|
||||
// This version is scheduled for destruction, and will be destroyed soon.
|
||||
// Call
|
||||
// [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion]
|
||||
// to put it back into the [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] state.
|
||||
CryptoKeyVersion_DESTROY_SCHEDULED CryptoKeyVersion_CryptoKeyVersionState = 4
|
||||
)
|
||||
|
||||
var CryptoKeyVersion_CryptoKeyVersionState_name = map[int32]string{
|
||||
0: "CRYPTO_KEY_VERSION_STATE_UNSPECIFIED",
|
||||
5: "PENDING_GENERATION",
|
||||
1: "ENABLED",
|
||||
2: "DISABLED",
|
||||
3: "DESTROYED",
|
||||
4: "DESTROY_SCHEDULED",
|
||||
}
|
||||
|
||||
var CryptoKeyVersion_CryptoKeyVersionState_value = map[string]int32{
|
||||
"CRYPTO_KEY_VERSION_STATE_UNSPECIFIED": 0,
|
||||
"PENDING_GENERATION": 5,
|
||||
"ENABLED": 1,
|
||||
"DISABLED": 2,
|
||||
"DESTROYED": 3,
|
||||
"DESTROY_SCHEDULED": 4,
|
||||
}
|
||||
|
||||
func (x CryptoKeyVersion_CryptoKeyVersionState) String() string {
|
||||
return proto.EnumName(CryptoKeyVersion_CryptoKeyVersionState_name, int32(x))
|
||||
}
|
||||
|
||||
func (CryptoKeyVersion_CryptoKeyVersionState) EnumDescriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{4, 1}
|
||||
}
|
||||
|
||||
// A view for [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]s. Controls the level of detail returned
|
||||
// for [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion] in
|
||||
// [KeyManagementService.ListCryptoKeyVersions][google.cloud.kms.v1.KeyManagementService.ListCryptoKeyVersions] and
|
||||
// [KeyManagementService.ListCryptoKeys][google.cloud.kms.v1.KeyManagementService.ListCryptoKeys].
|
||||
type CryptoKeyVersion_CryptoKeyVersionView int32
|
||||
|
||||
const (
|
||||
// Default view for each [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. Does not include
|
||||
// the [attestation][google.cloud.kms.v1.CryptoKeyVersion.attestation] field.
|
||||
CryptoKeyVersion_CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED CryptoKeyVersion_CryptoKeyVersionView = 0
|
||||
// Provides all fields in each [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], including the
|
||||
// [attestation][google.cloud.kms.v1.CryptoKeyVersion.attestation].
|
||||
CryptoKeyVersion_FULL CryptoKeyVersion_CryptoKeyVersionView = 1
|
||||
)
|
||||
|
||||
var CryptoKeyVersion_CryptoKeyVersionView_name = map[int32]string{
|
||||
0: "CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED",
|
||||
1: "FULL",
|
||||
}
|
||||
|
||||
var CryptoKeyVersion_CryptoKeyVersionView_value = map[string]int32{
|
||||
"CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED": 0,
|
||||
"FULL": 1,
|
||||
}
|
||||
|
||||
func (x CryptoKeyVersion_CryptoKeyVersionView) String() string {
|
||||
return proto.EnumName(CryptoKeyVersion_CryptoKeyVersionView_name, int32(x))
|
||||
}
|
||||
|
||||
func (CryptoKeyVersion_CryptoKeyVersionView) EnumDescriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{4, 2}
|
||||
}
|
||||
|
||||
// A [KeyRing][google.cloud.kms.v1.KeyRing] is a toplevel logical grouping of [CryptoKeys][google.cloud.kms.v1.CryptoKey].
|
||||
type KeyRing struct {
|
||||
// Output only. The resource name for the [KeyRing][google.cloud.kms.v1.KeyRing] in the format
|
||||
// `projects/*/locations/*/keyRings/*`.
|
||||
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
|
||||
// Output only. The time at which this [KeyRing][google.cloud.kms.v1.KeyRing] was created.
|
||||
CreateTime *timestamp.Timestamp `protobuf:"bytes,2,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"`
|
||||
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||||
XXX_unrecognized []byte `json:"-"`
|
||||
XXX_sizecache int32 `json:"-"`
|
||||
}
|
||||
|
||||
func (m *KeyRing) Reset() { *m = KeyRing{} }
|
||||
func (m *KeyRing) String() string { return proto.CompactTextString(m) }
|
||||
func (*KeyRing) ProtoMessage() {}
|
||||
func (*KeyRing) Descriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{0}
|
||||
}
|
||||
|
||||
func (m *KeyRing) XXX_Unmarshal(b []byte) error {
|
||||
return xxx_messageInfo_KeyRing.Unmarshal(m, b)
|
||||
}
|
||||
func (m *KeyRing) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||
return xxx_messageInfo_KeyRing.Marshal(b, m, deterministic)
|
||||
}
|
||||
func (m *KeyRing) XXX_Merge(src proto.Message) {
|
||||
xxx_messageInfo_KeyRing.Merge(m, src)
|
||||
}
|
||||
func (m *KeyRing) XXX_Size() int {
|
||||
return xxx_messageInfo_KeyRing.Size(m)
|
||||
}
|
||||
func (m *KeyRing) XXX_DiscardUnknown() {
|
||||
xxx_messageInfo_KeyRing.DiscardUnknown(m)
|
||||
}
|
||||
|
||||
var xxx_messageInfo_KeyRing proto.InternalMessageInfo
|
||||
|
||||
func (m *KeyRing) GetName() string {
|
||||
if m != nil {
|
||||
return m.Name
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func (m *KeyRing) GetCreateTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.CreateTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// A [CryptoKey][google.cloud.kms.v1.CryptoKey] represents a logical key that can be used for cryptographic
|
||||
// operations.
|
||||
//
|
||||
// A [CryptoKey][google.cloud.kms.v1.CryptoKey] is made up of one or more [versions][google.cloud.kms.v1.CryptoKeyVersion], which
|
||||
// represent the actual key material used in cryptographic operations.
|
||||
type CryptoKey struct {
|
||||
// Output only. The resource name for this [CryptoKey][google.cloud.kms.v1.CryptoKey] in the format
|
||||
// `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
|
||||
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
|
||||
// Output only. A copy of the "primary" [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that will be used
|
||||
// by [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt] when this [CryptoKey][google.cloud.kms.v1.CryptoKey] is given
|
||||
// in [EncryptRequest.name][google.cloud.kms.v1.EncryptRequest.name].
|
||||
//
|
||||
// The [CryptoKey][google.cloud.kms.v1.CryptoKey]'s primary version can be updated via
|
||||
// [UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion].
|
||||
//
|
||||
// All keys with [purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
||||
// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT] have a
|
||||
// primary. For other keys, this field will be omitted.
|
||||
Primary *CryptoKeyVersion `protobuf:"bytes,2,opt,name=primary,proto3" json:"primary,omitempty"`
|
||||
// The immutable purpose of this [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
||||
Purpose CryptoKey_CryptoKeyPurpose `protobuf:"varint,3,opt,name=purpose,proto3,enum=google.cloud.kms.v1.CryptoKey_CryptoKeyPurpose" json:"purpose,omitempty"`
|
||||
// Output only. The time at which this [CryptoKey][google.cloud.kms.v1.CryptoKey] was created.
|
||||
CreateTime *timestamp.Timestamp `protobuf:"bytes,5,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"`
|
||||
// At [next_rotation_time][google.cloud.kms.v1.CryptoKey.next_rotation_time], the Key Management Service will automatically:
|
||||
//
|
||||
// 1. Create a new version of this [CryptoKey][google.cloud.kms.v1.CryptoKey].
|
||||
// 2. Mark the new version as primary.
|
||||
//
|
||||
// Key rotations performed manually via
|
||||
// [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] and
|
||||
// [UpdateCryptoKeyPrimaryVersion][google.cloud.kms.v1.KeyManagementService.UpdateCryptoKeyPrimaryVersion]
|
||||
// do not affect [next_rotation_time][google.cloud.kms.v1.CryptoKey.next_rotation_time].
|
||||
//
|
||||
// Keys with [purpose][google.cloud.kms.v1.CryptoKey.purpose]
|
||||
// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT] support
|
||||
// automatic rotation. For other keys, this field must be omitted.
|
||||
NextRotationTime *timestamp.Timestamp `protobuf:"bytes,7,opt,name=next_rotation_time,json=nextRotationTime,proto3" json:"next_rotation_time,omitempty"`
|
||||
// Controls the rate of automatic rotation.
|
||||
//
|
||||
// Types that are valid to be assigned to RotationSchedule:
|
||||
// *CryptoKey_RotationPeriod
|
||||
RotationSchedule isCryptoKey_RotationSchedule `protobuf_oneof:"rotation_schedule"`
|
||||
// A template describing settings for new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] instances.
|
||||
// The properties of new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] instances created by either
|
||||
// [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or
|
||||
// auto-rotation are controlled by this template.
|
||||
VersionTemplate *CryptoKeyVersionTemplate `protobuf:"bytes,11,opt,name=version_template,json=versionTemplate,proto3" json:"version_template,omitempty"`
|
||||
// Labels with user-defined metadata. For more information, see
|
||||
// [Labeling Keys](/kms/docs/labeling-keys).
|
||||
Labels map[string]string `protobuf:"bytes,10,rep,name=labels,proto3" json:"labels,omitempty" protobuf_key:"bytes,1,opt,name=key,proto3" protobuf_val:"bytes,2,opt,name=value,proto3"`
|
||||
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||||
XXX_unrecognized []byte `json:"-"`
|
||||
XXX_sizecache int32 `json:"-"`
|
||||
}
|
||||
|
||||
func (m *CryptoKey) Reset() { *m = CryptoKey{} }
|
||||
func (m *CryptoKey) String() string { return proto.CompactTextString(m) }
|
||||
func (*CryptoKey) ProtoMessage() {}
|
||||
func (*CryptoKey) Descriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{1}
|
||||
}
|
||||
|
||||
func (m *CryptoKey) XXX_Unmarshal(b []byte) error {
|
||||
return xxx_messageInfo_CryptoKey.Unmarshal(m, b)
|
||||
}
|
||||
func (m *CryptoKey) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||
return xxx_messageInfo_CryptoKey.Marshal(b, m, deterministic)
|
||||
}
|
||||
func (m *CryptoKey) XXX_Merge(src proto.Message) {
|
||||
xxx_messageInfo_CryptoKey.Merge(m, src)
|
||||
}
|
||||
func (m *CryptoKey) XXX_Size() int {
|
||||
return xxx_messageInfo_CryptoKey.Size(m)
|
||||
}
|
||||
func (m *CryptoKey) XXX_DiscardUnknown() {
|
||||
xxx_messageInfo_CryptoKey.DiscardUnknown(m)
|
||||
}
|
||||
|
||||
var xxx_messageInfo_CryptoKey proto.InternalMessageInfo
|
||||
|
||||
func (m *CryptoKey) GetName() string {
|
||||
if m != nil {
|
||||
return m.Name
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetPrimary() *CryptoKeyVersion {
|
||||
if m != nil {
|
||||
return m.Primary
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetPurpose() CryptoKey_CryptoKeyPurpose {
|
||||
if m != nil {
|
||||
return m.Purpose
|
||||
}
|
||||
return CryptoKey_CRYPTO_KEY_PURPOSE_UNSPECIFIED
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetCreateTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.CreateTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetNextRotationTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.NextRotationTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
type isCryptoKey_RotationSchedule interface {
|
||||
isCryptoKey_RotationSchedule()
|
||||
}
|
||||
|
||||
type CryptoKey_RotationPeriod struct {
|
||||
RotationPeriod *duration.Duration `protobuf:"bytes,8,opt,name=rotation_period,json=rotationPeriod,proto3,oneof"`
|
||||
}
|
||||
|
||||
func (*CryptoKey_RotationPeriod) isCryptoKey_RotationSchedule() {}
|
||||
|
||||
func (m *CryptoKey) GetRotationSchedule() isCryptoKey_RotationSchedule {
|
||||
if m != nil {
|
||||
return m.RotationSchedule
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetRotationPeriod() *duration.Duration {
|
||||
if x, ok := m.GetRotationSchedule().(*CryptoKey_RotationPeriod); ok {
|
||||
return x.RotationPeriod
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetVersionTemplate() *CryptoKeyVersionTemplate {
|
||||
if m != nil {
|
||||
return m.VersionTemplate
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKey) GetLabels() map[string]string {
|
||||
if m != nil {
|
||||
return m.Labels
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// XXX_OneofFuncs is for the internal use of the proto package.
|
||||
func (*CryptoKey) XXX_OneofFuncs() (func(msg proto.Message, b *proto.Buffer) error, func(msg proto.Message, tag, wire int, b *proto.Buffer) (bool, error), func(msg proto.Message) (n int), []interface{}) {
|
||||
return _CryptoKey_OneofMarshaler, _CryptoKey_OneofUnmarshaler, _CryptoKey_OneofSizer, []interface{}{
|
||||
(*CryptoKey_RotationPeriod)(nil),
|
||||
}
|
||||
}
|
||||
|
||||
func _CryptoKey_OneofMarshaler(msg proto.Message, b *proto.Buffer) error {
|
||||
m := msg.(*CryptoKey)
|
||||
// rotation_schedule
|
||||
switch x := m.RotationSchedule.(type) {
|
||||
case *CryptoKey_RotationPeriod:
|
||||
b.EncodeVarint(8<<3 | proto.WireBytes)
|
||||
if err := b.EncodeMessage(x.RotationPeriod); err != nil {
|
||||
return err
|
||||
}
|
||||
case nil:
|
||||
default:
|
||||
return fmt.Errorf("CryptoKey.RotationSchedule has unexpected type %T", x)
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func _CryptoKey_OneofUnmarshaler(msg proto.Message, tag, wire int, b *proto.Buffer) (bool, error) {
|
||||
m := msg.(*CryptoKey)
|
||||
switch tag {
|
||||
case 8: // rotation_schedule.rotation_period
|
||||
if wire != proto.WireBytes {
|
||||
return true, proto.ErrInternalBadWireType
|
||||
}
|
||||
msg := new(duration.Duration)
|
||||
err := b.DecodeMessage(msg)
|
||||
m.RotationSchedule = &CryptoKey_RotationPeriod{msg}
|
||||
return true, err
|
||||
default:
|
||||
return false, nil
|
||||
}
|
||||
}
|
||||
|
||||
func _CryptoKey_OneofSizer(msg proto.Message) (n int) {
|
||||
m := msg.(*CryptoKey)
|
||||
// rotation_schedule
|
||||
switch x := m.RotationSchedule.(type) {
|
||||
case *CryptoKey_RotationPeriod:
|
||||
s := proto.Size(x.RotationPeriod)
|
||||
n += 1 // tag and wire
|
||||
n += proto.SizeVarint(uint64(s))
|
||||
n += s
|
||||
case nil:
|
||||
default:
|
||||
panic(fmt.Sprintf("proto: unexpected type %T in oneof", x))
|
||||
}
|
||||
return n
|
||||
}
|
||||
|
||||
// A [CryptoKeyVersionTemplate][google.cloud.kms.v1.CryptoKeyVersionTemplate] specifies the properties to use when creating
|
||||
// a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion], either manually with
|
||||
// [CreateCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.CreateCryptoKeyVersion] or
|
||||
// automatically as a result of auto-rotation.
|
||||
type CryptoKeyVersionTemplate struct {
|
||||
// [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] to use when creating a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] based on
|
||||
// this template. Immutable. Defaults to [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE].
|
||||
ProtectionLevel ProtectionLevel `protobuf:"varint,1,opt,name=protection_level,json=protectionLevel,proto3,enum=google.cloud.kms.v1.ProtectionLevel" json:"protection_level,omitempty"`
|
||||
// Required. [Algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] to use
|
||||
// when creating a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] based on this template.
|
||||
//
|
||||
// For backwards compatibility, GOOGLE_SYMMETRIC_ENCRYPTION is implied if both
|
||||
// this field is omitted and [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] is
|
||||
// [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
|
||||
Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,3,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"`
|
||||
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||||
XXX_unrecognized []byte `json:"-"`
|
||||
XXX_sizecache int32 `json:"-"`
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersionTemplate) Reset() { *m = CryptoKeyVersionTemplate{} }
|
||||
func (m *CryptoKeyVersionTemplate) String() string { return proto.CompactTextString(m) }
|
||||
func (*CryptoKeyVersionTemplate) ProtoMessage() {}
|
||||
func (*CryptoKeyVersionTemplate) Descriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{2}
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersionTemplate) XXX_Unmarshal(b []byte) error {
|
||||
return xxx_messageInfo_CryptoKeyVersionTemplate.Unmarshal(m, b)
|
||||
}
|
||||
func (m *CryptoKeyVersionTemplate) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||
return xxx_messageInfo_CryptoKeyVersionTemplate.Marshal(b, m, deterministic)
|
||||
}
|
||||
func (m *CryptoKeyVersionTemplate) XXX_Merge(src proto.Message) {
|
||||
xxx_messageInfo_CryptoKeyVersionTemplate.Merge(m, src)
|
||||
}
|
||||
func (m *CryptoKeyVersionTemplate) XXX_Size() int {
|
||||
return xxx_messageInfo_CryptoKeyVersionTemplate.Size(m)
|
||||
}
|
||||
func (m *CryptoKeyVersionTemplate) XXX_DiscardUnknown() {
|
||||
xxx_messageInfo_CryptoKeyVersionTemplate.DiscardUnknown(m)
|
||||
}
|
||||
|
||||
var xxx_messageInfo_CryptoKeyVersionTemplate proto.InternalMessageInfo
|
||||
|
||||
func (m *CryptoKeyVersionTemplate) GetProtectionLevel() ProtectionLevel {
|
||||
if m != nil {
|
||||
return m.ProtectionLevel
|
||||
}
|
||||
return ProtectionLevel_PROTECTION_LEVEL_UNSPECIFIED
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersionTemplate) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm {
|
||||
if m != nil {
|
||||
return m.Algorithm
|
||||
}
|
||||
return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED
|
||||
}
|
||||
|
||||
// Contains an HSM-generated attestation about a key operation.
|
||||
type KeyOperationAttestation struct {
|
||||
// Output only. The format of the attestation data.
|
||||
Format KeyOperationAttestation_AttestationFormat `protobuf:"varint,4,opt,name=format,proto3,enum=google.cloud.kms.v1.KeyOperationAttestation_AttestationFormat" json:"format,omitempty"`
|
||||
// Output only. The attestation data provided by the HSM when the key
|
||||
// operation was performed.
|
||||
Content []byte `protobuf:"bytes,5,opt,name=content,proto3" json:"content,omitempty"`
|
||||
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||||
XXX_unrecognized []byte `json:"-"`
|
||||
XXX_sizecache int32 `json:"-"`
|
||||
}
|
||||
|
||||
func (m *KeyOperationAttestation) Reset() { *m = KeyOperationAttestation{} }
|
||||
func (m *KeyOperationAttestation) String() string { return proto.CompactTextString(m) }
|
||||
func (*KeyOperationAttestation) ProtoMessage() {}
|
||||
func (*KeyOperationAttestation) Descriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{3}
|
||||
}
|
||||
|
||||
func (m *KeyOperationAttestation) XXX_Unmarshal(b []byte) error {
|
||||
return xxx_messageInfo_KeyOperationAttestation.Unmarshal(m, b)
|
||||
}
|
||||
func (m *KeyOperationAttestation) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||
return xxx_messageInfo_KeyOperationAttestation.Marshal(b, m, deterministic)
|
||||
}
|
||||
func (m *KeyOperationAttestation) XXX_Merge(src proto.Message) {
|
||||
xxx_messageInfo_KeyOperationAttestation.Merge(m, src)
|
||||
}
|
||||
func (m *KeyOperationAttestation) XXX_Size() int {
|
||||
return xxx_messageInfo_KeyOperationAttestation.Size(m)
|
||||
}
|
||||
func (m *KeyOperationAttestation) XXX_DiscardUnknown() {
|
||||
xxx_messageInfo_KeyOperationAttestation.DiscardUnknown(m)
|
||||
}
|
||||
|
||||
var xxx_messageInfo_KeyOperationAttestation proto.InternalMessageInfo
|
||||
|
||||
func (m *KeyOperationAttestation) GetFormat() KeyOperationAttestation_AttestationFormat {
|
||||
if m != nil {
|
||||
return m.Format
|
||||
}
|
||||
return KeyOperationAttestation_ATTESTATION_FORMAT_UNSPECIFIED
|
||||
}
|
||||
|
||||
func (m *KeyOperationAttestation) GetContent() []byte {
|
||||
if m != nil {
|
||||
return m.Content
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// A [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents an individual cryptographic key, and the
|
||||
// associated key material.
|
||||
//
|
||||
// An [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] version can be
|
||||
// used for cryptographic operations.
|
||||
//
|
||||
// For security reasons, the raw cryptographic key material represented by a
|
||||
// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] can never be viewed or exported. It can only be used to
|
||||
// encrypt, decrypt, or sign data when an authorized user or application invokes
|
||||
// Cloud KMS.
|
||||
type CryptoKeyVersion struct {
|
||||
// Output only. The resource name for this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the format
|
||||
// `projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*`.
|
||||
Name string `protobuf:"bytes,1,opt,name=name,proto3" json:"name,omitempty"`
|
||||
// The current state of the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
||||
State CryptoKeyVersion_CryptoKeyVersionState `protobuf:"varint,3,opt,name=state,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionState" json:"state,omitempty"`
|
||||
// Output only. The [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] describing how crypto operations are
|
||||
// performed with this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
|
||||
ProtectionLevel ProtectionLevel `protobuf:"varint,7,opt,name=protection_level,json=protectionLevel,proto3,enum=google.cloud.kms.v1.ProtectionLevel" json:"protection_level,omitempty"`
|
||||
// Output only. The [CryptoKeyVersionAlgorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] that this
|
||||
// [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] supports.
|
||||
Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,10,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"`
|
||||
// Output only. Statement that was generated and signed by the HSM at key
|
||||
// creation time. Use this statement to verify attributes of the key as stored
|
||||
// on the HSM, independently of Google. Only provided for key versions with
|
||||
// [protection_level][google.cloud.kms.v1.CryptoKeyVersion.protection_level] [HSM][google.cloud.kms.v1.ProtectionLevel.HSM].
|
||||
Attestation *KeyOperationAttestation `protobuf:"bytes,8,opt,name=attestation,proto3" json:"attestation,omitempty"`
|
||||
// Output only. The time at which this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] was created.
|
||||
CreateTime *timestamp.Timestamp `protobuf:"bytes,4,opt,name=create_time,json=createTime,proto3" json:"create_time,omitempty"`
|
||||
// Output only. The time this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s key material was
|
||||
// generated.
|
||||
GenerateTime *timestamp.Timestamp `protobuf:"bytes,11,opt,name=generate_time,json=generateTime,proto3" json:"generate_time,omitempty"`
|
||||
// Output only. The time this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s key material is scheduled
|
||||
// for destruction. Only present if [state][google.cloud.kms.v1.CryptoKeyVersion.state] is
|
||||
// [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED].
|
||||
DestroyTime *timestamp.Timestamp `protobuf:"bytes,5,opt,name=destroy_time,json=destroyTime,proto3" json:"destroy_time,omitempty"`
|
||||
// Output only. The time this CryptoKeyVersion's key material was
|
||||
// destroyed. Only present if [state][google.cloud.kms.v1.CryptoKeyVersion.state] is
|
||||
// [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED].
|
||||
DestroyEventTime *timestamp.Timestamp `protobuf:"bytes,6,opt,name=destroy_event_time,json=destroyEventTime,proto3" json:"destroy_event_time,omitempty"`
|
||||
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||||
XXX_unrecognized []byte `json:"-"`
|
||||
XXX_sizecache int32 `json:"-"`
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) Reset() { *m = CryptoKeyVersion{} }
|
||||
func (m *CryptoKeyVersion) String() string { return proto.CompactTextString(m) }
|
||||
func (*CryptoKeyVersion) ProtoMessage() {}
|
||||
func (*CryptoKeyVersion) Descriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{4}
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) XXX_Unmarshal(b []byte) error {
|
||||
return xxx_messageInfo_CryptoKeyVersion.Unmarshal(m, b)
|
||||
}
|
||||
func (m *CryptoKeyVersion) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||
return xxx_messageInfo_CryptoKeyVersion.Marshal(b, m, deterministic)
|
||||
}
|
||||
func (m *CryptoKeyVersion) XXX_Merge(src proto.Message) {
|
||||
xxx_messageInfo_CryptoKeyVersion.Merge(m, src)
|
||||
}
|
||||
func (m *CryptoKeyVersion) XXX_Size() int {
|
||||
return xxx_messageInfo_CryptoKeyVersion.Size(m)
|
||||
}
|
||||
func (m *CryptoKeyVersion) XXX_DiscardUnknown() {
|
||||
xxx_messageInfo_CryptoKeyVersion.DiscardUnknown(m)
|
||||
}
|
||||
|
||||
var xxx_messageInfo_CryptoKeyVersion proto.InternalMessageInfo
|
||||
|
||||
func (m *CryptoKeyVersion) GetName() string {
|
||||
if m != nil {
|
||||
return m.Name
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetState() CryptoKeyVersion_CryptoKeyVersionState {
|
||||
if m != nil {
|
||||
return m.State
|
||||
}
|
||||
return CryptoKeyVersion_CRYPTO_KEY_VERSION_STATE_UNSPECIFIED
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetProtectionLevel() ProtectionLevel {
|
||||
if m != nil {
|
||||
return m.ProtectionLevel
|
||||
}
|
||||
return ProtectionLevel_PROTECTION_LEVEL_UNSPECIFIED
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm {
|
||||
if m != nil {
|
||||
return m.Algorithm
|
||||
}
|
||||
return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetAttestation() *KeyOperationAttestation {
|
||||
if m != nil {
|
||||
return m.Attestation
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetCreateTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.CreateTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetGenerateTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.GenerateTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetDestroyTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.DestroyTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (m *CryptoKeyVersion) GetDestroyEventTime() *timestamp.Timestamp {
|
||||
if m != nil {
|
||||
return m.DestroyEventTime
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// The public key for a given [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. Obtained via
|
||||
// [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey].
|
||||
type PublicKey struct {
|
||||
// The public key, encoded in PEM format. For more information, see the
|
||||
// [RFC 7468](https://tools.ietf.org/html/rfc7468) sections for
|
||||
// [General Considerations](https://tools.ietf.org/html/rfc7468#section-2) and
|
||||
// [Textual Encoding of Subject Public Key Info]
|
||||
// (https://tools.ietf.org/html/rfc7468#section-13).
|
||||
Pem string `protobuf:"bytes,1,opt,name=pem,proto3" json:"pem,omitempty"`
|
||||
// The [Algorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm] associated
|
||||
// with this key.
|
||||
Algorithm CryptoKeyVersion_CryptoKeyVersionAlgorithm `protobuf:"varint,2,opt,name=algorithm,proto3,enum=google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm" json:"algorithm,omitempty"`
|
||||
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
||||
XXX_unrecognized []byte `json:"-"`
|
||||
XXX_sizecache int32 `json:"-"`
|
||||
}
|
||||
|
||||
func (m *PublicKey) Reset() { *m = PublicKey{} }
|
||||
func (m *PublicKey) String() string { return proto.CompactTextString(m) }
|
||||
func (*PublicKey) ProtoMessage() {}
|
||||
func (*PublicKey) Descriptor() ([]byte, []int) {
|
||||
return fileDescriptor_e40e1384d35a80c5, []int{5}
|
||||
}
|
||||
|
||||
func (m *PublicKey) XXX_Unmarshal(b []byte) error {
|
||||
return xxx_messageInfo_PublicKey.Unmarshal(m, b)
|
||||
}
|
||||
func (m *PublicKey) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||
return xxx_messageInfo_PublicKey.Marshal(b, m, deterministic)
|
||||
}
|
||||
func (m *PublicKey) XXX_Merge(src proto.Message) {
|
||||
xxx_messageInfo_PublicKey.Merge(m, src)
|
||||
}
|
||||
func (m *PublicKey) XXX_Size() int {
|
||||
return xxx_messageInfo_PublicKey.Size(m)
|
||||
}
|
||||
func (m *PublicKey) XXX_DiscardUnknown() {
|
||||
xxx_messageInfo_PublicKey.DiscardUnknown(m)
|
||||
}
|
||||
|
||||
var xxx_messageInfo_PublicKey proto.InternalMessageInfo
|
||||
|
||||
func (m *PublicKey) GetPem() string {
|
||||
if m != nil {
|
||||
return m.Pem
|
||||
}
|
||||
return ""
|
||||
}
|
||||
|
||||
func (m *PublicKey) GetAlgorithm() CryptoKeyVersion_CryptoKeyVersionAlgorithm {
|
||||
if m != nil {
|
||||
return m.Algorithm
|
||||
}
|
||||
return CryptoKeyVersion_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED
|
||||
}
|
||||
|
||||
func init() {
|
||||
proto.RegisterEnum("google.cloud.kms.v1.ProtectionLevel", ProtectionLevel_name, ProtectionLevel_value)
|
||||
proto.RegisterEnum("google.cloud.kms.v1.CryptoKey_CryptoKeyPurpose", CryptoKey_CryptoKeyPurpose_name, CryptoKey_CryptoKeyPurpose_value)
|
||||
proto.RegisterEnum("google.cloud.kms.v1.KeyOperationAttestation_AttestationFormat", KeyOperationAttestation_AttestationFormat_name, KeyOperationAttestation_AttestationFormat_value)
|
||||
proto.RegisterEnum("google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionAlgorithm", CryptoKeyVersion_CryptoKeyVersionAlgorithm_name, CryptoKeyVersion_CryptoKeyVersionAlgorithm_value)
|
||||
proto.RegisterEnum("google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionState", CryptoKeyVersion_CryptoKeyVersionState_name, CryptoKeyVersion_CryptoKeyVersionState_value)
|
||||
proto.RegisterEnum("google.cloud.kms.v1.CryptoKeyVersion_CryptoKeyVersionView", CryptoKeyVersion_CryptoKeyVersionView_name, CryptoKeyVersion_CryptoKeyVersionView_value)
|
||||
proto.RegisterType((*KeyRing)(nil), "google.cloud.kms.v1.KeyRing")
|
||||
proto.RegisterType((*CryptoKey)(nil), "google.cloud.kms.v1.CryptoKey")
|
||||
proto.RegisterMapType((map[string]string)(nil), "google.cloud.kms.v1.CryptoKey.LabelsEntry")
|
||||
proto.RegisterType((*CryptoKeyVersionTemplate)(nil), "google.cloud.kms.v1.CryptoKeyVersionTemplate")
|
||||
proto.RegisterType((*KeyOperationAttestation)(nil), "google.cloud.kms.v1.KeyOperationAttestation")
|
||||
proto.RegisterType((*CryptoKeyVersion)(nil), "google.cloud.kms.v1.CryptoKeyVersion")
|
||||
proto.RegisterType((*PublicKey)(nil), "google.cloud.kms.v1.PublicKey")
|
||||
}
|
||||
|
||||
func init() {
|
||||
proto.RegisterFile("google/cloud/kms/v1/resources.proto", fileDescriptor_e40e1384d35a80c5)
|
||||
}
|
||||
|
||||
var fileDescriptor_e40e1384d35a80c5 = []byte{
|
||||
// 1197 bytes of a gzipped FileDescriptorProto
|
||||
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0xac, 0x56, 0x5d, 0x6e, 0xdb, 0x46,
|
||||
0x10, 0x0e, 0x25, 0xcb, 0xb2, 0x46, 0x4e, 0x4c, 0xaf, 0xf3, 0xa3, 0xb8, 0x41, 0x62, 0x28, 0x29,
|
||||
0x6a, 0x04, 0xa9, 0x14, 0xcb, 0x4e, 0xea, 0x34, 0x68, 0x03, 0x5a, 0x5a, 0x4b, 0xac, 0x7e, 0xc8,
|
||||
0x2c, 0x69, 0xa5, 0x0e, 0x52, 0x10, 0xb4, 0xbc, 0x51, 0x04, 0x8b, 0x3f, 0x20, 0x29, 0x35, 0x02,
|
||||
0x7a, 0x8d, 0xbe, 0xf4, 0x02, 0x05, 0x7a, 0x86, 0x9e, 0x20, 0x87, 0x28, 0x7a, 0x8c, 0x3e, 0x16,
|
||||
0x5c, 0x2e, 0x6d, 0x49, 0x66, 0xea, 0xa4, 0xf0, 0x93, 0x76, 0x67, 0xe6, 0xfb, 0x66, 0x34, 0x33,
|
||||
0xfc, 0x48, 0xb8, 0xdf, 0x77, 0x9c, 0xfe, 0x90, 0x96, 0x7b, 0x43, 0x67, 0x74, 0x5c, 0x3e, 0xb1,
|
||||
0xfc, 0xf2, 0x78, 0xab, 0xec, 0x51, 0xdf, 0x19, 0x79, 0x3d, 0xea, 0x97, 0x5c, 0xcf, 0x09, 0x1c,
|
||||
0xb4, 0x16, 0x05, 0x95, 0x58, 0x50, 0xe9, 0xc4, 0xf2, 0x4b, 0xe3, 0xad, 0xf5, 0x3b, 0x1c, 0x69,
|
||||
0xba, 0x83, 0xb2, 0x69, 0xdb, 0x4e, 0x60, 0x06, 0x03, 0xc7, 0xe6, 0x90, 0xf5, 0xbb, 0xdc, 0xcb,
|
||||
0x6e, 0x47, 0xa3, 0xb7, 0xe5, 0xe3, 0x91, 0xc7, 0x02, 0xb8, 0xff, 0xde, 0xbc, 0x3f, 0x18, 0x58,
|
||||
0xd4, 0x0f, 0x4c, 0xcb, 0x8d, 0x02, 0x8a, 0xaf, 0x21, 0xdb, 0xa4, 0x13, 0x32, 0xb0, 0xfb, 0x08,
|
||||
0xc1, 0x82, 0x6d, 0x5a, 0xb4, 0x20, 0x6c, 0x08, 0x9b, 0x39, 0xc2, 0xce, 0xe8, 0x39, 0xe4, 0x7b,
|
||||
0x1e, 0x35, 0x03, 0x6a, 0x84, 0xc0, 0x42, 0x6a, 0x43, 0xd8, 0xcc, 0x57, 0xd6, 0x4b, 0xbc, 0xd0,
|
||||
0x98, 0xb5, 0xa4, 0xc7, 0xac, 0x04, 0xa2, 0xf0, 0xd0, 0x50, 0xfc, 0x3b, 0x03, 0xb9, 0xaa, 0x37,
|
||||
0x71, 0x03, 0xa7, 0x49, 0x27, 0x89, 0xf4, 0x2f, 0x20, 0xeb, 0x7a, 0x03, 0xcb, 0xf4, 0x26, 0x9c,
|
||||
0xfa, 0xcb, 0x52, 0x42, 0x0f, 0x4a, 0xa7, 0x24, 0x5d, 0xea, 0xf9, 0x03, 0xc7, 0x26, 0x31, 0x0a,
|
||||
0xc9, 0x90, 0x75, 0x47, 0x9e, 0xeb, 0xf8, 0xb4, 0x90, 0xde, 0x10, 0x36, 0xaf, 0x55, 0xca, 0xff,
|
||||
0x4d, 0x70, 0x76, 0x52, 0x23, 0x18, 0x89, 0xf1, 0xf3, 0x7f, 0x35, 0xf3, 0x39, 0x7f, 0x15, 0x35,
|
||||
0x00, 0xd9, 0xf4, 0x7d, 0x60, 0x78, 0x7c, 0x3e, 0x11, 0x47, 0xf6, 0x42, 0x0e, 0x31, 0x44, 0x11,
|
||||
0x0e, 0x62, 0x4c, 0x35, 0x58, 0x39, 0x25, 0x71, 0xa9, 0x37, 0x70, 0x8e, 0x0b, 0x4b, 0x8c, 0xe6,
|
||||
0xf6, 0x39, 0x9a, 0x1a, 0x9f, 0x75, 0xe3, 0x0a, 0xb9, 0x16, 0x63, 0x54, 0x06, 0x41, 0x3f, 0x82,
|
||||
0x38, 0x8e, 0x7a, 0x65, 0x04, 0xd4, 0x72, 0x87, 0x66, 0x40, 0x0b, 0x79, 0x46, 0xf3, 0xf5, 0x27,
|
||||
0x75, 0x58, 0xe7, 0x20, 0xb2, 0x32, 0x9e, 0x35, 0xa0, 0x3d, 0x58, 0x1c, 0x9a, 0x47, 0x74, 0xe8,
|
||||
0x17, 0x60, 0x23, 0xbd, 0x99, 0xaf, 0x3c, 0xbc, 0xa0, 0xe1, 0x2d, 0x16, 0x8c, 0xed, 0xc0, 0x9b,
|
||||
0x10, 0x8e, 0x5c, 0x7f, 0x06, 0xf9, 0x29, 0x33, 0x12, 0x21, 0x7d, 0x42, 0x27, 0x7c, 0x31, 0xc2,
|
||||
0x23, 0xba, 0x0e, 0x99, 0xb1, 0x39, 0x1c, 0x45, 0x0b, 0x97, 0x23, 0xd1, 0xe5, 0xdb, 0xd4, 0xae,
|
||||
0x50, 0x7c, 0x0f, 0xe2, 0xfc, 0x08, 0x51, 0x11, 0xee, 0x56, 0xc9, 0xa1, 0xaa, 0x2b, 0x46, 0x13,
|
||||
0x1f, 0x1a, 0xea, 0x01, 0x51, 0x15, 0x0d, 0x1b, 0x07, 0x1d, 0x4d, 0xc5, 0x55, 0x79, 0x5f, 0xc6,
|
||||
0x35, 0xf1, 0x0a, 0x5a, 0x83, 0x15, 0xdc, 0x61, 0x51, 0x46, 0x0d, 0xb3, 0x5f, 0x51, 0x08, 0x8d,
|
||||
0x92, 0x76, 0xd8, 0x6e, 0x63, 0x9d, 0xc8, 0x55, 0x43, 0x93, 0xeb, 0x1d, 0x31, 0x83, 0x6e, 0x02,
|
||||
0x9a, 0x32, 0xc6, 0xc1, 0x8b, 0x7b, 0x6b, 0xb0, 0x7a, 0x3a, 0x18, 0xbf, 0xf7, 0x8e, 0x1e, 0x8f,
|
||||
0x86, 0xb4, 0xf8, 0x41, 0x80, 0xc2, 0xc7, 0x7a, 0x87, 0x14, 0x10, 0xc3, 0x59, 0xd1, 0x1e, 0xc3,
|
||||
0x0c, 0xe9, 0x98, 0x0e, 0xd9, 0x9f, 0xbc, 0x56, 0x79, 0x90, 0xd8, 0x34, 0xf5, 0x34, 0xb8, 0x15,
|
||||
0xc6, 0x92, 0x15, 0x77, 0xd6, 0x80, 0x7e, 0x82, 0x9c, 0x39, 0xec, 0x3b, 0xde, 0x20, 0x78, 0x67,
|
||||
0xf1, 0x7d, 0x7f, 0xf1, 0x49, 0xe3, 0x3c, 0x67, 0x90, 0x62, 0x1a, 0x72, 0xc6, 0x58, 0xfc, 0x4b,
|
||||
0x80, 0x5b, 0x4d, 0x3a, 0x51, 0x5c, 0x1a, 0xed, 0x95, 0x14, 0x04, 0xe1, 0x9a, 0x86, 0x47, 0xd4,
|
||||
0x85, 0xc5, 0xb7, 0x8e, 0x67, 0x99, 0x41, 0x61, 0x81, 0xe5, 0xfd, 0x3e, 0x31, 0xef, 0x47, 0xd0,
|
||||
0xa5, 0xa9, 0xf3, 0x3e, 0x63, 0x21, 0x9c, 0x0d, 0x15, 0x20, 0xdb, 0x73, 0xec, 0x80, 0xda, 0x01,
|
||||
0x7b, 0xe2, 0x96, 0x49, 0x7c, 0x2d, 0xbe, 0x84, 0xd5, 0x73, 0xb0, 0x70, 0xd4, 0x92, 0xae, 0x63,
|
||||
0x4d, 0x97, 0x74, 0x59, 0xe9, 0x18, 0xfb, 0x0a, 0x69, 0x4b, 0xfa, 0xdc, 0xa8, 0x0b, 0x70, 0xbd,
|
||||
0x2a, 0x75, 0xe5, 0x83, 0xb6, 0xd1, 0xdd, 0x32, 0xaa, 0x4a, 0x5b, 0x25, 0x58, 0xd3, 0x70, 0x4d,
|
||||
0x4c, 0x17, 0x7f, 0x87, 0xa9, 0xed, 0xe1, 0x9d, 0x48, 0xd4, 0xa5, 0x97, 0x90, 0x09, 0xf3, 0xc6,
|
||||
0xa2, 0xf2, 0xfc, 0xff, 0x35, 0x59, 0x0b, 0x29, 0x48, 0xc4, 0x94, 0xb8, 0x0c, 0xd9, 0x4b, 0x5b,
|
||||
0x06, 0xb8, 0xec, 0x65, 0x40, 0x1d, 0xc8, 0x9b, 0x67, 0xed, 0xe7, 0x1a, 0xf4, 0xe8, 0x73, 0xa6,
|
||||
0x4e, 0xa6, 0x09, 0xe6, 0xe5, 0x75, 0xe1, 0xb3, 0xe4, 0xf5, 0x05, 0x5c, 0xed, 0x53, 0x3b, 0x4c,
|
||||
0xc1, 0xe1, 0xf9, 0x0b, 0xe1, 0xcb, 0x31, 0x80, 0x11, 0x7c, 0x07, 0xcb, 0xc7, 0xd4, 0x0f, 0x3c,
|
||||
0x67, 0xf2, 0xa9, 0xea, 0x9e, 0xe7, 0xf1, 0xb1, 0xbc, 0xc7, 0x70, 0x3a, 0xa6, 0x76, 0x10, 0x91,
|
||||
0x2c, 0x5e, 0x2c, 0xef, 0x1c, 0x85, 0x43, 0x10, 0x7b, 0x27, 0xfe, 0x99, 0x86, 0xdb, 0x1f, 0xed,
|
||||
0x3f, 0x7a, 0x04, 0x9b, 0x53, 0x4a, 0xd6, 0xc5, 0x44, 0x0b, 0xb7, 0x5c, 0x6a, 0xd5, 0x15, 0x22,
|
||||
0xeb, 0x8d, 0xf6, 0xdc, 0xa2, 0xdf, 0x83, 0x2f, 0xea, 0x8a, 0x52, 0x6f, 0x61, 0xe3, 0x4c, 0xaf,
|
||||
0xb8, 0xc8, 0xc9, 0x4a, 0x47, 0x14, 0xd0, 0x1d, 0x28, 0x10, 0x4d, 0x62, 0xc2, 0x66, 0xa8, 0x9a,
|
||||
0x66, 0x54, 0x1e, 0xef, 0xec, 0x1a, 0x5a, 0x43, 0xaa, 0x3c, 0x79, 0x2a, 0xa6, 0xce, 0x79, 0xb7,
|
||||
0x1f, 0x7f, 0x53, 0x89, 0xbd, 0xe9, 0x73, 0xde, 0x9d, 0xc7, 0xcf, 0x9e, 0xc6, 0xde, 0x05, 0x74,
|
||||
0x17, 0xd6, 0xcf, 0xbc, 0xcd, 0xaa, 0xb6, 0x35, 0xc3, 0x9d, 0x49, 0xf0, 0x4f, 0xb3, 0x2f, 0x26,
|
||||
0xf8, 0xa7, 0xf9, 0xb3, 0x68, 0x03, 0xee, 0x84, 0x7e, 0xae, 0xbe, 0x86, 0x22, 0x61, 0x75, 0x26,
|
||||
0xc3, 0x52, 0x62, 0xc4, 0x74, 0x8e, 0x5c, 0x62, 0xc4, 0x74, 0x16, 0x40, 0xb7, 0x60, 0x0d, 0x57,
|
||||
0x79, 0x11, 0x95, 0x27, 0xa7, 0x8e, 0xe5, 0x19, 0xc7, 0xf6, 0xee, 0x4e, 0xe8, 0xd8, 0xde, 0xdd,
|
||||
0x11, 0xaf, 0x16, 0x7f, 0x13, 0xe0, 0x46, 0xe2, 0x63, 0x8e, 0x36, 0xe1, 0x41, 0xc2, 0xe8, 0x42,
|
||||
0xa1, 0x9a, 0x7f, 0x15, 0xdd, 0x04, 0xa4, 0xe2, 0x4e, 0x4d, 0xee, 0xd4, 0x8d, 0x3a, 0xee, 0x60,
|
||||
0xc2, 0xa4, 0x4c, 0xcc, 0xa0, 0x3c, 0x64, 0x71, 0x47, 0xda, 0x6b, 0xe1, 0x9a, 0x28, 0xa0, 0x65,
|
||||
0x58, 0xaa, 0xc9, 0x5a, 0x74, 0x4b, 0xa1, 0xab, 0x90, 0xab, 0x61, 0x4d, 0x27, 0xca, 0x61, 0xa8,
|
||||
0x63, 0xe8, 0x06, 0xac, 0xf2, 0xab, 0xa1, 0x55, 0x1b, 0xb8, 0x76, 0x10, 0x46, 0x2d, 0x14, 0x65,
|
||||
0xb8, 0x3e, 0x5f, 0x5b, 0x77, 0x40, 0x7f, 0x46, 0x5f, 0xc1, 0xfd, 0x84, 0xd2, 0xba, 0x32, 0x7e,
|
||||
0x35, 0x57, 0xd9, 0x12, 0x2c, 0xec, 0x1f, 0xb4, 0x5a, 0xa2, 0x50, 0xfc, 0x05, 0x72, 0xea, 0xe8,
|
||||
0x68, 0x38, 0xe8, 0x85, 0x5f, 0x6e, 0x22, 0xa4, 0x5d, 0x6a, 0xc5, 0xef, 0x67, 0x97, 0x5a, 0xb3,
|
||||
0xda, 0x93, 0xba, 0x6c, 0xed, 0x79, 0xf8, 0x03, 0xac, 0xcc, 0xc9, 0x5f, 0x38, 0x4c, 0x95, 0x28,
|
||||
0x3a, 0xae, 0x32, 0xdd, 0x6f, 0xe1, 0x2e, 0x6e, 0xcd, 0x15, 0xbf, 0x0c, 0x4b, 0x9a, 0xb2, 0xaf,
|
||||
0xbf, 0x92, 0x08, 0x16, 0x05, 0x94, 0x85, 0x74, 0x43, 0x6b, 0x8b, 0xa9, 0xbd, 0x5f, 0x05, 0xb8,
|
||||
0xd5, 0x73, 0xac, 0xa4, 0xea, 0xf6, 0x56, 0x9b, 0x96, 0x4f, 0xe2, 0x8f, 0xf0, 0x30, 0xa3, 0xa3,
|
||||
0x0a, 0xaf, 0x9f, 0xf2, 0xc8, 0xbe, 0x33, 0x34, 0xed, 0x7e, 0xc9, 0xf1, 0xfa, 0xe5, 0x3e, 0xb5,
|
||||
0xd9, 0xc3, 0x5d, 0x8e, 0x5c, 0xa6, 0x3b, 0xf0, 0x67, 0xbe, 0xe4, 0x9f, 0x9f, 0x58, 0xfe, 0x3f,
|
||||
0x82, 0xf0, 0x47, 0x6a, 0xad, 0x1e, 0x61, 0xab, 0x2c, 0x4b, 0xd3, 0xf2, 0x4b, 0xdd, 0xad, 0x0f,
|
||||
0xb1, 0xf5, 0x0d, 0xb3, 0xbe, 0x69, 0x5a, 0xfe, 0x9b, 0xee, 0xd6, 0xd1, 0x22, 0x63, 0xdc, 0xfe,
|
||||
0x37, 0x00, 0x00, 0xff, 0xff, 0xc8, 0x00, 0x2e, 0x55, 0x1a, 0x0c, 0x00, 0x00,
|
||||
}
|
||||
2554
vendor/google.golang.org/genproto/googleapis/cloud/kms/v1/service.pb.go
generated
vendored
Normal file
2554
vendor/google.golang.org/genproto/googleapis/cloud/kms/v1/service.pb.go
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user