From 59968462a3870c6289166fa1161f9b6d9c10e093 Mon Sep 17 00:00:00 2001 From: Yoshi Automation Bot Date: Wed, 11 Aug 2021 07:33:48 -0700 Subject: [PATCH] chore(all): auto-regenerate gapics (#4591) This is an auto-generated regeneration of the gapic clients by cloud.google.com/go/internal/gapicgen. Once the corresponding genproto PR is submitted, genbot will update this PR with a newer dependency to the newer version of genproto and assign reviewers to this PR. If you have been assigned to review this PR, please: - Ensure that the version of genproto in go.mod has been updated. - Ensure that CI is passing. If it's failing, it requires your manual attention. - Approve and submit this PR if you believe it's ready to ship. Corresponding genproto PR: https://github.com/googleapis/go-genproto/pull/654 Changes: fix(pubsub): replace IAMPolicy in API config PiperOrigin-RevId: 389961627 Source-Link: https://github.com/googleapis/googleapis/commit/e41be609f1e2ae7618bf323748871c591f44742a feat(dialogflow/cx): added support for DLP templates; expose `Locations` service to get/list avaliable locations of Dialogflow products PiperOrigin-RevId: 389939863 Source-Link: https://github.com/googleapis/googleapis/commit/626df528c5ae8839254f28b1f8daa1bac75be3a4 feat(dialogflow/cx): added support for DLP templates; expose `Locations` service to get/list avaliable locations of Dialogflow products docs: reorder some fields PiperOrigin-RevId: 389907245 Source-Link: https://github.com/googleapis/googleapis/commit/114b1416f8f2725e1272b0bf2be74676cff0ed2c feat(dialogflow): expose `Locations` service to get/list avaliable locations of Dialogflow products; fixed some API annotations PiperOrigin-RevId: 389905442 Source-Link: https://github.com/googleapis/googleapis/commit/4c984f3be8e1bd85eb8fe78a2911a83b9785a7ea feat(pubsub): Add topic retention options PiperOrigin-RevId: 389879008 Source-Link: https://github.com/googleapis/googleapis/commit/7b6a2ceed6cacf676b3918b1703b3ddd6322444c feat(speech): add total_billed_time response field Committer: @cherba PiperOrigin-RevId: 389755489 Source-Link: https://github.com/googleapis/googleapis/commit/10185d07a4db1d76a888a119aeab1f2287b35105 build(dataproc): update from broken v1beta2 links to v1 PiperOrigin-RevId: 389649385 Source-Link: https://github.com/googleapis/googleapis/commit/2c1c2ac112b63ae304226b90dfbb9462a6418864 feat(video/transcoder): Add video cropping feature feat: Add video padding feature feat: Add ttl_after_completion_days field to Job docs: Update proto documentation docs: Indicate v1beta1 deprecation PiperOrigin-RevId: 389250478 Source-Link: https://github.com/googleapis/googleapis/commit/9a7d19079b5e3c22a5a08eaa94273f5d1eebb317 build(networkmanagement): correct artifact name for npm PiperOrigin-RevId: 389230095 Source-Link: https://github.com/googleapis/googleapis/commit/f642cc61dfae622ba8fe5f7addcdaeece2f6e5a3 feat(kms): add support for HMAC, Variable Key Destruction, and GenerateRandom PiperOrigin-RevId: 389008671 Source-Link: https://github.com/googleapis/googleapis/commit/2efb6951f151116fb7b5766fb4e377db465d49e9 --- .../apiv1beta2/cluster_controller_client.go | 8 +- dataproc/apiv1beta2/doc.go | 2 +- dataproc/apiv1beta2/job_controller_client.go | 4 +- .../apiv1beta2/workflow_template_client.go | 2 +- dialogflow/apiv2/doc.go | 2 +- dialogflow/cx/apiv3/doc.go | 2 +- dialogflow/cx/apiv3beta1/doc.go | 2 +- go.mod | 2 +- go.sum | 4 +- internal/generated/snippets/go.mod | 2 +- internal/generated/snippets/go.sum | 3 +- .../GenerateRandomBytes/main.go | 47 ++++ .../apiv1/KeyManagementClient/MacSign/main.go | 47 ++++ .../KeyManagementClient/MacVerify/main.go | 47 ++++ internal/godocfx/go.sum | 4 +- kms/apiv1/doc.go | 2 +- kms/apiv1/gapic_metadata.json | 15 ++ kms/apiv1/key_management_client.go | 219 ++++++++++++------ .../key_management_client_example_test.go | 75 +++++- networkmanagement/apiv1/doc.go | 2 +- pubsub/apiv1/doc.go | 2 +- pubsub/go.mod | 2 +- pubsub/go.sum | 4 +- speech/apiv1/doc.go | 2 +- video/transcoder/apiv1beta1/doc.go | 2 +- .../apiv1beta1/transcoder_client.go | 4 + 26 files changed, 401 insertions(+), 106 deletions(-) create mode 100644 internal/generated/snippets/kms/apiv1/KeyManagementClient/GenerateRandomBytes/main.go create mode 100644 internal/generated/snippets/kms/apiv1/KeyManagementClient/MacSign/main.go create mode 100644 internal/generated/snippets/kms/apiv1/KeyManagementClient/MacVerify/main.go diff --git a/dataproc/apiv1beta2/cluster_controller_client.go b/dataproc/apiv1beta2/cluster_controller_client.go index 5441fb58d87..73ef01ad0a4 100644 --- a/dataproc/apiv1beta2/cluster_controller_client.go +++ b/dataproc/apiv1beta2/cluster_controller_client.go @@ -197,7 +197,7 @@ func (c *ClusterControllerClient) Connection() *grpc.ClientConn { // CreateCluster creates a cluster in a project. The returned // Operation.metadata will be -// ClusterOperationMetadata (at https://cloud.google.com/dataproc/docs/reference/rpc/google.cloud.dataproc.v1beta2#clusteroperationmetadata). +// ClusterOperationMetadata. func (c *ClusterControllerClient) CreateCluster(ctx context.Context, req *dataprocpb.CreateClusterRequest, opts ...gax.CallOption) (*CreateClusterOperation, error) { return c.internalClient.CreateCluster(ctx, req, opts...) } @@ -210,7 +210,7 @@ func (c *ClusterControllerClient) CreateClusterOperation(name string) *CreateClu // UpdateCluster updates a cluster in a project. The returned // Operation.metadata will be -// ClusterOperationMetadata (at https://cloud.google.com/dataproc/docs/reference/rpc/google.cloud.dataproc.v1beta2#clusteroperationmetadata). +// ClusterOperationMetadata. func (c *ClusterControllerClient) UpdateCluster(ctx context.Context, req *dataprocpb.UpdateClusterRequest, opts ...gax.CallOption) (*UpdateClusterOperation, error) { return c.internalClient.UpdateCluster(ctx, req, opts...) } @@ -223,7 +223,7 @@ func (c *ClusterControllerClient) UpdateClusterOperation(name string) *UpdateClu // DeleteCluster deletes a cluster in a project. The returned // Operation.metadata will be -// ClusterOperationMetadata (at https://cloud.google.com/dataproc/docs/reference/rpc/google.cloud.dataproc.v1beta2#clusteroperationmetadata). +// ClusterOperationMetadata. func (c *ClusterControllerClient) DeleteCluster(ctx context.Context, req *dataprocpb.DeleteClusterRequest, opts ...gax.CallOption) (*DeleteClusterOperation, error) { return c.internalClient.DeleteCluster(ctx, req, opts...) } @@ -246,7 +246,7 @@ func (c *ClusterControllerClient) ListClusters(ctx context.Context, req *datapro // DiagnoseCluster gets cluster diagnostic information. The returned // Operation.metadata will be -// ClusterOperationMetadata (at https://cloud.google.com/dataproc/docs/reference/rpc/google.cloud.dataproc.v1beta2#clusteroperationmetadata). +// ClusterOperationMetadata. // After the operation completes, // Operation.response // contains diff --git a/dataproc/apiv1beta2/doc.go b/dataproc/apiv1beta2/doc.go index d6a26d7588a..f346f76162d 100644 --- a/dataproc/apiv1beta2/doc.go +++ b/dataproc/apiv1beta2/doc.go @@ -50,7 +50,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/dataproc/apiv1beta2/job_controller_client.go b/dataproc/apiv1beta2/job_controller_client.go index 5023eb2d96a..c85c2084bc4 100644 --- a/dataproc/apiv1beta2/job_controller_client.go +++ b/dataproc/apiv1beta2/job_controller_client.go @@ -239,9 +239,9 @@ func (c *JobControllerClient) UpdateJob(ctx context.Context, req *dataprocpb.Upd // CancelJob starts a job cancellation request. To access the job resource // after cancellation, call -// regions/{region}/jobs.list (at https://cloud.google.com/dataproc/docs/reference/rest/v1beta2/projects.regions.jobs/list) +// regions/{region}/jobs.list // or -// regions/{region}/jobs.get (at https://cloud.google.com/dataproc/docs/reference/rest/v1beta2/projects.regions.jobs/get). +// regions/{region}/jobs.get. func (c *JobControllerClient) CancelJob(ctx context.Context, req *dataprocpb.CancelJobRequest, opts ...gax.CallOption) (*dataprocpb.Job, error) { return c.internalClient.CancelJob(ctx, req, opts...) } diff --git a/dataproc/apiv1beta2/workflow_template_client.go b/dataproc/apiv1beta2/workflow_template_client.go index c7c92e67d48..4265af2fb5f 100644 --- a/dataproc/apiv1beta2/workflow_template_client.go +++ b/dataproc/apiv1beta2/workflow_template_client.go @@ -232,7 +232,7 @@ func (c *WorkflowTemplateClient) GetWorkflowTemplate(ctx context.Context, req *d // clusters to be deleted. // // The Operation.metadata will be -// WorkflowMetadata (at https://cloud.google.com/dataproc/docs/reference/rpc/google.cloud.dataproc.v1beta2#workflowmetadata). +// WorkflowMetadata. // Also see Using // WorkflowMetadata (at https://cloud.google.com/dataproc/docs/concepts/workflows/debugging#using_workflowmetadata). // diff --git a/dialogflow/apiv2/doc.go b/dialogflow/apiv2/doc.go index 19b29deef74..8b058ba4e1b 100644 --- a/dialogflow/apiv2/doc.go +++ b/dialogflow/apiv2/doc.go @@ -49,7 +49,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/dialogflow/cx/apiv3/doc.go b/dialogflow/cx/apiv3/doc.go index 5ec8a8560ae..e9421c65f1d 100644 --- a/dialogflow/cx/apiv3/doc.go +++ b/dialogflow/cx/apiv3/doc.go @@ -49,7 +49,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/dialogflow/cx/apiv3beta1/doc.go b/dialogflow/cx/apiv3beta1/doc.go index 8129a692521..d4205464995 100644 --- a/dialogflow/cx/apiv3beta1/doc.go +++ b/dialogflow/cx/apiv3beta1/doc.go @@ -51,7 +51,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/go.mod b/go.mod index 89f3c457146..cc4338b4263 100644 --- a/go.mod +++ b/go.mod @@ -17,7 +17,7 @@ require ( golang.org/x/text v0.3.6 golang.org/x/tools v0.1.5 google.golang.org/api v0.52.0 - google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 + google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 google.golang.org/grpc v1.39.1 google.golang.org/protobuf v1.27.1 ) diff --git a/go.sum b/go.sum index a5fcc7c6478..2f68c40a0a9 100644 --- a/go.sum +++ b/go.sum @@ -474,8 +474,8 @@ google.golang.org/genproto v0.0.0-20210608205507-b6d2f5bf0d7d/go.mod h1:UODoCrxH google.golang.org/genproto v0.0.0-20210624195500-8bfb893ecb84/go.mod h1:SzzZ/N+nwJDaO1kznhnlzqS8ocJICar6hYhVyhi++24= google.golang.org/genproto v0.0.0-20210721163202-f1cecdd8b78a/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 h1:VmMSf20ssFK0+u1dscyTH9bU4/M4y+X/xNfkvD6kGtM= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 h1:qnrhhl4uoNFepTqE28u11llFcDH07Z6r/cQxpGR97A4= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216/go.mod h1:cFeNkxwySK631ADgubI+/XFU/xp8FD5KIVV4rj8UC5w= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= diff --git a/internal/generated/snippets/go.mod b/internal/generated/snippets/go.mod index 644e35f215a..e71aba5c561 100644 --- a/internal/generated/snippets/go.mod +++ b/internal/generated/snippets/go.mod @@ -32,5 +32,5 @@ require ( cloud.google.com/go/pubsublite v0.90.0 cloud.google.com/go/spanner v0.90.0 google.golang.org/api v0.52.0 - google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 + google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 ) diff --git a/internal/generated/snippets/go.sum b/internal/generated/snippets/go.sum index 1f94a27c90d..1fb07e35947 100644 --- a/internal/generated/snippets/go.sum +++ b/internal/generated/snippets/go.sum @@ -146,8 +146,9 @@ google.golang.org/genproto v0.0.0-20190819201941-24fa4b261c55/go.mod h1:DMBHOl98 google.golang.org/genproto v0.0.0-20200513103714-09dca8ec2884/go.mod h1:55QSHmfGQM9UVYDPBsyGGes0y52j32PQ3BqQfXhyH3c= google.golang.org/genproto v0.0.0-20200526211855-cb27e3aa2013/go.mod h1:NbSheEEYHJ7i3ixzK3sjbqSGDJWnxyFXZblF3eUsNvo= google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 h1:VmMSf20ssFK0+u1dscyTH9bU4/M4y+X/xNfkvD6kGtM= google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 h1:qnrhhl4uoNFepTqE28u11llFcDH07Z6r/cQxpGR97A4= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216/go.mod h1:cFeNkxwySK631ADgubI+/XFU/xp8FD5KIVV4rj8UC5w= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.23.0/go.mod h1:Y5yQAOtifL1yxbo5wqy6BxZv8vAUGQwXBOALyacEbxg= google.golang.org/grpc v1.25.1/go.mod h1:c3i+UQWmh7LiEpx4sFZnkU36qjEYZ0imhYfXVyQciAY= diff --git a/internal/generated/snippets/kms/apiv1/KeyManagementClient/GenerateRandomBytes/main.go b/internal/generated/snippets/kms/apiv1/KeyManagementClient/GenerateRandomBytes/main.go new file mode 100644 index 00000000000..688c6b70de6 --- /dev/null +++ b/internal/generated/snippets/kms/apiv1/KeyManagementClient/GenerateRandomBytes/main.go @@ -0,0 +1,47 @@ +// Copyright 2021 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +// Code generated by cloud.google.com/go/internal/gapicgen/gensnippets. DO NOT EDIT. + +// [START cloudkms_v1_generated_KeyManagementService_GenerateRandomBytes_sync] + +package main + +import ( + "context" + + kms "cloud.google.com/go/kms/apiv1" + kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1" +) + +func main() { + ctx := context.Background() + c, err := kms.NewKeyManagementClient(ctx) + if err != nil { + // TODO: Handle error. + } + defer c.Close() + + req := &kmspb.GenerateRandomBytesRequest{ + // TODO: Fill request struct fields. + } + resp, err := c.GenerateRandomBytes(ctx, req) + if err != nil { + // TODO: Handle error. + } + // TODO: Use resp. + _ = resp +} + +// [END cloudkms_v1_generated_KeyManagementService_GenerateRandomBytes_sync] diff --git a/internal/generated/snippets/kms/apiv1/KeyManagementClient/MacSign/main.go b/internal/generated/snippets/kms/apiv1/KeyManagementClient/MacSign/main.go new file mode 100644 index 00000000000..7145ef826eb --- /dev/null +++ b/internal/generated/snippets/kms/apiv1/KeyManagementClient/MacSign/main.go @@ -0,0 +1,47 @@ +// Copyright 2021 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +// Code generated by cloud.google.com/go/internal/gapicgen/gensnippets. DO NOT EDIT. + +// [START cloudkms_v1_generated_KeyManagementService_MacSign_sync] + +package main + +import ( + "context" + + kms "cloud.google.com/go/kms/apiv1" + kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1" +) + +func main() { + ctx := context.Background() + c, err := kms.NewKeyManagementClient(ctx) + if err != nil { + // TODO: Handle error. + } + defer c.Close() + + req := &kmspb.MacSignRequest{ + // TODO: Fill request struct fields. + } + resp, err := c.MacSign(ctx, req) + if err != nil { + // TODO: Handle error. + } + // TODO: Use resp. + _ = resp +} + +// [END cloudkms_v1_generated_KeyManagementService_MacSign_sync] diff --git a/internal/generated/snippets/kms/apiv1/KeyManagementClient/MacVerify/main.go b/internal/generated/snippets/kms/apiv1/KeyManagementClient/MacVerify/main.go new file mode 100644 index 00000000000..c95d5b37fa9 --- /dev/null +++ b/internal/generated/snippets/kms/apiv1/KeyManagementClient/MacVerify/main.go @@ -0,0 +1,47 @@ +// Copyright 2021 Google LLC +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +// Code generated by cloud.google.com/go/internal/gapicgen/gensnippets. DO NOT EDIT. + +// [START cloudkms_v1_generated_KeyManagementService_MacVerify_sync] + +package main + +import ( + "context" + + kms "cloud.google.com/go/kms/apiv1" + kmspb "google.golang.org/genproto/googleapis/cloud/kms/v1" +) + +func main() { + ctx := context.Background() + c, err := kms.NewKeyManagementClient(ctx) + if err != nil { + // TODO: Handle error. + } + defer c.Close() + + req := &kmspb.MacVerifyRequest{ + // TODO: Fill request struct fields. + } + resp, err := c.MacVerify(ctx, req) + if err != nil { + // TODO: Handle error. + } + // TODO: Use resp. + _ = resp +} + +// [END cloudkms_v1_generated_KeyManagementService_MacVerify_sync] diff --git a/internal/godocfx/go.sum b/internal/godocfx/go.sum index 6cb8ffe9a1e..bcea8133053 100644 --- a/internal/godocfx/go.sum +++ b/internal/godocfx/go.sum @@ -306,8 +306,8 @@ google.golang.org/genproto v0.0.0-20200618031413-b414f8b61790/go.mod h1:jDfRM7Fc google.golang.org/genproto v0.0.0-20200804131852-c06518451d9c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20200827165113-ac2560b5e952/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 h1:VmMSf20ssFK0+u1dscyTH9bU4/M4y+X/xNfkvD6kGtM= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 h1:qnrhhl4uoNFepTqE28u11llFcDH07Z6r/cQxpGR97A4= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216/go.mod h1:cFeNkxwySK631ADgubI+/XFU/xp8FD5KIVV4rj8UC5w= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= diff --git a/kms/apiv1/doc.go b/kms/apiv1/doc.go index c3b434fd2a7..1e4f2dc6f10 100644 --- a/kms/apiv1/doc.go +++ b/kms/apiv1/doc.go @@ -49,7 +49,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/kms/apiv1/gapic_metadata.json b/kms/apiv1/gapic_metadata.json index 37d3fd6d549..82c8b473a20 100644 --- a/kms/apiv1/gapic_metadata.json +++ b/kms/apiv1/gapic_metadata.json @@ -55,6 +55,11 @@ "Encrypt" ] }, + "GenerateRandomBytes": { + "methods": [ + "GenerateRandomBytes" + ] + }, "GetCryptoKey": { "methods": [ "GetCryptoKey" @@ -110,6 +115,16 @@ "ListKeyRings" ] }, + "MacSign": { + "methods": [ + "MacSign" + ] + }, + "MacVerify": { + "methods": [ + "MacVerify" + ] + }, "RestoreCryptoKeyVersion": { "methods": [ "RestoreCryptoKeyVersion" diff --git a/kms/apiv1/key_management_client.go b/kms/apiv1/key_management_client.go index bad8e3d8ec3..4b83827fcd8 100644 --- a/kms/apiv1/key_management_client.go +++ b/kms/apiv1/key_management_client.go @@ -56,13 +56,16 @@ type KeyManagementCallOptions struct { CreateImportJob []gax.CallOption UpdateCryptoKey []gax.CallOption UpdateCryptoKeyVersion []gax.CallOption + UpdateCryptoKeyPrimaryVersion []gax.CallOption + DestroyCryptoKeyVersion []gax.CallOption + RestoreCryptoKeyVersion []gax.CallOption Encrypt []gax.CallOption Decrypt []gax.CallOption AsymmetricSign []gax.CallOption AsymmetricDecrypt []gax.CallOption - UpdateCryptoKeyPrimaryVersion []gax.CallOption - DestroyCryptoKeyVersion []gax.CallOption - RestoreCryptoKeyVersion []gax.CallOption + MacSign []gax.CallOption + MacVerify []gax.CallOption + GenerateRandomBytes []gax.CallOption GetIamPolicy []gax.CallOption SetIamPolicy []gax.CallOption TestIamPermissions []gax.CallOption @@ -253,7 +256,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - Encrypt: []gax.CallOption{ + UpdateCryptoKeyPrimaryVersion: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -265,7 +268,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - Decrypt: []gax.CallOption{ + DestroyCryptoKeyVersion: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -277,7 +280,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - AsymmetricSign: []gax.CallOption{ + RestoreCryptoKeyVersion: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -289,7 +292,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - AsymmetricDecrypt: []gax.CallOption{ + Encrypt: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -301,7 +304,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - UpdateCryptoKeyPrimaryVersion: []gax.CallOption{ + Decrypt: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -313,7 +316,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - DestroyCryptoKeyVersion: []gax.CallOption{ + AsymmetricSign: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -325,7 +328,7 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - RestoreCryptoKeyVersion: []gax.CallOption{ + AsymmetricDecrypt: []gax.CallOption{ gax.WithRetry(func() gax.Retryer { return gax.OnCodes([]codes.Code{ codes.Unavailable, @@ -337,9 +340,12 @@ func defaultKeyManagementCallOptions() *KeyManagementCallOptions { }) }), }, - GetIamPolicy: []gax.CallOption{}, - SetIamPolicy: []gax.CallOption{}, - TestIamPermissions: []gax.CallOption{}, + MacSign: []gax.CallOption{}, + MacVerify: []gax.CallOption{}, + GenerateRandomBytes: []gax.CallOption{}, + GetIamPolicy: []gax.CallOption{}, + SetIamPolicy: []gax.CallOption{}, + TestIamPermissions: []gax.CallOption{}, } } @@ -364,13 +370,16 @@ type internalKeyManagementClient interface { CreateImportJob(context.Context, *kmspb.CreateImportJobRequest, ...gax.CallOption) (*kmspb.ImportJob, error) UpdateCryptoKey(context.Context, *kmspb.UpdateCryptoKeyRequest, ...gax.CallOption) (*kmspb.CryptoKey, error) UpdateCryptoKeyVersion(context.Context, *kmspb.UpdateCryptoKeyVersionRequest, ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) + UpdateCryptoKeyPrimaryVersion(context.Context, *kmspb.UpdateCryptoKeyPrimaryVersionRequest, ...gax.CallOption) (*kmspb.CryptoKey, error) + DestroyCryptoKeyVersion(context.Context, *kmspb.DestroyCryptoKeyVersionRequest, ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) + RestoreCryptoKeyVersion(context.Context, *kmspb.RestoreCryptoKeyVersionRequest, ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) Encrypt(context.Context, *kmspb.EncryptRequest, ...gax.CallOption) (*kmspb.EncryptResponse, error) Decrypt(context.Context, *kmspb.DecryptRequest, ...gax.CallOption) (*kmspb.DecryptResponse, error) AsymmetricSign(context.Context, *kmspb.AsymmetricSignRequest, ...gax.CallOption) (*kmspb.AsymmetricSignResponse, error) AsymmetricDecrypt(context.Context, *kmspb.AsymmetricDecryptRequest, ...gax.CallOption) (*kmspb.AsymmetricDecryptResponse, error) - UpdateCryptoKeyPrimaryVersion(context.Context, *kmspb.UpdateCryptoKeyPrimaryVersionRequest, ...gax.CallOption) (*kmspb.CryptoKey, error) - DestroyCryptoKeyVersion(context.Context, *kmspb.DestroyCryptoKeyVersionRequest, ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) - RestoreCryptoKeyVersion(context.Context, *kmspb.RestoreCryptoKeyVersionRequest, ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) + MacSign(context.Context, *kmspb.MacSignRequest, ...gax.CallOption) (*kmspb.MacSignResponse, error) + MacVerify(context.Context, *kmspb.MacVerifyRequest, ...gax.CallOption) (*kmspb.MacVerifyResponse, error) + GenerateRandomBytes(context.Context, *kmspb.GenerateRandomBytesRequest, ...gax.CallOption) (*kmspb.GenerateRandomBytesResponse, error) GetIamPolicy(context.Context, *iampb.GetIamPolicyRequest, ...gax.CallOption) (*iampb.Policy, error) SetIamPolicy(context.Context, *iampb.SetIamPolicyRequest, ...gax.CallOption) (*iampb.Policy, error) TestIamPermissions(context.Context, *iampb.TestIamPermissionsRequest, ...gax.CallOption) (*iampb.TestIamPermissionsResponse, error) @@ -528,33 +537,6 @@ func (c *KeyManagementClient) UpdateCryptoKeyVersion(ctx context.Context, req *k return c.internalClient.UpdateCryptoKeyVersion(ctx, req, opts...) } -// Encrypt encrypts data, so that it can only be recovered by a call to Decrypt. -// The CryptoKey.purpose must be -// ENCRYPT_DECRYPT. -func (c *KeyManagementClient) Encrypt(ctx context.Context, req *kmspb.EncryptRequest, opts ...gax.CallOption) (*kmspb.EncryptResponse, error) { - return c.internalClient.Encrypt(ctx, req, opts...) -} - -// Decrypt decrypts data that was protected by Encrypt. The CryptoKey.purpose -// must be ENCRYPT_DECRYPT. -func (c *KeyManagementClient) Decrypt(ctx context.Context, req *kmspb.DecryptRequest, opts ...gax.CallOption) (*kmspb.DecryptResponse, error) { - return c.internalClient.Decrypt(ctx, req, opts...) -} - -// AsymmetricSign signs data using a CryptoKeyVersion with CryptoKey.purpose -// ASYMMETRIC_SIGN, producing a signature that can be verified with the public -// key retrieved from GetPublicKey. -func (c *KeyManagementClient) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest, opts ...gax.CallOption) (*kmspb.AsymmetricSignResponse, error) { - return c.internalClient.AsymmetricSign(ctx, req, opts...) -} - -// AsymmetricDecrypt decrypts data that was encrypted with a public key retrieved from -// GetPublicKey corresponding to a CryptoKeyVersion with -// CryptoKey.purpose ASYMMETRIC_DECRYPT. -func (c *KeyManagementClient) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest, opts ...gax.CallOption) (*kmspb.AsymmetricDecryptResponse, error) { - return c.internalClient.AsymmetricDecrypt(ctx, req, opts...) -} - // UpdateCryptoKeyPrimaryVersion update the version of a CryptoKey that will be used in Encrypt. // // Returns an error if called on a key whose purpose is not @@ -590,6 +572,53 @@ func (c *KeyManagementClient) RestoreCryptoKeyVersion(ctx context.Context, req * return c.internalClient.RestoreCryptoKeyVersion(ctx, req, opts...) } +// Encrypt encrypts data, so that it can only be recovered by a call to Decrypt. +// The CryptoKey.purpose must be +// ENCRYPT_DECRYPT. +func (c *KeyManagementClient) Encrypt(ctx context.Context, req *kmspb.EncryptRequest, opts ...gax.CallOption) (*kmspb.EncryptResponse, error) { + return c.internalClient.Encrypt(ctx, req, opts...) +} + +// Decrypt decrypts data that was protected by Encrypt. The CryptoKey.purpose +// must be ENCRYPT_DECRYPT. +func (c *KeyManagementClient) Decrypt(ctx context.Context, req *kmspb.DecryptRequest, opts ...gax.CallOption) (*kmspb.DecryptResponse, error) { + return c.internalClient.Decrypt(ctx, req, opts...) +} + +// AsymmetricSign signs data using a CryptoKeyVersion with CryptoKey.purpose +// ASYMMETRIC_SIGN, producing a signature that can be verified with the public +// key retrieved from GetPublicKey. +func (c *KeyManagementClient) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest, opts ...gax.CallOption) (*kmspb.AsymmetricSignResponse, error) { + return c.internalClient.AsymmetricSign(ctx, req, opts...) +} + +// AsymmetricDecrypt decrypts data that was encrypted with a public key retrieved from +// GetPublicKey corresponding to a CryptoKeyVersion with +// CryptoKey.purpose ASYMMETRIC_DECRYPT. +func (c *KeyManagementClient) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest, opts ...gax.CallOption) (*kmspb.AsymmetricDecryptResponse, error) { + return c.internalClient.AsymmetricDecrypt(ctx, req, opts...) +} + +// MacSign signs data using a CryptoKeyVersion with CryptoKey.purpose +// MAC, producing a tag that can be verified by another source with the +// same key. +func (c *KeyManagementClient) MacSign(ctx context.Context, req *kmspb.MacSignRequest, opts ...gax.CallOption) (*kmspb.MacSignResponse, error) { + return c.internalClient.MacSign(ctx, req, opts...) +} + +// MacVerify verifies MAC tag using a CryptoKeyVersion with CryptoKey.purpose +// MAC, and returns a response that indicates whether or not the verification +// was successful. +func (c *KeyManagementClient) MacVerify(ctx context.Context, req *kmspb.MacVerifyRequest, opts ...gax.CallOption) (*kmspb.MacVerifyResponse, error) { + return c.internalClient.MacVerify(ctx, req, opts...) +} + +// GenerateRandomBytes generate random bytes using the Cloud KMS randomness source in the provided +// location. +func (c *KeyManagementClient) GenerateRandomBytes(ctx context.Context, req *kmspb.GenerateRandomBytesRequest, opts ...gax.CallOption) (*kmspb.GenerateRandomBytesResponse, error) { + return c.internalClient.GenerateRandomBytes(ctx, req, opts...) +} + // GetIamPolicy gets the access control policy for a resource. Returns an empty policy // if the resource exists and does not have a policy set. func (c *KeyManagementClient) GetIamPolicy(ctx context.Context, req *iampb.GetIamPolicyRequest, opts ...gax.CallOption) (*iampb.Policy, error) { @@ -1141,7 +1170,7 @@ func (c *keyManagementGRPCClient) UpdateCryptoKeyVersion(ctx context.Context, re return resp, nil } -func (c *keyManagementGRPCClient) Encrypt(ctx context.Context, req *kmspb.EncryptRequest, opts ...gax.CallOption) (*kmspb.EncryptResponse, error) { +func (c *keyManagementGRPCClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyPrimaryVersionRequest, opts ...gax.CallOption) (*kmspb.CryptoKey, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1149,11 +1178,11 @@ func (c *keyManagementGRPCClient) Encrypt(ctx context.Context, req *kmspb.Encryp } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).Encrypt[0:len((*c.CallOptions).Encrypt):len((*c.CallOptions).Encrypt)], opts...) - var resp *kmspb.EncryptResponse + opts = append((*c.CallOptions).UpdateCryptoKeyPrimaryVersion[0:len((*c.CallOptions).UpdateCryptoKeyPrimaryVersion):len((*c.CallOptions).UpdateCryptoKeyPrimaryVersion)], opts...) + var resp *kmspb.CryptoKey err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.Encrypt(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.UpdateCryptoKeyPrimaryVersion(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { @@ -1162,7 +1191,7 @@ func (c *keyManagementGRPCClient) Encrypt(ctx context.Context, req *kmspb.Encryp return resp, nil } -func (c *keyManagementGRPCClient) Decrypt(ctx context.Context, req *kmspb.DecryptRequest, opts ...gax.CallOption) (*kmspb.DecryptResponse, error) { +func (c *keyManagementGRPCClient) DestroyCryptoKeyVersion(ctx context.Context, req *kmspb.DestroyCryptoKeyVersionRequest, opts ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1170,11 +1199,11 @@ func (c *keyManagementGRPCClient) Decrypt(ctx context.Context, req *kmspb.Decryp } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).Decrypt[0:len((*c.CallOptions).Decrypt):len((*c.CallOptions).Decrypt)], opts...) - var resp *kmspb.DecryptResponse + opts = append((*c.CallOptions).DestroyCryptoKeyVersion[0:len((*c.CallOptions).DestroyCryptoKeyVersion):len((*c.CallOptions).DestroyCryptoKeyVersion)], opts...) + var resp *kmspb.CryptoKeyVersion err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.Decrypt(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.DestroyCryptoKeyVersion(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { @@ -1183,7 +1212,7 @@ func (c *keyManagementGRPCClient) Decrypt(ctx context.Context, req *kmspb.Decryp return resp, nil } -func (c *keyManagementGRPCClient) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest, opts ...gax.CallOption) (*kmspb.AsymmetricSignResponse, error) { +func (c *keyManagementGRPCClient) RestoreCryptoKeyVersion(ctx context.Context, req *kmspb.RestoreCryptoKeyVersionRequest, opts ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1191,11 +1220,11 @@ func (c *keyManagementGRPCClient) AsymmetricSign(ctx context.Context, req *kmspb } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).AsymmetricSign[0:len((*c.CallOptions).AsymmetricSign):len((*c.CallOptions).AsymmetricSign)], opts...) - var resp *kmspb.AsymmetricSignResponse + opts = append((*c.CallOptions).RestoreCryptoKeyVersion[0:len((*c.CallOptions).RestoreCryptoKeyVersion):len((*c.CallOptions).RestoreCryptoKeyVersion)], opts...) + var resp *kmspb.CryptoKeyVersion err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.AsymmetricSign(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.RestoreCryptoKeyVersion(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { @@ -1204,7 +1233,7 @@ func (c *keyManagementGRPCClient) AsymmetricSign(ctx context.Context, req *kmspb return resp, nil } -func (c *keyManagementGRPCClient) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest, opts ...gax.CallOption) (*kmspb.AsymmetricDecryptResponse, error) { +func (c *keyManagementGRPCClient) Encrypt(ctx context.Context, req *kmspb.EncryptRequest, opts ...gax.CallOption) (*kmspb.EncryptResponse, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1212,11 +1241,11 @@ func (c *keyManagementGRPCClient) AsymmetricDecrypt(ctx context.Context, req *km } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).AsymmetricDecrypt[0:len((*c.CallOptions).AsymmetricDecrypt):len((*c.CallOptions).AsymmetricDecrypt)], opts...) - var resp *kmspb.AsymmetricDecryptResponse + opts = append((*c.CallOptions).Encrypt[0:len((*c.CallOptions).Encrypt):len((*c.CallOptions).Encrypt)], opts...) + var resp *kmspb.EncryptResponse err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.AsymmetricDecrypt(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.Encrypt(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { @@ -1225,7 +1254,7 @@ func (c *keyManagementGRPCClient) AsymmetricDecrypt(ctx context.Context, req *km return resp, nil } -func (c *keyManagementGRPCClient) UpdateCryptoKeyPrimaryVersion(ctx context.Context, req *kmspb.UpdateCryptoKeyPrimaryVersionRequest, opts ...gax.CallOption) (*kmspb.CryptoKey, error) { +func (c *keyManagementGRPCClient) Decrypt(ctx context.Context, req *kmspb.DecryptRequest, opts ...gax.CallOption) (*kmspb.DecryptResponse, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1233,11 +1262,11 @@ func (c *keyManagementGRPCClient) UpdateCryptoKeyPrimaryVersion(ctx context.Cont } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).UpdateCryptoKeyPrimaryVersion[0:len((*c.CallOptions).UpdateCryptoKeyPrimaryVersion):len((*c.CallOptions).UpdateCryptoKeyPrimaryVersion)], opts...) - var resp *kmspb.CryptoKey + opts = append((*c.CallOptions).Decrypt[0:len((*c.CallOptions).Decrypt):len((*c.CallOptions).Decrypt)], opts...) + var resp *kmspb.DecryptResponse err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.UpdateCryptoKeyPrimaryVersion(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.Decrypt(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { @@ -1246,7 +1275,7 @@ func (c *keyManagementGRPCClient) UpdateCryptoKeyPrimaryVersion(ctx context.Cont return resp, nil } -func (c *keyManagementGRPCClient) DestroyCryptoKeyVersion(ctx context.Context, req *kmspb.DestroyCryptoKeyVersionRequest, opts ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) { +func (c *keyManagementGRPCClient) AsymmetricSign(ctx context.Context, req *kmspb.AsymmetricSignRequest, opts ...gax.CallOption) (*kmspb.AsymmetricSignResponse, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1254,11 +1283,11 @@ func (c *keyManagementGRPCClient) DestroyCryptoKeyVersion(ctx context.Context, r } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).DestroyCryptoKeyVersion[0:len((*c.CallOptions).DestroyCryptoKeyVersion):len((*c.CallOptions).DestroyCryptoKeyVersion)], opts...) - var resp *kmspb.CryptoKeyVersion + opts = append((*c.CallOptions).AsymmetricSign[0:len((*c.CallOptions).AsymmetricSign):len((*c.CallOptions).AsymmetricSign)], opts...) + var resp *kmspb.AsymmetricSignResponse err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.DestroyCryptoKeyVersion(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.AsymmetricSign(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { @@ -1267,7 +1296,7 @@ func (c *keyManagementGRPCClient) DestroyCryptoKeyVersion(ctx context.Context, r return resp, nil } -func (c *keyManagementGRPCClient) RestoreCryptoKeyVersion(ctx context.Context, req *kmspb.RestoreCryptoKeyVersionRequest, opts ...gax.CallOption) (*kmspb.CryptoKeyVersion, error) { +func (c *keyManagementGRPCClient) AsymmetricDecrypt(ctx context.Context, req *kmspb.AsymmetricDecryptRequest, opts ...gax.CallOption) (*kmspb.AsymmetricDecryptResponse, error) { if _, ok := ctx.Deadline(); !ok && !c.disableDeadlines { cctx, cancel := context.WithTimeout(ctx, 60000*time.Millisecond) defer cancel() @@ -1275,11 +1304,59 @@ func (c *keyManagementGRPCClient) RestoreCryptoKeyVersion(ctx context.Context, r } md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) ctx = insertMetadata(ctx, c.xGoogMetadata, md) - opts = append((*c.CallOptions).RestoreCryptoKeyVersion[0:len((*c.CallOptions).RestoreCryptoKeyVersion):len((*c.CallOptions).RestoreCryptoKeyVersion)], opts...) - var resp *kmspb.CryptoKeyVersion + opts = append((*c.CallOptions).AsymmetricDecrypt[0:len((*c.CallOptions).AsymmetricDecrypt):len((*c.CallOptions).AsymmetricDecrypt)], opts...) + var resp *kmspb.AsymmetricDecryptResponse err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { var err error - resp, err = c.keyManagementClient.RestoreCryptoKeyVersion(ctx, req, settings.GRPC...) + resp, err = c.keyManagementClient.AsymmetricDecrypt(ctx, req, settings.GRPC...) + return err + }, opts...) + if err != nil { + return nil, err + } + return resp, nil +} + +func (c *keyManagementGRPCClient) MacSign(ctx context.Context, req *kmspb.MacSignRequest, opts ...gax.CallOption) (*kmspb.MacSignResponse, error) { + md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) + ctx = insertMetadata(ctx, c.xGoogMetadata, md) + opts = append((*c.CallOptions).MacSign[0:len((*c.CallOptions).MacSign):len((*c.CallOptions).MacSign)], opts...) + var resp *kmspb.MacSignResponse + err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { + var err error + resp, err = c.keyManagementClient.MacSign(ctx, req, settings.GRPC...) + return err + }, opts...) + if err != nil { + return nil, err + } + return resp, nil +} + +func (c *keyManagementGRPCClient) MacVerify(ctx context.Context, req *kmspb.MacVerifyRequest, opts ...gax.CallOption) (*kmspb.MacVerifyResponse, error) { + md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "name", url.QueryEscape(req.GetName()))) + ctx = insertMetadata(ctx, c.xGoogMetadata, md) + opts = append((*c.CallOptions).MacVerify[0:len((*c.CallOptions).MacVerify):len((*c.CallOptions).MacVerify)], opts...) + var resp *kmspb.MacVerifyResponse + err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { + var err error + resp, err = c.keyManagementClient.MacVerify(ctx, req, settings.GRPC...) + return err + }, opts...) + if err != nil { + return nil, err + } + return resp, nil +} + +func (c *keyManagementGRPCClient) GenerateRandomBytes(ctx context.Context, req *kmspb.GenerateRandomBytesRequest, opts ...gax.CallOption) (*kmspb.GenerateRandomBytesResponse, error) { + md := metadata.Pairs("x-goog-request-params", fmt.Sprintf("%s=%v", "location", url.QueryEscape(req.GetLocation()))) + ctx = insertMetadata(ctx, c.xGoogMetadata, md) + opts = append((*c.CallOptions).GenerateRandomBytes[0:len((*c.CallOptions).GenerateRandomBytes):len((*c.CallOptions).GenerateRandomBytes)], opts...) + var resp *kmspb.GenerateRandomBytesResponse + err := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error { + var err error + resp, err = c.keyManagementClient.GenerateRandomBytes(ctx, req, settings.GRPC...) return err }, opts...) if err != nil { diff --git a/kms/apiv1/key_management_client_example_test.go b/kms/apiv1/key_management_client_example_test.go index 66afc315842..d5b57f8ced7 100644 --- a/kms/apiv1/key_management_client_example_test.go +++ b/kms/apiv1/key_management_client_example_test.go @@ -365,6 +365,63 @@ func ExampleKeyManagementClient_UpdateCryptoKeyVersion() { _ = resp } +func ExampleKeyManagementClient_UpdateCryptoKeyPrimaryVersion() { + ctx := context.Background() + c, err := kms.NewKeyManagementClient(ctx) + if err != nil { + // TODO: Handle error. + } + defer c.Close() + + req := &kmspb.UpdateCryptoKeyPrimaryVersionRequest{ + // TODO: Fill request struct fields. + } + resp, err := c.UpdateCryptoKeyPrimaryVersion(ctx, req) + if err != nil { + // TODO: Handle error. + } + // TODO: Use resp. + _ = resp +} + +func ExampleKeyManagementClient_DestroyCryptoKeyVersion() { + ctx := context.Background() + c, err := kms.NewKeyManagementClient(ctx) + if err != nil { + // TODO: Handle error. + } + defer c.Close() + + req := &kmspb.DestroyCryptoKeyVersionRequest{ + // TODO: Fill request struct fields. + } + resp, err := c.DestroyCryptoKeyVersion(ctx, req) + if err != nil { + // TODO: Handle error. + } + // TODO: Use resp. + _ = resp +} + +func ExampleKeyManagementClient_RestoreCryptoKeyVersion() { + ctx := context.Background() + c, err := kms.NewKeyManagementClient(ctx) + if err != nil { + // TODO: Handle error. + } + defer c.Close() + + req := &kmspb.RestoreCryptoKeyVersionRequest{ + // TODO: Fill request struct fields. + } + resp, err := c.RestoreCryptoKeyVersion(ctx, req) + if err != nil { + // TODO: Handle error. + } + // TODO: Use resp. + _ = resp +} + func ExampleKeyManagementClient_Encrypt() { ctx := context.Background() c, err := kms.NewKeyManagementClient(ctx) @@ -441,7 +498,7 @@ func ExampleKeyManagementClient_AsymmetricDecrypt() { _ = resp } -func ExampleKeyManagementClient_UpdateCryptoKeyPrimaryVersion() { +func ExampleKeyManagementClient_MacSign() { ctx := context.Background() c, err := kms.NewKeyManagementClient(ctx) if err != nil { @@ -449,10 +506,10 @@ func ExampleKeyManagementClient_UpdateCryptoKeyPrimaryVersion() { } defer c.Close() - req := &kmspb.UpdateCryptoKeyPrimaryVersionRequest{ + req := &kmspb.MacSignRequest{ // TODO: Fill request struct fields. } - resp, err := c.UpdateCryptoKeyPrimaryVersion(ctx, req) + resp, err := c.MacSign(ctx, req) if err != nil { // TODO: Handle error. } @@ -460,7 +517,7 @@ func ExampleKeyManagementClient_UpdateCryptoKeyPrimaryVersion() { _ = resp } -func ExampleKeyManagementClient_DestroyCryptoKeyVersion() { +func ExampleKeyManagementClient_MacVerify() { ctx := context.Background() c, err := kms.NewKeyManagementClient(ctx) if err != nil { @@ -468,10 +525,10 @@ func ExampleKeyManagementClient_DestroyCryptoKeyVersion() { } defer c.Close() - req := &kmspb.DestroyCryptoKeyVersionRequest{ + req := &kmspb.MacVerifyRequest{ // TODO: Fill request struct fields. } - resp, err := c.DestroyCryptoKeyVersion(ctx, req) + resp, err := c.MacVerify(ctx, req) if err != nil { // TODO: Handle error. } @@ -479,7 +536,7 @@ func ExampleKeyManagementClient_DestroyCryptoKeyVersion() { _ = resp } -func ExampleKeyManagementClient_RestoreCryptoKeyVersion() { +func ExampleKeyManagementClient_GenerateRandomBytes() { ctx := context.Background() c, err := kms.NewKeyManagementClient(ctx) if err != nil { @@ -487,10 +544,10 @@ func ExampleKeyManagementClient_RestoreCryptoKeyVersion() { } defer c.Close() - req := &kmspb.RestoreCryptoKeyVersionRequest{ + req := &kmspb.GenerateRandomBytesRequest{ // TODO: Fill request struct fields. } - resp, err := c.RestoreCryptoKeyVersion(ctx, req) + resp, err := c.GenerateRandomBytes(ctx, req) if err != nil { // TODO: Handle error. } diff --git a/networkmanagement/apiv1/doc.go b/networkmanagement/apiv1/doc.go index 724f4c2e084..d6075a7770d 100644 --- a/networkmanagement/apiv1/doc.go +++ b/networkmanagement/apiv1/doc.go @@ -51,7 +51,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/pubsub/apiv1/doc.go b/pubsub/apiv1/doc.go index 7888df06b8e..497ef990c74 100644 --- a/pubsub/apiv1/doc.go +++ b/pubsub/apiv1/doc.go @@ -49,7 +49,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/pubsub/go.mod b/pubsub/go.mod index 8d914344b0c..437b4d8081c 100644 --- a/pubsub/go.mod +++ b/pubsub/go.mod @@ -12,7 +12,7 @@ require ( golang.org/x/sync v0.0.0-20210220032951-036812b2e83c golang.org/x/time v0.0.0-20210723032227-1f47c861a9ac google.golang.org/api v0.52.0 - google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 + google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 google.golang.org/grpc v1.39.1 google.golang.org/protobuf v1.27.1 ) diff --git a/pubsub/go.sum b/pubsub/go.sum index 3a3e470f4e2..51106f0e2fb 100644 --- a/pubsub/go.sum +++ b/pubsub/go.sum @@ -478,8 +478,8 @@ google.golang.org/genproto v0.0.0-20210716133855-ce7ef5c701ea/go.mod h1:AxrInvYm google.golang.org/genproto v0.0.0-20210721163202-f1cecdd8b78a/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= google.golang.org/genproto v0.0.0-20210728212813-7823e685a01f/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67 h1:VmMSf20ssFK0+u1dscyTH9bU4/M4y+X/xNfkvD6kGtM= -google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67/go.mod h1:ob2IJxKrgPT52GcgX759i1sleT07tiKowYBGbczaW48= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216 h1:qnrhhl4uoNFepTqE28u11llFcDH07Z6r/cQxpGR97A4= +google.golang.org/genproto v0.0.0-20210811021853-ddbe55d93216/go.mod h1:cFeNkxwySK631ADgubI+/XFU/xp8FD5KIVV4rj8UC5w= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.1/go.mod h1:10oTOabMzJvdu6/UiuZezV6QK5dSlG84ov/aaiqXj38= google.golang.org/grpc v1.21.1/go.mod h1:oYelfM1adQP15Ek0mdvEgi9Df8B9CZIaU1084ijfRaM= diff --git a/speech/apiv1/doc.go b/speech/apiv1/doc.go index cbaeb429548..f39509365f1 100644 --- a/speech/apiv1/doc.go +++ b/speech/apiv1/doc.go @@ -48,7 +48,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/video/transcoder/apiv1beta1/doc.go b/video/transcoder/apiv1beta1/doc.go index 8110d5fd499..488a0c70297 100644 --- a/video/transcoder/apiv1beta1/doc.go +++ b/video/transcoder/apiv1beta1/doc.go @@ -51,7 +51,7 @@ import ( type clientHookParams struct{} type clientHook func(context.Context, clientHookParams) ([]option.ClientOption, error) -const versionClient = "20210805" +const versionClient = "20210811" func insertMetadata(ctx context.Context, mds ...metadata.MD) context.Context { out, _ := metadata.FromOutgoingContext(ctx) diff --git a/video/transcoder/apiv1beta1/transcoder_client.go b/video/transcoder/apiv1beta1/transcoder_client.go index 63efced7272..86add1afdc9 100644 --- a/video/transcoder/apiv1beta1/transcoder_client.go +++ b/video/transcoder/apiv1beta1/transcoder_client.go @@ -98,6 +98,8 @@ type internalClient interface { // Streaming over HTTP (DASH). You can also customize jobs using advanced // features such as Digital Rights Management (DRM), audio equalization, content // concatenation, and digital ad-stitch ready content generation. +// +// Deprecated: TranscoderService may be removed in a future version. type Client struct { // The internal transport-dependent client. internalClient internalClient @@ -197,6 +199,8 @@ type gRPCClient struct { // Streaming over HTTP (DASH). You can also customize jobs using advanced // features such as Digital Rights Management (DRM), audio equalization, content // concatenation, and digital ad-stitch ready content generation. +// +// Deprecated: TranscoderService may be removed in a future version. func NewClient(ctx context.Context, opts ...option.ClientOption) (*Client, error) { clientOpts := defaultGRPCClientOptions() if newClientHook != nil {