diff --git a/README.md b/README.md
index cc0ddcf8..d6c3d282 100644
--- a/README.md
+++ b/README.md
@@ -17,7 +17,7 @@ If you are using Maven with [BOM][libraries-bom], add this to your pom.xml file
EC_SIGN_P384_SHA384 = 13;
*/
EC_SIGN_P384_SHA384(13),
+ /**
+ *
+ *
+ *
+ * Algorithm representing symmetric encryption by an external key manager. + *+ * + *
EXTERNAL_SYMMETRIC_ENCRYPTION = 18;
+ */
+ EXTERNAL_SYMMETRIC_ENCRYPTION(18),
UNRECOGNIZED(-1),
;
@@ -606,6 +633,16 @@ public enum CryptoKeyVersionAlgorithm implements com.google.protobuf.ProtocolMes
* EC_SIGN_P384_SHA384 = 13;
*/
public static final int EC_SIGN_P384_SHA384_VALUE = 13;
+ /**
+ *
+ *
+ * + * Algorithm representing symmetric encryption by an external key manager. + *+ * + *
EXTERNAL_SYMMETRIC_ENCRYPTION = 18;
+ */
+ public static final int EXTERNAL_SYMMETRIC_ENCRYPTION_VALUE = 18;
public final int getNumber() {
if (this == UNRECOGNIZED) {
@@ -663,6 +700,8 @@ public static CryptoKeyVersionAlgorithm forNumber(int value) {
return EC_SIGN_P256_SHA256;
case 13:
return EC_SIGN_P384_SHA384;
+ case 18:
+ return EXTERNAL_SYMMETRIC_ENCRYPTION;
default:
return null;
}
@@ -1733,6 +1772,65 @@ public com.google.protobuf.ByteString getImportFailureReasonBytes() {
}
}
+ public static final int EXTERNAL_PROTECTION_LEVEL_OPTIONS_FIELD_NUMBER = 17;
+ private com.google.cloud.kms.v1.ExternalProtectionLevelOptions externalProtectionLevelOptions_;
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ *
+ * @return Whether the externalProtectionLevelOptions field is set.
+ */
+ public boolean hasExternalProtectionLevelOptions() {
+ return externalProtectionLevelOptions_ != null;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ *
+ * @return The externalProtectionLevelOptions.
+ */
+ public com.google.cloud.kms.v1.ExternalProtectionLevelOptions
+ getExternalProtectionLevelOptions() {
+ return externalProtectionLevelOptions_ == null
+ ? com.google.cloud.kms.v1.ExternalProtectionLevelOptions.getDefaultInstance()
+ : externalProtectionLevelOptions_;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public com.google.cloud.kms.v1.ExternalProtectionLevelOptionsOrBuilder
+ getExternalProtectionLevelOptionsOrBuilder() {
+ return getExternalProtectionLevelOptions();
+ }
+
private byte memoizedIsInitialized = -1;
@java.lang.Override
@@ -1790,6 +1888,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io
if (!getImportFailureReasonBytes().isEmpty()) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 16, importFailureReason_);
}
+ if (externalProtectionLevelOptions_ != null) {
+ output.writeMessage(17, getExternalProtectionLevelOptions());
+ }
unknownFields.writeTo(output);
}
@@ -1842,6 +1943,11 @@ public int getSerializedSize() {
if (!getImportFailureReasonBytes().isEmpty()) {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(16, importFailureReason_);
}
+ if (externalProtectionLevelOptions_ != null) {
+ size +=
+ com.google.protobuf.CodedOutputStream.computeMessageSize(
+ 17, getExternalProtectionLevelOptions());
+ }
size += unknownFields.getSerializedSize();
memoizedSize = size;
return size;
@@ -1887,6 +1993,12 @@ public boolean equals(final java.lang.Object obj) {
if (!getImportTime().equals(other.getImportTime())) return false;
}
if (!getImportFailureReason().equals(other.getImportFailureReason())) return false;
+ if (hasExternalProtectionLevelOptions() != other.hasExternalProtectionLevelOptions())
+ return false;
+ if (hasExternalProtectionLevelOptions()) {
+ if (!getExternalProtectionLevelOptions().equals(other.getExternalProtectionLevelOptions()))
+ return false;
+ }
if (!unknownFields.equals(other.unknownFields)) return false;
return true;
}
@@ -1934,6 +2046,10 @@ public int hashCode() {
}
hash = (37 * hash) + IMPORT_FAILURE_REASON_FIELD_NUMBER;
hash = (53 * hash) + getImportFailureReason().hashCode();
+ if (hasExternalProtectionLevelOptions()) {
+ hash = (37 * hash) + EXTERNAL_PROTECTION_LEVEL_OPTIONS_FIELD_NUMBER;
+ hash = (53 * hash) + getExternalProtectionLevelOptions().hashCode();
+ }
hash = (29 * hash) + unknownFields.hashCode();
memoizedHashCode = hash;
return hash;
@@ -2134,6 +2250,12 @@ public Builder clear() {
}
importFailureReason_ = "";
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ externalProtectionLevelOptions_ = null;
+ } else {
+ externalProtectionLevelOptions_ = null;
+ externalProtectionLevelOptionsBuilder_ = null;
+ }
return this;
}
@@ -2197,6 +2319,11 @@ public com.google.cloud.kms.v1.CryptoKeyVersion buildPartial() {
result.importTime_ = importTimeBuilder_.build();
}
result.importFailureReason_ = importFailureReason_;
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ result.externalProtectionLevelOptions_ = externalProtectionLevelOptions_;
+ } else {
+ result.externalProtectionLevelOptions_ = externalProtectionLevelOptionsBuilder_.build();
+ }
onBuilt();
return result;
}
@@ -2285,6 +2412,9 @@ public Builder mergeFrom(com.google.cloud.kms.v1.CryptoKeyVersion other) {
importFailureReason_ = other.importFailureReason_;
onChanged();
}
+ if (other.hasExternalProtectionLevelOptions()) {
+ mergeExternalProtectionLevelOptions(other.getExternalProtectionLevelOptions());
+ }
this.mergeUnknownFields(other.unknownFields);
onChanged();
return this;
@@ -4252,6 +4382,235 @@ public Builder setImportFailureReasonBytes(com.google.protobuf.ByteString value)
return this;
}
+ private com.google.cloud.kms.v1.ExternalProtectionLevelOptions externalProtectionLevelOptions_;
+ private com.google.protobuf.SingleFieldBuilderV3<
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions,
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions.Builder,
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptionsOrBuilder>
+ externalProtectionLevelOptionsBuilder_;
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ *
+ * @return Whether the externalProtectionLevelOptions field is set.
+ */
+ public boolean hasExternalProtectionLevelOptions() {
+ return externalProtectionLevelOptionsBuilder_ != null
+ || externalProtectionLevelOptions_ != null;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ *
+ * @return The externalProtectionLevelOptions.
+ */
+ public com.google.cloud.kms.v1.ExternalProtectionLevelOptions
+ getExternalProtectionLevelOptions() {
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ return externalProtectionLevelOptions_ == null
+ ? com.google.cloud.kms.v1.ExternalProtectionLevelOptions.getDefaultInstance()
+ : externalProtectionLevelOptions_;
+ } else {
+ return externalProtectionLevelOptionsBuilder_.getMessage();
+ }
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public Builder setExternalProtectionLevelOptions(
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions value) {
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ if (value == null) {
+ throw new NullPointerException();
+ }
+ externalProtectionLevelOptions_ = value;
+ onChanged();
+ } else {
+ externalProtectionLevelOptionsBuilder_.setMessage(value);
+ }
+
+ return this;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public Builder setExternalProtectionLevelOptions(
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions.Builder builderForValue) {
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ externalProtectionLevelOptions_ = builderForValue.build();
+ onChanged();
+ } else {
+ externalProtectionLevelOptionsBuilder_.setMessage(builderForValue.build());
+ }
+
+ return this;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public Builder mergeExternalProtectionLevelOptions(
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions value) {
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ if (externalProtectionLevelOptions_ != null) {
+ externalProtectionLevelOptions_ =
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions.newBuilder(
+ externalProtectionLevelOptions_)
+ .mergeFrom(value)
+ .buildPartial();
+ } else {
+ externalProtectionLevelOptions_ = value;
+ }
+ onChanged();
+ } else {
+ externalProtectionLevelOptionsBuilder_.mergeFrom(value);
+ }
+
+ return this;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public Builder clearExternalProtectionLevelOptions() {
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ externalProtectionLevelOptions_ = null;
+ onChanged();
+ } else {
+ externalProtectionLevelOptions_ = null;
+ externalProtectionLevelOptionsBuilder_ = null;
+ }
+
+ return this;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public com.google.cloud.kms.v1.ExternalProtectionLevelOptions.Builder
+ getExternalProtectionLevelOptionsBuilder() {
+
+ onChanged();
+ return getExternalProtectionLevelOptionsFieldBuilder().getBuilder();
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ public com.google.cloud.kms.v1.ExternalProtectionLevelOptionsOrBuilder
+ getExternalProtectionLevelOptionsOrBuilder() {
+ if (externalProtectionLevelOptionsBuilder_ != null) {
+ return externalProtectionLevelOptionsBuilder_.getMessageOrBuilder();
+ } else {
+ return externalProtectionLevelOptions_ == null
+ ? com.google.cloud.kms.v1.ExternalProtectionLevelOptions.getDefaultInstance()
+ : externalProtectionLevelOptions_;
+ }
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ private com.google.protobuf.SingleFieldBuilderV3<
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions,
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions.Builder,
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptionsOrBuilder>
+ getExternalProtectionLevelOptionsFieldBuilder() {
+ if (externalProtectionLevelOptionsBuilder_ == null) {
+ externalProtectionLevelOptionsBuilder_ =
+ new com.google.protobuf.SingleFieldBuilderV3<
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions,
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions.Builder,
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptionsOrBuilder>(
+ getExternalProtectionLevelOptions(), getParentForChildren(), isClean());
+ externalProtectionLevelOptions_ = null;
+ }
+ return externalProtectionLevelOptionsBuilder_;
+ }
+
@java.lang.Override
public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersionOrBuilder.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersionOrBuilder.java
index 2f52bbb3..7aa12401 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersionOrBuilder.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/CryptoKeyVersionOrBuilder.java
@@ -458,4 +458,52 @@ public interface CryptoKeyVersionOrBuilder
* @return The bytes for importFailureReason.
*/
com.google.protobuf.ByteString getImportFailureReasonBytes();
+
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ *
+ * @return Whether the externalProtectionLevelOptions field is set.
+ */
+ boolean hasExternalProtectionLevelOptions();
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ *
+ * @return The externalProtectionLevelOptions.
+ */
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions getExternalProtectionLevelOptions();
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + *
+ * .google.cloud.kms.v1.ExternalProtectionLevelOptions external_protection_level_options = 17;
+ *
+ */
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptionsOrBuilder
+ getExternalProtectionLevelOptionsOrBuilder();
}
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java
new file mode 100644
index 00000000..4a9da8e5
--- /dev/null
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ExternalProtectionLevelOptions.java
@@ -0,0 +1,640 @@
+/*
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * https://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+// Generated by the protocol buffer compiler. DO NOT EDIT!
+// source: google/cloud/kms/v1/resources.proto
+
+package com.google.cloud.kms.v1;
+
+/**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + * Protobuf type {@code google.cloud.kms.v1.ExternalProtectionLevelOptions} + */ +public final class ExternalProtectionLevelOptions extends com.google.protobuf.GeneratedMessageV3 + implements + // @@protoc_insertion_point(message_implements:google.cloud.kms.v1.ExternalProtectionLevelOptions) + ExternalProtectionLevelOptionsOrBuilder { + private static final long serialVersionUID = 0L; + // Use ExternalProtectionLevelOptions.newBuilder() to construct. + private ExternalProtectionLevelOptions( + com.google.protobuf.GeneratedMessageV3.Builder> builder) { + super(builder); + } + + private ExternalProtectionLevelOptions() { + externalKeyUri_ = ""; + } + + @java.lang.Override + @SuppressWarnings({"unused"}) + protected java.lang.Object newInstance(UnusedPrivateParameter unused) { + return new ExternalProtectionLevelOptions(); + } + + @java.lang.Override + public final com.google.protobuf.UnknownFieldSet getUnknownFields() { + return this.unknownFields; + } + + private ExternalProtectionLevelOptions( + com.google.protobuf.CodedInputStream input, + com.google.protobuf.ExtensionRegistryLite extensionRegistry) + throws com.google.protobuf.InvalidProtocolBufferException { + this(); + if (extensionRegistry == null) { + throw new java.lang.NullPointerException(); + } + com.google.protobuf.UnknownFieldSet.Builder unknownFields = + com.google.protobuf.UnknownFieldSet.newBuilder(); + try { + boolean done = false; + while (!done) { + int tag = input.readTag(); + switch (tag) { + case 0: + done = true; + break; + case 10: + { + java.lang.String s = input.readStringRequireUtf8(); + + externalKeyUri_ = s; + break; + } + default: + { + if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) { + done = true; + } + break; + } + } + } + } catch (com.google.protobuf.InvalidProtocolBufferException e) { + throw e.setUnfinishedMessage(this); + } catch (java.io.IOException e) { + throw new com.google.protobuf.InvalidProtocolBufferException(e).setUnfinishedMessage(this); + } finally { + this.unknownFields = unknownFields.build(); + makeExtensionsImmutable(); + } + } + + public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() { + return com.google.cloud.kms.v1.KmsResourcesProto + .internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_descriptor; + } + + @java.lang.Override + protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable + internalGetFieldAccessorTable() { + return com.google.cloud.kms.v1.KmsResourcesProto + .internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_fieldAccessorTable + .ensureFieldAccessorsInitialized( + com.google.cloud.kms.v1.ExternalProtectionLevelOptions.class, + com.google.cloud.kms.v1.ExternalProtectionLevelOptions.Builder.class); + } + + public static final int EXTERNAL_KEY_URI_FIELD_NUMBER = 1; + private volatile java.lang.Object externalKeyUri_; + /** + * + * + *
+ * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return The externalKeyUri.
+ */
+ public java.lang.String getExternalKeyUri() {
+ java.lang.Object ref = externalKeyUri_;
+ if (ref instanceof java.lang.String) {
+ return (java.lang.String) ref;
+ } else {
+ com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
+ java.lang.String s = bs.toStringUtf8();
+ externalKeyUri_ = s;
+ return s;
+ }
+ }
+ /**
+ *
+ *
+ * + * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return The bytes for externalKeyUri.
+ */
+ public com.google.protobuf.ByteString getExternalKeyUriBytes() {
+ java.lang.Object ref = externalKeyUri_;
+ if (ref instanceof java.lang.String) {
+ com.google.protobuf.ByteString b =
+ com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
+ externalKeyUri_ = b;
+ return b;
+ } else {
+ return (com.google.protobuf.ByteString) ref;
+ }
+ }
+
+ private byte memoizedIsInitialized = -1;
+
+ @java.lang.Override
+ public final boolean isInitialized() {
+ byte isInitialized = memoizedIsInitialized;
+ if (isInitialized == 1) return true;
+ if (isInitialized == 0) return false;
+
+ memoizedIsInitialized = 1;
+ return true;
+ }
+
+ @java.lang.Override
+ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
+ if (!getExternalKeyUriBytes().isEmpty()) {
+ com.google.protobuf.GeneratedMessageV3.writeString(output, 1, externalKeyUri_);
+ }
+ unknownFields.writeTo(output);
+ }
+
+ @java.lang.Override
+ public int getSerializedSize() {
+ int size = memoizedSize;
+ if (size != -1) return size;
+
+ size = 0;
+ if (!getExternalKeyUriBytes().isEmpty()) {
+ size += com.google.protobuf.GeneratedMessageV3.computeStringSize(1, externalKeyUri_);
+ }
+ size += unknownFields.getSerializedSize();
+ memoizedSize = size;
+ return size;
+ }
+
+ @java.lang.Override
+ public boolean equals(final java.lang.Object obj) {
+ if (obj == this) {
+ return true;
+ }
+ if (!(obj instanceof com.google.cloud.kms.v1.ExternalProtectionLevelOptions)) {
+ return super.equals(obj);
+ }
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions other =
+ (com.google.cloud.kms.v1.ExternalProtectionLevelOptions) obj;
+
+ if (!getExternalKeyUri().equals(other.getExternalKeyUri())) return false;
+ if (!unknownFields.equals(other.unknownFields)) return false;
+ return true;
+ }
+
+ @java.lang.Override
+ public int hashCode() {
+ if (memoizedHashCode != 0) {
+ return memoizedHashCode;
+ }
+ int hash = 41;
+ hash = (19 * hash) + getDescriptor().hashCode();
+ hash = (37 * hash) + EXTERNAL_KEY_URI_FIELD_NUMBER;
+ hash = (53 * hash) + getExternalKeyUri().hashCode();
+ hash = (29 * hash) + unknownFields.hashCode();
+ memoizedHashCode = hash;
+ return hash;
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data, extensionRegistry);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ com.google.protobuf.ByteString data)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ com.google.protobuf.ByteString data,
+ com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data, extensionRegistry);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(byte[] data)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data, extensionRegistry);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ java.io.InputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
+ PARSER, input, extensionRegistry);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseDelimitedFrom(
+ java.io.InputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseDelimitedFrom(
+ java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
+ PARSER, input, extensionRegistry);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ com.google.protobuf.CodedInputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions parseFrom(
+ com.google.protobuf.CodedInputStream input,
+ com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
+ PARSER, input, extensionRegistry);
+ }
+
+ @java.lang.Override
+ public Builder newBuilderForType() {
+ return newBuilder();
+ }
+
+ public static Builder newBuilder() {
+ return DEFAULT_INSTANCE.toBuilder();
+ }
+
+ public static Builder newBuilder(
+ com.google.cloud.kms.v1.ExternalProtectionLevelOptions prototype) {
+ return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
+ }
+
+ @java.lang.Override
+ public Builder toBuilder() {
+ return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
+ }
+
+ @java.lang.Override
+ protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
+ Builder builder = new Builder(parent);
+ return builder;
+ }
+ /**
+ *
+ *
+ * + * ExternalProtectionLevelOptions stores a group of additional fields for + * configuring a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] that are specific to the + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] protection level. + *+ * + * Protobuf type {@code google.cloud.kms.v1.ExternalProtectionLevelOptions} + */ + public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder
+ * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return The externalKeyUri.
+ */
+ public java.lang.String getExternalKeyUri() {
+ java.lang.Object ref = externalKeyUri_;
+ if (!(ref instanceof java.lang.String)) {
+ com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
+ java.lang.String s = bs.toStringUtf8();
+ externalKeyUri_ = s;
+ return s;
+ } else {
+ return (java.lang.String) ref;
+ }
+ }
+ /**
+ *
+ *
+ * + * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return The bytes for externalKeyUri.
+ */
+ public com.google.protobuf.ByteString getExternalKeyUriBytes() {
+ java.lang.Object ref = externalKeyUri_;
+ if (ref instanceof String) {
+ com.google.protobuf.ByteString b =
+ com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
+ externalKeyUri_ = b;
+ return b;
+ } else {
+ return (com.google.protobuf.ByteString) ref;
+ }
+ }
+ /**
+ *
+ *
+ * + * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @param value The externalKeyUri to set.
+ * @return This builder for chaining.
+ */
+ public Builder setExternalKeyUri(java.lang.String value) {
+ if (value == null) {
+ throw new NullPointerException();
+ }
+
+ externalKeyUri_ = value;
+ onChanged();
+ return this;
+ }
+ /**
+ *
+ *
+ * + * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return This builder for chaining.
+ */
+ public Builder clearExternalKeyUri() {
+
+ externalKeyUri_ = getDefaultInstance().getExternalKeyUri();
+ onChanged();
+ return this;
+ }
+ /**
+ *
+ *
+ * + * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @param value The bytes for externalKeyUri to set.
+ * @return This builder for chaining.
+ */
+ public Builder setExternalKeyUriBytes(com.google.protobuf.ByteString value) {
+ if (value == null) {
+ throw new NullPointerException();
+ }
+ checkByteStringIsUtf8(value);
+
+ externalKeyUri_ = value;
+ onChanged();
+ return this;
+ }
+
+ @java.lang.Override
+ public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
+ return super.setUnknownFields(unknownFields);
+ }
+
+ @java.lang.Override
+ public final Builder mergeUnknownFields(
+ final com.google.protobuf.UnknownFieldSet unknownFields) {
+ return super.mergeUnknownFields(unknownFields);
+ }
+
+ // @@protoc_insertion_point(builder_scope:google.cloud.kms.v1.ExternalProtectionLevelOptions)
+ }
+
+ // @@protoc_insertion_point(class_scope:google.cloud.kms.v1.ExternalProtectionLevelOptions)
+ private static final com.google.cloud.kms.v1.ExternalProtectionLevelOptions DEFAULT_INSTANCE;
+
+ static {
+ DEFAULT_INSTANCE = new com.google.cloud.kms.v1.ExternalProtectionLevelOptions();
+ }
+
+ public static com.google.cloud.kms.v1.ExternalProtectionLevelOptions getDefaultInstance() {
+ return DEFAULT_INSTANCE;
+ }
+
+ private static final com.google.protobuf.Parser+ * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return The externalKeyUri.
+ */
+ java.lang.String getExternalKeyUri();
+ /**
+ *
+ *
+ * + * The URI for an external resource that this [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] represents. + *+ * + *
string external_key_uri = 1;
+ *
+ * @return The bytes for externalKeyUri.
+ */
+ com.google.protobuf.ByteString getExternalKeyUriBytes();
+}
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java
index 47e67c56..ecea61f1 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsProto.java
@@ -278,133 +278,134 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "\001(\tB0\340A\002\372A*\n(cloudkms.googleapis.com/Cry"
+ "ptoKeyVersion\"H\n\006Digest\022\020\n\006sha256\030\001 \001(\014H"
+ "\000\022\020\n\006sha384\030\002 \001(\014H\000\022\020\n\006sha512\030\003 \001(\014H\000B\010\n"
- + "\006digest\")\n\020LocationMetadata\022\025\n\rhsm_avail"
- + "able\030\001 \001(\0102\206&\n\024KeyManagementService\022\242\001\n\014"
- + "ListKeyRings\022(.google.cloud.kms.v1.ListK"
- + "eyRingsRequest\032).google.cloud.kms.v1.Lis"
- + "tKeyRingsResponse\"=\202\323\344\223\002.\022,/v1/{parent=p"
- + "rojects/*/locations/*}/keyRings\332A\006parent"
- + "\022\265\001\n\016ListCryptoKeys\022*.google.cloud.kms.v"
- + "1.ListCryptoKeysRequest\032+.google.cloud.k"
- + "ms.v1.ListCryptoKeysResponse\"J\202\323\344\223\002;\0229/v"
- + "1/{parent=projects/*/locations/*/keyRing"
- + "s/*}/cryptoKeys\332A\006parent\022\336\001\n\025ListCryptoK"
- + "eyVersions\0221.google.cloud.kms.v1.ListCry"
- + "ptoKeyVersionsRequest\0322.google.cloud.kms"
- + ".v1.ListCryptoKeyVersionsResponse\"^\202\323\344\223\002"
- + "O\022M/v1/{parent=projects/*/locations/*/ke"
- + "yRings/*/cryptoKeys/*}/cryptoKeyVersions"
- + "\332A\006parent\022\265\001\n\016ListImportJobs\022*.google.cl"
- + "oud.kms.v1.ListImportJobsRequest\032+.googl"
- + "e.cloud.kms.v1.ListImportJobsResponse\"J\202"
- + "\323\344\223\002;\0229/v1/{parent=projects/*/locations/"
- + "*/keyRings/*}/importJobs\332A\006parent\022\217\001\n\nGe"
- + "tKeyRing\022&.google.cloud.kms.v1.GetKeyRin"
- + "gRequest\032\034.google.cloud.kms.v1.KeyRing\";"
- + "\202\323\344\223\002.\022,/v1/{name=projects/*/locations/*"
- + "/keyRings/*}\332A\004name\022\242\001\n\014GetCryptoKey\022(.g"
- + "oogle.cloud.kms.v1.GetCryptoKeyRequest\032\036"
- + ".google.cloud.kms.v1.CryptoKey\"H\202\323\344\223\002;\0229"
- + "/v1/{name=projects/*/locations/*/keyRing"
- + "s/*/cryptoKeys/*}\332A\004name\022\313\001\n\023GetCryptoKe"
- + "yVersion\022/.google.cloud.kms.v1.GetCrypto"
- + "KeyVersionRequest\032%.google.cloud.kms.v1."
- + "CryptoKeyVersion\"\\\202\323\344\223\002O\022M/v1/{name=proj"
- + "ects/*/locations/*/keyRings/*/cryptoKeys"
- + "/*/cryptoKeyVersions/*}\332A\004name\022\300\001\n\014GetPu"
- + "blicKey\022(.google.cloud.kms.v1.GetPublicK"
- + "eyRequest\032\036.google.cloud.kms.v1.PublicKe"
- + "y\"f\202\323\344\223\002Y\022W/v1/{name=projects/*/location"
- + "s/*/keyRings/*/cryptoKeys/*/cryptoKeyVer"
- + "sions/*}/publicKey\332A\004name\022\242\001\n\014GetImportJ"
- + "ob\022(.google.cloud.kms.v1.GetImportJobReq"
- + "uest\032\036.google.cloud.kms.v1.ImportJob\"H\202\323"
- + "\344\223\002;\0229/v1/{name=projects/*/locations/*/k"
- + "eyRings/*/importJobs/*}\332A\004name\022\266\001\n\rCreat"
- + "eKeyRing\022).google.cloud.kms.v1.CreateKey"
- + "RingRequest\032\034.google.cloud.kms.v1.KeyRin"
- + "g\"\\\202\323\344\223\0028\",/v1/{parent=projects/*/locati"
- + "ons/*}/keyRings:\010key_ring\332A\033parent,key_r"
- + "ing_id,key_ring\022\317\001\n\017CreateCryptoKey\022+.go"
- + "ogle.cloud.kms.v1.CreateCryptoKeyRequest"
- + "\032\036.google.cloud.kms.v1.CryptoKey\"o\202\323\344\223\002G"
- + "\"9/v1/{parent=projects/*/locations/*/key"
- + "Rings/*}/cryptoKeys:\ncrypto_key\332A\037parent"
- + ",crypto_key_id,crypto_key\022\373\001\n\026CreateCryp"
- + "toKeyVersion\0222.google.cloud.kms.v1.Creat"
- + "eCryptoKeyVersionRequest\032%.google.cloud."
- + "kms.v1.CryptoKeyVersion\"\205\001\202\323\344\223\002c\"M/v1/{p"
- + "arent=projects/*/locations/*/keyRings/*/"
- + "cryptoKeys/*}/cryptoKeyVersions:\022crypto_"
- + "key_version\332A\031parent,crypto_key_version\022"
- + "\324\001\n\026ImportCryptoKeyVersion\0222.google.clou"
- + "d.kms.v1.ImportCryptoKeyVersionRequest\032%"
- + ".google.cloud.kms.v1.CryptoKeyVersion\"_\202"
- + "\323\344\223\002Y\"T/v1/{parent=projects/*/locations/"
- + "*/keyRings/*/cryptoKeys/*}/cryptoKeyVers"
- + "ions:import:\001*\022\317\001\n\017CreateImportJob\022+.goo"
- + "gle.cloud.kms.v1.CreateImportJobRequest\032"
- + "\036.google.cloud.kms.v1.ImportJob\"o\202\323\344\223\002G\""
- + "9/v1/{parent=projects/*/locations/*/keyR"
- + "ings/*}/importJobs:\nimport_job\332A\037parent,"
- + "import_job_id,import_job\022\321\001\n\017UpdateCrypt"
- + "oKey\022+.google.cloud.kms.v1.UpdateCryptoK"
- + "eyRequest\032\036.google.cloud.kms.v1.CryptoKe"
- + "y\"q\202\323\344\223\002R2D/v1/{crypto_key.name=projects"
- + "/*/locations/*/keyRings/*/cryptoKeys/*}:"
- + "\ncrypto_key\332A\026crypto_key,update_mask\022\223\002\n"
- + "\026UpdateCryptoKeyVersion\0222.google.cloud.k"
- + "ms.v1.UpdateCryptoKeyVersionRequest\032%.go"
- + "ogle.cloud.kms.v1.CryptoKeyVersion\"\235\001\202\323\344"
- + "\223\002v2`/v1/{crypto_key_version.name=projec"
- + "ts/*/locations/*/keyRings/*/cryptoKeys/*"
- + "/cryptoKeyVersions/*}:\022crypto_key_versio"
- + "n\332A\036crypto_key_version,update_mask\022\264\001\n\007E"
- + "ncrypt\022#.google.cloud.kms.v1.EncryptRequ"
- + "est\032$.google.cloud.kms.v1.EncryptRespons"
- + "e\"^\202\323\344\223\002G\"B/v1/{name=projects/*/location"
- + "s/*/keyRings/*/cryptoKeys/**}:encrypt:\001*"
- + "\332A\016name,plaintext\022\264\001\n\007Decrypt\022#.google.c"
- + "loud.kms.v1.DecryptRequest\032$.google.clou"
- + "d.kms.v1.DecryptResponse\"^\202\323\344\223\002F\"A/v1/{n"
+ + "\006digest\"@\n\020LocationMetadata\022\025\n\rhsm_avail"
+ + "able\030\001 \001(\010\022\025\n\rekm_available\030\002 \001(\0102\206&\n\024Ke"
+ + "yManagementService\022\242\001\n\014ListKeyRings\022(.go"
+ + "ogle.cloud.kms.v1.ListKeyRingsRequest\032)."
+ + "google.cloud.kms.v1.ListKeyRingsResponse"
+ + "\"=\202\323\344\223\002.\022,/v1/{parent=projects/*/locatio"
+ + "ns/*}/keyRings\332A\006parent\022\265\001\n\016ListCryptoKe"
+ + "ys\022*.google.cloud.kms.v1.ListCryptoKeysR"
+ + "equest\032+.google.cloud.kms.v1.ListCryptoK"
+ + "eysResponse\"J\202\323\344\223\002;\0229/v1/{parent=project"
+ + "s/*/locations/*/keyRings/*}/cryptoKeys\332A"
+ + "\006parent\022\336\001\n\025ListCryptoKeyVersions\0221.goog"
+ + "le.cloud.kms.v1.ListCryptoKeyVersionsReq"
+ + "uest\0322.google.cloud.kms.v1.ListCryptoKey"
+ + "VersionsResponse\"^\202\323\344\223\002O\022M/v1/{parent=pr"
+ + "ojects/*/locations/*/keyRings/*/cryptoKe"
+ + "ys/*}/cryptoKeyVersions\332A\006parent\022\265\001\n\016Lis"
+ + "tImportJobs\022*.google.cloud.kms.v1.ListIm"
+ + "portJobsRequest\032+.google.cloud.kms.v1.Li"
+ + "stImportJobsResponse\"J\202\323\344\223\002;\0229/v1/{paren"
+ + "t=projects/*/locations/*/keyRings/*}/imp"
+ + "ortJobs\332A\006parent\022\217\001\n\nGetKeyRing\022&.google"
+ + ".cloud.kms.v1.GetKeyRingRequest\032\034.google"
+ + ".cloud.kms.v1.KeyRing\";\202\323\344\223\002.\022,/v1/{name"
+ + "=projects/*/locations/*/keyRings/*}\332A\004na"
+ + "me\022\242\001\n\014GetCryptoKey\022(.google.cloud.kms.v"
+ + "1.GetCryptoKeyRequest\032\036.google.cloud.kms"
+ + ".v1.CryptoKey\"H\202\323\344\223\002;\0229/v1/{name=project"
+ + "s/*/locations/*/keyRings/*/cryptoKeys/*}"
+ + "\332A\004name\022\313\001\n\023GetCryptoKeyVersion\022/.google"
+ + ".cloud.kms.v1.GetCryptoKeyVersionRequest"
+ + "\032%.google.cloud.kms.v1.CryptoKeyVersion\""
+ + "\\\202\323\344\223\002O\022M/v1/{name=projects/*/locations/"
+ + "*/keyRings/*/cryptoKeys/*/cryptoKeyVersi"
+ + "ons/*}\332A\004name\022\300\001\n\014GetPublicKey\022(.google."
+ + "cloud.kms.v1.GetPublicKeyRequest\032\036.googl"
+ + "e.cloud.kms.v1.PublicKey\"f\202\323\344\223\002Y\022W/v1/{n"
+ "ame=projects/*/locations/*/keyRings/*/cr"
- + "yptoKeys/*}:decrypt:\001*\332A\017name,ciphertext"
- + "\022\340\001\n\016AsymmetricSign\022*.google.cloud.kms.v"
- + "1.AsymmetricSignRequest\032+.google.cloud.k"
- + "ms.v1.AsymmetricSignResponse\"u\202\323\344\223\002a\"\\/v"
- + "1/{name=projects/*/locations/*/keyRings/"
- + "*/cryptoKeys/*/cryptoKeyVersions/*}:asym"
- + "metricSign:\001*\332A\013name,digest\022\360\001\n\021Asymmetr"
- + "icDecrypt\022-.google.cloud.kms.v1.Asymmetr"
- + "icDecryptRequest\032..google.cloud.kms.v1.A"
- + "symmetricDecryptResponse\"|\202\323\344\223\002d\"_/v1/{n"
- + "ame=projects/*/locations/*/keyRings/*/cr"
- + "yptoKeys/*/cryptoKeyVersions/*}:asymmetr"
- + "icDecrypt:\001*\332A\017name,ciphertext\022\362\001\n\035Updat"
- + "eCryptoKeyPrimaryVersion\0229.google.cloud."
- + "kms.v1.UpdateCryptoKeyPrimaryVersionRequ"
- + "est\032\036.google.cloud.kms.v1.CryptoKey\"v\202\323\344"
- + "\223\002S\"N/v1/{name=projects/*/locations/*/ke"
- + "yRings/*/cryptoKeys/*}:updatePrimaryVers"
- + "ion:\001*\332A\032name,crypto_key_version_id\022\336\001\n\027"
- + "DestroyCryptoKeyVersion\0223.google.cloud.k"
- + "ms.v1.DestroyCryptoKeyVersionRequest\032%.g"
- + "oogle.cloud.kms.v1.CryptoKeyVersion\"g\202\323\344"
- + "\223\002Z\"U/v1/{name=projects/*/locations/*/ke"
- + "yRings/*/cryptoKeys/*/cryptoKeyVersions/"
- + "*}:destroy:\001*\332A\004name\022\336\001\n\027RestoreCryptoKe"
- + "yVersion\0223.google.cloud.kms.v1.RestoreCr"
+ + "yptoKeys/*/cryptoKeyVersions/*}/publicKe"
+ + "y\332A\004name\022\242\001\n\014GetImportJob\022(.google.cloud"
+ + ".kms.v1.GetImportJobRequest\032\036.google.clo"
+ + "ud.kms.v1.ImportJob\"H\202\323\344\223\002;\0229/v1/{name=p"
+ + "rojects/*/locations/*/keyRings/*/importJ"
+ + "obs/*}\332A\004name\022\266\001\n\rCreateKeyRing\022).google"
+ + ".cloud.kms.v1.CreateKeyRingRequest\032\034.goo"
+ + "gle.cloud.kms.v1.KeyRing\"\\\202\323\344\223\0028\",/v1/{p"
+ + "arent=projects/*/locations/*}/keyRings:\010"
+ + "key_ring\332A\033parent,key_ring_id,key_ring\022\317"
+ + "\001\n\017CreateCryptoKey\022+.google.cloud.kms.v1"
+ + ".CreateCryptoKeyRequest\032\036.google.cloud.k"
+ + "ms.v1.CryptoKey\"o\202\323\344\223\002G\"9/v1/{parent=pro"
+ + "jects/*/locations/*/keyRings/*}/cryptoKe"
+ + "ys:\ncrypto_key\332A\037parent,crypto_key_id,cr"
+ + "ypto_key\022\373\001\n\026CreateCryptoKeyVersion\0222.go"
+ + "ogle.cloud.kms.v1.CreateCryptoKeyVersion"
+ + "Request\032%.google.cloud.kms.v1.CryptoKeyV"
+ + "ersion\"\205\001\202\323\344\223\002c\"M/v1/{parent=projects/*/"
+ + "locations/*/keyRings/*/cryptoKeys/*}/cry"
+ + "ptoKeyVersions:\022crypto_key_version\332A\031par"
+ + "ent,crypto_key_version\022\324\001\n\026ImportCryptoK"
+ + "eyVersion\0222.google.cloud.kms.v1.ImportCr"
+ "yptoKeyVersionRequest\032%.google.cloud.kms"
- + ".v1.CryptoKeyVersion\"g\202\323\344\223\002Z\"U/v1/{name="
- + "projects/*/locations/*/keyRings/*/crypto"
- + "Keys/*/cryptoKeyVersions/*}:restore:\001*\332A"
- + "\004name\032t\312A\027cloudkms.googleapis.com\322AWhttp"
- + "s://www.googleapis.com/auth/cloud-platfo"
- + "rm,https://www.googleapis.com/auth/cloud"
- + "kmsB\214\001\n\027com.google.cloud.kms.v1B\010KmsProt"
- + "oP\001Z6google.golang.org/genproto/googleap"
- + "is/cloud/kms/v1;kms\370\001\001\252\002\023Google.Cloud.Km"
- + "s.V1\312\002\023Google\\Cloud\\Kms\\V1b\006proto3"
+ + ".v1.CryptoKeyVersion\"_\202\323\344\223\002Y\"T/v1/{paren"
+ + "t=projects/*/locations/*/keyRings/*/cryp"
+ + "toKeys/*}/cryptoKeyVersions:import:\001*\022\317\001"
+ + "\n\017CreateImportJob\022+.google.cloud.kms.v1."
+ + "CreateImportJobRequest\032\036.google.cloud.km"
+ + "s.v1.ImportJob\"o\202\323\344\223\002G\"9/v1/{parent=proj"
+ + "ects/*/locations/*/keyRings/*}/importJob"
+ + "s:\nimport_job\332A\037parent,import_job_id,imp"
+ + "ort_job\022\321\001\n\017UpdateCryptoKey\022+.google.clo"
+ + "ud.kms.v1.UpdateCryptoKeyRequest\032\036.googl"
+ + "e.cloud.kms.v1.CryptoKey\"q\202\323\344\223\002R2D/v1/{c"
+ + "rypto_key.name=projects/*/locations/*/ke"
+ + "yRings/*/cryptoKeys/*}:\ncrypto_key\332A\026cry"
+ + "pto_key,update_mask\022\223\002\n\026UpdateCryptoKeyV"
+ + "ersion\0222.google.cloud.kms.v1.UpdateCrypt"
+ + "oKeyVersionRequest\032%.google.cloud.kms.v1"
+ + ".CryptoKeyVersion\"\235\001\202\323\344\223\002v2`/v1/{crypto_"
+ + "key_version.name=projects/*/locations/*/"
+ + "keyRings/*/cryptoKeys/*/cryptoKeyVersion"
+ + "s/*}:\022crypto_key_version\332A\036crypto_key_ve"
+ + "rsion,update_mask\022\264\001\n\007Encrypt\022#.google.c"
+ + "loud.kms.v1.EncryptRequest\032$.google.clou"
+ + "d.kms.v1.EncryptResponse\"^\202\323\344\223\002G\"B/v1/{n"
+ + "ame=projects/*/locations/*/keyRings/*/cr"
+ + "yptoKeys/**}:encrypt:\001*\332A\016name,plaintext"
+ + "\022\264\001\n\007Decrypt\022#.google.cloud.kms.v1.Decry"
+ + "ptRequest\032$.google.cloud.kms.v1.DecryptR"
+ + "esponse\"^\202\323\344\223\002F\"A/v1/{name=projects/*/lo"
+ + "cations/*/keyRings/*/cryptoKeys/*}:decry"
+ + "pt:\001*\332A\017name,ciphertext\022\340\001\n\016AsymmetricSi"
+ + "gn\022*.google.cloud.kms.v1.AsymmetricSignR"
+ + "equest\032+.google.cloud.kms.v1.AsymmetricS"
+ + "ignResponse\"u\202\323\344\223\002a\"\\/v1/{name=projects/"
+ + "*/locations/*/keyRings/*/cryptoKeys/*/cr"
+ + "yptoKeyVersions/*}:asymmetricSign:\001*\332A\013n"
+ + "ame,digest\022\360\001\n\021AsymmetricDecrypt\022-.googl"
+ + "e.cloud.kms.v1.AsymmetricDecryptRequest\032"
+ + "..google.cloud.kms.v1.AsymmetricDecryptR"
+ + "esponse\"|\202\323\344\223\002d\"_/v1/{name=projects/*/lo"
+ + "cations/*/keyRings/*/cryptoKeys/*/crypto"
+ + "KeyVersions/*}:asymmetricDecrypt:\001*\332A\017na"
+ + "me,ciphertext\022\362\001\n\035UpdateCryptoKeyPrimary"
+ + "Version\0229.google.cloud.kms.v1.UpdateCryp"
+ + "toKeyPrimaryVersionRequest\032\036.google.clou"
+ + "d.kms.v1.CryptoKey\"v\202\323\344\223\002S\"N/v1/{name=pr"
+ + "ojects/*/locations/*/keyRings/*/cryptoKe"
+ + "ys/*}:updatePrimaryVersion:\001*\332A\032name,cry"
+ + "pto_key_version_id\022\336\001\n\027DestroyCryptoKeyV"
+ + "ersion\0223.google.cloud.kms.v1.DestroyCryp"
+ + "toKeyVersionRequest\032%.google.cloud.kms.v"
+ + "1.CryptoKeyVersion\"g\202\323\344\223\002Z\"U/v1/{name=pr"
+ + "ojects/*/locations/*/keyRings/*/cryptoKe"
+ + "ys/*/cryptoKeyVersions/*}:destroy:\001*\332A\004n"
+ + "ame\022\336\001\n\027RestoreCryptoKeyVersion\0223.google"
+ + ".cloud.kms.v1.RestoreCryptoKeyVersionReq"
+ + "uest\032%.google.cloud.kms.v1.CryptoKeyVers"
+ + "ion\"g\202\323\344\223\002Z\"U/v1/{name=projects/*/locati"
+ + "ons/*/keyRings/*/cryptoKeys/*/cryptoKeyV"
+ + "ersions/*}:restore:\001*\332A\004name\032t\312A\027cloudkm"
+ + "s.googleapis.com\322AWhttps://www.googleapi"
+ + "s.com/auth/cloud-platform,https://www.go"
+ + "ogleapis.com/auth/cloudkmsB\214\001\n\027com.googl"
+ + "e.cloud.kms.v1B\010KmsProtoP\001Z6google.golan"
+ + "g.org/genproto/googleapis/cloud/kms/v1;k"
+ + "ms\370\001\001\252\002\023Google.Cloud.Kms.V1\312\002\023Google\\Clo"
+ + "ud\\Kms\\V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
@@ -679,7 +680,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_kms_v1_LocationMetadata_descriptor,
new java.lang.String[] {
- "HsmAvailable",
+ "HsmAvailable", "EkmAvailable",
});
com.google.protobuf.ExtensionRegistry registry =
com.google.protobuf.ExtensionRegistry.newInstance();
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java
index 366d662d..e2a04a1c 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KmsResourcesProto.java
@@ -63,6 +63,10 @@ public static void registerAllExtensions(com.google.protobuf.ExtensionRegistry r
internal_static_google_cloud_kms_v1_ImportJob_WrappingPublicKey_descriptor;
static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internal_static_google_cloud_kms_v1_ImportJob_WrappingPublicKey_fieldAccessorTable;
+ static final com.google.protobuf.Descriptors.Descriptor
+ internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_descriptor;
+ static final com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
+ internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_fieldAccessorTable;
public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
return descriptor;
@@ -73,11 +77,11 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
static {
java.lang.String[] descriptorData = {
"\n#google/cloud/kms/v1/resources.proto\022\023g"
- + "oogle.cloud.kms.v1\032\034google/api/annotatio"
- + "ns.proto\032\037google/api/field_behavior.prot"
- + "o\032\031google/api/resource.proto\032\036google/pro"
- + "tobuf/duration.proto\032\037google/protobuf/ti"
- + "mestamp.proto\"\265\001\n\007KeyRing\022\021\n\004name\030\001 \001(\tB"
+ + "oogle.cloud.kms.v1\032\037google/api/field_beh"
+ + "avior.proto\032\031google/api/resource.proto\032\036"
+ + "google/protobuf/duration.proto\032\037google/p"
+ + "rotobuf/timestamp.proto\032\034google/api/anno"
+ + "tations.proto\"\265\001\n\007KeyRing\022\021\n\004name\030\001 \001(\tB"
+ "\003\340A\003\0224\n\013create_time\030\002 \001(\0132\032.google.proto"
+ "buf.TimestampB\003\340A\003:a\352A^\n\037cloudkms.google"
+ "apis.com/KeyRing\022;projects/{project}/loc"
@@ -112,7 +116,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "\030\005 \001(\014B\003\340A\003\"k\n\021AttestationFormat\022\"\n\036ATTE"
+ "STATION_FORMAT_UNSPECIFIED\020\000\022\030\n\024CAVIUM_V"
+ "1_COMPRESSED\020\003\022\030\n\024CAVIUM_V2_COMPRESSED\020\004"
- + "\"\207\r\n\020CryptoKeyVersion\022\021\n\004name\030\001 \001(\tB\003\340A\003"
+ + "\"\212\016\n\020CryptoKeyVersion\022\021\n\004name\030\001 \001(\tB\003\340A\003"
+ "\022J\n\005state\030\003 \001(\0162;.google.cloud.kms.v1.Cr"
+ "yptoKeyVersion.CryptoKeyVersionState\022C\n\020"
+ "protection_level\030\007 \001(\0162$.google.cloud.km"
@@ -129,75 +133,84 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "mestampB\003\340A\003\022\027\n\nimport_job\030\016 \001(\tB\003\340A\003\0224\n"
+ "\013import_time\030\017 \001(\0132\032.google.protobuf.Tim"
+ "estampB\003\340A\003\022\"\n\025import_failure_reason\030\020 \001"
- + "(\tB\003\340A\003\"\234\004\n\031CryptoKeyVersionAlgorithm\022,\n"
- + "(CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIE"
- + "D\020\000\022\037\n\033GOOGLE_SYMMETRIC_ENCRYPTION\020\001\022\034\n\030"
- + "RSA_SIGN_PSS_2048_SHA256\020\002\022\034\n\030RSA_SIGN_P"
- + "SS_3072_SHA256\020\003\022\034\n\030RSA_SIGN_PSS_4096_SH"
- + "A256\020\004\022\034\n\030RSA_SIGN_PSS_4096_SHA512\020\017\022\036\n\032"
- + "RSA_SIGN_PKCS1_2048_SHA256\020\005\022\036\n\032RSA_SIGN"
- + "_PKCS1_3072_SHA256\020\006\022\036\n\032RSA_SIGN_PKCS1_4"
- + "096_SHA256\020\007\022\036\n\032RSA_SIGN_PKCS1_4096_SHA5"
- + "12\020\020\022 \n\034RSA_DECRYPT_OAEP_2048_SHA256\020\010\022 "
- + "\n\034RSA_DECRYPT_OAEP_3072_SHA256\020\t\022 \n\034RSA_"
- + "DECRYPT_OAEP_4096_SHA256\020\n\022 \n\034RSA_DECRYP"
- + "T_OAEP_4096_SHA512\020\021\022\027\n\023EC_SIGN_P256_SHA"
- + "256\020\014\022\027\n\023EC_SIGN_P384_SHA384\020\r\"\301\001\n\025Crypt"
- + "oKeyVersionState\022(\n$CRYPTO_KEY_VERSION_S"
- + "TATE_UNSPECIFIED\020\000\022\026\n\022PENDING_GENERATION"
- + "\020\005\022\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r\n\tDESTROY"
- + "ED\020\003\022\025\n\021DESTROY_SCHEDULED\020\004\022\022\n\016PENDING_I"
- + "MPORT\020\006\022\021\n\rIMPORT_FAILED\020\007\"I\n\024CryptoKeyV"
- + "ersionView\022\'\n#CRYPTO_KEY_VERSION_VIEW_UN"
- + "SPECIFIED\020\000\022\010\n\004FULL\020\001:\252\001\352A\246\001\n(cloudkms.g"
- + "oogleapis.com/CryptoKeyVersion\022zprojects"
- + "/{project}/locations/{location}/keyRings"
- + "/{key_ring}/cryptoKeys/{crypto_key}/cryp"
- + "toKeyVersions/{crypto_key_version}\"l\n\tPu"
- + "blicKey\022\013\n\003pem\030\001 \001(\t\022R\n\talgorithm\030\002 \001(\0162"
- + "?.google.cloud.kms.v1.CryptoKeyVersion.C"
- + "ryptoKeyVersionAlgorithm\"\333\007\n\tImportJob\022\021"
- + "\n\004name\030\001 \001(\tB\003\340A\003\022J\n\rimport_method\030\002 \001(\016"
- + "2+.google.cloud.kms.v1.ImportJob.ImportM"
- + "ethodB\006\340A\002\340A\005\022F\n\020protection_level\030\t \001(\0162"
- + "$.google.cloud.kms.v1.ProtectionLevelB\006\340"
- + "A\002\340A\005\0224\n\013create_time\030\003 \001(\0132\032.google.prot"
- + "obuf.TimestampB\003\340A\003\0226\n\rgenerate_time\030\004 \001"
- + "(\0132\032.google.protobuf.TimestampB\003\340A\003\0224\n\013e"
- + "xpire_time\030\005 \001(\0132\032.google.protobuf.Times"
- + "tampB\003\340A\003\022:\n\021expire_event_time\030\n \001(\0132\032.g"
- + "oogle.protobuf.TimestampB\003\340A\003\022A\n\005state\030\006"
- + " \001(\0162-.google.cloud.kms.v1.ImportJob.Imp"
- + "ortJobStateB\003\340A\003\022I\n\npublic_key\030\007 \001(\01320.g"
- + "oogle.cloud.kms.v1.ImportJob.WrappingPub"
- + "licKeyB\003\340A\003\022F\n\013attestation\030\010 \001(\0132,.googl"
- + "e.cloud.kms.v1.KeyOperationAttestationB\003"
- + "\340A\003\032 \n\021WrappingPublicKey\022\013\n\003pem\030\001 \001(\t\"m\n"
- + "\014ImportMethod\022\035\n\031IMPORT_METHOD_UNSPECIFI"
- + "ED\020\000\022\036\n\032RSA_OAEP_3072_SHA1_AES_256\020\001\022\036\n\032"
- + "RSA_OAEP_4096_SHA1_AES_256\020\002\"c\n\016ImportJo"
- + "bState\022 \n\034IMPORT_JOB_STATE_UNSPECIFIED\020\000"
- + "\022\026\n\022PENDING_GENERATION\020\001\022\n\n\006ACTIVE\020\002\022\013\n\007"
- + "EXPIRED\020\003:{\352Ax\n!cloudkms.googleapis.com/"
- + "ImportJob\022Sprojects/{project}/locations/"
- + "{location}/keyRings/{key_ring}/importJob"
- + "s/{import_job}*X\n\017ProtectionLevel\022 \n\034PRO"
- + "TECTION_LEVEL_UNSPECIFIED\020\000\022\014\n\010SOFTWARE\020"
- + "\001\022\007\n\003HSM\020\002\022\014\n\010EXTERNAL\020\003B\225\001\n\027com.google."
- + "cloud.kms.v1B\021KmsResourcesProtoP\001Z6googl"
- + "e.golang.org/genproto/googleapis/cloud/k"
- + "ms/v1;kms\370\001\001\252\002\023Google.Cloud.Kms.V1\312\002\023Goo"
- + "gle\\Cloud\\Kms\\V1b\006proto3"
+ + "(\tB\003\340A\003\022^\n!external_protection_level_opt"
+ + "ions\030\021 \001(\01323.google.cloud.kms.v1.Externa"
+ + "lProtectionLevelOptions\"\277\004\n\031CryptoKeyVer"
+ + "sionAlgorithm\022,\n(CRYPTO_KEY_VERSION_ALGO"
+ + "RITHM_UNSPECIFIED\020\000\022\037\n\033GOOGLE_SYMMETRIC_"
+ + "ENCRYPTION\020\001\022\034\n\030RSA_SIGN_PSS_2048_SHA256"
+ + "\020\002\022\034\n\030RSA_SIGN_PSS_3072_SHA256\020\003\022\034\n\030RSA_"
+ + "SIGN_PSS_4096_SHA256\020\004\022\034\n\030RSA_SIGN_PSS_4"
+ + "096_SHA512\020\017\022\036\n\032RSA_SIGN_PKCS1_2048_SHA2"
+ + "56\020\005\022\036\n\032RSA_SIGN_PKCS1_3072_SHA256\020\006\022\036\n\032"
+ + "RSA_SIGN_PKCS1_4096_SHA256\020\007\022\036\n\032RSA_SIGN"
+ + "_PKCS1_4096_SHA512\020\020\022 \n\034RSA_DECRYPT_OAEP"
+ + "_2048_SHA256\020\010\022 \n\034RSA_DECRYPT_OAEP_3072_"
+ + "SHA256\020\t\022 \n\034RSA_DECRYPT_OAEP_4096_SHA256"
+ + "\020\n\022 \n\034RSA_DECRYPT_OAEP_4096_SHA512\020\021\022\027\n\023"
+ + "EC_SIGN_P256_SHA256\020\014\022\027\n\023EC_SIGN_P384_SH"
+ + "A384\020\r\022!\n\035EXTERNAL_SYMMETRIC_ENCRYPTION\020"
+ + "\022\"\301\001\n\025CryptoKeyVersionState\022(\n$CRYPTO_KE"
+ + "Y_VERSION_STATE_UNSPECIFIED\020\000\022\026\n\022PENDING"
+ + "_GENERATION\020\005\022\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002"
+ + "\022\r\n\tDESTROYED\020\003\022\025\n\021DESTROY_SCHEDULED\020\004\022\022"
+ + "\n\016PENDING_IMPORT\020\006\022\021\n\rIMPORT_FAILED\020\007\"I\n"
+ + "\024CryptoKeyVersionView\022\'\n#CRYPTO_KEY_VERS"
+ + "ION_VIEW_UNSPECIFIED\020\000\022\010\n\004FULL\020\001:\252\001\352A\246\001\n"
+ + "(cloudkms.googleapis.com/CryptoKeyVersio"
+ + "n\022zprojects/{project}/locations/{locatio"
+ + "n}/keyRings/{key_ring}/cryptoKeys/{crypt"
+ + "o_key}/cryptoKeyVersions/{crypto_key_ver"
+ + "sion}\"\235\002\n\tPublicKey\022\013\n\003pem\030\001 \001(\t\022R\n\talgo"
+ + "rithm\030\002 \001(\0162?.google.cloud.kms.v1.Crypto"
+ + "KeyVersion.CryptoKeyVersionAlgorithm:\256\001\352"
+ + "A\252\001\n!cloudkms.googleapis.com/PublicKey\022\204"
+ + "\001projects/{project}/locations/{location}"
+ + "/keyRings/{key_ring}/cryptoKeys/{crypto_"
+ + "key}/cryptoKeyVersions/{crypto_key_versi"
+ + "on}/publicKey\"\333\007\n\tImportJob\022\021\n\004name\030\001 \001("
+ + "\tB\003\340A\003\022J\n\rimport_method\030\002 \001(\0162+.google.c"
+ + "loud.kms.v1.ImportJob.ImportMethodB\006\340A\002\340"
+ + "A\005\022F\n\020protection_level\030\t \001(\0162$.google.cl"
+ + "oud.kms.v1.ProtectionLevelB\006\340A\002\340A\005\0224\n\013cr"
+ + "eate_time\030\003 \001(\0132\032.google.protobuf.Timest"
+ + "ampB\003\340A\003\0226\n\rgenerate_time\030\004 \001(\0132\032.google"
+ + ".protobuf.TimestampB\003\340A\003\0224\n\013expire_time\030"
+ + "\005 \001(\0132\032.google.protobuf.TimestampB\003\340A\003\022:"
+ + "\n\021expire_event_time\030\n \001(\0132\032.google.proto"
+ + "buf.TimestampB\003\340A\003\022A\n\005state\030\006 \001(\0162-.goog"
+ + "le.cloud.kms.v1.ImportJob.ImportJobState"
+ + "B\003\340A\003\022I\n\npublic_key\030\007 \001(\01320.google.cloud"
+ + ".kms.v1.ImportJob.WrappingPublicKeyB\003\340A\003"
+ + "\022F\n\013attestation\030\010 \001(\0132,.google.cloud.kms"
+ + ".v1.KeyOperationAttestationB\003\340A\003\032 \n\021Wrap"
+ + "pingPublicKey\022\013\n\003pem\030\001 \001(\t\"m\n\014ImportMeth"
+ + "od\022\035\n\031IMPORT_METHOD_UNSPECIFIED\020\000\022\036\n\032RSA"
+ + "_OAEP_3072_SHA1_AES_256\020\001\022\036\n\032RSA_OAEP_40"
+ + "96_SHA1_AES_256\020\002\"c\n\016ImportJobState\022 \n\034I"
+ + "MPORT_JOB_STATE_UNSPECIFIED\020\000\022\026\n\022PENDING"
+ + "_GENERATION\020\001\022\n\n\006ACTIVE\020\002\022\013\n\007EXPIRED\020\003:{"
+ + "\352Ax\n!cloudkms.googleapis.com/ImportJob\022S"
+ + "projects/{project}/locations/{location}/"
+ + "keyRings/{key_ring}/importJobs/{import_j"
+ + "ob}\":\n\036ExternalProtectionLevelOptions\022\030\n"
+ + "\020external_key_uri\030\001 \001(\t*X\n\017ProtectionLev"
+ + "el\022 \n\034PROTECTION_LEVEL_UNSPECIFIED\020\000\022\014\n\010"
+ + "SOFTWARE\020\001\022\007\n\003HSM\020\002\022\014\n\010EXTERNAL\020\003B\225\001\n\027co"
+ + "m.google.cloud.kms.v1B\021KmsResourcesProto"
+ + "P\001Z6google.golang.org/genproto/googleapi"
+ + "s/cloud/kms/v1;kms\370\001\001\252\002\023Google.Cloud.Kms"
+ + ".V1\312\002\023Google\\Cloud\\Kms\\V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
descriptorData,
new com.google.protobuf.Descriptors.FileDescriptor[] {
- com.google.api.AnnotationsProto.getDescriptor(),
com.google.api.FieldBehaviorProto.getDescriptor(),
com.google.api.ResourceProto.getDescriptor(),
com.google.protobuf.DurationProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
+ com.google.api.AnnotationsProto.getDescriptor(),
});
internal_static_google_cloud_kms_v1_KeyRing_descriptor =
getDescriptor().getMessageTypes().get(0);
@@ -265,6 +278,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
"ImportJob",
"ImportTime",
"ImportFailureReason",
+ "ExternalProtectionLevelOptions",
});
internal_static_google_cloud_kms_v1_PublicKey_descriptor =
getDescriptor().getMessageTypes().get(5);
@@ -299,17 +313,25 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new java.lang.String[] {
"Pem",
});
+ internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_descriptor =
+ getDescriptor().getMessageTypes().get(7);
+ internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_fieldAccessorTable =
+ new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
+ internal_static_google_cloud_kms_v1_ExternalProtectionLevelOptions_descriptor,
+ new java.lang.String[] {
+ "ExternalKeyUri",
+ });
com.google.protobuf.ExtensionRegistry registry =
com.google.protobuf.ExtensionRegistry.newInstance();
registry.add(com.google.api.FieldBehaviorProto.fieldBehavior);
registry.add(com.google.api.ResourceProto.resource);
com.google.protobuf.Descriptors.FileDescriptor.internalUpdateFileDescriptor(
descriptor, registry);
- com.google.api.AnnotationsProto.getDescriptor();
com.google.api.FieldBehaviorProto.getDescriptor();
com.google.api.ResourceProto.getDescriptor();
com.google.protobuf.DurationProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
+ com.google.api.AnnotationsProto.getDescriptor();
}
// @@protoc_insertion_point(outer_class_scope)
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadata.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadata.java
index e3bf1b77..d664926b 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadata.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadata.java
@@ -73,6 +73,11 @@ private LocationMetadata(
hsmAvailable_ = input.readBool();
break;
}
+ case 16:
+ {
+ ekmAvailable_ = input.readBool();
+ break;
+ }
default:
{
if (!parseUnknownField(input, unknownFields, extensionRegistry, tag)) {
@@ -126,6 +131,25 @@ public boolean getHsmAvailable() {
return hsmAvailable_;
}
+ public static final int EKM_AVAILABLE_FIELD_NUMBER = 2;
+ private boolean ekmAvailable_;
+ /**
+ *
+ *
+ * + * Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with + * [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location. + *+ * + *
bool ekm_available = 2;
+ *
+ * @return The ekmAvailable.
+ */
+ public boolean getEkmAvailable() {
+ return ekmAvailable_;
+ }
+
private byte memoizedIsInitialized = -1;
@java.lang.Override
@@ -143,6 +167,9 @@ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io
if (hsmAvailable_ != false) {
output.writeBool(1, hsmAvailable_);
}
+ if (ekmAvailable_ != false) {
+ output.writeBool(2, ekmAvailable_);
+ }
unknownFields.writeTo(output);
}
@@ -155,6 +182,9 @@ public int getSerializedSize() {
if (hsmAvailable_ != false) {
size += com.google.protobuf.CodedOutputStream.computeBoolSize(1, hsmAvailable_);
}
+ if (ekmAvailable_ != false) {
+ size += com.google.protobuf.CodedOutputStream.computeBoolSize(2, ekmAvailable_);
+ }
size += unknownFields.getSerializedSize();
memoizedSize = size;
return size;
@@ -171,6 +201,7 @@ public boolean equals(final java.lang.Object obj) {
com.google.cloud.kms.v1.LocationMetadata other = (com.google.cloud.kms.v1.LocationMetadata) obj;
if (getHsmAvailable() != other.getHsmAvailable()) return false;
+ if (getEkmAvailable() != other.getEkmAvailable()) return false;
if (!unknownFields.equals(other.unknownFields)) return false;
return true;
}
@@ -184,6 +215,8 @@ public int hashCode() {
hash = (19 * hash) + getDescriptor().hashCode();
hash = (37 * hash) + HSM_AVAILABLE_FIELD_NUMBER;
hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getHsmAvailable());
+ hash = (37 * hash) + EKM_AVAILABLE_FIELD_NUMBER;
+ hash = (53 * hash) + com.google.protobuf.Internal.hashBoolean(getEkmAvailable());
hash = (29 * hash) + unknownFields.hashCode();
memoizedHashCode = hash;
return hash;
@@ -331,6 +364,8 @@ public Builder clear() {
super.clear();
hsmAvailable_ = false;
+ ekmAvailable_ = false;
+
return this;
}
@@ -359,6 +394,7 @@ public com.google.cloud.kms.v1.LocationMetadata buildPartial() {
com.google.cloud.kms.v1.LocationMetadata result =
new com.google.cloud.kms.v1.LocationMetadata(this);
result.hsmAvailable_ = hsmAvailable_;
+ result.ekmAvailable_ = ekmAvailable_;
onBuilt();
return result;
}
@@ -411,6 +447,9 @@ public Builder mergeFrom(com.google.cloud.kms.v1.LocationMetadata other) {
if (other.getHsmAvailable() != false) {
setHsmAvailable(other.getHsmAvailable());
}
+ if (other.getEkmAvailable() != false) {
+ setEkmAvailable(other.getEkmAvailable());
+ }
this.mergeUnknownFields(other.unknownFields);
onChanged();
return this;
@@ -497,6 +536,63 @@ public Builder clearHsmAvailable() {
return this;
}
+ private boolean ekmAvailable_;
+ /**
+ *
+ *
+ * + * Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with + * [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location. + *+ * + *
bool ekm_available = 2;
+ *
+ * @return The ekmAvailable.
+ */
+ public boolean getEkmAvailable() {
+ return ekmAvailable_;
+ }
+ /**
+ *
+ *
+ * + * Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with + * [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location. + *+ * + *
bool ekm_available = 2;
+ *
+ * @param value The ekmAvailable to set.
+ * @return This builder for chaining.
+ */
+ public Builder setEkmAvailable(boolean value) {
+
+ ekmAvailable_ = value;
+ onChanged();
+ return this;
+ }
+ /**
+ *
+ *
+ * + * Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with + * [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location. + *+ * + *
bool ekm_available = 2;
+ *
+ * @return This builder for chaining.
+ */
+ public Builder clearEkmAvailable() {
+
+ ekmAvailable_ = false;
+ onChanged();
+ return this;
+ }
+
@java.lang.Override
public final Builder setUnknownFields(final com.google.protobuf.UnknownFieldSet unknownFields) {
return super.setUnknownFields(unknownFields);
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadataOrBuilder.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadataOrBuilder.java
index f395d284..3b3ddcb8 100644
--- a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadataOrBuilder.java
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/LocationMetadataOrBuilder.java
@@ -37,4 +37,19 @@ public interface LocationMetadataOrBuilder
* @return The hsmAvailable.
*/
boolean getHsmAvailable();
+
+ /**
+ *
+ *
+ * + * Indicates whether [CryptoKeys][google.cloud.kms.v1.CryptoKey] with + * [protection_level][google.cloud.kms.v1.CryptoKeyVersionTemplate.protection_level] + * [EXTERNAL][google.cloud.kms.v1.ProtectionLevel.EXTERNAL] can be created in this location. + *+ * + *
bool ekm_available = 2;
+ *
+ * @return The ekmAvailable.
+ */
+ boolean getEkmAvailable();
}
diff --git a/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKeyName.java b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKeyName.java
new file mode 100644
index 00000000..87d07c2f
--- /dev/null
+++ b/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/PublicKeyName.java
@@ -0,0 +1,277 @@
+/*
+ * Copyright 2020 Google LLC
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * https://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package com.google.cloud.kms.v1;
+
+import com.google.api.pathtemplate.PathTemplate;
+import com.google.api.resourcenames.ResourceName;
+import com.google.common.base.Preconditions;
+import com.google.common.collect.ImmutableMap;
+import java.util.ArrayList;
+import java.util.List;
+import java.util.Map;
+
+/** AUTO-GENERATED DOCUMENTATION AND CLASS */
+@javax.annotation.Generated("by GAPIC protoc plugin")
+public class PublicKeyName implements ResourceName {
+
+ private static final PathTemplate PATH_TEMPLATE =
+ PathTemplate.createWithoutUrlEncoding(
+ "projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}/publicKey");
+
+ private volatile Map