diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java
index 17abefd9..e205cdeb 100644
--- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java
+++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceClient.java
@@ -2132,6 +2132,459 @@ public final CryptoKeyVersion updateCryptoKeyVersion(UpdateCryptoKeyVersionReque
return stub.updateCryptoKeyVersionCallable();
}
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in
+ * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
+ *
+ *
Returns an error if called on a key whose purpose is not
+ * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ *
+ *
Returns an error if called on a key whose purpose is not
+ * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ *
+ *
Returns an error if called on a key whose purpose is not
+ * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ *
+ *
Returns an error if called on a key whose purpose is not
+ * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ *
+ *
+ updateCryptoKeyPrimaryVersionCallable() {
+ return stub.updateCryptoKeyPrimaryVersionCallable();
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
+ *
+ * Upon calling this method,
+ * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
+ * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be changed to
+ * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
+ * material will be irrevocably destroyed.
+ *
+ *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
+ * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
+ * be called to reverse the process.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * CryptoKeyVersionName name =
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ * CryptoKeyVersion response = keyManagementServiceClient.destroyCryptoKeyVersion(name);
+ * }
+ * }
+ *
+ * @param name Required. The resource name of the
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final CryptoKeyVersion destroyCryptoKeyVersion(CryptoKeyVersionName name) {
+ DestroyCryptoKeyVersionRequest request =
+ DestroyCryptoKeyVersionRequest.newBuilder()
+ .setName(name == null ? null : name.toString())
+ .build();
+ return destroyCryptoKeyVersion(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
+ *
+ * Upon calling this method,
+ * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
+ * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be changed to
+ * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
+ * material will be irrevocably destroyed.
+ *
+ *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
+ * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
+ * be called to reverse the process.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * String name =
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
+ * .toString();
+ * CryptoKeyVersion response = keyManagementServiceClient.destroyCryptoKeyVersion(name);
+ * }
+ * }
+ *
+ * @param name Required. The resource name of the
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final CryptoKeyVersion destroyCryptoKeyVersion(String name) {
+ DestroyCryptoKeyVersionRequest request =
+ DestroyCryptoKeyVersionRequest.newBuilder().setName(name).build();
+ return destroyCryptoKeyVersion(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
+ *
+ * Upon calling this method,
+ * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
+ * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be changed to
+ * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
+ * material will be irrevocably destroyed.
+ *
+ *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
+ * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
+ * be called to reverse the process.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * DestroyCryptoKeyVersionRequest request =
+ * DestroyCryptoKeyVersionRequest.newBuilder()
+ * .setName(
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]",
+ * "[LOCATION]",
+ * "[KEY_RING]",
+ * "[CRYPTO_KEY]",
+ * "[CRYPTO_KEY_VERSION]")
+ * .toString())
+ * .build();
+ * CryptoKeyVersion response = keyManagementServiceClient.destroyCryptoKeyVersion(request);
+ * }
+ * }
+ *
+ * @param request The request object containing all of the parameters for the API call.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final CryptoKeyVersion destroyCryptoKeyVersion(DestroyCryptoKeyVersionRequest request) {
+ return destroyCryptoKeyVersionCallable().call(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
+ *
+ * Upon calling this method,
+ * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
+ * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be changed to
+ * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
+ * material will be irrevocably destroyed.
+ *
+ *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
+ * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
+ * be called to reverse the process.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * DestroyCryptoKeyVersionRequest request =
+ * DestroyCryptoKeyVersionRequest.newBuilder()
+ * .setName(
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]",
+ * "[LOCATION]",
+ * "[KEY_RING]",
+ * "[CRYPTO_KEY]",
+ * "[CRYPTO_KEY_VERSION]")
+ * .toString())
+ * .build();
+ * ApiFuture future =
+ * keyManagementServiceClient.destroyCryptoKeyVersionCallable().futureCall(request);
+ * // Do something.
+ * CryptoKeyVersion response = future.get();
+ * }
+ * }
+ */
+ public final UnaryCallable
+ destroyCryptoKeyVersionCallable() {
+ return stub.destroyCryptoKeyVersionCallable();
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * state.
+ *
+ * Upon restoration of the CryptoKeyVersion,
+ * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
+ * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * CryptoKeyVersionName name =
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ * CryptoKeyVersion response = keyManagementServiceClient.restoreCryptoKeyVersion(name);
+ * }
+ * }
+ *
+ * @param name Required. The resource name of the
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final CryptoKeyVersion restoreCryptoKeyVersion(CryptoKeyVersionName name) {
+ RestoreCryptoKeyVersionRequest request =
+ RestoreCryptoKeyVersionRequest.newBuilder()
+ .setName(name == null ? null : name.toString())
+ .build();
+ return restoreCryptoKeyVersion(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * state.
+ *
+ * Upon restoration of the CryptoKeyVersion,
+ * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
+ * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * String name =
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
+ * .toString();
+ * CryptoKeyVersion response = keyManagementServiceClient.restoreCryptoKeyVersion(name);
+ * }
+ * }
+ *
+ * @param name Required. The resource name of the
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final CryptoKeyVersion restoreCryptoKeyVersion(String name) {
+ RestoreCryptoKeyVersionRequest request =
+ RestoreCryptoKeyVersionRequest.newBuilder().setName(name).build();
+ return restoreCryptoKeyVersion(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * state.
+ *
+ * Upon restoration of the CryptoKeyVersion,
+ * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
+ * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * RestoreCryptoKeyVersionRequest request =
+ * RestoreCryptoKeyVersionRequest.newBuilder()
+ * .setName(
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]",
+ * "[LOCATION]",
+ * "[KEY_RING]",
+ * "[CRYPTO_KEY]",
+ * "[CRYPTO_KEY_VERSION]")
+ * .toString())
+ * .build();
+ * CryptoKeyVersion response = keyManagementServiceClient.restoreCryptoKeyVersion(request);
+ * }
+ * }
+ *
+ * @param request The request object containing all of the parameters for the API call.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final CryptoKeyVersion restoreCryptoKeyVersion(RestoreCryptoKeyVersionRequest request) {
+ return restoreCryptoKeyVersionCallable().call(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * state.
+ *
+ * Upon restoration of the CryptoKeyVersion,
+ * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
+ * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ *
+ *
Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * RestoreCryptoKeyVersionRequest request =
+ * RestoreCryptoKeyVersionRequest.newBuilder()
+ * .setName(
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]",
+ * "[LOCATION]",
+ * "[KEY_RING]",
+ * "[CRYPTO_KEY]",
+ * "[CRYPTO_KEY_VERSION]")
+ * .toString())
+ * .build();
+ * ApiFuture future =
+ * keyManagementServiceClient.restoreCryptoKeyVersionCallable().futureCall(request);
+ * // Do something.
+ * CryptoKeyVersion response = future.get();
+ * }
+ * }
+ */
+ public final UnaryCallable
+ restoreCryptoKeyVersionCallable() {
+ return stub.restoreCryptoKeyVersionCallable();
+ }
+
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
* Encrypts data, so that it can only be recovered by a call to
@@ -2653,234 +3106,86 @@ public final AsymmetricDecryptResponse asymmetricDecrypt(String name, ByteString
AsymmetricDecryptRequest request =
AsymmetricDecryptRequest.newBuilder().setName(name).setCiphertext(ciphertext).build();
return asymmetricDecrypt(request);
- }
-
- // AUTO-GENERATED DOCUMENTATION AND METHOD.
- /**
- * Decrypts data that was encrypted with a public key retrieved from
- * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
- * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
- *
- * Sample code:
- *
- *
{@code
- * try (KeyManagementServiceClient keyManagementServiceClient =
- * KeyManagementServiceClient.create()) {
- * AsymmetricDecryptRequest request =
- * AsymmetricDecryptRequest.newBuilder()
- * .setName(
- * CryptoKeyVersionName.of(
- * "[PROJECT]",
- * "[LOCATION]",
- * "[KEY_RING]",
- * "[CRYPTO_KEY]",
- * "[CRYPTO_KEY_VERSION]")
- * .toString())
- * .setCiphertext(ByteString.EMPTY)
- * .setCiphertextCrc32C(Int64Value.newBuilder().build())
- * .build();
- * AsymmetricDecryptResponse response = keyManagementServiceClient.asymmetricDecrypt(request);
- * }
- * }
- *
- * @param request The request object containing all of the parameters for the API call.
- * @throws com.google.api.gax.rpc.ApiException if the remote call fails
- */
- public final AsymmetricDecryptResponse asymmetricDecrypt(AsymmetricDecryptRequest request) {
- return asymmetricDecryptCallable().call(request);
- }
-
- // AUTO-GENERATED DOCUMENTATION AND METHOD.
- /**
- * Decrypts data that was encrypted with a public key retrieved from
- * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
- * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
- *
- * Sample code:
- *
- *
{@code
- * try (KeyManagementServiceClient keyManagementServiceClient =
- * KeyManagementServiceClient.create()) {
- * AsymmetricDecryptRequest request =
- * AsymmetricDecryptRequest.newBuilder()
- * .setName(
- * CryptoKeyVersionName.of(
- * "[PROJECT]",
- * "[LOCATION]",
- * "[KEY_RING]",
- * "[CRYPTO_KEY]",
- * "[CRYPTO_KEY_VERSION]")
- * .toString())
- * .setCiphertext(ByteString.EMPTY)
- * .setCiphertextCrc32C(Int64Value.newBuilder().build())
- * .build();
- * ApiFuture future =
- * keyManagementServiceClient.asymmetricDecryptCallable().futureCall(request);
- * // Do something.
- * AsymmetricDecryptResponse response = future.get();
- * }
- * }
- */
- public final UnaryCallable
- asymmetricDecryptCallable() {
- return stub.asymmetricDecryptCallable();
- }
-
- // AUTO-GENERATED DOCUMENTATION AND METHOD.
- /**
- * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in
- * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
- *
- * Returns an error if called on a key whose purpose is not
- * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
- *
- *
Sample code:
- *
- *
{@code
- * try (KeyManagementServiceClient keyManagementServiceClient =
- * KeyManagementServiceClient.create()) {
- * CryptoKeyName name =
- * CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
- * String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
- * CryptoKey response =
- * keyManagementServiceClient.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
- * }
- * }
- *
- * @param name Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to
- * update.
- * @param cryptoKeyVersionId Required. The id of the child
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary.
- * @throws com.google.api.gax.rpc.ApiException if the remote call fails
- */
- public final CryptoKey updateCryptoKeyPrimaryVersion(
- CryptoKeyName name, String cryptoKeyVersionId) {
- UpdateCryptoKeyPrimaryVersionRequest request =
- UpdateCryptoKeyPrimaryVersionRequest.newBuilder()
- .setName(name == null ? null : name.toString())
- .setCryptoKeyVersionId(cryptoKeyVersionId)
- .build();
- return updateCryptoKeyPrimaryVersion(request);
- }
-
- // AUTO-GENERATED DOCUMENTATION AND METHOD.
- /**
- * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in
- * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
- *
- * Returns an error if called on a key whose purpose is not
- * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
- *
- *
Sample code:
- *
- *
{@code
- * try (KeyManagementServiceClient keyManagementServiceClient =
- * KeyManagementServiceClient.create()) {
- * String name =
- * CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]").toString();
- * String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
- * CryptoKey response =
- * keyManagementServiceClient.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
- * }
- * }
- *
- * @param name Required. The resource name of the [CryptoKey][google.cloud.kms.v1.CryptoKey] to
- * update.
- * @param cryptoKeyVersionId Required. The id of the child
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use as primary.
- * @throws com.google.api.gax.rpc.ApiException if the remote call fails
- */
- public final CryptoKey updateCryptoKeyPrimaryVersion(String name, String cryptoKeyVersionId) {
- UpdateCryptoKeyPrimaryVersionRequest request =
- UpdateCryptoKeyPrimaryVersionRequest.newBuilder()
- .setName(name)
- .setCryptoKeyVersionId(cryptoKeyVersionId)
- .build();
- return updateCryptoKeyPrimaryVersion(request);
- }
-
- // AUTO-GENERATED DOCUMENTATION AND METHOD.
- /**
- * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in
- * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
- *
- * Returns an error if called on a key whose purpose is not
- * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Decrypts data that was encrypted with a public key retrieved from
+ * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
*
*
Sample code:
*
*
{@code
* try (KeyManagementServiceClient keyManagementServiceClient =
* KeyManagementServiceClient.create()) {
- * UpdateCryptoKeyPrimaryVersionRequest request =
- * UpdateCryptoKeyPrimaryVersionRequest.newBuilder()
+ * AsymmetricDecryptRequest request =
+ * AsymmetricDecryptRequest.newBuilder()
* .setName(
- * CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]",
+ * "[LOCATION]",
+ * "[KEY_RING]",
+ * "[CRYPTO_KEY]",
+ * "[CRYPTO_KEY_VERSION]")
* .toString())
- * .setCryptoKeyVersionId("cryptoKeyVersionId987674581")
+ * .setCiphertext(ByteString.EMPTY)
+ * .setCiphertextCrc32C(Int64Value.newBuilder().build())
* .build();
- * CryptoKey response = keyManagementServiceClient.updateCryptoKeyPrimaryVersion(request);
+ * AsymmetricDecryptResponse response = keyManagementServiceClient.asymmetricDecrypt(request);
* }
* }
*
* @param request The request object containing all of the parameters for the API call.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKey updateCryptoKeyPrimaryVersion(
- UpdateCryptoKeyPrimaryVersionRequest request) {
- return updateCryptoKeyPrimaryVersionCallable().call(request);
+ public final AsymmetricDecryptResponse asymmetricDecrypt(AsymmetricDecryptRequest request) {
+ return asymmetricDecryptCallable().call(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in
- * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
- *
- * Returns an error if called on a key whose purpose is not
- * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ * Decrypts data that was encrypted with a public key retrieved from
+ * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] corresponding to a
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] ASYMMETRIC_DECRYPT.
*
*
Sample code:
*
*
{@code
* try (KeyManagementServiceClient keyManagementServiceClient =
* KeyManagementServiceClient.create()) {
- * UpdateCryptoKeyPrimaryVersionRequest request =
- * UpdateCryptoKeyPrimaryVersionRequest.newBuilder()
+ * AsymmetricDecryptRequest request =
+ * AsymmetricDecryptRequest.newBuilder()
* .setName(
- * CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
+ * CryptoKeyVersionName.of(
+ * "[PROJECT]",
+ * "[LOCATION]",
+ * "[KEY_RING]",
+ * "[CRYPTO_KEY]",
+ * "[CRYPTO_KEY_VERSION]")
* .toString())
- * .setCryptoKeyVersionId("cryptoKeyVersionId987674581")
+ * .setCiphertext(ByteString.EMPTY)
+ * .setCiphertextCrc32C(Int64Value.newBuilder().build())
* .build();
- * ApiFuture future =
- * keyManagementServiceClient.updateCryptoKeyPrimaryVersionCallable().futureCall(request);
+ * ApiFuture future =
+ * keyManagementServiceClient.asymmetricDecryptCallable().futureCall(request);
* // Do something.
- * CryptoKey response = future.get();
+ * AsymmetricDecryptResponse response = future.get();
* }
* }
*/
- public final UnaryCallable
- updateCryptoKeyPrimaryVersionCallable() {
- return stub.updateCryptoKeyPrimaryVersionCallable();
+ public final UnaryCallable
+ asymmetricDecryptCallable() {
+ return stub.asymmetricDecryptCallable();
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
- *
- * Upon calling this method,
- * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
- * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be changed to
- * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
- * material will be irrevocably destroyed.
- *
- *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
- * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
- * be called to reverse the process.
+ * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, producing a tag that can be
+ * verified by another source with the same key.
*
*
Sample code:
*
@@ -2890,38 +3195,31 @@ public final CryptoKey updateCryptoKeyPrimaryVersion(
* CryptoKeyVersionName name =
* CryptoKeyVersionName.of(
* "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- * CryptoKeyVersion response = keyManagementServiceClient.destroyCryptoKeyVersion(name);
+ * ByteString data = ByteString.EMPTY;
+ * MacSignResponse response = keyManagementServiceClient.macSign(name, data);
* }
* }
*
* @param name Required. The resource name of the
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing.
+ * @param data Required. The data to sign. The MAC tag is computed over this data field based on
+ * the specific algorithm.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKeyVersion destroyCryptoKeyVersion(CryptoKeyVersionName name) {
- DestroyCryptoKeyVersionRequest request =
- DestroyCryptoKeyVersionRequest.newBuilder()
+ public final MacSignResponse macSign(CryptoKeyVersionName name, ByteString data) {
+ MacSignRequest request =
+ MacSignRequest.newBuilder()
.setName(name == null ? null : name.toString())
+ .setData(data)
.build();
- return destroyCryptoKeyVersion(request);
+ return macSign(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
- *
- *
Upon calling this method,
- * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
- * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be changed to
- * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
- * material will be irrevocably destroyed.
- *
- *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
- * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
- * be called to reverse the process.
+ * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, producing a tag that can be
+ * verified by another source with the same key.
*
*
Sample code:
*
@@ -2932,44 +3230,35 @@ public final CryptoKeyVersion destroyCryptoKeyVersion(CryptoKeyVersionName name)
* CryptoKeyVersionName.of(
* "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
* .toString();
- * CryptoKeyVersion response = keyManagementServiceClient.destroyCryptoKeyVersion(name);
+ * ByteString data = ByteString.EMPTY;
+ * MacSignResponse response = keyManagementServiceClient.macSign(name, data);
* }
* }
*
* @param name Required. The resource name of the
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to destroy.
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for signing.
+ * @param data Required. The data to sign. The MAC tag is computed over this data field based on
+ * the specific algorithm.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKeyVersion destroyCryptoKeyVersion(String name) {
- DestroyCryptoKeyVersionRequest request =
- DestroyCryptoKeyVersionRequest.newBuilder().setName(name).build();
- return destroyCryptoKeyVersion(request);
+ public final MacSignResponse macSign(String name, ByteString data) {
+ MacSignRequest request = MacSignRequest.newBuilder().setName(name).setData(data).build();
+ return macSign(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
- *
- *
Upon calling this method,
- * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
- * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be changed to
- * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
- * material will be irrevocably destroyed.
- *
- *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
- * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
- * be called to reverse the process.
+ * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, producing a tag that can be
+ * verified by another source with the same key.
*
*
Sample code:
*
*
{@code
* try (KeyManagementServiceClient keyManagementServiceClient =
* KeyManagementServiceClient.create()) {
- * DestroyCryptoKeyVersionRequest request =
- * DestroyCryptoKeyVersionRequest.newBuilder()
+ * MacSignRequest request =
+ * MacSignRequest.newBuilder()
* .setName(
* CryptoKeyVersionName.of(
* "[PROJECT]",
@@ -2978,42 +3267,33 @@ public final CryptoKeyVersion destroyCryptoKeyVersion(String name) {
* "[CRYPTO_KEY]",
* "[CRYPTO_KEY_VERSION]")
* .toString())
+ * .setData(ByteString.EMPTY)
+ * .setDataCrc32C(Int64Value.newBuilder().build())
* .build();
- * CryptoKeyVersion response = keyManagementServiceClient.destroyCryptoKeyVersion(request);
+ * MacSignResponse response = keyManagementServiceClient.macSign(request);
* }
* }
*
* @param request The request object containing all of the parameters for the API call.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKeyVersion destroyCryptoKeyVersion(DestroyCryptoKeyVersionRequest request) {
- return destroyCryptoKeyVersionCallable().call(request);
+ public final MacSignResponse macSign(MacSignRequest request) {
+ return macSignCallable().call(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
- *
- * Upon calling this method,
- * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
- * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be changed to
- * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
- * material will be irrevocably destroyed.
- *
- *
Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
- * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may
- * be called to reverse the process.
+ * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, producing a tag that can be
+ * verified by another source with the same key.
*
*
Sample code:
*
*
{@code
* try (KeyManagementServiceClient keyManagementServiceClient =
* KeyManagementServiceClient.create()) {
- * DestroyCryptoKeyVersionRequest request =
- * DestroyCryptoKeyVersionRequest.newBuilder()
+ * MacSignRequest request =
+ * MacSignRequest.newBuilder()
* .setName(
* CryptoKeyVersionName.of(
* "[PROJECT]",
@@ -3022,29 +3302,25 @@ public final CryptoKeyVersion destroyCryptoKeyVersion(DestroyCryptoKeyVersionReq
* "[CRYPTO_KEY]",
* "[CRYPTO_KEY_VERSION]")
* .toString())
+ * .setData(ByteString.EMPTY)
+ * .setDataCrc32C(Int64Value.newBuilder().build())
* .build();
- * ApiFuture future =
- * keyManagementServiceClient.destroyCryptoKeyVersionCallable().futureCall(request);
+ * ApiFuture future =
+ * keyManagementServiceClient.macSignCallable().futureCall(request);
* // Do something.
- * CryptoKeyVersion response = future.get();
+ * MacSignResponse response = future.get();
* }
* }
*/
- public final UnaryCallable
- destroyCryptoKeyVersionCallable() {
- return stub.destroyCryptoKeyVersionCallable();
+ public final UnaryCallable macSignCallable() {
+ return stub.macSignCallable();
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * state.
- *
- * Upon restoration of the CryptoKeyVersion,
- * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
- * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ * Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns a response that
+ * indicates whether or not the verification was successful.
*
*
Sample code:
*
@@ -3054,32 +3330,35 @@ public final CryptoKeyVersion destroyCryptoKeyVersion(DestroyCryptoKeyVersionReq
* CryptoKeyVersionName name =
* CryptoKeyVersionName.of(
* "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- * CryptoKeyVersion response = keyManagementServiceClient.restoreCryptoKeyVersion(name);
+ * ByteString data = ByteString.EMPTY;
+ * ByteString mac = ByteString.EMPTY;
+ * MacVerifyResponse response = keyManagementServiceClient.macVerify(name, data, mac);
* }
* }
*
* @param name Required. The resource name of the
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for verification.
+ * @param data Required. The data used previously as a
+ * [MacSignRequest.data][google.cloud.kms.v1.MacSignRequest.data] to generate the MAC tag.
+ * @param mac Required. The signature to verify.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKeyVersion restoreCryptoKeyVersion(CryptoKeyVersionName name) {
- RestoreCryptoKeyVersionRequest request =
- RestoreCryptoKeyVersionRequest.newBuilder()
+ public final MacVerifyResponse macVerify(
+ CryptoKeyVersionName name, ByteString data, ByteString mac) {
+ MacVerifyRequest request =
+ MacVerifyRequest.newBuilder()
.setName(name == null ? null : name.toString())
+ .setData(data)
+ .setMac(mac)
.build();
- return restoreCryptoKeyVersion(request);
+ return macVerify(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * state.
- *
- *
Upon restoration of the CryptoKeyVersion,
- * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
- * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ * Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns a response that
+ * indicates whether or not the verification was successful.
*
*
Sample code:
*
@@ -3090,38 +3369,38 @@ public final CryptoKeyVersion restoreCryptoKeyVersion(CryptoKeyVersionName name)
* CryptoKeyVersionName.of(
* "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]")
* .toString();
- * CryptoKeyVersion response = keyManagementServiceClient.restoreCryptoKeyVersion(name);
+ * ByteString data = ByteString.EMPTY;
+ * ByteString mac = ByteString.EMPTY;
+ * MacVerifyResponse response = keyManagementServiceClient.macVerify(name, data, mac);
* }
* }
*
* @param name Required. The resource name of the
- * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to restore.
+ * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] to use for verification.
+ * @param data Required. The data used previously as a
+ * [MacSignRequest.data][google.cloud.kms.v1.MacSignRequest.data] to generate the MAC tag.
+ * @param mac Required. The signature to verify.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKeyVersion restoreCryptoKeyVersion(String name) {
- RestoreCryptoKeyVersionRequest request =
- RestoreCryptoKeyVersionRequest.newBuilder().setName(name).build();
- return restoreCryptoKeyVersion(request);
+ public final MacVerifyResponse macVerify(String name, ByteString data, ByteString mac) {
+ MacVerifyRequest request =
+ MacVerifyRequest.newBuilder().setName(name).setData(data).setMac(mac).build();
+ return macVerify(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * state.
- *
- *
Upon restoration of the CryptoKeyVersion,
- * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
- * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ * Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns a response that
+ * indicates whether or not the verification was successful.
*
*
Sample code:
*
*
{@code
* try (KeyManagementServiceClient keyManagementServiceClient =
* KeyManagementServiceClient.create()) {
- * RestoreCryptoKeyVersionRequest request =
- * RestoreCryptoKeyVersionRequest.newBuilder()
+ * MacVerifyRequest request =
+ * MacVerifyRequest.newBuilder()
* .setName(
* CryptoKeyVersionName.of(
* "[PROJECT]",
@@ -3130,36 +3409,35 @@ public final CryptoKeyVersion restoreCryptoKeyVersion(String name) {
* "[CRYPTO_KEY]",
* "[CRYPTO_KEY_VERSION]")
* .toString())
+ * .setData(ByteString.EMPTY)
+ * .setDataCrc32C(Int64Value.newBuilder().build())
+ * .setMac(ByteString.EMPTY)
+ * .setMacCrc32C(Int64Value.newBuilder().build())
* .build();
- * CryptoKeyVersion response = keyManagementServiceClient.restoreCryptoKeyVersion(request);
+ * MacVerifyResponse response = keyManagementServiceClient.macVerify(request);
* }
* }
*
* @param request The request object containing all of the parameters for the API call.
* @throws com.google.api.gax.rpc.ApiException if the remote call fails
*/
- public final CryptoKeyVersion restoreCryptoKeyVersion(RestoreCryptoKeyVersionRequest request) {
- return restoreCryptoKeyVersionCallable().call(request);
+ public final MacVerifyResponse macVerify(MacVerifyRequest request) {
+ return macVerifyCallable().call(request);
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * state.
- *
- * Upon restoration of the CryptoKeyVersion,
- * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], and
- * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ * Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with
+ * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns a response that
+ * indicates whether or not the verification was successful.
*
*
Sample code:
*
*
{@code
* try (KeyManagementServiceClient keyManagementServiceClient =
* KeyManagementServiceClient.create()) {
- * RestoreCryptoKeyVersionRequest request =
- * RestoreCryptoKeyVersionRequest.newBuilder()
+ * MacVerifyRequest request =
+ * MacVerifyRequest.newBuilder()
* .setName(
* CryptoKeyVersionName.of(
* "[PROJECT]",
@@ -3168,17 +3446,111 @@ public final CryptoKeyVersion restoreCryptoKeyVersion(RestoreCryptoKeyVersionReq
* "[CRYPTO_KEY]",
* "[CRYPTO_KEY_VERSION]")
* .toString())
+ * .setData(ByteString.EMPTY)
+ * .setDataCrc32C(Int64Value.newBuilder().build())
+ * .setMac(ByteString.EMPTY)
+ * .setMacCrc32C(Int64Value.newBuilder().build())
* .build();
- * ApiFuture future =
- * keyManagementServiceClient.restoreCryptoKeyVersionCallable().futureCall(request);
+ * ApiFuture future =
+ * keyManagementServiceClient.macVerifyCallable().futureCall(request);
* // Do something.
- * CryptoKeyVersion response = future.get();
+ * MacVerifyResponse response = future.get();
* }
* }
*/
- public final UnaryCallable
- restoreCryptoKeyVersionCallable() {
- return stub.restoreCryptoKeyVersionCallable();
+ public final UnaryCallable macVerifyCallable() {
+ return stub.macVerifyCallable();
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Generate random bytes using the Cloud KMS randomness source in the provided location.
+ *
+ * Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * String location = "location1901043637";
+ * int lengthBytes = -745661998;
+ * ProtectionLevel protectionLevel = ProtectionLevel.forNumber(0);
+ * GenerateRandomBytesResponse response =
+ * keyManagementServiceClient.generateRandomBytes(location, lengthBytes, protectionLevel);
+ * }
+ * }
+ *
+ * @param location The project-specific location in which to generate random bytes. For example,
+ * "projects/my-project/locations/us-central1".
+ * @param lengthBytes The length in bytes of the amount of randomness to retrieve. Minimum 8
+ * bytes, maximum 1024 bytes.
+ * @param protectionLevel The [ProtectionLevel][google.cloud.kms.v1.ProtectionLevel] to use when
+ * generating the random data. Defaults to
+ * [SOFTWARE][google.cloud.kms.v1.ProtectionLevel.SOFTWARE].
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final GenerateRandomBytesResponse generateRandomBytes(
+ String location, int lengthBytes, ProtectionLevel protectionLevel) {
+ GenerateRandomBytesRequest request =
+ GenerateRandomBytesRequest.newBuilder()
+ .setLocation(location)
+ .setLengthBytes(lengthBytes)
+ .setProtectionLevel(protectionLevel)
+ .build();
+ return generateRandomBytes(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Generate random bytes using the Cloud KMS randomness source in the provided location.
+ *
+ * Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * GenerateRandomBytesRequest request =
+ * GenerateRandomBytesRequest.newBuilder()
+ * .setLocation("location1901043637")
+ * .setLengthBytes(-745661998)
+ * .setProtectionLevel(ProtectionLevel.forNumber(0))
+ * .build();
+ * GenerateRandomBytesResponse response =
+ * keyManagementServiceClient.generateRandomBytes(request);
+ * }
+ * }
+ *
+ * @param request The request object containing all of the parameters for the API call.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final GenerateRandomBytesResponse generateRandomBytes(GenerateRandomBytesRequest request) {
+ return generateRandomBytesCallable().call(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Generate random bytes using the Cloud KMS randomness source in the provided location.
+ *
+ * Sample code:
+ *
+ *
{@code
+ * try (KeyManagementServiceClient keyManagementServiceClient =
+ * KeyManagementServiceClient.create()) {
+ * GenerateRandomBytesRequest request =
+ * GenerateRandomBytesRequest.newBuilder()
+ * .setLocation("location1901043637")
+ * .setLengthBytes(-745661998)
+ * .setProtectionLevel(ProtectionLevel.forNumber(0))
+ * .build();
+ * ApiFuture future =
+ * keyManagementServiceClient.generateRandomBytesCallable().futureCall(request);
+ * // Do something.
+ * GenerateRandomBytesResponse response = future.get();
+ * }
+ * }
+ */
+ public final UnaryCallable
+ generateRandomBytesCallable() {
+ return stub.generateRandomBytesCallable();
}
// AUTO-GENERATED DOCUMENTATION AND METHOD.
diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceSettings.java b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceSettings.java
index fd8008f6..5ea1d68b 100644
--- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceSettings.java
+++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceSettings.java
@@ -171,6 +171,25 @@ public UnaryCallSettings updateCryptoKeySetti
return ((KeyManagementServiceStubSettings) getStubSettings()).updateCryptoKeyVersionSettings();
}
+ /** Returns the object with the settings used for calls to updateCryptoKeyPrimaryVersion. */
+ public UnaryCallSettings
+ updateCryptoKeyPrimaryVersionSettings() {
+ return ((KeyManagementServiceStubSettings) getStubSettings())
+ .updateCryptoKeyPrimaryVersionSettings();
+ }
+
+ /** Returns the object with the settings used for calls to destroyCryptoKeyVersion. */
+ public UnaryCallSettings
+ destroyCryptoKeyVersionSettings() {
+ return ((KeyManagementServiceStubSettings) getStubSettings()).destroyCryptoKeyVersionSettings();
+ }
+
+ /** Returns the object with the settings used for calls to restoreCryptoKeyVersion. */
+ public UnaryCallSettings
+ restoreCryptoKeyVersionSettings() {
+ return ((KeyManagementServiceStubSettings) getStubSettings()).restoreCryptoKeyVersionSettings();
+ }
+
/** Returns the object with the settings used for calls to encrypt. */
public UnaryCallSettings encryptSettings() {
return ((KeyManagementServiceStubSettings) getStubSettings()).encryptSettings();
@@ -192,23 +211,20 @@ public UnaryCallSettings asymmetr
return ((KeyManagementServiceStubSettings) getStubSettings()).asymmetricDecryptSettings();
}
- /** Returns the object with the settings used for calls to updateCryptoKeyPrimaryVersion. */
- public UnaryCallSettings
- updateCryptoKeyPrimaryVersionSettings() {
- return ((KeyManagementServiceStubSettings) getStubSettings())
- .updateCryptoKeyPrimaryVersionSettings();
+ /** Returns the object with the settings used for calls to macSign. */
+ public UnaryCallSettings macSignSettings() {
+ return ((KeyManagementServiceStubSettings) getStubSettings()).macSignSettings();
}
- /** Returns the object with the settings used for calls to destroyCryptoKeyVersion. */
- public UnaryCallSettings
- destroyCryptoKeyVersionSettings() {
- return ((KeyManagementServiceStubSettings) getStubSettings()).destroyCryptoKeyVersionSettings();
+ /** Returns the object with the settings used for calls to macVerify. */
+ public UnaryCallSettings macVerifySettings() {
+ return ((KeyManagementServiceStubSettings) getStubSettings()).macVerifySettings();
}
- /** Returns the object with the settings used for calls to restoreCryptoKeyVersion. */
- public UnaryCallSettings
- restoreCryptoKeyVersionSettings() {
- return ((KeyManagementServiceStubSettings) getStubSettings()).restoreCryptoKeyVersionSettings();
+ /** Returns the object with the settings used for calls to generateRandomBytes. */
+ public UnaryCallSettings
+ generateRandomBytesSettings() {
+ return ((KeyManagementServiceStubSettings) getStubSettings()).generateRandomBytesSettings();
}
/** Returns the object with the settings used for calls to setIamPolicy. */
@@ -419,6 +435,24 @@ public UnaryCallSettings.Builder updateCrypto
return getStubSettingsBuilder().updateCryptoKeyVersionSettings();
}
+ /** Returns the builder for the settings used for calls to updateCryptoKeyPrimaryVersion. */
+ public UnaryCallSettings.Builder
+ updateCryptoKeyPrimaryVersionSettings() {
+ return getStubSettingsBuilder().updateCryptoKeyPrimaryVersionSettings();
+ }
+
+ /** Returns the builder for the settings used for calls to destroyCryptoKeyVersion. */
+ public UnaryCallSettings.Builder
+ destroyCryptoKeyVersionSettings() {
+ return getStubSettingsBuilder().destroyCryptoKeyVersionSettings();
+ }
+
+ /** Returns the builder for the settings used for calls to restoreCryptoKeyVersion. */
+ public UnaryCallSettings.Builder
+ restoreCryptoKeyVersionSettings() {
+ return getStubSettingsBuilder().restoreCryptoKeyVersionSettings();
+ }
+
/** Returns the builder for the settings used for calls to encrypt. */
public UnaryCallSettings.Builder encryptSettings() {
return getStubSettingsBuilder().encryptSettings();
@@ -441,22 +475,20 @@ public UnaryCallSettings.Builder decryptSetting
return getStubSettingsBuilder().asymmetricDecryptSettings();
}
- /** Returns the builder for the settings used for calls to updateCryptoKeyPrimaryVersion. */
- public UnaryCallSettings.Builder
- updateCryptoKeyPrimaryVersionSettings() {
- return getStubSettingsBuilder().updateCryptoKeyPrimaryVersionSettings();
+ /** Returns the builder for the settings used for calls to macSign. */
+ public UnaryCallSettings.Builder macSignSettings() {
+ return getStubSettingsBuilder().macSignSettings();
}
- /** Returns the builder for the settings used for calls to destroyCryptoKeyVersion. */
- public UnaryCallSettings.Builder
- destroyCryptoKeyVersionSettings() {
- return getStubSettingsBuilder().destroyCryptoKeyVersionSettings();
+ /** Returns the builder for the settings used for calls to macVerify. */
+ public UnaryCallSettings.Builder macVerifySettings() {
+ return getStubSettingsBuilder().macVerifySettings();
}
- /** Returns the builder for the settings used for calls to restoreCryptoKeyVersion. */
- public UnaryCallSettings.Builder
- restoreCryptoKeyVersionSettings() {
- return getStubSettingsBuilder().restoreCryptoKeyVersionSettings();
+ /** Returns the builder for the settings used for calls to generateRandomBytes. */
+ public UnaryCallSettings.Builder
+ generateRandomBytesSettings() {
+ return getStubSettingsBuilder().generateRandomBytesSettings();
}
/** Returns the builder for the settings used for calls to setIamPolicy. */
diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/gapic_metadata.json b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/gapic_metadata.json
index e34e14ad..892870aa 100644
--- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/gapic_metadata.json
+++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/gapic_metadata.json
@@ -37,6 +37,9 @@
"Encrypt": {
"methods": ["encrypt", "encrypt", "encrypt", "encryptCallable"]
},
+ "GenerateRandomBytes": {
+ "methods": ["generateRandomBytes", "generateRandomBytes", "generateRandomBytesCallable"]
+ },
"GetCryptoKey": {
"methods": ["getCryptoKey", "getCryptoKey", "getCryptoKey", "getCryptoKeyCallable"]
},
@@ -70,6 +73,12 @@
"ListKeyRings": {
"methods": ["listKeyRings", "listKeyRings", "listKeyRings", "listKeyRingsPagedCallable", "listKeyRingsCallable"]
},
+ "MacSign": {
+ "methods": ["macSign", "macSign", "macSign", "macSignCallable"]
+ },
+ "MacVerify": {
+ "methods": ["macVerify", "macVerify", "macVerify", "macVerifyCallable"]
+ },
"RestoreCryptoKeyVersion": {
"methods": ["restoreCryptoKeyVersion", "restoreCryptoKeyVersion", "restoreCryptoKeyVersion", "restoreCryptoKeyVersionCallable"]
},
diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/GrpcKeyManagementServiceStub.java b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/GrpcKeyManagementServiceStub.java
index 280a21da..7ebd65ac 100644
--- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/GrpcKeyManagementServiceStub.java
+++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/GrpcKeyManagementServiceStub.java
@@ -42,6 +42,8 @@
import com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.EncryptRequest;
import com.google.cloud.kms.v1.EncryptResponse;
+import com.google.cloud.kms.v1.GenerateRandomBytesRequest;
+import com.google.cloud.kms.v1.GenerateRandomBytesResponse;
import com.google.cloud.kms.v1.GetCryptoKeyRequest;
import com.google.cloud.kms.v1.GetCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.GetImportJobRequest;
@@ -58,6 +60,10 @@
import com.google.cloud.kms.v1.ListImportJobsResponse;
import com.google.cloud.kms.v1.ListKeyRingsRequest;
import com.google.cloud.kms.v1.ListKeyRingsResponse;
+import com.google.cloud.kms.v1.MacSignRequest;
+import com.google.cloud.kms.v1.MacSignResponse;
+import com.google.cloud.kms.v1.MacVerifyRequest;
+import com.google.cloud.kms.v1.MacVerifyResponse;
import com.google.cloud.kms.v1.PublicKey;
import com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest;
@@ -242,6 +248,37 @@ public class GrpcKeyManagementServiceStub extends KeyManagementServiceStub {
.setResponseMarshaller(ProtoUtils.marshaller(CryptoKeyVersion.getDefaultInstance()))
.build();
+ private static final MethodDescriptor
+ updateCryptoKeyPrimaryVersionMethodDescriptor =
+ MethodDescriptor.newBuilder()
+ .setType(MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName(
+ "google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion")
+ .setRequestMarshaller(
+ ProtoUtils.marshaller(UpdateCryptoKeyPrimaryVersionRequest.getDefaultInstance()))
+ .setResponseMarshaller(ProtoUtils.marshaller(CryptoKey.getDefaultInstance()))
+ .build();
+
+ private static final MethodDescriptor
+ destroyCryptoKeyVersionMethodDescriptor =
+ MethodDescriptor.newBuilder()
+ .setType(MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName("google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion")
+ .setRequestMarshaller(
+ ProtoUtils.marshaller(DestroyCryptoKeyVersionRequest.getDefaultInstance()))
+ .setResponseMarshaller(ProtoUtils.marshaller(CryptoKeyVersion.getDefaultInstance()))
+ .build();
+
+ private static final MethodDescriptor
+ restoreCryptoKeyVersionMethodDescriptor =
+ MethodDescriptor.newBuilder()
+ .setType(MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName("google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion")
+ .setRequestMarshaller(
+ ProtoUtils.marshaller(RestoreCryptoKeyVersionRequest.getDefaultInstance()))
+ .setResponseMarshaller(ProtoUtils.marshaller(CryptoKeyVersion.getDefaultInstance()))
+ .build();
+
private static final MethodDescriptor encryptMethodDescriptor =
MethodDescriptor.newBuilder()
.setType(MethodDescriptor.MethodType.UNARY)
@@ -280,35 +317,32 @@ public class GrpcKeyManagementServiceStub extends KeyManagementServiceStub {
ProtoUtils.marshaller(AsymmetricDecryptResponse.getDefaultInstance()))
.build();
- private static final MethodDescriptor
- updateCryptoKeyPrimaryVersionMethodDescriptor =
- MethodDescriptor.newBuilder()
- .setType(MethodDescriptor.MethodType.UNARY)
- .setFullMethodName(
- "google.cloud.kms.v1.KeyManagementService/UpdateCryptoKeyPrimaryVersion")
- .setRequestMarshaller(
- ProtoUtils.marshaller(UpdateCryptoKeyPrimaryVersionRequest.getDefaultInstance()))
- .setResponseMarshaller(ProtoUtils.marshaller(CryptoKey.getDefaultInstance()))
- .build();
+ private static final MethodDescriptor macSignMethodDescriptor =
+ MethodDescriptor.newBuilder()
+ .setType(MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName("google.cloud.kms.v1.KeyManagementService/MacSign")
+ .setRequestMarshaller(ProtoUtils.marshaller(MacSignRequest.getDefaultInstance()))
+ .setResponseMarshaller(ProtoUtils.marshaller(MacSignResponse.getDefaultInstance()))
+ .build();
- private static final MethodDescriptor
- destroyCryptoKeyVersionMethodDescriptor =
- MethodDescriptor.newBuilder()
+ private static final MethodDescriptor
+ macVerifyMethodDescriptor =
+ MethodDescriptor.newBuilder()
.setType(MethodDescriptor.MethodType.UNARY)
- .setFullMethodName("google.cloud.kms.v1.KeyManagementService/DestroyCryptoKeyVersion")
- .setRequestMarshaller(
- ProtoUtils.marshaller(DestroyCryptoKeyVersionRequest.getDefaultInstance()))
- .setResponseMarshaller(ProtoUtils.marshaller(CryptoKeyVersion.getDefaultInstance()))
+ .setFullMethodName("google.cloud.kms.v1.KeyManagementService/MacVerify")
+ .setRequestMarshaller(ProtoUtils.marshaller(MacVerifyRequest.getDefaultInstance()))
+ .setResponseMarshaller(ProtoUtils.marshaller(MacVerifyResponse.getDefaultInstance()))
.build();
- private static final MethodDescriptor
- restoreCryptoKeyVersionMethodDescriptor =
- MethodDescriptor.newBuilder()
+ private static final MethodDescriptor
+ generateRandomBytesMethodDescriptor =
+ MethodDescriptor.newBuilder()
.setType(MethodDescriptor.MethodType.UNARY)
- .setFullMethodName("google.cloud.kms.v1.KeyManagementService/RestoreCryptoKeyVersion")
+ .setFullMethodName("google.cloud.kms.v1.KeyManagementService/GenerateRandomBytes")
.setRequestMarshaller(
- ProtoUtils.marshaller(RestoreCryptoKeyVersionRequest.getDefaultInstance()))
- .setResponseMarshaller(ProtoUtils.marshaller(CryptoKeyVersion.getDefaultInstance()))
+ ProtoUtils.marshaller(GenerateRandomBytesRequest.getDefaultInstance()))
+ .setResponseMarshaller(
+ ProtoUtils.marshaller(GenerateRandomBytesResponse.getDefaultInstance()))
.build();
private static final MethodDescriptor setIamPolicyMethodDescriptor =
@@ -367,17 +401,21 @@ public class GrpcKeyManagementServiceStub extends KeyManagementServiceStub {
private final UnaryCallable updateCryptoKeyCallable;
private final UnaryCallable
updateCryptoKeyVersionCallable;
- private final UnaryCallable encryptCallable;
- private final UnaryCallable decryptCallable;
- private final UnaryCallable asymmetricSignCallable;
- private final UnaryCallable
- asymmetricDecryptCallable;
private final UnaryCallable
updateCryptoKeyPrimaryVersionCallable;
private final UnaryCallable
destroyCryptoKeyVersionCallable;
private final UnaryCallable
restoreCryptoKeyVersionCallable;
+ private final UnaryCallable encryptCallable;
+ private final UnaryCallable decryptCallable;
+ private final UnaryCallable asymmetricSignCallable;
+ private final UnaryCallable
+ asymmetricDecryptCallable;
+ private final UnaryCallable macSignCallable;
+ private final UnaryCallable macVerifyCallable;
+ private final UnaryCallable
+ generateRandomBytesCallable;
private final UnaryCallable setIamPolicyCallable;
private final UnaryCallable getIamPolicyCallable;
private final UnaryCallable
@@ -597,6 +635,39 @@ protected GrpcKeyManagementServiceStub(
return params.build();
})
.build();
+ GrpcCallSettings
+ updateCryptoKeyPrimaryVersionTransportSettings =
+ GrpcCallSettings.newBuilder()
+ .setMethodDescriptor(updateCryptoKeyPrimaryVersionMethodDescriptor)
+ .setParamsExtractor(
+ request -> {
+ ImmutableMap.Builder params = ImmutableMap.builder();
+ params.put("name", String.valueOf(request.getName()));
+ return params.build();
+ })
+ .build();
+ GrpcCallSettings
+ destroyCryptoKeyVersionTransportSettings =
+ GrpcCallSettings.newBuilder()
+ .setMethodDescriptor(destroyCryptoKeyVersionMethodDescriptor)
+ .setParamsExtractor(
+ request -> {
+ ImmutableMap.Builder params = ImmutableMap.builder();
+ params.put("name", String.valueOf(request.getName()));
+ return params.build();
+ })
+ .build();
+ GrpcCallSettings
+ restoreCryptoKeyVersionTransportSettings =
+ GrpcCallSettings.newBuilder()
+ .setMethodDescriptor(restoreCryptoKeyVersionMethodDescriptor)
+ .setParamsExtractor(
+ request -> {
+ ImmutableMap.Builder params = ImmutableMap.builder();
+ params.put("name", String.valueOf(request.getName()));
+ return params.build();
+ })
+ .build();
GrpcCallSettings encryptTransportSettings =
GrpcCallSettings.newBuilder()
.setMethodDescriptor(encryptMethodDescriptor)
@@ -639,36 +710,34 @@ protected GrpcKeyManagementServiceStub(
return params.build();
})
.build();
- GrpcCallSettings
- updateCryptoKeyPrimaryVersionTransportSettings =
- GrpcCallSettings.newBuilder()
- .setMethodDescriptor(updateCryptoKeyPrimaryVersionMethodDescriptor)
- .setParamsExtractor(
- request -> {
- ImmutableMap.Builder params = ImmutableMap.builder();
- params.put("name", String.valueOf(request.getName()));
- return params.build();
- })
- .build();
- GrpcCallSettings
- destroyCryptoKeyVersionTransportSettings =
- GrpcCallSettings.newBuilder()
- .setMethodDescriptor(destroyCryptoKeyVersionMethodDescriptor)
- .setParamsExtractor(
- request -> {
- ImmutableMap.Builder params = ImmutableMap.builder();
- params.put("name", String.valueOf(request.getName()));
- return params.build();
- })
- .build();
- GrpcCallSettings
- restoreCryptoKeyVersionTransportSettings =
- GrpcCallSettings.newBuilder()
- .setMethodDescriptor(restoreCryptoKeyVersionMethodDescriptor)
+ GrpcCallSettings macSignTransportSettings =
+ GrpcCallSettings.newBuilder()
+ .setMethodDescriptor(macSignMethodDescriptor)
+ .setParamsExtractor(
+ request -> {
+ ImmutableMap.Builder params = ImmutableMap.builder();
+ params.put("name", String.valueOf(request.getName()));
+ return params.build();
+ })
+ .build();
+ GrpcCallSettings macVerifyTransportSettings =
+ GrpcCallSettings.newBuilder()
+ .setMethodDescriptor(macVerifyMethodDescriptor)
+ .setParamsExtractor(
+ request -> {
+ ImmutableMap.Builder params = ImmutableMap.builder();
+ params.put("name", String.valueOf(request.getName()));
+ return params.build();
+ })
+ .build();
+ GrpcCallSettings
+ generateRandomBytesTransportSettings =
+ GrpcCallSettings.newBuilder()
+ .setMethodDescriptor(generateRandomBytesMethodDescriptor)
.setParamsExtractor(
request -> {
ImmutableMap.Builder params = ImmutableMap.builder();
- params.put("name", String.valueOf(request.getName()));
+ params.put("location", String.valueOf(request.getLocation()));
return params.build();
})
.build();
@@ -776,6 +845,21 @@ protected GrpcKeyManagementServiceStub(
updateCryptoKeyVersionTransportSettings,
settings.updateCryptoKeyVersionSettings(),
clientContext);
+ this.updateCryptoKeyPrimaryVersionCallable =
+ callableFactory.createUnaryCallable(
+ updateCryptoKeyPrimaryVersionTransportSettings,
+ settings.updateCryptoKeyPrimaryVersionSettings(),
+ clientContext);
+ this.destroyCryptoKeyVersionCallable =
+ callableFactory.createUnaryCallable(
+ destroyCryptoKeyVersionTransportSettings,
+ settings.destroyCryptoKeyVersionSettings(),
+ clientContext);
+ this.restoreCryptoKeyVersionCallable =
+ callableFactory.createUnaryCallable(
+ restoreCryptoKeyVersionTransportSettings,
+ settings.restoreCryptoKeyVersionSettings(),
+ clientContext);
this.encryptCallable =
callableFactory.createUnaryCallable(
encryptTransportSettings, settings.encryptSettings(), clientContext);
@@ -790,20 +874,16 @@ protected GrpcKeyManagementServiceStub(
asymmetricDecryptTransportSettings,
settings.asymmetricDecryptSettings(),
clientContext);
- this.updateCryptoKeyPrimaryVersionCallable =
+ this.macSignCallable =
callableFactory.createUnaryCallable(
- updateCryptoKeyPrimaryVersionTransportSettings,
- settings.updateCryptoKeyPrimaryVersionSettings(),
- clientContext);
- this.destroyCryptoKeyVersionCallable =
+ macSignTransportSettings, settings.macSignSettings(), clientContext);
+ this.macVerifyCallable =
callableFactory.createUnaryCallable(
- destroyCryptoKeyVersionTransportSettings,
- settings.destroyCryptoKeyVersionSettings(),
- clientContext);
- this.restoreCryptoKeyVersionCallable =
+ macVerifyTransportSettings, settings.macVerifySettings(), clientContext);
+ this.generateRandomBytesCallable =
callableFactory.createUnaryCallable(
- restoreCryptoKeyVersionTransportSettings,
- settings.restoreCryptoKeyVersionSettings(),
+ generateRandomBytesTransportSettings,
+ settings.generateRandomBytesSettings(),
clientContext);
this.setIamPolicyCallable =
callableFactory.createUnaryCallable(
@@ -932,6 +1012,24 @@ public UnaryCallable updateCryptoKeyCallable(
return updateCryptoKeyVersionCallable;
}
+ @Override
+ public UnaryCallable
+ updateCryptoKeyPrimaryVersionCallable() {
+ return updateCryptoKeyPrimaryVersionCallable;
+ }
+
+ @Override
+ public UnaryCallable
+ destroyCryptoKeyVersionCallable() {
+ return destroyCryptoKeyVersionCallable;
+ }
+
+ @Override
+ public UnaryCallable
+ restoreCryptoKeyVersionCallable() {
+ return restoreCryptoKeyVersionCallable;
+ }
+
@Override
public UnaryCallable encryptCallable() {
return encryptCallable;
@@ -954,21 +1052,19 @@ public UnaryCallable asymmetricSi
}
@Override
- public UnaryCallable
- updateCryptoKeyPrimaryVersionCallable() {
- return updateCryptoKeyPrimaryVersionCallable;
+ public UnaryCallable macSignCallable() {
+ return macSignCallable;
}
@Override
- public UnaryCallable
- destroyCryptoKeyVersionCallable() {
- return destroyCryptoKeyVersionCallable;
+ public UnaryCallable macVerifyCallable() {
+ return macVerifyCallable;
}
@Override
- public UnaryCallable
- restoreCryptoKeyVersionCallable() {
- return restoreCryptoKeyVersionCallable;
+ public UnaryCallable
+ generateRandomBytesCallable() {
+ return generateRandomBytesCallable;
}
@Override
diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStub.java b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStub.java
index 45c4fb2e..75a38b14 100644
--- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStub.java
+++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStub.java
@@ -38,6 +38,8 @@
import com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.EncryptRequest;
import com.google.cloud.kms.v1.EncryptResponse;
+import com.google.cloud.kms.v1.GenerateRandomBytesRequest;
+import com.google.cloud.kms.v1.GenerateRandomBytesResponse;
import com.google.cloud.kms.v1.GetCryptoKeyRequest;
import com.google.cloud.kms.v1.GetCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.GetImportJobRequest;
@@ -54,6 +56,10 @@
import com.google.cloud.kms.v1.ListImportJobsResponse;
import com.google.cloud.kms.v1.ListKeyRingsRequest;
import com.google.cloud.kms.v1.ListKeyRingsResponse;
+import com.google.cloud.kms.v1.MacSignRequest;
+import com.google.cloud.kms.v1.MacSignResponse;
+import com.google.cloud.kms.v1.MacVerifyRequest;
+import com.google.cloud.kms.v1.MacVerifyResponse;
import com.google.cloud.kms.v1.PublicKey;
import com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest;
@@ -163,6 +169,22 @@ public UnaryCallable updateCryptoKeyCallable(
throw new UnsupportedOperationException("Not implemented: updateCryptoKeyVersionCallable()");
}
+ public UnaryCallable
+ updateCryptoKeyPrimaryVersionCallable() {
+ throw new UnsupportedOperationException(
+ "Not implemented: updateCryptoKeyPrimaryVersionCallable()");
+ }
+
+ public UnaryCallable
+ destroyCryptoKeyVersionCallable() {
+ throw new UnsupportedOperationException("Not implemented: destroyCryptoKeyVersionCallable()");
+ }
+
+ public UnaryCallable
+ restoreCryptoKeyVersionCallable() {
+ throw new UnsupportedOperationException("Not implemented: restoreCryptoKeyVersionCallable()");
+ }
+
public UnaryCallable encryptCallable() {
throw new UnsupportedOperationException("Not implemented: encryptCallable()");
}
@@ -180,20 +202,17 @@ public UnaryCallable asymmetricSi
throw new UnsupportedOperationException("Not implemented: asymmetricDecryptCallable()");
}
- public UnaryCallable
- updateCryptoKeyPrimaryVersionCallable() {
- throw new UnsupportedOperationException(
- "Not implemented: updateCryptoKeyPrimaryVersionCallable()");
+ public UnaryCallable macSignCallable() {
+ throw new UnsupportedOperationException("Not implemented: macSignCallable()");
}
- public UnaryCallable
- destroyCryptoKeyVersionCallable() {
- throw new UnsupportedOperationException("Not implemented: destroyCryptoKeyVersionCallable()");
+ public UnaryCallable macVerifyCallable() {
+ throw new UnsupportedOperationException("Not implemented: macVerifyCallable()");
}
- public UnaryCallable
- restoreCryptoKeyVersionCallable() {
- throw new UnsupportedOperationException("Not implemented: restoreCryptoKeyVersionCallable()");
+ public UnaryCallable
+ generateRandomBytesCallable() {
+ throw new UnsupportedOperationException("Not implemented: generateRandomBytesCallable()");
}
public UnaryCallable setIamPolicyCallable() {
diff --git a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStubSettings.java b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStubSettings.java
index 74dba4f6..e0e940b3 100644
--- a/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStubSettings.java
+++ b/google-cloud-kms/src/main/java/com/google/cloud/kms/v1/stub/KeyManagementServiceStubSettings.java
@@ -58,6 +58,8 @@
import com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.EncryptRequest;
import com.google.cloud.kms.v1.EncryptResponse;
+import com.google.cloud.kms.v1.GenerateRandomBytesRequest;
+import com.google.cloud.kms.v1.GenerateRandomBytesResponse;
import com.google.cloud.kms.v1.GetCryptoKeyRequest;
import com.google.cloud.kms.v1.GetCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.GetImportJobRequest;
@@ -74,6 +76,10 @@
import com.google.cloud.kms.v1.ListImportJobsResponse;
import com.google.cloud.kms.v1.ListKeyRingsRequest;
import com.google.cloud.kms.v1.ListKeyRingsResponse;
+import com.google.cloud.kms.v1.MacSignRequest;
+import com.google.cloud.kms.v1.MacSignResponse;
+import com.google.cloud.kms.v1.MacVerifyRequest;
+import com.google.cloud.kms.v1.MacVerifyResponse;
import com.google.cloud.kms.v1.PublicKey;
import com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest;
import com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest;
@@ -166,18 +172,22 @@ public class KeyManagementServiceStubSettings
private final UnaryCallSettings updateCryptoKeySettings;
private final UnaryCallSettings
updateCryptoKeyVersionSettings;
- private final UnaryCallSettings encryptSettings;
- private final UnaryCallSettings decryptSettings;
- private final UnaryCallSettings
- asymmetricSignSettings;
- private final UnaryCallSettings
- asymmetricDecryptSettings;
private final UnaryCallSettings
updateCryptoKeyPrimaryVersionSettings;
private final UnaryCallSettings
destroyCryptoKeyVersionSettings;
private final UnaryCallSettings
restoreCryptoKeyVersionSettings;
+ private final UnaryCallSettings encryptSettings;
+ private final UnaryCallSettings decryptSettings;
+ private final UnaryCallSettings
+ asymmetricSignSettings;
+ private final UnaryCallSettings
+ asymmetricDecryptSettings;
+ private final UnaryCallSettings macSignSettings;
+ private final UnaryCallSettings macVerifySettings;
+ private final UnaryCallSettings
+ generateRandomBytesSettings;
private final UnaryCallSettings setIamPolicySettings;
private final UnaryCallSettings getIamPolicySettings;
private final UnaryCallSettings
@@ -502,6 +512,24 @@ public UnaryCallSettings updateCryptoKeySetti
return updateCryptoKeyVersionSettings;
}
+ /** Returns the object with the settings used for calls to updateCryptoKeyPrimaryVersion. */
+ public UnaryCallSettings
+ updateCryptoKeyPrimaryVersionSettings() {
+ return updateCryptoKeyPrimaryVersionSettings;
+ }
+
+ /** Returns the object with the settings used for calls to destroyCryptoKeyVersion. */
+ public UnaryCallSettings
+ destroyCryptoKeyVersionSettings() {
+ return destroyCryptoKeyVersionSettings;
+ }
+
+ /** Returns the object with the settings used for calls to restoreCryptoKeyVersion. */
+ public UnaryCallSettings
+ restoreCryptoKeyVersionSettings() {
+ return restoreCryptoKeyVersionSettings;
+ }
+
/** Returns the object with the settings used for calls to encrypt. */
public UnaryCallSettings encryptSettings() {
return encryptSettings;
@@ -523,22 +551,20 @@ public UnaryCallSettings asymmetr
return asymmetricDecryptSettings;
}
- /** Returns the object with the settings used for calls to updateCryptoKeyPrimaryVersion. */
- public UnaryCallSettings
- updateCryptoKeyPrimaryVersionSettings() {
- return updateCryptoKeyPrimaryVersionSettings;
+ /** Returns the object with the settings used for calls to macSign. */
+ public UnaryCallSettings macSignSettings() {
+ return macSignSettings;
}
- /** Returns the object with the settings used for calls to destroyCryptoKeyVersion. */
- public UnaryCallSettings
- destroyCryptoKeyVersionSettings() {
- return destroyCryptoKeyVersionSettings;
+ /** Returns the object with the settings used for calls to macVerify. */
+ public UnaryCallSettings macVerifySettings() {
+ return macVerifySettings;
}
- /** Returns the object with the settings used for calls to restoreCryptoKeyVersion. */
- public UnaryCallSettings
- restoreCryptoKeyVersionSettings() {
- return restoreCryptoKeyVersionSettings;
+ /** Returns the object with the settings used for calls to generateRandomBytes. */
+ public UnaryCallSettings
+ generateRandomBytesSettings() {
+ return generateRandomBytesSettings;
}
/** Returns the object with the settings used for calls to setIamPolicy. */
@@ -647,14 +673,17 @@ protected KeyManagementServiceStubSettings(Builder settingsBuilder) throws IOExc
createImportJobSettings = settingsBuilder.createImportJobSettings().build();
updateCryptoKeySettings = settingsBuilder.updateCryptoKeySettings().build();
updateCryptoKeyVersionSettings = settingsBuilder.updateCryptoKeyVersionSettings().build();
- encryptSettings = settingsBuilder.encryptSettings().build();
- decryptSettings = settingsBuilder.decryptSettings().build();
- asymmetricSignSettings = settingsBuilder.asymmetricSignSettings().build();
- asymmetricDecryptSettings = settingsBuilder.asymmetricDecryptSettings().build();
updateCryptoKeyPrimaryVersionSettings =
settingsBuilder.updateCryptoKeyPrimaryVersionSettings().build();
destroyCryptoKeyVersionSettings = settingsBuilder.destroyCryptoKeyVersionSettings().build();
restoreCryptoKeyVersionSettings = settingsBuilder.restoreCryptoKeyVersionSettings().build();
+ encryptSettings = settingsBuilder.encryptSettings().build();
+ decryptSettings = settingsBuilder.decryptSettings().build();
+ asymmetricSignSettings = settingsBuilder.asymmetricSignSettings().build();
+ asymmetricDecryptSettings = settingsBuilder.asymmetricDecryptSettings().build();
+ macSignSettings = settingsBuilder.macSignSettings().build();
+ macVerifySettings = settingsBuilder.macVerifySettings().build();
+ generateRandomBytesSettings = settingsBuilder.generateRandomBytesSettings().build();
setIamPolicySettings = settingsBuilder.setIamPolicySettings().build();
getIamPolicySettings = settingsBuilder.getIamPolicySettings().build();
testIamPermissionsSettings = settingsBuilder.testIamPermissionsSettings().build();
@@ -697,18 +726,22 @@ public static class Builder
updateCryptoKeySettings;
private final UnaryCallSettings.Builder
updateCryptoKeyVersionSettings;
- private final UnaryCallSettings.Builder encryptSettings;
- private final UnaryCallSettings.Builder decryptSettings;
- private final UnaryCallSettings.Builder
- asymmetricSignSettings;
- private final UnaryCallSettings.Builder
- asymmetricDecryptSettings;
private final UnaryCallSettings.Builder
updateCryptoKeyPrimaryVersionSettings;
private final UnaryCallSettings.Builder
destroyCryptoKeyVersionSettings;
private final UnaryCallSettings.Builder
restoreCryptoKeyVersionSettings;
+ private final UnaryCallSettings.Builder encryptSettings;
+ private final UnaryCallSettings.Builder decryptSettings;
+ private final UnaryCallSettings.Builder
+ asymmetricSignSettings;
+ private final UnaryCallSettings.Builder
+ asymmetricDecryptSettings;
+ private final UnaryCallSettings.Builder macSignSettings;
+ private final UnaryCallSettings.Builder macVerifySettings;
+ private final UnaryCallSettings.Builder
+ generateRandomBytesSettings;
private final UnaryCallSettings.Builder setIamPolicySettings;
private final UnaryCallSettings.Builder getIamPolicySettings;
private final UnaryCallSettings.Builder
@@ -726,6 +759,7 @@ public static class Builder
StatusCode.Code.UNAVAILABLE, StatusCode.Code.DEADLINE_EXCEEDED)));
definitions.put(
"no_retry_0_codes", ImmutableSet.copyOf(Lists.newArrayList()));
+ definitions.put("no_retry_codes", ImmutableSet.copyOf(Lists.newArrayList()));
RETRYABLE_CODE_DEFINITIONS = definitions.build();
}
@@ -753,6 +787,8 @@ public static class Builder
.setTotalTimeout(Duration.ofMillis(60000L))
.build();
definitions.put("no_retry_0_params", settings);
+ settings = RetrySettings.newBuilder().setRpcTimeoutMultiplier(1.0).build();
+ definitions.put("no_retry_params", settings);
RETRY_PARAM_DEFINITIONS = definitions.build();
}
@@ -780,13 +816,16 @@ protected Builder(ClientContext clientContext) {
createImportJobSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
updateCryptoKeySettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
updateCryptoKeyVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
+ updateCryptoKeyPrimaryVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
+ destroyCryptoKeyVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
+ restoreCryptoKeyVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
encryptSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
decryptSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
asymmetricSignSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
asymmetricDecryptSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
- updateCryptoKeyPrimaryVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
- destroyCryptoKeyVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
- restoreCryptoKeyVersionSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
+ macSignSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
+ macVerifySettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
+ generateRandomBytesSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
setIamPolicySettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
getIamPolicySettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
testIamPermissionsSettings = UnaryCallSettings.newUnaryCallSettingsBuilder();
@@ -809,13 +848,16 @@ protected Builder(ClientContext clientContext) {
createImportJobSettings,
updateCryptoKeySettings,
updateCryptoKeyVersionSettings,
+ updateCryptoKeyPrimaryVersionSettings,
+ destroyCryptoKeyVersionSettings,
+ restoreCryptoKeyVersionSettings,
encryptSettings,
decryptSettings,
asymmetricSignSettings,
asymmetricDecryptSettings,
- updateCryptoKeyPrimaryVersionSettings,
- destroyCryptoKeyVersionSettings,
- restoreCryptoKeyVersionSettings,
+ macSignSettings,
+ macVerifySettings,
+ generateRandomBytesSettings,
setIamPolicySettings,
getIamPolicySettings,
testIamPermissionsSettings);
@@ -841,14 +883,17 @@ protected Builder(KeyManagementServiceStubSettings settings) {
createImportJobSettings = settings.createImportJobSettings.toBuilder();
updateCryptoKeySettings = settings.updateCryptoKeySettings.toBuilder();
updateCryptoKeyVersionSettings = settings.updateCryptoKeyVersionSettings.toBuilder();
- encryptSettings = settings.encryptSettings.toBuilder();
- decryptSettings = settings.decryptSettings.toBuilder();
- asymmetricSignSettings = settings.asymmetricSignSettings.toBuilder();
- asymmetricDecryptSettings = settings.asymmetricDecryptSettings.toBuilder();
updateCryptoKeyPrimaryVersionSettings =
settings.updateCryptoKeyPrimaryVersionSettings.toBuilder();
destroyCryptoKeyVersionSettings = settings.destroyCryptoKeyVersionSettings.toBuilder();
restoreCryptoKeyVersionSettings = settings.restoreCryptoKeyVersionSettings.toBuilder();
+ encryptSettings = settings.encryptSettings.toBuilder();
+ decryptSettings = settings.decryptSettings.toBuilder();
+ asymmetricSignSettings = settings.asymmetricSignSettings.toBuilder();
+ asymmetricDecryptSettings = settings.asymmetricDecryptSettings.toBuilder();
+ macSignSettings = settings.macSignSettings.toBuilder();
+ macVerifySettings = settings.macVerifySettings.toBuilder();
+ generateRandomBytesSettings = settings.generateRandomBytesSettings.toBuilder();
setIamPolicySettings = settings.setIamPolicySettings.toBuilder();
getIamPolicySettings = settings.getIamPolicySettings.toBuilder();
testIamPermissionsSettings = settings.testIamPermissionsSettings.toBuilder();
@@ -871,13 +916,16 @@ protected Builder(KeyManagementServiceStubSettings settings) {
createImportJobSettings,
updateCryptoKeySettings,
updateCryptoKeyVersionSettings,
+ updateCryptoKeyPrimaryVersionSettings,
+ destroyCryptoKeyVersionSettings,
+ restoreCryptoKeyVersionSettings,
encryptSettings,
decryptSettings,
asymmetricSignSettings,
asymmetricDecryptSettings,
- updateCryptoKeyPrimaryVersionSettings,
- destroyCryptoKeyVersionSettings,
- restoreCryptoKeyVersionSettings,
+ macSignSettings,
+ macVerifySettings,
+ generateRandomBytesSettings,
setIamPolicySettings,
getIamPolicySettings,
testIamPermissionsSettings);
@@ -978,40 +1026,55 @@ private static Builder initDefaults(Builder builder) {
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .encryptSettings()
+ .updateCryptoKeyPrimaryVersionSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .decryptSettings()
+ .destroyCryptoKeyVersionSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .asymmetricSignSettings()
+ .restoreCryptoKeyVersionSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .asymmetricDecryptSettings()
+ .encryptSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .updateCryptoKeyPrimaryVersionSettings()
+ .decryptSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .destroyCryptoKeyVersionSettings()
+ .asymmetricSignSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
builder
- .restoreCryptoKeyVersionSettings()
+ .asymmetricDecryptSettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
.setRetrySettings(RETRY_PARAM_DEFINITIONS.get("retry_policy_1_params"));
+ builder
+ .macSignSettings()
+ .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_codes"))
+ .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_params"));
+
+ builder
+ .macVerifySettings()
+ .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_codes"))
+ .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_params"));
+
+ builder
+ .generateRandomBytesSettings()
+ .setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("no_retry_codes"))
+ .setRetrySettings(RETRY_PARAM_DEFINITIONS.get("no_retry_params"));
+
builder
.setIamPolicySettings()
.setRetryableCodes(RETRYABLE_CODE_DEFINITIONS.get("retry_policy_1_codes"))
@@ -1139,6 +1202,24 @@ public UnaryCallSettings.Builder updateCrypto
return updateCryptoKeyVersionSettings;
}
+ /** Returns the builder for the settings used for calls to updateCryptoKeyPrimaryVersion. */
+ public UnaryCallSettings.Builder
+ updateCryptoKeyPrimaryVersionSettings() {
+ return updateCryptoKeyPrimaryVersionSettings;
+ }
+
+ /** Returns the builder for the settings used for calls to destroyCryptoKeyVersion. */
+ public UnaryCallSettings.Builder
+ destroyCryptoKeyVersionSettings() {
+ return destroyCryptoKeyVersionSettings;
+ }
+
+ /** Returns the builder for the settings used for calls to restoreCryptoKeyVersion. */
+ public UnaryCallSettings.Builder
+ restoreCryptoKeyVersionSettings() {
+ return restoreCryptoKeyVersionSettings;
+ }
+
/** Returns the builder for the settings used for calls to encrypt. */
public UnaryCallSettings.Builder encryptSettings() {
return encryptSettings;
@@ -1161,22 +1242,20 @@ public UnaryCallSettings.Builder decryptSetting
return asymmetricDecryptSettings;
}
- /** Returns the builder for the settings used for calls to updateCryptoKeyPrimaryVersion. */
- public UnaryCallSettings.Builder
- updateCryptoKeyPrimaryVersionSettings() {
- return updateCryptoKeyPrimaryVersionSettings;
+ /** Returns the builder for the settings used for calls to macSign. */
+ public UnaryCallSettings.Builder macSignSettings() {
+ return macSignSettings;
}
- /** Returns the builder for the settings used for calls to destroyCryptoKeyVersion. */
- public UnaryCallSettings.Builder
- destroyCryptoKeyVersionSettings() {
- return destroyCryptoKeyVersionSettings;
+ /** Returns the builder for the settings used for calls to macVerify. */
+ public UnaryCallSettings.Builder macVerifySettings() {
+ return macVerifySettings;
}
- /** Returns the builder for the settings used for calls to restoreCryptoKeyVersion. */
- public UnaryCallSettings.Builder
- restoreCryptoKeyVersionSettings() {
- return restoreCryptoKeyVersionSettings;
+ /** Returns the builder for the settings used for calls to generateRandomBytes. */
+ public UnaryCallSettings.Builder
+ generateRandomBytesSettings() {
+ return generateRandomBytesSettings;
}
/** Returns the builder for the settings used for calls to setIamPolicy. */
diff --git a/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java b/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java
index a7f1b8aa..ba4e3107 100644
--- a/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java
+++ b/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/KeyManagementServiceClientTest.java
@@ -40,6 +40,7 @@
import com.google.iam.v1.TestIamPermissionsResponse;
import com.google.protobuf.AbstractMessage;
import com.google.protobuf.ByteString;
+import com.google.protobuf.Duration;
import com.google.protobuf.FieldMask;
import com.google.protobuf.Int64Value;
import com.google.protobuf.Timestamp;
@@ -545,6 +546,8 @@ public void getCryptoKeyTest() throws Exception {
.setNextRotationTime(Timestamp.newBuilder().build())
.setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
.putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -591,6 +594,8 @@ public void getCryptoKeyTest2() throws Exception {
.setNextRotationTime(Timestamp.newBuilder().build())
.setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
.putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -745,6 +750,7 @@ public void getPublicKeyTest() throws Exception {
.setPem("pem110872")
.setPemCrc32C(Int64Value.newBuilder().build())
.setName("name3373707")
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -789,6 +795,7 @@ public void getPublicKeyTest2() throws Exception {
.setPem("pem110872")
.setPemCrc32C(Int64Value.newBuilder().build())
.setName("name3373707")
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -1019,6 +1026,8 @@ public void createCryptoKeyTest() throws Exception {
.setNextRotationTime(Timestamp.newBuilder().build())
.setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
.putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -1070,6 +1079,8 @@ public void createCryptoKeyTest2() throws Exception {
.setNextRotationTime(Timestamp.newBuilder().build())
.setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
.putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -1418,6 +1429,8 @@ public void updateCryptoKeyTest() throws Exception {
.setNextRotationTime(Timestamp.newBuilder().build())
.setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
.putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
@@ -1514,29 +1527,35 @@ public void updateCryptoKeyVersionExceptionTest() throws Exception {
}
@Test
- public void encryptTest() throws Exception {
- EncryptResponse expectedResponse =
- EncryptResponse.newBuilder()
- .setName("name3373707")
- .setCiphertext(ByteString.EMPTY)
- .setCiphertextCrc32C(Int64Value.newBuilder().build())
- .setVerifiedPlaintextCrc32C(true)
- .setVerifiedAdditionalAuthenticatedDataCrc32C(true)
+ public void updateCryptoKeyPrimaryVersionTest() throws Exception {
+ CryptoKey expectedResponse =
+ CryptoKey.newBuilder()
+ .setName(
+ CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
+ .toString())
+ .setPrimary(CryptoKeyVersion.newBuilder().build())
+ .setCreateTime(Timestamp.newBuilder().build())
+ .setNextRotationTime(Timestamp.newBuilder().build())
+ .setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
+ .putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
- ResourceName name = KeyRingName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]");
- ByteString plaintext = ByteString.EMPTY;
+ CryptoKeyName name = CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
+ String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
- EncryptResponse actualResponse = client.encrypt(name, plaintext);
+ CryptoKey actualResponse = client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- EncryptRequest actualRequest = ((EncryptRequest) actualRequests.get(0));
+ UpdateCryptoKeyPrimaryVersionRequest actualRequest =
+ ((UpdateCryptoKeyPrimaryVersionRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
- Assert.assertEquals(plaintext, actualRequest.getPlaintext());
+ Assert.assertEquals(cryptoKeyVersionId, actualRequest.getCryptoKeyVersionId());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1544,14 +1563,15 @@ public void encryptTest() throws Exception {
}
@Test
- public void encryptExceptionTest() throws Exception {
+ public void updateCryptoKeyPrimaryVersionExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
- ResourceName name = KeyRingName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]");
- ByteString plaintext = ByteString.EMPTY;
- client.encrypt(name, plaintext);
+ CryptoKeyName name =
+ CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
+ String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
+ client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1559,29 +1579,35 @@ public void encryptExceptionTest() throws Exception {
}
@Test
- public void encryptTest2() throws Exception {
- EncryptResponse expectedResponse =
- EncryptResponse.newBuilder()
- .setName("name3373707")
- .setCiphertext(ByteString.EMPTY)
- .setCiphertextCrc32C(Int64Value.newBuilder().build())
- .setVerifiedPlaintextCrc32C(true)
- .setVerifiedAdditionalAuthenticatedDataCrc32C(true)
+ public void updateCryptoKeyPrimaryVersionTest2() throws Exception {
+ CryptoKey expectedResponse =
+ CryptoKey.newBuilder()
+ .setName(
+ CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
+ .toString())
+ .setPrimary(CryptoKeyVersion.newBuilder().build())
+ .setCreateTime(Timestamp.newBuilder().build())
+ .setNextRotationTime(Timestamp.newBuilder().build())
+ .setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
+ .putAllLabels(new HashMap())
+ .setImportOnly(true)
+ .setDestroyScheduledDuration(Duration.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
- ByteString plaintext = ByteString.EMPTY;
+ String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
- EncryptResponse actualResponse = client.encrypt(name, plaintext);
+ CryptoKey actualResponse = client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- EncryptRequest actualRequest = ((EncryptRequest) actualRequests.get(0));
+ UpdateCryptoKeyPrimaryVersionRequest actualRequest =
+ ((UpdateCryptoKeyPrimaryVersionRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
- Assert.assertEquals(plaintext, actualRequest.getPlaintext());
+ Assert.assertEquals(cryptoKeyVersionId, actualRequest.getCryptoKeyVersionId());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1589,14 +1615,14 @@ public void encryptTest2() throws Exception {
}
@Test
- public void encryptExceptionTest2() throws Exception {
+ public void updateCryptoKeyPrimaryVersionExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
- ByteString plaintext = ByteString.EMPTY;
- client.encrypt(name, plaintext);
+ String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
+ client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1604,26 +1630,43 @@ public void encryptExceptionTest2() throws Exception {
}
@Test
- public void decryptTest() throws Exception {
- DecryptResponse expectedResponse =
- DecryptResponse.newBuilder()
- .setPlaintext(ByteString.EMPTY)
- .setPlaintextCrc32C(Int64Value.newBuilder().build())
+ public void destroyCryptoKeyVersionTest() throws Exception {
+ CryptoKeyVersion expectedResponse =
+ CryptoKeyVersion.newBuilder()
+ .setName(
+ CryptoKeyVersionName.of(
+ "[PROJECT]",
+ "[LOCATION]",
+ "[KEY_RING]",
+ "[CRYPTO_KEY]",
+ "[CRYPTO_KEY_VERSION]")
+ .toString())
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .setAttestation(KeyOperationAttestation.newBuilder().build())
+ .setCreateTime(Timestamp.newBuilder().build())
+ .setGenerateTime(Timestamp.newBuilder().build())
+ .setDestroyTime(Timestamp.newBuilder().build())
+ .setDestroyEventTime(Timestamp.newBuilder().build())
+ .setImportJob("importJob-208547368")
+ .setImportTime(Timestamp.newBuilder().build())
+ .setImportFailureReason("importFailureReason985493705")
+ .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
- CryptoKeyName name = CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
- ByteString ciphertext = ByteString.EMPTY;
+ CryptoKeyVersionName name =
+ CryptoKeyVersionName.of(
+ "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- DecryptResponse actualResponse = client.decrypt(name, ciphertext);
+ CryptoKeyVersion actualResponse = client.destroyCryptoKeyVersion(name);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- DecryptRequest actualRequest = ((DecryptRequest) actualRequests.get(0));
+ DestroyCryptoKeyVersionRequest actualRequest =
+ ((DestroyCryptoKeyVersionRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
- Assert.assertEquals(ciphertext, actualRequest.getCiphertext());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1631,15 +1674,15 @@ public void decryptTest() throws Exception {
}
@Test
- public void decryptExceptionTest() throws Exception {
+ public void destroyCryptoKeyVersionExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
- CryptoKeyName name =
- CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
- ByteString ciphertext = ByteString.EMPTY;
- client.decrypt(name, ciphertext);
+ CryptoKeyVersionName name =
+ CryptoKeyVersionName.of(
+ "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ client.destroyCryptoKeyVersion(name);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1647,26 +1690,41 @@ public void decryptExceptionTest() throws Exception {
}
@Test
- public void decryptTest2() throws Exception {
- DecryptResponse expectedResponse =
- DecryptResponse.newBuilder()
- .setPlaintext(ByteString.EMPTY)
- .setPlaintextCrc32C(Int64Value.newBuilder().build())
+ public void destroyCryptoKeyVersionTest2() throws Exception {
+ CryptoKeyVersion expectedResponse =
+ CryptoKeyVersion.newBuilder()
+ .setName(
+ CryptoKeyVersionName.of(
+ "[PROJECT]",
+ "[LOCATION]",
+ "[KEY_RING]",
+ "[CRYPTO_KEY]",
+ "[CRYPTO_KEY_VERSION]")
+ .toString())
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .setAttestation(KeyOperationAttestation.newBuilder().build())
+ .setCreateTime(Timestamp.newBuilder().build())
+ .setGenerateTime(Timestamp.newBuilder().build())
+ .setDestroyTime(Timestamp.newBuilder().build())
+ .setDestroyEventTime(Timestamp.newBuilder().build())
+ .setImportJob("importJob-208547368")
+ .setImportTime(Timestamp.newBuilder().build())
+ .setImportFailureReason("importFailureReason985493705")
+ .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
- ByteString ciphertext = ByteString.EMPTY;
- DecryptResponse actualResponse = client.decrypt(name, ciphertext);
+ CryptoKeyVersion actualResponse = client.destroyCryptoKeyVersion(name);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- DecryptRequest actualRequest = ((DecryptRequest) actualRequests.get(0));
+ DestroyCryptoKeyVersionRequest actualRequest =
+ ((DestroyCryptoKeyVersionRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
- Assert.assertEquals(ciphertext, actualRequest.getCiphertext());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1674,14 +1732,13 @@ public void decryptTest2() throws Exception {
}
@Test
- public void decryptExceptionTest2() throws Exception {
+ public void destroyCryptoKeyVersionExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
- ByteString ciphertext = ByteString.EMPTY;
- client.decrypt(name, ciphertext);
+ client.destroyCryptoKeyVersion(name);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1689,30 +1746,43 @@ public void decryptExceptionTest2() throws Exception {
}
@Test
- public void asymmetricSignTest() throws Exception {
- AsymmetricSignResponse expectedResponse =
- AsymmetricSignResponse.newBuilder()
- .setSignature(ByteString.EMPTY)
- .setSignatureCrc32C(Int64Value.newBuilder().build())
- .setVerifiedDigestCrc32C(true)
- .setName("name3373707")
+ public void restoreCryptoKeyVersionTest() throws Exception {
+ CryptoKeyVersion expectedResponse =
+ CryptoKeyVersion.newBuilder()
+ .setName(
+ CryptoKeyVersionName.of(
+ "[PROJECT]",
+ "[LOCATION]",
+ "[KEY_RING]",
+ "[CRYPTO_KEY]",
+ "[CRYPTO_KEY_VERSION]")
+ .toString())
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .setAttestation(KeyOperationAttestation.newBuilder().build())
+ .setCreateTime(Timestamp.newBuilder().build())
+ .setGenerateTime(Timestamp.newBuilder().build())
+ .setDestroyTime(Timestamp.newBuilder().build())
+ .setDestroyEventTime(Timestamp.newBuilder().build())
+ .setImportJob("importJob-208547368")
+ .setImportTime(Timestamp.newBuilder().build())
+ .setImportFailureReason("importFailureReason985493705")
+ .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
CryptoKeyVersionName name =
CryptoKeyVersionName.of(
"[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- Digest digest = Digest.newBuilder().build();
- AsymmetricSignResponse actualResponse = client.asymmetricSign(name, digest);
+ CryptoKeyVersion actualResponse = client.restoreCryptoKeyVersion(name);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- AsymmetricSignRequest actualRequest = ((AsymmetricSignRequest) actualRequests.get(0));
+ RestoreCryptoKeyVersionRequest actualRequest =
+ ((RestoreCryptoKeyVersionRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
- Assert.assertEquals(digest, actualRequest.getDigest());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1720,7 +1790,7 @@ public void asymmetricSignTest() throws Exception {
}
@Test
- public void asymmetricSignExceptionTest() throws Exception {
+ public void restoreCryptoKeyVersionExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
@@ -1728,8 +1798,7 @@ public void asymmetricSignExceptionTest() throws Exception {
CryptoKeyVersionName name =
CryptoKeyVersionName.of(
"[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- Digest digest = Digest.newBuilder().build();
- client.asymmetricSign(name, digest);
+ client.restoreCryptoKeyVersion(name);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1737,28 +1806,41 @@ public void asymmetricSignExceptionTest() throws Exception {
}
@Test
- public void asymmetricSignTest2() throws Exception {
- AsymmetricSignResponse expectedResponse =
- AsymmetricSignResponse.newBuilder()
- .setSignature(ByteString.EMPTY)
- .setSignatureCrc32C(Int64Value.newBuilder().build())
- .setVerifiedDigestCrc32C(true)
- .setName("name3373707")
+ public void restoreCryptoKeyVersionTest2() throws Exception {
+ CryptoKeyVersion expectedResponse =
+ CryptoKeyVersion.newBuilder()
+ .setName(
+ CryptoKeyVersionName.of(
+ "[PROJECT]",
+ "[LOCATION]",
+ "[KEY_RING]",
+ "[CRYPTO_KEY]",
+ "[CRYPTO_KEY_VERSION]")
+ .toString())
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .setAttestation(KeyOperationAttestation.newBuilder().build())
+ .setCreateTime(Timestamp.newBuilder().build())
+ .setGenerateTime(Timestamp.newBuilder().build())
+ .setDestroyTime(Timestamp.newBuilder().build())
+ .setDestroyEventTime(Timestamp.newBuilder().build())
+ .setImportJob("importJob-208547368")
+ .setImportTime(Timestamp.newBuilder().build())
+ .setImportFailureReason("importFailureReason985493705")
+ .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
- Digest digest = Digest.newBuilder().build();
- AsymmetricSignResponse actualResponse = client.asymmetricSign(name, digest);
+ CryptoKeyVersion actualResponse = client.restoreCryptoKeyVersion(name);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- AsymmetricSignRequest actualRequest = ((AsymmetricSignRequest) actualRequests.get(0));
+ RestoreCryptoKeyVersionRequest actualRequest =
+ ((RestoreCryptoKeyVersionRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
- Assert.assertEquals(digest, actualRequest.getDigest());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1766,14 +1848,13 @@ public void asymmetricSignTest2() throws Exception {
}
@Test
- public void asymmetricSignExceptionTest2() throws Exception {
+ public void restoreCryptoKeyVersionExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
- Digest digest = Digest.newBuilder().build();
- client.asymmetricSign(name, digest);
+ client.restoreCryptoKeyVersion(name);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1781,26 +1862,117 @@ public void asymmetricSignExceptionTest2() throws Exception {
}
@Test
- public void asymmetricDecryptTest() throws Exception {
- AsymmetricDecryptResponse expectedResponse =
- AsymmetricDecryptResponse.newBuilder()
- .setPlaintext(ByteString.EMPTY)
- .setPlaintextCrc32C(Int64Value.newBuilder().build())
- .setVerifiedCiphertextCrc32C(true)
+ public void encryptTest() throws Exception {
+ EncryptResponse expectedResponse =
+ EncryptResponse.newBuilder()
+ .setName("name3373707")
+ .setCiphertext(ByteString.EMPTY)
+ .setCiphertextCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedPlaintextCrc32C(true)
+ .setVerifiedAdditionalAuthenticatedDataCrc32C(true)
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
.build();
mockKeyManagementService.addResponse(expectedResponse);
- CryptoKeyVersionName name =
- CryptoKeyVersionName.of(
- "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ ResourceName name = KeyRingName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]");
+ ByteString plaintext = ByteString.EMPTY;
+
+ EncryptResponse actualResponse = client.encrypt(name, plaintext);
+ Assert.assertEquals(expectedResponse, actualResponse);
+
+ List actualRequests = mockKeyManagementService.getRequests();
+ Assert.assertEquals(1, actualRequests.size());
+ EncryptRequest actualRequest = ((EncryptRequest) actualRequests.get(0));
+
+ Assert.assertEquals(name.toString(), actualRequest.getName());
+ Assert.assertEquals(plaintext, actualRequest.getPlaintext());
+ Assert.assertTrue(
+ channelProvider.isHeaderSent(
+ ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
+ GaxGrpcProperties.getDefaultApiClientHeaderPattern()));
+ }
+
+ @Test
+ public void encryptExceptionTest() throws Exception {
+ StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
+ mockKeyManagementService.addException(exception);
+
+ try {
+ ResourceName name = KeyRingName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]");
+ ByteString plaintext = ByteString.EMPTY;
+ client.encrypt(name, plaintext);
+ Assert.fail("No exception raised");
+ } catch (InvalidArgumentException e) {
+ // Expected exception.
+ }
+ }
+
+ @Test
+ public void encryptTest2() throws Exception {
+ EncryptResponse expectedResponse =
+ EncryptResponse.newBuilder()
+ .setName("name3373707")
+ .setCiphertext(ByteString.EMPTY)
+ .setCiphertextCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedPlaintextCrc32C(true)
+ .setVerifiedAdditionalAuthenticatedDataCrc32C(true)
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .build();
+ mockKeyManagementService.addResponse(expectedResponse);
+
+ String name = "name3373707";
+ ByteString plaintext = ByteString.EMPTY;
+
+ EncryptResponse actualResponse = client.encrypt(name, plaintext);
+ Assert.assertEquals(expectedResponse, actualResponse);
+
+ List actualRequests = mockKeyManagementService.getRequests();
+ Assert.assertEquals(1, actualRequests.size());
+ EncryptRequest actualRequest = ((EncryptRequest) actualRequests.get(0));
+
+ Assert.assertEquals(name, actualRequest.getName());
+ Assert.assertEquals(plaintext, actualRequest.getPlaintext());
+ Assert.assertTrue(
+ channelProvider.isHeaderSent(
+ ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
+ GaxGrpcProperties.getDefaultApiClientHeaderPattern()));
+ }
+
+ @Test
+ public void encryptExceptionTest2() throws Exception {
+ StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
+ mockKeyManagementService.addException(exception);
+
+ try {
+ String name = "name3373707";
+ ByteString plaintext = ByteString.EMPTY;
+ client.encrypt(name, plaintext);
+ Assert.fail("No exception raised");
+ } catch (InvalidArgumentException e) {
+ // Expected exception.
+ }
+ }
+
+ @Test
+ public void decryptTest() throws Exception {
+ DecryptResponse expectedResponse =
+ DecryptResponse.newBuilder()
+ .setPlaintext(ByteString.EMPTY)
+ .setPlaintextCrc32C(Int64Value.newBuilder().build())
+ .setUsedPrimary(true)
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .build();
+ mockKeyManagementService.addResponse(expectedResponse);
+
+ CryptoKeyName name = CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
ByteString ciphertext = ByteString.EMPTY;
- AsymmetricDecryptResponse actualResponse = client.asymmetricDecrypt(name, ciphertext);
+ DecryptResponse actualResponse = client.decrypt(name, ciphertext);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- AsymmetricDecryptRequest actualRequest = ((AsymmetricDecryptRequest) actualRequests.get(0));
+ DecryptRequest actualRequest = ((DecryptRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
Assert.assertEquals(ciphertext, actualRequest.getCiphertext());
@@ -1811,16 +1983,15 @@ public void asymmetricDecryptTest() throws Exception {
}
@Test
- public void asymmetricDecryptExceptionTest() throws Exception {
+ public void decryptExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
- CryptoKeyVersionName name =
- CryptoKeyVersionName.of(
- "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ CryptoKeyName name =
+ CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
ByteString ciphertext = ByteString.EMPTY;
- client.asymmetricDecrypt(name, ciphertext);
+ client.decrypt(name, ciphertext);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1828,24 +1999,25 @@ public void asymmetricDecryptExceptionTest() throws Exception {
}
@Test
- public void asymmetricDecryptTest2() throws Exception {
- AsymmetricDecryptResponse expectedResponse =
- AsymmetricDecryptResponse.newBuilder()
+ public void decryptTest2() throws Exception {
+ DecryptResponse expectedResponse =
+ DecryptResponse.newBuilder()
.setPlaintext(ByteString.EMPTY)
.setPlaintextCrc32C(Int64Value.newBuilder().build())
- .setVerifiedCiphertextCrc32C(true)
+ .setUsedPrimary(true)
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
ByteString ciphertext = ByteString.EMPTY;
- AsymmetricDecryptResponse actualResponse = client.asymmetricDecrypt(name, ciphertext);
+ DecryptResponse actualResponse = client.decrypt(name, ciphertext);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- AsymmetricDecryptRequest actualRequest = ((AsymmetricDecryptRequest) actualRequests.get(0));
+ DecryptRequest actualRequest = ((DecryptRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
Assert.assertEquals(ciphertext, actualRequest.getCiphertext());
@@ -1856,14 +2028,14 @@ public void asymmetricDecryptTest2() throws Exception {
}
@Test
- public void asymmetricDecryptExceptionTest2() throws Exception {
+ public void decryptExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
ByteString ciphertext = ByteString.EMPTY;
- client.asymmetricDecrypt(name, ciphertext);
+ client.decrypt(name, ciphertext);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1871,33 +2043,31 @@ public void asymmetricDecryptExceptionTest2() throws Exception {
}
@Test
- public void updateCryptoKeyPrimaryVersionTest() throws Exception {
- CryptoKey expectedResponse =
- CryptoKey.newBuilder()
- .setName(
- CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
- .toString())
- .setPrimary(CryptoKeyVersion.newBuilder().build())
- .setCreateTime(Timestamp.newBuilder().build())
- .setNextRotationTime(Timestamp.newBuilder().build())
- .setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
- .putAllLabels(new HashMap())
+ public void asymmetricSignTest() throws Exception {
+ AsymmetricSignResponse expectedResponse =
+ AsymmetricSignResponse.newBuilder()
+ .setSignature(ByteString.EMPTY)
+ .setSignatureCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedDigestCrc32C(true)
+ .setName("name3373707")
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
.build();
mockKeyManagementService.addResponse(expectedResponse);
- CryptoKeyName name = CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
- String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
+ CryptoKeyVersionName name =
+ CryptoKeyVersionName.of(
+ "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ Digest digest = Digest.newBuilder().build();
- CryptoKey actualResponse = client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
+ AsymmetricSignResponse actualResponse = client.asymmetricSign(name, digest);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- UpdateCryptoKeyPrimaryVersionRequest actualRequest =
- ((UpdateCryptoKeyPrimaryVersionRequest) actualRequests.get(0));
+ AsymmetricSignRequest actualRequest = ((AsymmetricSignRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
- Assert.assertEquals(cryptoKeyVersionId, actualRequest.getCryptoKeyVersionId());
+ Assert.assertEquals(digest, actualRequest.getDigest());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1905,15 +2075,16 @@ public void updateCryptoKeyPrimaryVersionTest() throws Exception {
}
@Test
- public void updateCryptoKeyPrimaryVersionExceptionTest() throws Exception {
+ public void asymmetricSignExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
- CryptoKeyName name =
- CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]");
- String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
- client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
+ CryptoKeyVersionName name =
+ CryptoKeyVersionName.of(
+ "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ Digest digest = Digest.newBuilder().build();
+ client.asymmetricSign(name, digest);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1921,33 +2092,29 @@ public void updateCryptoKeyPrimaryVersionExceptionTest() throws Exception {
}
@Test
- public void updateCryptoKeyPrimaryVersionTest2() throws Exception {
- CryptoKey expectedResponse =
- CryptoKey.newBuilder()
- .setName(
- CryptoKeyName.of("[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]")
- .toString())
- .setPrimary(CryptoKeyVersion.newBuilder().build())
- .setCreateTime(Timestamp.newBuilder().build())
- .setNextRotationTime(Timestamp.newBuilder().build())
- .setVersionTemplate(CryptoKeyVersionTemplate.newBuilder().build())
- .putAllLabels(new HashMap())
+ public void asymmetricSignTest2() throws Exception {
+ AsymmetricSignResponse expectedResponse =
+ AsymmetricSignResponse.newBuilder()
+ .setSignature(ByteString.EMPTY)
+ .setSignatureCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedDigestCrc32C(true)
+ .setName("name3373707")
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
- String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
+ Digest digest = Digest.newBuilder().build();
- CryptoKey actualResponse = client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
+ AsymmetricSignResponse actualResponse = client.asymmetricSign(name, digest);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- UpdateCryptoKeyPrimaryVersionRequest actualRequest =
- ((UpdateCryptoKeyPrimaryVersionRequest) actualRequests.get(0));
+ AsymmetricSignRequest actualRequest = ((AsymmetricSignRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
- Assert.assertEquals(cryptoKeyVersionId, actualRequest.getCryptoKeyVersionId());
+ Assert.assertEquals(digest, actualRequest.getDigest());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -1955,14 +2122,14 @@ public void updateCryptoKeyPrimaryVersionTest2() throws Exception {
}
@Test
- public void updateCryptoKeyPrimaryVersionExceptionTest2() throws Exception {
+ public void asymmetricSignExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
- String cryptoKeyVersionId = "cryptoKeyVersionId987674581";
- client.updateCryptoKeyPrimaryVersion(name, cryptoKeyVersionId);
+ Digest digest = Digest.newBuilder().build();
+ client.asymmetricSign(name, digest);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -1970,43 +2137,30 @@ public void updateCryptoKeyPrimaryVersionExceptionTest2() throws Exception {
}
@Test
- public void destroyCryptoKeyVersionTest() throws Exception {
- CryptoKeyVersion expectedResponse =
- CryptoKeyVersion.newBuilder()
- .setName(
- CryptoKeyVersionName.of(
- "[PROJECT]",
- "[LOCATION]",
- "[KEY_RING]",
- "[CRYPTO_KEY]",
- "[CRYPTO_KEY_VERSION]")
- .toString())
+ public void asymmetricDecryptTest() throws Exception {
+ AsymmetricDecryptResponse expectedResponse =
+ AsymmetricDecryptResponse.newBuilder()
+ .setPlaintext(ByteString.EMPTY)
+ .setPlaintextCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedCiphertextCrc32C(true)
.setProtectionLevel(ProtectionLevel.forNumber(0))
- .setAttestation(KeyOperationAttestation.newBuilder().build())
- .setCreateTime(Timestamp.newBuilder().build())
- .setGenerateTime(Timestamp.newBuilder().build())
- .setDestroyTime(Timestamp.newBuilder().build())
- .setDestroyEventTime(Timestamp.newBuilder().build())
- .setImportJob("importJob-208547368")
- .setImportTime(Timestamp.newBuilder().build())
- .setImportFailureReason("importFailureReason985493705")
- .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
CryptoKeyVersionName name =
CryptoKeyVersionName.of(
"[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ ByteString ciphertext = ByteString.EMPTY;
- CryptoKeyVersion actualResponse = client.destroyCryptoKeyVersion(name);
+ AsymmetricDecryptResponse actualResponse = client.asymmetricDecrypt(name, ciphertext);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- DestroyCryptoKeyVersionRequest actualRequest =
- ((DestroyCryptoKeyVersionRequest) actualRequests.get(0));
+ AsymmetricDecryptRequest actualRequest = ((AsymmetricDecryptRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
+ Assert.assertEquals(ciphertext, actualRequest.getCiphertext());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -2014,7 +2168,7 @@ public void destroyCryptoKeyVersionTest() throws Exception {
}
@Test
- public void destroyCryptoKeyVersionExceptionTest() throws Exception {
+ public void asymmetricDecryptExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
@@ -2022,7 +2176,8 @@ public void destroyCryptoKeyVersionExceptionTest() throws Exception {
CryptoKeyVersionName name =
CryptoKeyVersionName.of(
"[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- client.destroyCryptoKeyVersion(name);
+ ByteString ciphertext = ByteString.EMPTY;
+ client.asymmetricDecrypt(name, ciphertext);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -2030,41 +2185,28 @@ public void destroyCryptoKeyVersionExceptionTest() throws Exception {
}
@Test
- public void destroyCryptoKeyVersionTest2() throws Exception {
- CryptoKeyVersion expectedResponse =
- CryptoKeyVersion.newBuilder()
- .setName(
- CryptoKeyVersionName.of(
- "[PROJECT]",
- "[LOCATION]",
- "[KEY_RING]",
- "[CRYPTO_KEY]",
- "[CRYPTO_KEY_VERSION]")
- .toString())
+ public void asymmetricDecryptTest2() throws Exception {
+ AsymmetricDecryptResponse expectedResponse =
+ AsymmetricDecryptResponse.newBuilder()
+ .setPlaintext(ByteString.EMPTY)
+ .setPlaintextCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedCiphertextCrc32C(true)
.setProtectionLevel(ProtectionLevel.forNumber(0))
- .setAttestation(KeyOperationAttestation.newBuilder().build())
- .setCreateTime(Timestamp.newBuilder().build())
- .setGenerateTime(Timestamp.newBuilder().build())
- .setDestroyTime(Timestamp.newBuilder().build())
- .setDestroyEventTime(Timestamp.newBuilder().build())
- .setImportJob("importJob-208547368")
- .setImportTime(Timestamp.newBuilder().build())
- .setImportFailureReason("importFailureReason985493705")
- .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
+ ByteString ciphertext = ByteString.EMPTY;
- CryptoKeyVersion actualResponse = client.destroyCryptoKeyVersion(name);
+ AsymmetricDecryptResponse actualResponse = client.asymmetricDecrypt(name, ciphertext);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- DestroyCryptoKeyVersionRequest actualRequest =
- ((DestroyCryptoKeyVersionRequest) actualRequests.get(0));
+ AsymmetricDecryptRequest actualRequest = ((AsymmetricDecryptRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
+ Assert.assertEquals(ciphertext, actualRequest.getCiphertext());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -2072,13 +2214,14 @@ public void destroyCryptoKeyVersionTest2() throws Exception {
}
@Test
- public void destroyCryptoKeyVersionExceptionTest2() throws Exception {
+ public void asymmetricDecryptExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
- client.destroyCryptoKeyVersion(name);
+ ByteString ciphertext = ByteString.EMPTY;
+ client.asymmetricDecrypt(name, ciphertext);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -2086,43 +2229,31 @@ public void destroyCryptoKeyVersionExceptionTest2() throws Exception {
}
@Test
- public void restoreCryptoKeyVersionTest() throws Exception {
- CryptoKeyVersion expectedResponse =
- CryptoKeyVersion.newBuilder()
- .setName(
- CryptoKeyVersionName.of(
- "[PROJECT]",
- "[LOCATION]",
- "[KEY_RING]",
- "[CRYPTO_KEY]",
- "[CRYPTO_KEY_VERSION]")
- .toString())
+ public void macSignTest() throws Exception {
+ MacSignResponse expectedResponse =
+ MacSignResponse.newBuilder()
+ .setName("name3373707")
+ .setMac(ByteString.EMPTY)
+ .setMacCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedDataCrc32C(true)
.setProtectionLevel(ProtectionLevel.forNumber(0))
- .setAttestation(KeyOperationAttestation.newBuilder().build())
- .setCreateTime(Timestamp.newBuilder().build())
- .setGenerateTime(Timestamp.newBuilder().build())
- .setDestroyTime(Timestamp.newBuilder().build())
- .setDestroyEventTime(Timestamp.newBuilder().build())
- .setImportJob("importJob-208547368")
- .setImportTime(Timestamp.newBuilder().build())
- .setImportFailureReason("importFailureReason985493705")
- .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
CryptoKeyVersionName name =
CryptoKeyVersionName.of(
"[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ ByteString data = ByteString.EMPTY;
- CryptoKeyVersion actualResponse = client.restoreCryptoKeyVersion(name);
+ MacSignResponse actualResponse = client.macSign(name, data);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- RestoreCryptoKeyVersionRequest actualRequest =
- ((RestoreCryptoKeyVersionRequest) actualRequests.get(0));
+ MacSignRequest actualRequest = ((MacSignRequest) actualRequests.get(0));
Assert.assertEquals(name.toString(), actualRequest.getName());
+ Assert.assertEquals(data, actualRequest.getData());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -2130,7 +2261,7 @@ public void restoreCryptoKeyVersionTest() throws Exception {
}
@Test
- public void restoreCryptoKeyVersionExceptionTest() throws Exception {
+ public void macSignExceptionTest() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
@@ -2138,7 +2269,8 @@ public void restoreCryptoKeyVersionExceptionTest() throws Exception {
CryptoKeyVersionName name =
CryptoKeyVersionName.of(
"[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
- client.restoreCryptoKeyVersion(name);
+ ByteString data = ByteString.EMPTY;
+ client.macSign(name, data);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
@@ -2146,41 +2278,29 @@ public void restoreCryptoKeyVersionExceptionTest() throws Exception {
}
@Test
- public void restoreCryptoKeyVersionTest2() throws Exception {
- CryptoKeyVersion expectedResponse =
- CryptoKeyVersion.newBuilder()
- .setName(
- CryptoKeyVersionName.of(
- "[PROJECT]",
- "[LOCATION]",
- "[KEY_RING]",
- "[CRYPTO_KEY]",
- "[CRYPTO_KEY_VERSION]")
- .toString())
+ public void macSignTest2() throws Exception {
+ MacSignResponse expectedResponse =
+ MacSignResponse.newBuilder()
+ .setName("name3373707")
+ .setMac(ByteString.EMPTY)
+ .setMacCrc32C(Int64Value.newBuilder().build())
+ .setVerifiedDataCrc32C(true)
.setProtectionLevel(ProtectionLevel.forNumber(0))
- .setAttestation(KeyOperationAttestation.newBuilder().build())
- .setCreateTime(Timestamp.newBuilder().build())
- .setGenerateTime(Timestamp.newBuilder().build())
- .setDestroyTime(Timestamp.newBuilder().build())
- .setDestroyEventTime(Timestamp.newBuilder().build())
- .setImportJob("importJob-208547368")
- .setImportTime(Timestamp.newBuilder().build())
- .setImportFailureReason("importFailureReason985493705")
- .setExternalProtectionLevelOptions(ExternalProtectionLevelOptions.newBuilder().build())
.build();
mockKeyManagementService.addResponse(expectedResponse);
String name = "name3373707";
+ ByteString data = ByteString.EMPTY;
- CryptoKeyVersion actualResponse = client.restoreCryptoKeyVersion(name);
+ MacSignResponse actualResponse = client.macSign(name, data);
Assert.assertEquals(expectedResponse, actualResponse);
List actualRequests = mockKeyManagementService.getRequests();
Assert.assertEquals(1, actualRequests.size());
- RestoreCryptoKeyVersionRequest actualRequest =
- ((RestoreCryptoKeyVersionRequest) actualRequests.get(0));
+ MacSignRequest actualRequest = ((MacSignRequest) actualRequests.get(0));
Assert.assertEquals(name, actualRequest.getName());
+ Assert.assertEquals(data, actualRequest.getData());
Assert.assertTrue(
channelProvider.isHeaderSent(
ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
@@ -2188,13 +2308,162 @@ public void restoreCryptoKeyVersionTest2() throws Exception {
}
@Test
- public void restoreCryptoKeyVersionExceptionTest2() throws Exception {
+ public void macSignExceptionTest2() throws Exception {
StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
mockKeyManagementService.addException(exception);
try {
String name = "name3373707";
- client.restoreCryptoKeyVersion(name);
+ ByteString data = ByteString.EMPTY;
+ client.macSign(name, data);
+ Assert.fail("No exception raised");
+ } catch (InvalidArgumentException e) {
+ // Expected exception.
+ }
+ }
+
+ @Test
+ public void macVerifyTest() throws Exception {
+ MacVerifyResponse expectedResponse =
+ MacVerifyResponse.newBuilder()
+ .setName("name3373707")
+ .setSuccess(true)
+ .setVerifiedDataCrc32C(true)
+ .setVerifiedMacCrc32C(true)
+ .setVerifiedSuccessIntegrity(true)
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .build();
+ mockKeyManagementService.addResponse(expectedResponse);
+
+ CryptoKeyVersionName name =
+ CryptoKeyVersionName.of(
+ "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ ByteString data = ByteString.EMPTY;
+ ByteString mac = ByteString.EMPTY;
+
+ MacVerifyResponse actualResponse = client.macVerify(name, data, mac);
+ Assert.assertEquals(expectedResponse, actualResponse);
+
+ List actualRequests = mockKeyManagementService.getRequests();
+ Assert.assertEquals(1, actualRequests.size());
+ MacVerifyRequest actualRequest = ((MacVerifyRequest) actualRequests.get(0));
+
+ Assert.assertEquals(name.toString(), actualRequest.getName());
+ Assert.assertEquals(data, actualRequest.getData());
+ Assert.assertEquals(mac, actualRequest.getMac());
+ Assert.assertTrue(
+ channelProvider.isHeaderSent(
+ ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
+ GaxGrpcProperties.getDefaultApiClientHeaderPattern()));
+ }
+
+ @Test
+ public void macVerifyExceptionTest() throws Exception {
+ StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
+ mockKeyManagementService.addException(exception);
+
+ try {
+ CryptoKeyVersionName name =
+ CryptoKeyVersionName.of(
+ "[PROJECT]", "[LOCATION]", "[KEY_RING]", "[CRYPTO_KEY]", "[CRYPTO_KEY_VERSION]");
+ ByteString data = ByteString.EMPTY;
+ ByteString mac = ByteString.EMPTY;
+ client.macVerify(name, data, mac);
+ Assert.fail("No exception raised");
+ } catch (InvalidArgumentException e) {
+ // Expected exception.
+ }
+ }
+
+ @Test
+ public void macVerifyTest2() throws Exception {
+ MacVerifyResponse expectedResponse =
+ MacVerifyResponse.newBuilder()
+ .setName("name3373707")
+ .setSuccess(true)
+ .setVerifiedDataCrc32C(true)
+ .setVerifiedMacCrc32C(true)
+ .setVerifiedSuccessIntegrity(true)
+ .setProtectionLevel(ProtectionLevel.forNumber(0))
+ .build();
+ mockKeyManagementService.addResponse(expectedResponse);
+
+ String name = "name3373707";
+ ByteString data = ByteString.EMPTY;
+ ByteString mac = ByteString.EMPTY;
+
+ MacVerifyResponse actualResponse = client.macVerify(name, data, mac);
+ Assert.assertEquals(expectedResponse, actualResponse);
+
+ List actualRequests = mockKeyManagementService.getRequests();
+ Assert.assertEquals(1, actualRequests.size());
+ MacVerifyRequest actualRequest = ((MacVerifyRequest) actualRequests.get(0));
+
+ Assert.assertEquals(name, actualRequest.getName());
+ Assert.assertEquals(data, actualRequest.getData());
+ Assert.assertEquals(mac, actualRequest.getMac());
+ Assert.assertTrue(
+ channelProvider.isHeaderSent(
+ ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
+ GaxGrpcProperties.getDefaultApiClientHeaderPattern()));
+ }
+
+ @Test
+ public void macVerifyExceptionTest2() throws Exception {
+ StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
+ mockKeyManagementService.addException(exception);
+
+ try {
+ String name = "name3373707";
+ ByteString data = ByteString.EMPTY;
+ ByteString mac = ByteString.EMPTY;
+ client.macVerify(name, data, mac);
+ Assert.fail("No exception raised");
+ } catch (InvalidArgumentException e) {
+ // Expected exception.
+ }
+ }
+
+ @Test
+ public void generateRandomBytesTest() throws Exception {
+ GenerateRandomBytesResponse expectedResponse =
+ GenerateRandomBytesResponse.newBuilder()
+ .setData(ByteString.EMPTY)
+ .setDataCrc32C(Int64Value.newBuilder().build())
+ .build();
+ mockKeyManagementService.addResponse(expectedResponse);
+
+ String location = "location1901043637";
+ int lengthBytes = -745661998;
+ ProtectionLevel protectionLevel = ProtectionLevel.forNumber(0);
+
+ GenerateRandomBytesResponse actualResponse =
+ client.generateRandomBytes(location, lengthBytes, protectionLevel);
+ Assert.assertEquals(expectedResponse, actualResponse);
+
+ List actualRequests = mockKeyManagementService.getRequests();
+ Assert.assertEquals(1, actualRequests.size());
+ GenerateRandomBytesRequest actualRequest = ((GenerateRandomBytesRequest) actualRequests.get(0));
+
+ Assert.assertEquals(location, actualRequest.getLocation());
+ Assert.assertEquals(lengthBytes, actualRequest.getLengthBytes());
+ Assert.assertEquals(protectionLevel, actualRequest.getProtectionLevel());
+ Assert.assertTrue(
+ channelProvider.isHeaderSent(
+ ApiClientHeaderProvider.getDefaultApiClientHeaderKey(),
+ GaxGrpcProperties.getDefaultApiClientHeaderPattern()));
+ }
+
+ @Test
+ public void generateRandomBytesExceptionTest() throws Exception {
+ StatusRuntimeException exception = new StatusRuntimeException(io.grpc.Status.INVALID_ARGUMENT);
+ mockKeyManagementService.addException(exception);
+
+ try {
+ String location = "location1901043637";
+ int lengthBytes = -745661998;
+ ProtectionLevel protectionLevel = ProtectionLevel.forNumber(0);
+ client.generateRandomBytes(location, lengthBytes, protectionLevel);
Assert.fail("No exception raised");
} catch (InvalidArgumentException e) {
// Expected exception.
diff --git a/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/MockKeyManagementServiceImpl.java b/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/MockKeyManagementServiceImpl.java
index c5a5f4c0..85b6f2b5 100644
--- a/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/MockKeyManagementServiceImpl.java
+++ b/google-cloud-kms/src/test/java/com/google/cloud/kms/v1/MockKeyManagementServiceImpl.java
@@ -394,6 +394,69 @@ public void updateCryptoKeyVersion(
}
}
+ @Override
+ public void updateCryptoKeyPrimaryVersion(
+ UpdateCryptoKeyPrimaryVersionRequest request, StreamObserver responseObserver) {
+ Object response = responses.poll();
+ if (response instanceof CryptoKey) {
+ requests.add(request);
+ responseObserver.onNext(((CryptoKey) response));
+ responseObserver.onCompleted();
+ } else if (response instanceof Exception) {
+ responseObserver.onError(((Exception) response));
+ } else {
+ responseObserver.onError(
+ new IllegalArgumentException(
+ String.format(
+ "Unrecognized response type %s for method UpdateCryptoKeyPrimaryVersion, expected %s or %s",
+ response == null ? "null" : response.getClass().getName(),
+ CryptoKey.class.getName(),
+ Exception.class.getName())));
+ }
+ }
+
+ @Override
+ public void destroyCryptoKeyVersion(
+ DestroyCryptoKeyVersionRequest request, StreamObserver responseObserver) {
+ Object response = responses.poll();
+ if (response instanceof CryptoKeyVersion) {
+ requests.add(request);
+ responseObserver.onNext(((CryptoKeyVersion) response));
+ responseObserver.onCompleted();
+ } else if (response instanceof Exception) {
+ responseObserver.onError(((Exception) response));
+ } else {
+ responseObserver.onError(
+ new IllegalArgumentException(
+ String.format(
+ "Unrecognized response type %s for method DestroyCryptoKeyVersion, expected %s or %s",
+ response == null ? "null" : response.getClass().getName(),
+ CryptoKeyVersion.class.getName(),
+ Exception.class.getName())));
+ }
+ }
+
+ @Override
+ public void restoreCryptoKeyVersion(
+ RestoreCryptoKeyVersionRequest request, StreamObserver responseObserver) {
+ Object response = responses.poll();
+ if (response instanceof CryptoKeyVersion) {
+ requests.add(request);
+ responseObserver.onNext(((CryptoKeyVersion) response));
+ responseObserver.onCompleted();
+ } else if (response instanceof Exception) {
+ responseObserver.onError(((Exception) response));
+ } else {
+ responseObserver.onError(
+ new IllegalArgumentException(
+ String.format(
+ "Unrecognized response type %s for method RestoreCryptoKeyVersion, expected %s or %s",
+ response == null ? "null" : response.getClass().getName(),
+ CryptoKeyVersion.class.getName(),
+ Exception.class.getName())));
+ }
+ }
+
@Override
public void encrypt(EncryptRequest request, StreamObserver responseObserver) {
Object response = responses.poll();
@@ -478,12 +541,11 @@ public void asymmetricDecrypt(
}
@Override
- public void updateCryptoKeyPrimaryVersion(
- UpdateCryptoKeyPrimaryVersionRequest request, StreamObserver responseObserver) {
+ public void macSign(MacSignRequest request, StreamObserver responseObserver) {
Object response = responses.poll();
- if (response instanceof CryptoKey) {
+ if (response instanceof MacSignResponse) {
requests.add(request);
- responseObserver.onNext(((CryptoKey) response));
+ responseObserver.onNext(((MacSignResponse) response));
responseObserver.onCompleted();
} else if (response instanceof Exception) {
responseObserver.onError(((Exception) response));
@@ -491,20 +553,20 @@ public void updateCryptoKeyPrimaryVersion(
responseObserver.onError(
new IllegalArgumentException(
String.format(
- "Unrecognized response type %s for method UpdateCryptoKeyPrimaryVersion, expected %s or %s",
+ "Unrecognized response type %s for method MacSign, expected %s or %s",
response == null ? "null" : response.getClass().getName(),
- CryptoKey.class.getName(),
+ MacSignResponse.class.getName(),
Exception.class.getName())));
}
}
@Override
- public void destroyCryptoKeyVersion(
- DestroyCryptoKeyVersionRequest request, StreamObserver responseObserver) {
+ public void macVerify(
+ MacVerifyRequest request, StreamObserver responseObserver) {
Object response = responses.poll();
- if (response instanceof CryptoKeyVersion) {
+ if (response instanceof MacVerifyResponse) {
requests.add(request);
- responseObserver.onNext(((CryptoKeyVersion) response));
+ responseObserver.onNext(((MacVerifyResponse) response));
responseObserver.onCompleted();
} else if (response instanceof Exception) {
responseObserver.onError(((Exception) response));
@@ -512,20 +574,21 @@ public void destroyCryptoKeyVersion(
responseObserver.onError(
new IllegalArgumentException(
String.format(
- "Unrecognized response type %s for method DestroyCryptoKeyVersion, expected %s or %s",
+ "Unrecognized response type %s for method MacVerify, expected %s or %s",
response == null ? "null" : response.getClass().getName(),
- CryptoKeyVersion.class.getName(),
+ MacVerifyResponse.class.getName(),
Exception.class.getName())));
}
}
@Override
- public void restoreCryptoKeyVersion(
- RestoreCryptoKeyVersionRequest request, StreamObserver responseObserver) {
+ public void generateRandomBytes(
+ GenerateRandomBytesRequest request,
+ StreamObserver responseObserver) {
Object response = responses.poll();
- if (response instanceof CryptoKeyVersion) {
+ if (response instanceof GenerateRandomBytesResponse) {
requests.add(request);
- responseObserver.onNext(((CryptoKeyVersion) response));
+ responseObserver.onNext(((GenerateRandomBytesResponse) response));
responseObserver.onCompleted();
} else if (response instanceof Exception) {
responseObserver.onError(((Exception) response));
@@ -533,9 +596,9 @@ public void restoreCryptoKeyVersion(
responseObserver.onError(
new IllegalArgumentException(
String.format(
- "Unrecognized response type %s for method RestoreCryptoKeyVersion, expected %s or %s",
+ "Unrecognized response type %s for method GenerateRandomBytes, expected %s or %s",
response == null ? "null" : response.getClass().getName(),
- CryptoKeyVersion.class.getName(),
+ GenerateRandomBytesResponse.class.getName(),
Exception.class.getName())));
}
}
diff --git a/grpc-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceGrpc.java b/grpc-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceGrpc.java
index 4d802cee..6567eab9 100644
--- a/grpc-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceGrpc.java
+++ b/grpc-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/KeyManagementServiceGrpc.java
@@ -766,6 +766,162 @@ private KeyManagementServiceGrpc() {}
return getUpdateCryptoKeyVersionMethod;
}
+ private static volatile io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
+ com.google.cloud.kms.v1.CryptoKey>
+ getUpdateCryptoKeyPrimaryVersionMethod;
+
+ @io.grpc.stub.annotations.RpcMethod(
+ fullMethodName = SERVICE_NAME + '/' + "UpdateCryptoKeyPrimaryVersion",
+ requestType = com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest.class,
+ responseType = com.google.cloud.kms.v1.CryptoKey.class,
+ methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
+ public static io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
+ com.google.cloud.kms.v1.CryptoKey>
+ getUpdateCryptoKeyPrimaryVersionMethod() {
+ io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
+ com.google.cloud.kms.v1.CryptoKey>
+ getUpdateCryptoKeyPrimaryVersionMethod;
+ if ((getUpdateCryptoKeyPrimaryVersionMethod =
+ KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod)
+ == null) {
+ synchronized (KeyManagementServiceGrpc.class) {
+ if ((getUpdateCryptoKeyPrimaryVersionMethod =
+ KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod)
+ == null) {
+ KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod =
+ getUpdateCryptoKeyPrimaryVersionMethod =
+ io.grpc.MethodDescriptor
+ .
+ newBuilder()
+ .setType(io.grpc.MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName(
+ generateFullMethodName(SERVICE_NAME, "UpdateCryptoKeyPrimaryVersion"))
+ .setSampledToLocalTracing(true)
+ .setRequestMarshaller(
+ io.grpc.protobuf.ProtoUtils.marshaller(
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest
+ .getDefaultInstance()))
+ .setResponseMarshaller(
+ io.grpc.protobuf.ProtoUtils.marshaller(
+ com.google.cloud.kms.v1.CryptoKey.getDefaultInstance()))
+ .setSchemaDescriptor(
+ new KeyManagementServiceMethodDescriptorSupplier(
+ "UpdateCryptoKeyPrimaryVersion"))
+ .build();
+ }
+ }
+ }
+ return getUpdateCryptoKeyPrimaryVersionMethod;
+ }
+
+ private static volatile io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>
+ getDestroyCryptoKeyVersionMethod;
+
+ @io.grpc.stub.annotations.RpcMethod(
+ fullMethodName = SERVICE_NAME + '/' + "DestroyCryptoKeyVersion",
+ requestType = com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest.class,
+ responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class,
+ methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
+ public static io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>
+ getDestroyCryptoKeyVersionMethod() {
+ io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>
+ getDestroyCryptoKeyVersionMethod;
+ if ((getDestroyCryptoKeyVersionMethod =
+ KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod)
+ == null) {
+ synchronized (KeyManagementServiceGrpc.class) {
+ if ((getDestroyCryptoKeyVersionMethod =
+ KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod)
+ == null) {
+ KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod =
+ getDestroyCryptoKeyVersionMethod =
+ io.grpc.MethodDescriptor
+ .
+ newBuilder()
+ .setType(io.grpc.MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName(
+ generateFullMethodName(SERVICE_NAME, "DestroyCryptoKeyVersion"))
+ .setSampledToLocalTracing(true)
+ .setRequestMarshaller(
+ io.grpc.protobuf.ProtoUtils.marshaller(
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest
+ .getDefaultInstance()))
+ .setResponseMarshaller(
+ io.grpc.protobuf.ProtoUtils.marshaller(
+ com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance()))
+ .setSchemaDescriptor(
+ new KeyManagementServiceMethodDescriptorSupplier(
+ "DestroyCryptoKeyVersion"))
+ .build();
+ }
+ }
+ }
+ return getDestroyCryptoKeyVersionMethod;
+ }
+
+ private static volatile io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>
+ getRestoreCryptoKeyVersionMethod;
+
+ @io.grpc.stub.annotations.RpcMethod(
+ fullMethodName = SERVICE_NAME + '/' + "RestoreCryptoKeyVersion",
+ requestType = com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest.class,
+ responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class,
+ methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
+ public static io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>
+ getRestoreCryptoKeyVersionMethod() {
+ io.grpc.MethodDescriptor<
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>
+ getRestoreCryptoKeyVersionMethod;
+ if ((getRestoreCryptoKeyVersionMethod =
+ KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod)
+ == null) {
+ synchronized (KeyManagementServiceGrpc.class) {
+ if ((getRestoreCryptoKeyVersionMethod =
+ KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod)
+ == null) {
+ KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod =
+ getRestoreCryptoKeyVersionMethod =
+ io.grpc.MethodDescriptor
+ .
+ newBuilder()
+ .setType(io.grpc.MethodDescriptor.MethodType.UNARY)
+ .setFullMethodName(
+ generateFullMethodName(SERVICE_NAME, "RestoreCryptoKeyVersion"))
+ .setSampledToLocalTracing(true)
+ .setRequestMarshaller(
+ io.grpc.protobuf.ProtoUtils.marshaller(
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest
+ .getDefaultInstance()))
+ .setResponseMarshaller(
+ io.grpc.protobuf.ProtoUtils.marshaller(
+ com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance()))
+ .setSchemaDescriptor(
+ new KeyManagementServiceMethodDescriptorSupplier(
+ "RestoreCryptoKeyVersion"))
+ .build();
+ }
+ }
+ }
+ return getRestoreCryptoKeyVersionMethod;
+ }
+
private static volatile io.grpc.MethodDescriptor<
com.google.cloud.kms.v1.EncryptRequest, com.google.cloud.kms.v1.EncryptResponse>
getEncryptMethod;
@@ -945,159 +1101,137 @@ private KeyManagementServiceGrpc() {}
}
private static volatile io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
- com.google.cloud.kms.v1.CryptoKey>
- getUpdateCryptoKeyPrimaryVersionMethod;
+ com.google.cloud.kms.v1.MacSignRequest, com.google.cloud.kms.v1.MacSignResponse>
+ getMacSignMethod;
@io.grpc.stub.annotations.RpcMethod(
- fullMethodName = SERVICE_NAME + '/' + "UpdateCryptoKeyPrimaryVersion",
- requestType = com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest.class,
- responseType = com.google.cloud.kms.v1.CryptoKey.class,
+ fullMethodName = SERVICE_NAME + '/' + "MacSign",
+ requestType = com.google.cloud.kms.v1.MacSignRequest.class,
+ responseType = com.google.cloud.kms.v1.MacSignResponse.class,
methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
public static io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
- com.google.cloud.kms.v1.CryptoKey>
- getUpdateCryptoKeyPrimaryVersionMethod() {
+ com.google.cloud.kms.v1.MacSignRequest, com.google.cloud.kms.v1.MacSignResponse>
+ getMacSignMethod() {
io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
- com.google.cloud.kms.v1.CryptoKey>
- getUpdateCryptoKeyPrimaryVersionMethod;
- if ((getUpdateCryptoKeyPrimaryVersionMethod =
- KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod)
- == null) {
+ com.google.cloud.kms.v1.MacSignRequest, com.google.cloud.kms.v1.MacSignResponse>
+ getMacSignMethod;
+ if ((getMacSignMethod = KeyManagementServiceGrpc.getMacSignMethod) == null) {
synchronized (KeyManagementServiceGrpc.class) {
- if ((getUpdateCryptoKeyPrimaryVersionMethod =
- KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod)
- == null) {
- KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod =
- getUpdateCryptoKeyPrimaryVersionMethod =
+ if ((getMacSignMethod = KeyManagementServiceGrpc.getMacSignMethod) == null) {
+ KeyManagementServiceGrpc.getMacSignMethod =
+ getMacSignMethod =
io.grpc.MethodDescriptor
- .
+ .
newBuilder()
.setType(io.grpc.MethodDescriptor.MethodType.UNARY)
- .setFullMethodName(
- generateFullMethodName(SERVICE_NAME, "UpdateCryptoKeyPrimaryVersion"))
+ .setFullMethodName(generateFullMethodName(SERVICE_NAME, "MacSign"))
.setSampledToLocalTracing(true)
.setRequestMarshaller(
io.grpc.protobuf.ProtoUtils.marshaller(
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest
- .getDefaultInstance()))
+ com.google.cloud.kms.v1.MacSignRequest.getDefaultInstance()))
.setResponseMarshaller(
io.grpc.protobuf.ProtoUtils.marshaller(
- com.google.cloud.kms.v1.CryptoKey.getDefaultInstance()))
+ com.google.cloud.kms.v1.MacSignResponse.getDefaultInstance()))
.setSchemaDescriptor(
- new KeyManagementServiceMethodDescriptorSupplier(
- "UpdateCryptoKeyPrimaryVersion"))
+ new KeyManagementServiceMethodDescriptorSupplier("MacSign"))
.build();
}
}
}
- return getUpdateCryptoKeyPrimaryVersionMethod;
+ return getMacSignMethod;
}
private static volatile io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>
- getDestroyCryptoKeyVersionMethod;
+ com.google.cloud.kms.v1.MacVerifyRequest, com.google.cloud.kms.v1.MacVerifyResponse>
+ getMacVerifyMethod;
@io.grpc.stub.annotations.RpcMethod(
- fullMethodName = SERVICE_NAME + '/' + "DestroyCryptoKeyVersion",
- requestType = com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest.class,
- responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class,
+ fullMethodName = SERVICE_NAME + '/' + "MacVerify",
+ requestType = com.google.cloud.kms.v1.MacVerifyRequest.class,
+ responseType = com.google.cloud.kms.v1.MacVerifyResponse.class,
methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
public static io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>
- getDestroyCryptoKeyVersionMethod() {
+ com.google.cloud.kms.v1.MacVerifyRequest, com.google.cloud.kms.v1.MacVerifyResponse>
+ getMacVerifyMethod() {
io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>
- getDestroyCryptoKeyVersionMethod;
- if ((getDestroyCryptoKeyVersionMethod =
- KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod)
- == null) {
+ com.google.cloud.kms.v1.MacVerifyRequest, com.google.cloud.kms.v1.MacVerifyResponse>
+ getMacVerifyMethod;
+ if ((getMacVerifyMethod = KeyManagementServiceGrpc.getMacVerifyMethod) == null) {
synchronized (KeyManagementServiceGrpc.class) {
- if ((getDestroyCryptoKeyVersionMethod =
- KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod)
- == null) {
- KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod =
- getDestroyCryptoKeyVersionMethod =
+ if ((getMacVerifyMethod = KeyManagementServiceGrpc.getMacVerifyMethod) == null) {
+ KeyManagementServiceGrpc.getMacVerifyMethod =
+ getMacVerifyMethod =
io.grpc.MethodDescriptor
- .
+ .
newBuilder()
.setType(io.grpc.MethodDescriptor.MethodType.UNARY)
- .setFullMethodName(
- generateFullMethodName(SERVICE_NAME, "DestroyCryptoKeyVersion"))
+ .setFullMethodName(generateFullMethodName(SERVICE_NAME, "MacVerify"))
.setSampledToLocalTracing(true)
.setRequestMarshaller(
io.grpc.protobuf.ProtoUtils.marshaller(
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest
- .getDefaultInstance()))
+ com.google.cloud.kms.v1.MacVerifyRequest.getDefaultInstance()))
.setResponseMarshaller(
io.grpc.protobuf.ProtoUtils.marshaller(
- com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance()))
+ com.google.cloud.kms.v1.MacVerifyResponse.getDefaultInstance()))
.setSchemaDescriptor(
- new KeyManagementServiceMethodDescriptorSupplier(
- "DestroyCryptoKeyVersion"))
+ new KeyManagementServiceMethodDescriptorSupplier("MacVerify"))
.build();
}
}
}
- return getDestroyCryptoKeyVersionMethod;
+ return getMacVerifyMethod;
}
private static volatile io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>
- getRestoreCryptoKeyVersionMethod;
+ com.google.cloud.kms.v1.GenerateRandomBytesRequest,
+ com.google.cloud.kms.v1.GenerateRandomBytesResponse>
+ getGenerateRandomBytesMethod;
@io.grpc.stub.annotations.RpcMethod(
- fullMethodName = SERVICE_NAME + '/' + "RestoreCryptoKeyVersion",
- requestType = com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest.class,
- responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class,
+ fullMethodName = SERVICE_NAME + '/' + "GenerateRandomBytes",
+ requestType = com.google.cloud.kms.v1.GenerateRandomBytesRequest.class,
+ responseType = com.google.cloud.kms.v1.GenerateRandomBytesResponse.class,
methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
public static io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>
- getRestoreCryptoKeyVersionMethod() {
+ com.google.cloud.kms.v1.GenerateRandomBytesRequest,
+ com.google.cloud.kms.v1.GenerateRandomBytesResponse>
+ getGenerateRandomBytesMethod() {
io.grpc.MethodDescriptor<
- com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>
- getRestoreCryptoKeyVersionMethod;
- if ((getRestoreCryptoKeyVersionMethod =
- KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod)
+ com.google.cloud.kms.v1.GenerateRandomBytesRequest,
+ com.google.cloud.kms.v1.GenerateRandomBytesResponse>
+ getGenerateRandomBytesMethod;
+ if ((getGenerateRandomBytesMethod = KeyManagementServiceGrpc.getGenerateRandomBytesMethod)
== null) {
synchronized (KeyManagementServiceGrpc.class) {
- if ((getRestoreCryptoKeyVersionMethod =
- KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod)
+ if ((getGenerateRandomBytesMethod = KeyManagementServiceGrpc.getGenerateRandomBytesMethod)
== null) {
- KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod =
- getRestoreCryptoKeyVersionMethod =
+ KeyManagementServiceGrpc.getGenerateRandomBytesMethod =
+ getGenerateRandomBytesMethod =
io.grpc.MethodDescriptor
- .
+ .
newBuilder()
.setType(io.grpc.MethodDescriptor.MethodType.UNARY)
.setFullMethodName(
- generateFullMethodName(SERVICE_NAME, "RestoreCryptoKeyVersion"))
+ generateFullMethodName(SERVICE_NAME, "GenerateRandomBytes"))
.setSampledToLocalTracing(true)
.setRequestMarshaller(
io.grpc.protobuf.ProtoUtils.marshaller(
- com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest
+ com.google.cloud.kms.v1.GenerateRandomBytesRequest
.getDefaultInstance()))
.setResponseMarshaller(
io.grpc.protobuf.ProtoUtils.marshaller(
- com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance()))
+ com.google.cloud.kms.v1.GenerateRandomBytesResponse
+ .getDefaultInstance()))
.setSchemaDescriptor(
- new KeyManagementServiceMethodDescriptorSupplier(
- "RestoreCryptoKeyVersion"))
+ new KeyManagementServiceMethodDescriptorSupplier("GenerateRandomBytes"))
.build();
}
}
}
- return getRestoreCryptoKeyVersionMethod;
+ return getGenerateRandomBytesMethod;
}
/** Creates a new async stub that supports all call types for the service */
@@ -1404,6 +1538,64 @@ public void updateCryptoKeyVersion(
getUpdateCryptoKeyVersionMethod(), responseObserver);
}
+ /**
+ *
+ *
+ *
+ * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
+ * Returns an error if called on a key whose purpose is not
+ * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ *
+ */
+ public void updateCryptoKeyPrimaryVersion(
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(
+ getUpdateCryptoKeyPrimaryVersionMethod(), responseObserver);
+ }
+
+ /**
+ *
+ *
+ *
+ * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
+ * Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
+ * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be changed to
+ * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
+ * material will be irrevocably destroyed.
+ * Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
+ * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
+ *
+ */
+ public void destroyCryptoKeyVersion(
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(
+ getDestroyCryptoKeyVersionMethod(), responseObserver);
+ }
+
+ /**
+ *
+ *
+ *
+ * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * state.
+ * Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ *
+ */
+ public void restoreCryptoKeyVersion(
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(
+ getRestoreCryptoKeyVersionMethod(), responseObserver);
+ }
+
/**
*
*
@@ -1471,58 +1663,46 @@ public void asymmetricDecrypt(
*
*
*
- * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
- * Returns an error if called on a key whose purpose is not
- * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
+ * MAC, producing a tag that can be verified by another source with the
+ * same key.
*
*/
- public void updateCryptoKeyPrimaryVersion(
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request,
- io.grpc.stub.StreamObserver responseObserver) {
- io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(
- getUpdateCryptoKeyPrimaryVersionMethod(), responseObserver);
+ public void macSign(
+ com.google.cloud.kms.v1.MacSignRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getMacSignMethod(), responseObserver);
}
/**
*
*
*
- * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
- * Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
- * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be changed to
- * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
- * material will be irrevocably destroyed.
- * Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
- * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
+ * Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
+ * MAC, and returns a response that indicates whether or not the verification
+ * was successful.
*
*/
- public void destroyCryptoKeyVersion(
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request,
- io.grpc.stub.StreamObserver responseObserver) {
- io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(
- getDestroyCryptoKeyVersionMethod(), responseObserver);
+ public void macVerify(
+ com.google.cloud.kms.v1.MacVerifyRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getMacVerifyMethod(), responseObserver);
}
/**
*
*
*
- * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * state.
- * Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ * Generate random bytes using the Cloud KMS randomness source in the provided
+ * location.
*
*/
- public void restoreCryptoKeyVersion(
- com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request,
- io.grpc.stub.StreamObserver responseObserver) {
+ public void generateRandomBytes(
+ com.google.cloud.kms.v1.GenerateRandomBytesRequest request,
+ io.grpc.stub.StreamObserver
+ responseObserver) {
io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(
- getRestoreCryptoKeyVersionMethod(), responseObserver);
+ getGenerateRandomBytesMethod(), responseObserver);
}
@java.lang.Override
@@ -1631,6 +1811,27 @@ public final io.grpc.ServerServiceDefinition bindService() {
com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest,
com.google.cloud.kms.v1.CryptoKeyVersion>(
this, METHODID_UPDATE_CRYPTO_KEY_VERSION)))
+ .addMethod(
+ getUpdateCryptoKeyPrimaryVersionMethod(),
+ io.grpc.stub.ServerCalls.asyncUnaryCall(
+ new MethodHandlers<
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
+ com.google.cloud.kms.v1.CryptoKey>(
+ this, METHODID_UPDATE_CRYPTO_KEY_PRIMARY_VERSION)))
+ .addMethod(
+ getDestroyCryptoKeyVersionMethod(),
+ io.grpc.stub.ServerCalls.asyncUnaryCall(
+ new MethodHandlers<
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>(
+ this, METHODID_DESTROY_CRYPTO_KEY_VERSION)))
+ .addMethod(
+ getRestoreCryptoKeyVersionMethod(),
+ io.grpc.stub.ServerCalls.asyncUnaryCall(
+ new MethodHandlers<
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
+ com.google.cloud.kms.v1.CryptoKeyVersion>(
+ this, METHODID_RESTORE_CRYPTO_KEY_VERSION)))
.addMethod(
getEncryptMethod(),
io.grpc.stub.ServerCalls.asyncUnaryCall(
@@ -1658,26 +1859,24 @@ public final io.grpc.ServerServiceDefinition bindService() {
com.google.cloud.kms.v1.AsymmetricDecryptResponse>(
this, METHODID_ASYMMETRIC_DECRYPT)))
.addMethod(
- getUpdateCryptoKeyPrimaryVersionMethod(),
+ getMacSignMethod(),
io.grpc.stub.ServerCalls.asyncUnaryCall(
new MethodHandlers<
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest,
- com.google.cloud.kms.v1.CryptoKey>(
- this, METHODID_UPDATE_CRYPTO_KEY_PRIMARY_VERSION)))
+ com.google.cloud.kms.v1.MacSignRequest,
+ com.google.cloud.kms.v1.MacSignResponse>(this, METHODID_MAC_SIGN)))
.addMethod(
- getDestroyCryptoKeyVersionMethod(),
+ getMacVerifyMethod(),
io.grpc.stub.ServerCalls.asyncUnaryCall(
new MethodHandlers<
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>(
- this, METHODID_DESTROY_CRYPTO_KEY_VERSION)))
+ com.google.cloud.kms.v1.MacVerifyRequest,
+ com.google.cloud.kms.v1.MacVerifyResponse>(this, METHODID_MAC_VERIFY)))
.addMethod(
- getRestoreCryptoKeyVersionMethod(),
+ getGenerateRandomBytesMethod(),
io.grpc.stub.ServerCalls.asyncUnaryCall(
new MethodHandlers<
- com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest,
- com.google.cloud.kms.v1.CryptoKeyVersion>(
- this, METHODID_RESTORE_CRYPTO_KEY_VERSION)))
+ com.google.cloud.kms.v1.GenerateRandomBytesRequest,
+ com.google.cloud.kms.v1.GenerateRandomBytesResponse>(
+ this, METHODID_GENERATE_RANDOM_BYTES)))
.build();
}
}
@@ -1977,11 +2176,75 @@ public void updateCryptoKey(
* move between other states.
*
*/
- public void updateCryptoKeyVersion(
- com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request,
+ public void updateCryptoKeyVersion(
+ com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ClientCalls.asyncUnaryCall(
+ getChannel().newCall(getUpdateCryptoKeyVersionMethod(), getCallOptions()),
+ request,
+ responseObserver);
+ }
+
+ /**
+ *
+ *
+ *
+ * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
+ * Returns an error if called on a key whose purpose is not
+ * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ *
+ */
+ public void updateCryptoKeyPrimaryVersion(
+ com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ClientCalls.asyncUnaryCall(
+ getChannel().newCall(getUpdateCryptoKeyPrimaryVersionMethod(), getCallOptions()),
+ request,
+ responseObserver);
+ }
+
+ /**
+ *
+ *
+ *
+ * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
+ * Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
+ * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be changed to
+ * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
+ * material will be irrevocably destroyed.
+ * Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
+ * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
+ *
+ */
+ public void destroyCryptoKeyVersion(
+ com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
+ io.grpc.stub.ClientCalls.asyncUnaryCall(
+ getChannel().newCall(getDestroyCryptoKeyVersionMethod(), getCallOptions()),
+ request,
+ responseObserver);
+ }
+
+ /**
+ *
+ *
+ *
+ * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the
+ * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
+ * state.
+ * Upon restoration of the CryptoKeyVersion, [state][google.cloud.kms.v1.CryptoKeyVersion.state]
+ * will be set to [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED],
+ * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be cleared.
+ *
+ */
+ public void restoreCryptoKeyVersion(
+ com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request,
io.grpc.stub.StreamObserver responseObserver) {
io.grpc.stub.ClientCalls.asyncUnaryCall(
- getChannel().newCall(getUpdateCryptoKeyVersionMethod(), getCallOptions()),
+ getChannel().newCall(getRestoreCryptoKeyVersionMethod(), getCallOptions()),
request,
responseObserver);
}
@@ -2059,62 +2322,48 @@ public void asymmetricDecrypt(
*
*
*
- * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that will be used in [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt].
- * Returns an error if called on a key whose purpose is not
- * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT].
+ * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
+ * MAC, producing a tag that can be verified by another source with the
+ * same key.
*
*/
- public void updateCryptoKeyPrimaryVersion(
- com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request,
- io.grpc.stub.StreamObserver responseObserver) {
+ public void macSign(
+ com.google.cloud.kms.v1.MacSignRequest request,
+ io.grpc.stub.StreamObserver responseObserver) {
io.grpc.stub.ClientCalls.asyncUnaryCall(
- getChannel().newCall(getUpdateCryptoKeyPrimaryVersionMethod(), getCallOptions()),
- request,
- responseObserver);
+ getChannel().newCall(getMacSignMethod(), getCallOptions()), request, responseObserver);
}
/**
*
*
*
- * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for destruction.
- * Upon calling this method, [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to
- * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED]
- * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will be set to a time 24
- * hours in the future, at which point the [state][google.cloud.kms.v1.CryptoKeyVersion.state]
- * will be changed to
- * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], and the key
- * material will be irrevocably destroyed.
- * Before the [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is reached,
- * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] may be called to reverse the process.
+ * Verifies MAC tag using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose]
+ * MAC, and returns a response that indicates whether or not the verification
+ * was successful.
*
*/
- public void destroyCryptoKeyVersion(
- com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request,
- io.grpc.stub.StreamObserver responseObserver) {
+ public void macVerify(
+ com.google.cloud.kms.v1.MacVerifyRequest request,
+ io.grpc.stub.StreamObserver