1 /* 2 * Copyright 2020 Google LLC 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * https://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 package com.google.cloud.kms.v1; 17 18 import static io.grpc.MethodDescriptor.generateFullMethodName; 19 20 /** 21 * 22 * 23 * <pre> 24 * Google Cloud Key Management Service 25 * Manages cryptographic keys and operations using those keys. Implements a REST 26 * model with the following objects: 27 * * [KeyRing][google.cloud.kms.v1.KeyRing] 28 * * [CryptoKey][google.cloud.kms.v1.CryptoKey] 29 * * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 30 * * [ImportJob][google.cloud.kms.v1.ImportJob] 31 * If you are using manual gRPC libraries, see 32 * [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc). 33 * </pre> 34 */ 35 @javax.annotation.Generated( 36 value = "by gRPC proto compiler", 37 comments = "Source: google/cloud/kms/v1/service.proto") 38 @io.grpc.stub.annotations.GrpcGenerated 39 public final class KeyManagementServiceGrpc { 40 KeyManagementServiceGrpc()41 private KeyManagementServiceGrpc() {} 42 43 public static final String SERVICE_NAME = "google.cloud.kms.v1.KeyManagementService"; 44 45 // Static method descriptors that strictly reflect the proto. 46 private static volatile io.grpc.MethodDescriptor< 47 com.google.cloud.kms.v1.ListKeyRingsRequest, com.google.cloud.kms.v1.ListKeyRingsResponse> 48 getListKeyRingsMethod; 49 50 @io.grpc.stub.annotations.RpcMethod( 51 fullMethodName = SERVICE_NAME + '/' + "ListKeyRings", 52 requestType = com.google.cloud.kms.v1.ListKeyRingsRequest.class, 53 responseType = com.google.cloud.kms.v1.ListKeyRingsResponse.class, 54 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 55 public static io.grpc.MethodDescriptor< 56 com.google.cloud.kms.v1.ListKeyRingsRequest, com.google.cloud.kms.v1.ListKeyRingsResponse> getListKeyRingsMethod()57 getListKeyRingsMethod() { 58 io.grpc.MethodDescriptor< 59 com.google.cloud.kms.v1.ListKeyRingsRequest, 60 com.google.cloud.kms.v1.ListKeyRingsResponse> 61 getListKeyRingsMethod; 62 if ((getListKeyRingsMethod = KeyManagementServiceGrpc.getListKeyRingsMethod) == null) { 63 synchronized (KeyManagementServiceGrpc.class) { 64 if ((getListKeyRingsMethod = KeyManagementServiceGrpc.getListKeyRingsMethod) == null) { 65 KeyManagementServiceGrpc.getListKeyRingsMethod = 66 getListKeyRingsMethod = 67 io.grpc.MethodDescriptor 68 .<com.google.cloud.kms.v1.ListKeyRingsRequest, 69 com.google.cloud.kms.v1.ListKeyRingsResponse> 70 newBuilder() 71 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 72 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListKeyRings")) 73 .setSampledToLocalTracing(true) 74 .setRequestMarshaller( 75 io.grpc.protobuf.ProtoUtils.marshaller( 76 com.google.cloud.kms.v1.ListKeyRingsRequest.getDefaultInstance())) 77 .setResponseMarshaller( 78 io.grpc.protobuf.ProtoUtils.marshaller( 79 com.google.cloud.kms.v1.ListKeyRingsResponse.getDefaultInstance())) 80 .setSchemaDescriptor( 81 new KeyManagementServiceMethodDescriptorSupplier("ListKeyRings")) 82 .build(); 83 } 84 } 85 } 86 return getListKeyRingsMethod; 87 } 88 89 private static volatile io.grpc.MethodDescriptor< 90 com.google.cloud.kms.v1.ListCryptoKeysRequest, 91 com.google.cloud.kms.v1.ListCryptoKeysResponse> 92 getListCryptoKeysMethod; 93 94 @io.grpc.stub.annotations.RpcMethod( 95 fullMethodName = SERVICE_NAME + '/' + "ListCryptoKeys", 96 requestType = com.google.cloud.kms.v1.ListCryptoKeysRequest.class, 97 responseType = com.google.cloud.kms.v1.ListCryptoKeysResponse.class, 98 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 99 public static io.grpc.MethodDescriptor< 100 com.google.cloud.kms.v1.ListCryptoKeysRequest, 101 com.google.cloud.kms.v1.ListCryptoKeysResponse> getListCryptoKeysMethod()102 getListCryptoKeysMethod() { 103 io.grpc.MethodDescriptor< 104 com.google.cloud.kms.v1.ListCryptoKeysRequest, 105 com.google.cloud.kms.v1.ListCryptoKeysResponse> 106 getListCryptoKeysMethod; 107 if ((getListCryptoKeysMethod = KeyManagementServiceGrpc.getListCryptoKeysMethod) == null) { 108 synchronized (KeyManagementServiceGrpc.class) { 109 if ((getListCryptoKeysMethod = KeyManagementServiceGrpc.getListCryptoKeysMethod) == null) { 110 KeyManagementServiceGrpc.getListCryptoKeysMethod = 111 getListCryptoKeysMethod = 112 io.grpc.MethodDescriptor 113 .<com.google.cloud.kms.v1.ListCryptoKeysRequest, 114 com.google.cloud.kms.v1.ListCryptoKeysResponse> 115 newBuilder() 116 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 117 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListCryptoKeys")) 118 .setSampledToLocalTracing(true) 119 .setRequestMarshaller( 120 io.grpc.protobuf.ProtoUtils.marshaller( 121 com.google.cloud.kms.v1.ListCryptoKeysRequest.getDefaultInstance())) 122 .setResponseMarshaller( 123 io.grpc.protobuf.ProtoUtils.marshaller( 124 com.google.cloud.kms.v1.ListCryptoKeysResponse.getDefaultInstance())) 125 .setSchemaDescriptor( 126 new KeyManagementServiceMethodDescriptorSupplier("ListCryptoKeys")) 127 .build(); 128 } 129 } 130 } 131 return getListCryptoKeysMethod; 132 } 133 134 private static volatile io.grpc.MethodDescriptor< 135 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest, 136 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> 137 getListCryptoKeyVersionsMethod; 138 139 @io.grpc.stub.annotations.RpcMethod( 140 fullMethodName = SERVICE_NAME + '/' + "ListCryptoKeyVersions", 141 requestType = com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest.class, 142 responseType = com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse.class, 143 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 144 public static io.grpc.MethodDescriptor< 145 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest, 146 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> getListCryptoKeyVersionsMethod()147 getListCryptoKeyVersionsMethod() { 148 io.grpc.MethodDescriptor< 149 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest, 150 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> 151 getListCryptoKeyVersionsMethod; 152 if ((getListCryptoKeyVersionsMethod = KeyManagementServiceGrpc.getListCryptoKeyVersionsMethod) 153 == null) { 154 synchronized (KeyManagementServiceGrpc.class) { 155 if ((getListCryptoKeyVersionsMethod = 156 KeyManagementServiceGrpc.getListCryptoKeyVersionsMethod) 157 == null) { 158 KeyManagementServiceGrpc.getListCryptoKeyVersionsMethod = 159 getListCryptoKeyVersionsMethod = 160 io.grpc.MethodDescriptor 161 .<com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest, 162 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> 163 newBuilder() 164 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 165 .setFullMethodName( 166 generateFullMethodName(SERVICE_NAME, "ListCryptoKeyVersions")) 167 .setSampledToLocalTracing(true) 168 .setRequestMarshaller( 169 io.grpc.protobuf.ProtoUtils.marshaller( 170 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest 171 .getDefaultInstance())) 172 .setResponseMarshaller( 173 io.grpc.protobuf.ProtoUtils.marshaller( 174 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse 175 .getDefaultInstance())) 176 .setSchemaDescriptor( 177 new KeyManagementServiceMethodDescriptorSupplier("ListCryptoKeyVersions")) 178 .build(); 179 } 180 } 181 } 182 return getListCryptoKeyVersionsMethod; 183 } 184 185 private static volatile io.grpc.MethodDescriptor< 186 com.google.cloud.kms.v1.ListImportJobsRequest, 187 com.google.cloud.kms.v1.ListImportJobsResponse> 188 getListImportJobsMethod; 189 190 @io.grpc.stub.annotations.RpcMethod( 191 fullMethodName = SERVICE_NAME + '/' + "ListImportJobs", 192 requestType = com.google.cloud.kms.v1.ListImportJobsRequest.class, 193 responseType = com.google.cloud.kms.v1.ListImportJobsResponse.class, 194 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 195 public static io.grpc.MethodDescriptor< 196 com.google.cloud.kms.v1.ListImportJobsRequest, 197 com.google.cloud.kms.v1.ListImportJobsResponse> getListImportJobsMethod()198 getListImportJobsMethod() { 199 io.grpc.MethodDescriptor< 200 com.google.cloud.kms.v1.ListImportJobsRequest, 201 com.google.cloud.kms.v1.ListImportJobsResponse> 202 getListImportJobsMethod; 203 if ((getListImportJobsMethod = KeyManagementServiceGrpc.getListImportJobsMethod) == null) { 204 synchronized (KeyManagementServiceGrpc.class) { 205 if ((getListImportJobsMethod = KeyManagementServiceGrpc.getListImportJobsMethod) == null) { 206 KeyManagementServiceGrpc.getListImportJobsMethod = 207 getListImportJobsMethod = 208 io.grpc.MethodDescriptor 209 .<com.google.cloud.kms.v1.ListImportJobsRequest, 210 com.google.cloud.kms.v1.ListImportJobsResponse> 211 newBuilder() 212 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 213 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "ListImportJobs")) 214 .setSampledToLocalTracing(true) 215 .setRequestMarshaller( 216 io.grpc.protobuf.ProtoUtils.marshaller( 217 com.google.cloud.kms.v1.ListImportJobsRequest.getDefaultInstance())) 218 .setResponseMarshaller( 219 io.grpc.protobuf.ProtoUtils.marshaller( 220 com.google.cloud.kms.v1.ListImportJobsResponse.getDefaultInstance())) 221 .setSchemaDescriptor( 222 new KeyManagementServiceMethodDescriptorSupplier("ListImportJobs")) 223 .build(); 224 } 225 } 226 } 227 return getListImportJobsMethod; 228 } 229 230 private static volatile io.grpc.MethodDescriptor< 231 com.google.cloud.kms.v1.GetKeyRingRequest, com.google.cloud.kms.v1.KeyRing> 232 getGetKeyRingMethod; 233 234 @io.grpc.stub.annotations.RpcMethod( 235 fullMethodName = SERVICE_NAME + '/' + "GetKeyRing", 236 requestType = com.google.cloud.kms.v1.GetKeyRingRequest.class, 237 responseType = com.google.cloud.kms.v1.KeyRing.class, 238 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 239 public static io.grpc.MethodDescriptor< 240 com.google.cloud.kms.v1.GetKeyRingRequest, com.google.cloud.kms.v1.KeyRing> getGetKeyRingMethod()241 getGetKeyRingMethod() { 242 io.grpc.MethodDescriptor< 243 com.google.cloud.kms.v1.GetKeyRingRequest, com.google.cloud.kms.v1.KeyRing> 244 getGetKeyRingMethod; 245 if ((getGetKeyRingMethod = KeyManagementServiceGrpc.getGetKeyRingMethod) == null) { 246 synchronized (KeyManagementServiceGrpc.class) { 247 if ((getGetKeyRingMethod = KeyManagementServiceGrpc.getGetKeyRingMethod) == null) { 248 KeyManagementServiceGrpc.getGetKeyRingMethod = 249 getGetKeyRingMethod = 250 io.grpc.MethodDescriptor 251 .<com.google.cloud.kms.v1.GetKeyRingRequest, com.google.cloud.kms.v1.KeyRing> 252 newBuilder() 253 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 254 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetKeyRing")) 255 .setSampledToLocalTracing(true) 256 .setRequestMarshaller( 257 io.grpc.protobuf.ProtoUtils.marshaller( 258 com.google.cloud.kms.v1.GetKeyRingRequest.getDefaultInstance())) 259 .setResponseMarshaller( 260 io.grpc.protobuf.ProtoUtils.marshaller( 261 com.google.cloud.kms.v1.KeyRing.getDefaultInstance())) 262 .setSchemaDescriptor( 263 new KeyManagementServiceMethodDescriptorSupplier("GetKeyRing")) 264 .build(); 265 } 266 } 267 } 268 return getGetKeyRingMethod; 269 } 270 271 private static volatile io.grpc.MethodDescriptor< 272 com.google.cloud.kms.v1.GetCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> 273 getGetCryptoKeyMethod; 274 275 @io.grpc.stub.annotations.RpcMethod( 276 fullMethodName = SERVICE_NAME + '/' + "GetCryptoKey", 277 requestType = com.google.cloud.kms.v1.GetCryptoKeyRequest.class, 278 responseType = com.google.cloud.kms.v1.CryptoKey.class, 279 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 280 public static io.grpc.MethodDescriptor< 281 com.google.cloud.kms.v1.GetCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> getGetCryptoKeyMethod()282 getGetCryptoKeyMethod() { 283 io.grpc.MethodDescriptor< 284 com.google.cloud.kms.v1.GetCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> 285 getGetCryptoKeyMethod; 286 if ((getGetCryptoKeyMethod = KeyManagementServiceGrpc.getGetCryptoKeyMethod) == null) { 287 synchronized (KeyManagementServiceGrpc.class) { 288 if ((getGetCryptoKeyMethod = KeyManagementServiceGrpc.getGetCryptoKeyMethod) == null) { 289 KeyManagementServiceGrpc.getGetCryptoKeyMethod = 290 getGetCryptoKeyMethod = 291 io.grpc.MethodDescriptor 292 .<com.google.cloud.kms.v1.GetCryptoKeyRequest, 293 com.google.cloud.kms.v1.CryptoKey> 294 newBuilder() 295 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 296 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetCryptoKey")) 297 .setSampledToLocalTracing(true) 298 .setRequestMarshaller( 299 io.grpc.protobuf.ProtoUtils.marshaller( 300 com.google.cloud.kms.v1.GetCryptoKeyRequest.getDefaultInstance())) 301 .setResponseMarshaller( 302 io.grpc.protobuf.ProtoUtils.marshaller( 303 com.google.cloud.kms.v1.CryptoKey.getDefaultInstance())) 304 .setSchemaDescriptor( 305 new KeyManagementServiceMethodDescriptorSupplier("GetCryptoKey")) 306 .build(); 307 } 308 } 309 } 310 return getGetCryptoKeyMethod; 311 } 312 313 private static volatile io.grpc.MethodDescriptor< 314 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest, 315 com.google.cloud.kms.v1.CryptoKeyVersion> 316 getGetCryptoKeyVersionMethod; 317 318 @io.grpc.stub.annotations.RpcMethod( 319 fullMethodName = SERVICE_NAME + '/' + "GetCryptoKeyVersion", 320 requestType = com.google.cloud.kms.v1.GetCryptoKeyVersionRequest.class, 321 responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class, 322 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 323 public static io.grpc.MethodDescriptor< 324 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest, 325 com.google.cloud.kms.v1.CryptoKeyVersion> getGetCryptoKeyVersionMethod()326 getGetCryptoKeyVersionMethod() { 327 io.grpc.MethodDescriptor< 328 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest, 329 com.google.cloud.kms.v1.CryptoKeyVersion> 330 getGetCryptoKeyVersionMethod; 331 if ((getGetCryptoKeyVersionMethod = KeyManagementServiceGrpc.getGetCryptoKeyVersionMethod) 332 == null) { 333 synchronized (KeyManagementServiceGrpc.class) { 334 if ((getGetCryptoKeyVersionMethod = KeyManagementServiceGrpc.getGetCryptoKeyVersionMethod) 335 == null) { 336 KeyManagementServiceGrpc.getGetCryptoKeyVersionMethod = 337 getGetCryptoKeyVersionMethod = 338 io.grpc.MethodDescriptor 339 .<com.google.cloud.kms.v1.GetCryptoKeyVersionRequest, 340 com.google.cloud.kms.v1.CryptoKeyVersion> 341 newBuilder() 342 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 343 .setFullMethodName( 344 generateFullMethodName(SERVICE_NAME, "GetCryptoKeyVersion")) 345 .setSampledToLocalTracing(true) 346 .setRequestMarshaller( 347 io.grpc.protobuf.ProtoUtils.marshaller( 348 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest 349 .getDefaultInstance())) 350 .setResponseMarshaller( 351 io.grpc.protobuf.ProtoUtils.marshaller( 352 com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance())) 353 .setSchemaDescriptor( 354 new KeyManagementServiceMethodDescriptorSupplier("GetCryptoKeyVersion")) 355 .build(); 356 } 357 } 358 } 359 return getGetCryptoKeyVersionMethod; 360 } 361 362 private static volatile io.grpc.MethodDescriptor< 363 com.google.cloud.kms.v1.GetPublicKeyRequest, com.google.cloud.kms.v1.PublicKey> 364 getGetPublicKeyMethod; 365 366 @io.grpc.stub.annotations.RpcMethod( 367 fullMethodName = SERVICE_NAME + '/' + "GetPublicKey", 368 requestType = com.google.cloud.kms.v1.GetPublicKeyRequest.class, 369 responseType = com.google.cloud.kms.v1.PublicKey.class, 370 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 371 public static io.grpc.MethodDescriptor< 372 com.google.cloud.kms.v1.GetPublicKeyRequest, com.google.cloud.kms.v1.PublicKey> getGetPublicKeyMethod()373 getGetPublicKeyMethod() { 374 io.grpc.MethodDescriptor< 375 com.google.cloud.kms.v1.GetPublicKeyRequest, com.google.cloud.kms.v1.PublicKey> 376 getGetPublicKeyMethod; 377 if ((getGetPublicKeyMethod = KeyManagementServiceGrpc.getGetPublicKeyMethod) == null) { 378 synchronized (KeyManagementServiceGrpc.class) { 379 if ((getGetPublicKeyMethod = KeyManagementServiceGrpc.getGetPublicKeyMethod) == null) { 380 KeyManagementServiceGrpc.getGetPublicKeyMethod = 381 getGetPublicKeyMethod = 382 io.grpc.MethodDescriptor 383 .<com.google.cloud.kms.v1.GetPublicKeyRequest, 384 com.google.cloud.kms.v1.PublicKey> 385 newBuilder() 386 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 387 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetPublicKey")) 388 .setSampledToLocalTracing(true) 389 .setRequestMarshaller( 390 io.grpc.protobuf.ProtoUtils.marshaller( 391 com.google.cloud.kms.v1.GetPublicKeyRequest.getDefaultInstance())) 392 .setResponseMarshaller( 393 io.grpc.protobuf.ProtoUtils.marshaller( 394 com.google.cloud.kms.v1.PublicKey.getDefaultInstance())) 395 .setSchemaDescriptor( 396 new KeyManagementServiceMethodDescriptorSupplier("GetPublicKey")) 397 .build(); 398 } 399 } 400 } 401 return getGetPublicKeyMethod; 402 } 403 404 private static volatile io.grpc.MethodDescriptor< 405 com.google.cloud.kms.v1.GetImportJobRequest, com.google.cloud.kms.v1.ImportJob> 406 getGetImportJobMethod; 407 408 @io.grpc.stub.annotations.RpcMethod( 409 fullMethodName = SERVICE_NAME + '/' + "GetImportJob", 410 requestType = com.google.cloud.kms.v1.GetImportJobRequest.class, 411 responseType = com.google.cloud.kms.v1.ImportJob.class, 412 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 413 public static io.grpc.MethodDescriptor< 414 com.google.cloud.kms.v1.GetImportJobRequest, com.google.cloud.kms.v1.ImportJob> getGetImportJobMethod()415 getGetImportJobMethod() { 416 io.grpc.MethodDescriptor< 417 com.google.cloud.kms.v1.GetImportJobRequest, com.google.cloud.kms.v1.ImportJob> 418 getGetImportJobMethod; 419 if ((getGetImportJobMethod = KeyManagementServiceGrpc.getGetImportJobMethod) == null) { 420 synchronized (KeyManagementServiceGrpc.class) { 421 if ((getGetImportJobMethod = KeyManagementServiceGrpc.getGetImportJobMethod) == null) { 422 KeyManagementServiceGrpc.getGetImportJobMethod = 423 getGetImportJobMethod = 424 io.grpc.MethodDescriptor 425 .<com.google.cloud.kms.v1.GetImportJobRequest, 426 com.google.cloud.kms.v1.ImportJob> 427 newBuilder() 428 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 429 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "GetImportJob")) 430 .setSampledToLocalTracing(true) 431 .setRequestMarshaller( 432 io.grpc.protobuf.ProtoUtils.marshaller( 433 com.google.cloud.kms.v1.GetImportJobRequest.getDefaultInstance())) 434 .setResponseMarshaller( 435 io.grpc.protobuf.ProtoUtils.marshaller( 436 com.google.cloud.kms.v1.ImportJob.getDefaultInstance())) 437 .setSchemaDescriptor( 438 new KeyManagementServiceMethodDescriptorSupplier("GetImportJob")) 439 .build(); 440 } 441 } 442 } 443 return getGetImportJobMethod; 444 } 445 446 private static volatile io.grpc.MethodDescriptor< 447 com.google.cloud.kms.v1.CreateKeyRingRequest, com.google.cloud.kms.v1.KeyRing> 448 getCreateKeyRingMethod; 449 450 @io.grpc.stub.annotations.RpcMethod( 451 fullMethodName = SERVICE_NAME + '/' + "CreateKeyRing", 452 requestType = com.google.cloud.kms.v1.CreateKeyRingRequest.class, 453 responseType = com.google.cloud.kms.v1.KeyRing.class, 454 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 455 public static io.grpc.MethodDescriptor< 456 com.google.cloud.kms.v1.CreateKeyRingRequest, com.google.cloud.kms.v1.KeyRing> getCreateKeyRingMethod()457 getCreateKeyRingMethod() { 458 io.grpc.MethodDescriptor< 459 com.google.cloud.kms.v1.CreateKeyRingRequest, com.google.cloud.kms.v1.KeyRing> 460 getCreateKeyRingMethod; 461 if ((getCreateKeyRingMethod = KeyManagementServiceGrpc.getCreateKeyRingMethod) == null) { 462 synchronized (KeyManagementServiceGrpc.class) { 463 if ((getCreateKeyRingMethod = KeyManagementServiceGrpc.getCreateKeyRingMethod) == null) { 464 KeyManagementServiceGrpc.getCreateKeyRingMethod = 465 getCreateKeyRingMethod = 466 io.grpc.MethodDescriptor 467 .<com.google.cloud.kms.v1.CreateKeyRingRequest, 468 com.google.cloud.kms.v1.KeyRing> 469 newBuilder() 470 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 471 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "CreateKeyRing")) 472 .setSampledToLocalTracing(true) 473 .setRequestMarshaller( 474 io.grpc.protobuf.ProtoUtils.marshaller( 475 com.google.cloud.kms.v1.CreateKeyRingRequest.getDefaultInstance())) 476 .setResponseMarshaller( 477 io.grpc.protobuf.ProtoUtils.marshaller( 478 com.google.cloud.kms.v1.KeyRing.getDefaultInstance())) 479 .setSchemaDescriptor( 480 new KeyManagementServiceMethodDescriptorSupplier("CreateKeyRing")) 481 .build(); 482 } 483 } 484 } 485 return getCreateKeyRingMethod; 486 } 487 488 private static volatile io.grpc.MethodDescriptor< 489 com.google.cloud.kms.v1.CreateCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> 490 getCreateCryptoKeyMethod; 491 492 @io.grpc.stub.annotations.RpcMethod( 493 fullMethodName = SERVICE_NAME + '/' + "CreateCryptoKey", 494 requestType = com.google.cloud.kms.v1.CreateCryptoKeyRequest.class, 495 responseType = com.google.cloud.kms.v1.CryptoKey.class, 496 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 497 public static io.grpc.MethodDescriptor< 498 com.google.cloud.kms.v1.CreateCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> getCreateCryptoKeyMethod()499 getCreateCryptoKeyMethod() { 500 io.grpc.MethodDescriptor< 501 com.google.cloud.kms.v1.CreateCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> 502 getCreateCryptoKeyMethod; 503 if ((getCreateCryptoKeyMethod = KeyManagementServiceGrpc.getCreateCryptoKeyMethod) == null) { 504 synchronized (KeyManagementServiceGrpc.class) { 505 if ((getCreateCryptoKeyMethod = KeyManagementServiceGrpc.getCreateCryptoKeyMethod) 506 == null) { 507 KeyManagementServiceGrpc.getCreateCryptoKeyMethod = 508 getCreateCryptoKeyMethod = 509 io.grpc.MethodDescriptor 510 .<com.google.cloud.kms.v1.CreateCryptoKeyRequest, 511 com.google.cloud.kms.v1.CryptoKey> 512 newBuilder() 513 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 514 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "CreateCryptoKey")) 515 .setSampledToLocalTracing(true) 516 .setRequestMarshaller( 517 io.grpc.protobuf.ProtoUtils.marshaller( 518 com.google.cloud.kms.v1.CreateCryptoKeyRequest.getDefaultInstance())) 519 .setResponseMarshaller( 520 io.grpc.protobuf.ProtoUtils.marshaller( 521 com.google.cloud.kms.v1.CryptoKey.getDefaultInstance())) 522 .setSchemaDescriptor( 523 new KeyManagementServiceMethodDescriptorSupplier("CreateCryptoKey")) 524 .build(); 525 } 526 } 527 } 528 return getCreateCryptoKeyMethod; 529 } 530 531 private static volatile io.grpc.MethodDescriptor< 532 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest, 533 com.google.cloud.kms.v1.CryptoKeyVersion> 534 getCreateCryptoKeyVersionMethod; 535 536 @io.grpc.stub.annotations.RpcMethod( 537 fullMethodName = SERVICE_NAME + '/' + "CreateCryptoKeyVersion", 538 requestType = com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest.class, 539 responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class, 540 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 541 public static io.grpc.MethodDescriptor< 542 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest, 543 com.google.cloud.kms.v1.CryptoKeyVersion> getCreateCryptoKeyVersionMethod()544 getCreateCryptoKeyVersionMethod() { 545 io.grpc.MethodDescriptor< 546 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest, 547 com.google.cloud.kms.v1.CryptoKeyVersion> 548 getCreateCryptoKeyVersionMethod; 549 if ((getCreateCryptoKeyVersionMethod = KeyManagementServiceGrpc.getCreateCryptoKeyVersionMethod) 550 == null) { 551 synchronized (KeyManagementServiceGrpc.class) { 552 if ((getCreateCryptoKeyVersionMethod = 553 KeyManagementServiceGrpc.getCreateCryptoKeyVersionMethod) 554 == null) { 555 KeyManagementServiceGrpc.getCreateCryptoKeyVersionMethod = 556 getCreateCryptoKeyVersionMethod = 557 io.grpc.MethodDescriptor 558 .<com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest, 559 com.google.cloud.kms.v1.CryptoKeyVersion> 560 newBuilder() 561 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 562 .setFullMethodName( 563 generateFullMethodName(SERVICE_NAME, "CreateCryptoKeyVersion")) 564 .setSampledToLocalTracing(true) 565 .setRequestMarshaller( 566 io.grpc.protobuf.ProtoUtils.marshaller( 567 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest 568 .getDefaultInstance())) 569 .setResponseMarshaller( 570 io.grpc.protobuf.ProtoUtils.marshaller( 571 com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance())) 572 .setSchemaDescriptor( 573 new KeyManagementServiceMethodDescriptorSupplier( 574 "CreateCryptoKeyVersion")) 575 .build(); 576 } 577 } 578 } 579 return getCreateCryptoKeyVersionMethod; 580 } 581 582 private static volatile io.grpc.MethodDescriptor< 583 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest, 584 com.google.cloud.kms.v1.CryptoKeyVersion> 585 getImportCryptoKeyVersionMethod; 586 587 @io.grpc.stub.annotations.RpcMethod( 588 fullMethodName = SERVICE_NAME + '/' + "ImportCryptoKeyVersion", 589 requestType = com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest.class, 590 responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class, 591 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 592 public static io.grpc.MethodDescriptor< 593 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest, 594 com.google.cloud.kms.v1.CryptoKeyVersion> getImportCryptoKeyVersionMethod()595 getImportCryptoKeyVersionMethod() { 596 io.grpc.MethodDescriptor< 597 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest, 598 com.google.cloud.kms.v1.CryptoKeyVersion> 599 getImportCryptoKeyVersionMethod; 600 if ((getImportCryptoKeyVersionMethod = KeyManagementServiceGrpc.getImportCryptoKeyVersionMethod) 601 == null) { 602 synchronized (KeyManagementServiceGrpc.class) { 603 if ((getImportCryptoKeyVersionMethod = 604 KeyManagementServiceGrpc.getImportCryptoKeyVersionMethod) 605 == null) { 606 KeyManagementServiceGrpc.getImportCryptoKeyVersionMethod = 607 getImportCryptoKeyVersionMethod = 608 io.grpc.MethodDescriptor 609 .<com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest, 610 com.google.cloud.kms.v1.CryptoKeyVersion> 611 newBuilder() 612 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 613 .setFullMethodName( 614 generateFullMethodName(SERVICE_NAME, "ImportCryptoKeyVersion")) 615 .setSampledToLocalTracing(true) 616 .setRequestMarshaller( 617 io.grpc.protobuf.ProtoUtils.marshaller( 618 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest 619 .getDefaultInstance())) 620 .setResponseMarshaller( 621 io.grpc.protobuf.ProtoUtils.marshaller( 622 com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance())) 623 .setSchemaDescriptor( 624 new KeyManagementServiceMethodDescriptorSupplier( 625 "ImportCryptoKeyVersion")) 626 .build(); 627 } 628 } 629 } 630 return getImportCryptoKeyVersionMethod; 631 } 632 633 private static volatile io.grpc.MethodDescriptor< 634 com.google.cloud.kms.v1.CreateImportJobRequest, com.google.cloud.kms.v1.ImportJob> 635 getCreateImportJobMethod; 636 637 @io.grpc.stub.annotations.RpcMethod( 638 fullMethodName = SERVICE_NAME + '/' + "CreateImportJob", 639 requestType = com.google.cloud.kms.v1.CreateImportJobRequest.class, 640 responseType = com.google.cloud.kms.v1.ImportJob.class, 641 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 642 public static io.grpc.MethodDescriptor< 643 com.google.cloud.kms.v1.CreateImportJobRequest, com.google.cloud.kms.v1.ImportJob> getCreateImportJobMethod()644 getCreateImportJobMethod() { 645 io.grpc.MethodDescriptor< 646 com.google.cloud.kms.v1.CreateImportJobRequest, com.google.cloud.kms.v1.ImportJob> 647 getCreateImportJobMethod; 648 if ((getCreateImportJobMethod = KeyManagementServiceGrpc.getCreateImportJobMethod) == null) { 649 synchronized (KeyManagementServiceGrpc.class) { 650 if ((getCreateImportJobMethod = KeyManagementServiceGrpc.getCreateImportJobMethod) 651 == null) { 652 KeyManagementServiceGrpc.getCreateImportJobMethod = 653 getCreateImportJobMethod = 654 io.grpc.MethodDescriptor 655 .<com.google.cloud.kms.v1.CreateImportJobRequest, 656 com.google.cloud.kms.v1.ImportJob> 657 newBuilder() 658 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 659 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "CreateImportJob")) 660 .setSampledToLocalTracing(true) 661 .setRequestMarshaller( 662 io.grpc.protobuf.ProtoUtils.marshaller( 663 com.google.cloud.kms.v1.CreateImportJobRequest.getDefaultInstance())) 664 .setResponseMarshaller( 665 io.grpc.protobuf.ProtoUtils.marshaller( 666 com.google.cloud.kms.v1.ImportJob.getDefaultInstance())) 667 .setSchemaDescriptor( 668 new KeyManagementServiceMethodDescriptorSupplier("CreateImportJob")) 669 .build(); 670 } 671 } 672 } 673 return getCreateImportJobMethod; 674 } 675 676 private static volatile io.grpc.MethodDescriptor< 677 com.google.cloud.kms.v1.UpdateCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> 678 getUpdateCryptoKeyMethod; 679 680 @io.grpc.stub.annotations.RpcMethod( 681 fullMethodName = SERVICE_NAME + '/' + "UpdateCryptoKey", 682 requestType = com.google.cloud.kms.v1.UpdateCryptoKeyRequest.class, 683 responseType = com.google.cloud.kms.v1.CryptoKey.class, 684 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 685 public static io.grpc.MethodDescriptor< 686 com.google.cloud.kms.v1.UpdateCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> getUpdateCryptoKeyMethod()687 getUpdateCryptoKeyMethod() { 688 io.grpc.MethodDescriptor< 689 com.google.cloud.kms.v1.UpdateCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey> 690 getUpdateCryptoKeyMethod; 691 if ((getUpdateCryptoKeyMethod = KeyManagementServiceGrpc.getUpdateCryptoKeyMethod) == null) { 692 synchronized (KeyManagementServiceGrpc.class) { 693 if ((getUpdateCryptoKeyMethod = KeyManagementServiceGrpc.getUpdateCryptoKeyMethod) 694 == null) { 695 KeyManagementServiceGrpc.getUpdateCryptoKeyMethod = 696 getUpdateCryptoKeyMethod = 697 io.grpc.MethodDescriptor 698 .<com.google.cloud.kms.v1.UpdateCryptoKeyRequest, 699 com.google.cloud.kms.v1.CryptoKey> 700 newBuilder() 701 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 702 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "UpdateCryptoKey")) 703 .setSampledToLocalTracing(true) 704 .setRequestMarshaller( 705 io.grpc.protobuf.ProtoUtils.marshaller( 706 com.google.cloud.kms.v1.UpdateCryptoKeyRequest.getDefaultInstance())) 707 .setResponseMarshaller( 708 io.grpc.protobuf.ProtoUtils.marshaller( 709 com.google.cloud.kms.v1.CryptoKey.getDefaultInstance())) 710 .setSchemaDescriptor( 711 new KeyManagementServiceMethodDescriptorSupplier("UpdateCryptoKey")) 712 .build(); 713 } 714 } 715 } 716 return getUpdateCryptoKeyMethod; 717 } 718 719 private static volatile io.grpc.MethodDescriptor< 720 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest, 721 com.google.cloud.kms.v1.CryptoKeyVersion> 722 getUpdateCryptoKeyVersionMethod; 723 724 @io.grpc.stub.annotations.RpcMethod( 725 fullMethodName = SERVICE_NAME + '/' + "UpdateCryptoKeyVersion", 726 requestType = com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest.class, 727 responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class, 728 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 729 public static io.grpc.MethodDescriptor< 730 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest, 731 com.google.cloud.kms.v1.CryptoKeyVersion> getUpdateCryptoKeyVersionMethod()732 getUpdateCryptoKeyVersionMethod() { 733 io.grpc.MethodDescriptor< 734 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest, 735 com.google.cloud.kms.v1.CryptoKeyVersion> 736 getUpdateCryptoKeyVersionMethod; 737 if ((getUpdateCryptoKeyVersionMethod = KeyManagementServiceGrpc.getUpdateCryptoKeyVersionMethod) 738 == null) { 739 synchronized (KeyManagementServiceGrpc.class) { 740 if ((getUpdateCryptoKeyVersionMethod = 741 KeyManagementServiceGrpc.getUpdateCryptoKeyVersionMethod) 742 == null) { 743 KeyManagementServiceGrpc.getUpdateCryptoKeyVersionMethod = 744 getUpdateCryptoKeyVersionMethod = 745 io.grpc.MethodDescriptor 746 .<com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest, 747 com.google.cloud.kms.v1.CryptoKeyVersion> 748 newBuilder() 749 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 750 .setFullMethodName( 751 generateFullMethodName(SERVICE_NAME, "UpdateCryptoKeyVersion")) 752 .setSampledToLocalTracing(true) 753 .setRequestMarshaller( 754 io.grpc.protobuf.ProtoUtils.marshaller( 755 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest 756 .getDefaultInstance())) 757 .setResponseMarshaller( 758 io.grpc.protobuf.ProtoUtils.marshaller( 759 com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance())) 760 .setSchemaDescriptor( 761 new KeyManagementServiceMethodDescriptorSupplier( 762 "UpdateCryptoKeyVersion")) 763 .build(); 764 } 765 } 766 } 767 return getUpdateCryptoKeyVersionMethod; 768 } 769 770 private static volatile io.grpc.MethodDescriptor< 771 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest, 772 com.google.cloud.kms.v1.CryptoKey> 773 getUpdateCryptoKeyPrimaryVersionMethod; 774 775 @io.grpc.stub.annotations.RpcMethod( 776 fullMethodName = SERVICE_NAME + '/' + "UpdateCryptoKeyPrimaryVersion", 777 requestType = com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest.class, 778 responseType = com.google.cloud.kms.v1.CryptoKey.class, 779 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 780 public static io.grpc.MethodDescriptor< 781 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest, 782 com.google.cloud.kms.v1.CryptoKey> getUpdateCryptoKeyPrimaryVersionMethod()783 getUpdateCryptoKeyPrimaryVersionMethod() { 784 io.grpc.MethodDescriptor< 785 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest, 786 com.google.cloud.kms.v1.CryptoKey> 787 getUpdateCryptoKeyPrimaryVersionMethod; 788 if ((getUpdateCryptoKeyPrimaryVersionMethod = 789 KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod) 790 == null) { 791 synchronized (KeyManagementServiceGrpc.class) { 792 if ((getUpdateCryptoKeyPrimaryVersionMethod = 793 KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod) 794 == null) { 795 KeyManagementServiceGrpc.getUpdateCryptoKeyPrimaryVersionMethod = 796 getUpdateCryptoKeyPrimaryVersionMethod = 797 io.grpc.MethodDescriptor 798 .<com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest, 799 com.google.cloud.kms.v1.CryptoKey> 800 newBuilder() 801 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 802 .setFullMethodName( 803 generateFullMethodName(SERVICE_NAME, "UpdateCryptoKeyPrimaryVersion")) 804 .setSampledToLocalTracing(true) 805 .setRequestMarshaller( 806 io.grpc.protobuf.ProtoUtils.marshaller( 807 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest 808 .getDefaultInstance())) 809 .setResponseMarshaller( 810 io.grpc.protobuf.ProtoUtils.marshaller( 811 com.google.cloud.kms.v1.CryptoKey.getDefaultInstance())) 812 .setSchemaDescriptor( 813 new KeyManagementServiceMethodDescriptorSupplier( 814 "UpdateCryptoKeyPrimaryVersion")) 815 .build(); 816 } 817 } 818 } 819 return getUpdateCryptoKeyPrimaryVersionMethod; 820 } 821 822 private static volatile io.grpc.MethodDescriptor< 823 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest, 824 com.google.cloud.kms.v1.CryptoKeyVersion> 825 getDestroyCryptoKeyVersionMethod; 826 827 @io.grpc.stub.annotations.RpcMethod( 828 fullMethodName = SERVICE_NAME + '/' + "DestroyCryptoKeyVersion", 829 requestType = com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest.class, 830 responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class, 831 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 832 public static io.grpc.MethodDescriptor< 833 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest, 834 com.google.cloud.kms.v1.CryptoKeyVersion> getDestroyCryptoKeyVersionMethod()835 getDestroyCryptoKeyVersionMethod() { 836 io.grpc.MethodDescriptor< 837 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest, 838 com.google.cloud.kms.v1.CryptoKeyVersion> 839 getDestroyCryptoKeyVersionMethod; 840 if ((getDestroyCryptoKeyVersionMethod = 841 KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod) 842 == null) { 843 synchronized (KeyManagementServiceGrpc.class) { 844 if ((getDestroyCryptoKeyVersionMethod = 845 KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod) 846 == null) { 847 KeyManagementServiceGrpc.getDestroyCryptoKeyVersionMethod = 848 getDestroyCryptoKeyVersionMethod = 849 io.grpc.MethodDescriptor 850 .<com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest, 851 com.google.cloud.kms.v1.CryptoKeyVersion> 852 newBuilder() 853 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 854 .setFullMethodName( 855 generateFullMethodName(SERVICE_NAME, "DestroyCryptoKeyVersion")) 856 .setSampledToLocalTracing(true) 857 .setRequestMarshaller( 858 io.grpc.protobuf.ProtoUtils.marshaller( 859 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest 860 .getDefaultInstance())) 861 .setResponseMarshaller( 862 io.grpc.protobuf.ProtoUtils.marshaller( 863 com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance())) 864 .setSchemaDescriptor( 865 new KeyManagementServiceMethodDescriptorSupplier( 866 "DestroyCryptoKeyVersion")) 867 .build(); 868 } 869 } 870 } 871 return getDestroyCryptoKeyVersionMethod; 872 } 873 874 private static volatile io.grpc.MethodDescriptor< 875 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest, 876 com.google.cloud.kms.v1.CryptoKeyVersion> 877 getRestoreCryptoKeyVersionMethod; 878 879 @io.grpc.stub.annotations.RpcMethod( 880 fullMethodName = SERVICE_NAME + '/' + "RestoreCryptoKeyVersion", 881 requestType = com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest.class, 882 responseType = com.google.cloud.kms.v1.CryptoKeyVersion.class, 883 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 884 public static io.grpc.MethodDescriptor< 885 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest, 886 com.google.cloud.kms.v1.CryptoKeyVersion> getRestoreCryptoKeyVersionMethod()887 getRestoreCryptoKeyVersionMethod() { 888 io.grpc.MethodDescriptor< 889 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest, 890 com.google.cloud.kms.v1.CryptoKeyVersion> 891 getRestoreCryptoKeyVersionMethod; 892 if ((getRestoreCryptoKeyVersionMethod = 893 KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod) 894 == null) { 895 synchronized (KeyManagementServiceGrpc.class) { 896 if ((getRestoreCryptoKeyVersionMethod = 897 KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod) 898 == null) { 899 KeyManagementServiceGrpc.getRestoreCryptoKeyVersionMethod = 900 getRestoreCryptoKeyVersionMethod = 901 io.grpc.MethodDescriptor 902 .<com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest, 903 com.google.cloud.kms.v1.CryptoKeyVersion> 904 newBuilder() 905 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 906 .setFullMethodName( 907 generateFullMethodName(SERVICE_NAME, "RestoreCryptoKeyVersion")) 908 .setSampledToLocalTracing(true) 909 .setRequestMarshaller( 910 io.grpc.protobuf.ProtoUtils.marshaller( 911 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest 912 .getDefaultInstance())) 913 .setResponseMarshaller( 914 io.grpc.protobuf.ProtoUtils.marshaller( 915 com.google.cloud.kms.v1.CryptoKeyVersion.getDefaultInstance())) 916 .setSchemaDescriptor( 917 new KeyManagementServiceMethodDescriptorSupplier( 918 "RestoreCryptoKeyVersion")) 919 .build(); 920 } 921 } 922 } 923 return getRestoreCryptoKeyVersionMethod; 924 } 925 926 private static volatile io.grpc.MethodDescriptor< 927 com.google.cloud.kms.v1.EncryptRequest, com.google.cloud.kms.v1.EncryptResponse> 928 getEncryptMethod; 929 930 @io.grpc.stub.annotations.RpcMethod( 931 fullMethodName = SERVICE_NAME + '/' + "Encrypt", 932 requestType = com.google.cloud.kms.v1.EncryptRequest.class, 933 responseType = com.google.cloud.kms.v1.EncryptResponse.class, 934 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 935 public static io.grpc.MethodDescriptor< 936 com.google.cloud.kms.v1.EncryptRequest, com.google.cloud.kms.v1.EncryptResponse> getEncryptMethod()937 getEncryptMethod() { 938 io.grpc.MethodDescriptor< 939 com.google.cloud.kms.v1.EncryptRequest, com.google.cloud.kms.v1.EncryptResponse> 940 getEncryptMethod; 941 if ((getEncryptMethod = KeyManagementServiceGrpc.getEncryptMethod) == null) { 942 synchronized (KeyManagementServiceGrpc.class) { 943 if ((getEncryptMethod = KeyManagementServiceGrpc.getEncryptMethod) == null) { 944 KeyManagementServiceGrpc.getEncryptMethod = 945 getEncryptMethod = 946 io.grpc.MethodDescriptor 947 .<com.google.cloud.kms.v1.EncryptRequest, 948 com.google.cloud.kms.v1.EncryptResponse> 949 newBuilder() 950 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 951 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "Encrypt")) 952 .setSampledToLocalTracing(true) 953 .setRequestMarshaller( 954 io.grpc.protobuf.ProtoUtils.marshaller( 955 com.google.cloud.kms.v1.EncryptRequest.getDefaultInstance())) 956 .setResponseMarshaller( 957 io.grpc.protobuf.ProtoUtils.marshaller( 958 com.google.cloud.kms.v1.EncryptResponse.getDefaultInstance())) 959 .setSchemaDescriptor( 960 new KeyManagementServiceMethodDescriptorSupplier("Encrypt")) 961 .build(); 962 } 963 } 964 } 965 return getEncryptMethod; 966 } 967 968 private static volatile io.grpc.MethodDescriptor< 969 com.google.cloud.kms.v1.DecryptRequest, com.google.cloud.kms.v1.DecryptResponse> 970 getDecryptMethod; 971 972 @io.grpc.stub.annotations.RpcMethod( 973 fullMethodName = SERVICE_NAME + '/' + "Decrypt", 974 requestType = com.google.cloud.kms.v1.DecryptRequest.class, 975 responseType = com.google.cloud.kms.v1.DecryptResponse.class, 976 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 977 public static io.grpc.MethodDescriptor< 978 com.google.cloud.kms.v1.DecryptRequest, com.google.cloud.kms.v1.DecryptResponse> getDecryptMethod()979 getDecryptMethod() { 980 io.grpc.MethodDescriptor< 981 com.google.cloud.kms.v1.DecryptRequest, com.google.cloud.kms.v1.DecryptResponse> 982 getDecryptMethod; 983 if ((getDecryptMethod = KeyManagementServiceGrpc.getDecryptMethod) == null) { 984 synchronized (KeyManagementServiceGrpc.class) { 985 if ((getDecryptMethod = KeyManagementServiceGrpc.getDecryptMethod) == null) { 986 KeyManagementServiceGrpc.getDecryptMethod = 987 getDecryptMethod = 988 io.grpc.MethodDescriptor 989 .<com.google.cloud.kms.v1.DecryptRequest, 990 com.google.cloud.kms.v1.DecryptResponse> 991 newBuilder() 992 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 993 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "Decrypt")) 994 .setSampledToLocalTracing(true) 995 .setRequestMarshaller( 996 io.grpc.protobuf.ProtoUtils.marshaller( 997 com.google.cloud.kms.v1.DecryptRequest.getDefaultInstance())) 998 .setResponseMarshaller( 999 io.grpc.protobuf.ProtoUtils.marshaller( 1000 com.google.cloud.kms.v1.DecryptResponse.getDefaultInstance())) 1001 .setSchemaDescriptor( 1002 new KeyManagementServiceMethodDescriptorSupplier("Decrypt")) 1003 .build(); 1004 } 1005 } 1006 } 1007 return getDecryptMethod; 1008 } 1009 1010 private static volatile io.grpc.MethodDescriptor< 1011 com.google.cloud.kms.v1.AsymmetricSignRequest, 1012 com.google.cloud.kms.v1.AsymmetricSignResponse> 1013 getAsymmetricSignMethod; 1014 1015 @io.grpc.stub.annotations.RpcMethod( 1016 fullMethodName = SERVICE_NAME + '/' + "AsymmetricSign", 1017 requestType = com.google.cloud.kms.v1.AsymmetricSignRequest.class, 1018 responseType = com.google.cloud.kms.v1.AsymmetricSignResponse.class, 1019 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 1020 public static io.grpc.MethodDescriptor< 1021 com.google.cloud.kms.v1.AsymmetricSignRequest, 1022 com.google.cloud.kms.v1.AsymmetricSignResponse> getAsymmetricSignMethod()1023 getAsymmetricSignMethod() { 1024 io.grpc.MethodDescriptor< 1025 com.google.cloud.kms.v1.AsymmetricSignRequest, 1026 com.google.cloud.kms.v1.AsymmetricSignResponse> 1027 getAsymmetricSignMethod; 1028 if ((getAsymmetricSignMethod = KeyManagementServiceGrpc.getAsymmetricSignMethod) == null) { 1029 synchronized (KeyManagementServiceGrpc.class) { 1030 if ((getAsymmetricSignMethod = KeyManagementServiceGrpc.getAsymmetricSignMethod) == null) { 1031 KeyManagementServiceGrpc.getAsymmetricSignMethod = 1032 getAsymmetricSignMethod = 1033 io.grpc.MethodDescriptor 1034 .<com.google.cloud.kms.v1.AsymmetricSignRequest, 1035 com.google.cloud.kms.v1.AsymmetricSignResponse> 1036 newBuilder() 1037 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 1038 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "AsymmetricSign")) 1039 .setSampledToLocalTracing(true) 1040 .setRequestMarshaller( 1041 io.grpc.protobuf.ProtoUtils.marshaller( 1042 com.google.cloud.kms.v1.AsymmetricSignRequest.getDefaultInstance())) 1043 .setResponseMarshaller( 1044 io.grpc.protobuf.ProtoUtils.marshaller( 1045 com.google.cloud.kms.v1.AsymmetricSignResponse.getDefaultInstance())) 1046 .setSchemaDescriptor( 1047 new KeyManagementServiceMethodDescriptorSupplier("AsymmetricSign")) 1048 .build(); 1049 } 1050 } 1051 } 1052 return getAsymmetricSignMethod; 1053 } 1054 1055 private static volatile io.grpc.MethodDescriptor< 1056 com.google.cloud.kms.v1.AsymmetricDecryptRequest, 1057 com.google.cloud.kms.v1.AsymmetricDecryptResponse> 1058 getAsymmetricDecryptMethod; 1059 1060 @io.grpc.stub.annotations.RpcMethod( 1061 fullMethodName = SERVICE_NAME + '/' + "AsymmetricDecrypt", 1062 requestType = com.google.cloud.kms.v1.AsymmetricDecryptRequest.class, 1063 responseType = com.google.cloud.kms.v1.AsymmetricDecryptResponse.class, 1064 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 1065 public static io.grpc.MethodDescriptor< 1066 com.google.cloud.kms.v1.AsymmetricDecryptRequest, 1067 com.google.cloud.kms.v1.AsymmetricDecryptResponse> getAsymmetricDecryptMethod()1068 getAsymmetricDecryptMethod() { 1069 io.grpc.MethodDescriptor< 1070 com.google.cloud.kms.v1.AsymmetricDecryptRequest, 1071 com.google.cloud.kms.v1.AsymmetricDecryptResponse> 1072 getAsymmetricDecryptMethod; 1073 if ((getAsymmetricDecryptMethod = KeyManagementServiceGrpc.getAsymmetricDecryptMethod) 1074 == null) { 1075 synchronized (KeyManagementServiceGrpc.class) { 1076 if ((getAsymmetricDecryptMethod = KeyManagementServiceGrpc.getAsymmetricDecryptMethod) 1077 == null) { 1078 KeyManagementServiceGrpc.getAsymmetricDecryptMethod = 1079 getAsymmetricDecryptMethod = 1080 io.grpc.MethodDescriptor 1081 .<com.google.cloud.kms.v1.AsymmetricDecryptRequest, 1082 com.google.cloud.kms.v1.AsymmetricDecryptResponse> 1083 newBuilder() 1084 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 1085 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "AsymmetricDecrypt")) 1086 .setSampledToLocalTracing(true) 1087 .setRequestMarshaller( 1088 io.grpc.protobuf.ProtoUtils.marshaller( 1089 com.google.cloud.kms.v1.AsymmetricDecryptRequest 1090 .getDefaultInstance())) 1091 .setResponseMarshaller( 1092 io.grpc.protobuf.ProtoUtils.marshaller( 1093 com.google.cloud.kms.v1.AsymmetricDecryptResponse 1094 .getDefaultInstance())) 1095 .setSchemaDescriptor( 1096 new KeyManagementServiceMethodDescriptorSupplier("AsymmetricDecrypt")) 1097 .build(); 1098 } 1099 } 1100 } 1101 return getAsymmetricDecryptMethod; 1102 } 1103 1104 private static volatile io.grpc.MethodDescriptor< 1105 com.google.cloud.kms.v1.MacSignRequest, com.google.cloud.kms.v1.MacSignResponse> 1106 getMacSignMethod; 1107 1108 @io.grpc.stub.annotations.RpcMethod( 1109 fullMethodName = SERVICE_NAME + '/' + "MacSign", 1110 requestType = com.google.cloud.kms.v1.MacSignRequest.class, 1111 responseType = com.google.cloud.kms.v1.MacSignResponse.class, 1112 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 1113 public static io.grpc.MethodDescriptor< 1114 com.google.cloud.kms.v1.MacSignRequest, com.google.cloud.kms.v1.MacSignResponse> getMacSignMethod()1115 getMacSignMethod() { 1116 io.grpc.MethodDescriptor< 1117 com.google.cloud.kms.v1.MacSignRequest, com.google.cloud.kms.v1.MacSignResponse> 1118 getMacSignMethod; 1119 if ((getMacSignMethod = KeyManagementServiceGrpc.getMacSignMethod) == null) { 1120 synchronized (KeyManagementServiceGrpc.class) { 1121 if ((getMacSignMethod = KeyManagementServiceGrpc.getMacSignMethod) == null) { 1122 KeyManagementServiceGrpc.getMacSignMethod = 1123 getMacSignMethod = 1124 io.grpc.MethodDescriptor 1125 .<com.google.cloud.kms.v1.MacSignRequest, 1126 com.google.cloud.kms.v1.MacSignResponse> 1127 newBuilder() 1128 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 1129 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "MacSign")) 1130 .setSampledToLocalTracing(true) 1131 .setRequestMarshaller( 1132 io.grpc.protobuf.ProtoUtils.marshaller( 1133 com.google.cloud.kms.v1.MacSignRequest.getDefaultInstance())) 1134 .setResponseMarshaller( 1135 io.grpc.protobuf.ProtoUtils.marshaller( 1136 com.google.cloud.kms.v1.MacSignResponse.getDefaultInstance())) 1137 .setSchemaDescriptor( 1138 new KeyManagementServiceMethodDescriptorSupplier("MacSign")) 1139 .build(); 1140 } 1141 } 1142 } 1143 return getMacSignMethod; 1144 } 1145 1146 private static volatile io.grpc.MethodDescriptor< 1147 com.google.cloud.kms.v1.MacVerifyRequest, com.google.cloud.kms.v1.MacVerifyResponse> 1148 getMacVerifyMethod; 1149 1150 @io.grpc.stub.annotations.RpcMethod( 1151 fullMethodName = SERVICE_NAME + '/' + "MacVerify", 1152 requestType = com.google.cloud.kms.v1.MacVerifyRequest.class, 1153 responseType = com.google.cloud.kms.v1.MacVerifyResponse.class, 1154 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 1155 public static io.grpc.MethodDescriptor< 1156 com.google.cloud.kms.v1.MacVerifyRequest, com.google.cloud.kms.v1.MacVerifyResponse> getMacVerifyMethod()1157 getMacVerifyMethod() { 1158 io.grpc.MethodDescriptor< 1159 com.google.cloud.kms.v1.MacVerifyRequest, com.google.cloud.kms.v1.MacVerifyResponse> 1160 getMacVerifyMethod; 1161 if ((getMacVerifyMethod = KeyManagementServiceGrpc.getMacVerifyMethod) == null) { 1162 synchronized (KeyManagementServiceGrpc.class) { 1163 if ((getMacVerifyMethod = KeyManagementServiceGrpc.getMacVerifyMethod) == null) { 1164 KeyManagementServiceGrpc.getMacVerifyMethod = 1165 getMacVerifyMethod = 1166 io.grpc.MethodDescriptor 1167 .<com.google.cloud.kms.v1.MacVerifyRequest, 1168 com.google.cloud.kms.v1.MacVerifyResponse> 1169 newBuilder() 1170 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 1171 .setFullMethodName(generateFullMethodName(SERVICE_NAME, "MacVerify")) 1172 .setSampledToLocalTracing(true) 1173 .setRequestMarshaller( 1174 io.grpc.protobuf.ProtoUtils.marshaller( 1175 com.google.cloud.kms.v1.MacVerifyRequest.getDefaultInstance())) 1176 .setResponseMarshaller( 1177 io.grpc.protobuf.ProtoUtils.marshaller( 1178 com.google.cloud.kms.v1.MacVerifyResponse.getDefaultInstance())) 1179 .setSchemaDescriptor( 1180 new KeyManagementServiceMethodDescriptorSupplier("MacVerify")) 1181 .build(); 1182 } 1183 } 1184 } 1185 return getMacVerifyMethod; 1186 } 1187 1188 private static volatile io.grpc.MethodDescriptor< 1189 com.google.cloud.kms.v1.GenerateRandomBytesRequest, 1190 com.google.cloud.kms.v1.GenerateRandomBytesResponse> 1191 getGenerateRandomBytesMethod; 1192 1193 @io.grpc.stub.annotations.RpcMethod( 1194 fullMethodName = SERVICE_NAME + '/' + "GenerateRandomBytes", 1195 requestType = com.google.cloud.kms.v1.GenerateRandomBytesRequest.class, 1196 responseType = com.google.cloud.kms.v1.GenerateRandomBytesResponse.class, 1197 methodType = io.grpc.MethodDescriptor.MethodType.UNARY) 1198 public static io.grpc.MethodDescriptor< 1199 com.google.cloud.kms.v1.GenerateRandomBytesRequest, 1200 com.google.cloud.kms.v1.GenerateRandomBytesResponse> getGenerateRandomBytesMethod()1201 getGenerateRandomBytesMethod() { 1202 io.grpc.MethodDescriptor< 1203 com.google.cloud.kms.v1.GenerateRandomBytesRequest, 1204 com.google.cloud.kms.v1.GenerateRandomBytesResponse> 1205 getGenerateRandomBytesMethod; 1206 if ((getGenerateRandomBytesMethod = KeyManagementServiceGrpc.getGenerateRandomBytesMethod) 1207 == null) { 1208 synchronized (KeyManagementServiceGrpc.class) { 1209 if ((getGenerateRandomBytesMethod = KeyManagementServiceGrpc.getGenerateRandomBytesMethod) 1210 == null) { 1211 KeyManagementServiceGrpc.getGenerateRandomBytesMethod = 1212 getGenerateRandomBytesMethod = 1213 io.grpc.MethodDescriptor 1214 .<com.google.cloud.kms.v1.GenerateRandomBytesRequest, 1215 com.google.cloud.kms.v1.GenerateRandomBytesResponse> 1216 newBuilder() 1217 .setType(io.grpc.MethodDescriptor.MethodType.UNARY) 1218 .setFullMethodName( 1219 generateFullMethodName(SERVICE_NAME, "GenerateRandomBytes")) 1220 .setSampledToLocalTracing(true) 1221 .setRequestMarshaller( 1222 io.grpc.protobuf.ProtoUtils.marshaller( 1223 com.google.cloud.kms.v1.GenerateRandomBytesRequest 1224 .getDefaultInstance())) 1225 .setResponseMarshaller( 1226 io.grpc.protobuf.ProtoUtils.marshaller( 1227 com.google.cloud.kms.v1.GenerateRandomBytesResponse 1228 .getDefaultInstance())) 1229 .setSchemaDescriptor( 1230 new KeyManagementServiceMethodDescriptorSupplier("GenerateRandomBytes")) 1231 .build(); 1232 } 1233 } 1234 } 1235 return getGenerateRandomBytesMethod; 1236 } 1237 1238 /** Creates a new async stub that supports all call types for the service */ newStub(io.grpc.Channel channel)1239 public static KeyManagementServiceStub newStub(io.grpc.Channel channel) { 1240 io.grpc.stub.AbstractStub.StubFactory<KeyManagementServiceStub> factory = 1241 new io.grpc.stub.AbstractStub.StubFactory<KeyManagementServiceStub>() { 1242 @java.lang.Override 1243 public KeyManagementServiceStub newStub( 1244 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 1245 return new KeyManagementServiceStub(channel, callOptions); 1246 } 1247 }; 1248 return KeyManagementServiceStub.newStub(factory, channel); 1249 } 1250 1251 /** 1252 * Creates a new blocking-style stub that supports unary and streaming output calls on the service 1253 */ newBlockingStub(io.grpc.Channel channel)1254 public static KeyManagementServiceBlockingStub newBlockingStub(io.grpc.Channel channel) { 1255 io.grpc.stub.AbstractStub.StubFactory<KeyManagementServiceBlockingStub> factory = 1256 new io.grpc.stub.AbstractStub.StubFactory<KeyManagementServiceBlockingStub>() { 1257 @java.lang.Override 1258 public KeyManagementServiceBlockingStub newStub( 1259 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 1260 return new KeyManagementServiceBlockingStub(channel, callOptions); 1261 } 1262 }; 1263 return KeyManagementServiceBlockingStub.newStub(factory, channel); 1264 } 1265 1266 /** Creates a new ListenableFuture-style stub that supports unary calls on the service */ newFutureStub(io.grpc.Channel channel)1267 public static KeyManagementServiceFutureStub newFutureStub(io.grpc.Channel channel) { 1268 io.grpc.stub.AbstractStub.StubFactory<KeyManagementServiceFutureStub> factory = 1269 new io.grpc.stub.AbstractStub.StubFactory<KeyManagementServiceFutureStub>() { 1270 @java.lang.Override 1271 public KeyManagementServiceFutureStub newStub( 1272 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 1273 return new KeyManagementServiceFutureStub(channel, callOptions); 1274 } 1275 }; 1276 return KeyManagementServiceFutureStub.newStub(factory, channel); 1277 } 1278 1279 /** 1280 * 1281 * 1282 * <pre> 1283 * Google Cloud Key Management Service 1284 * Manages cryptographic keys and operations using those keys. Implements a REST 1285 * model with the following objects: 1286 * * [KeyRing][google.cloud.kms.v1.KeyRing] 1287 * * [CryptoKey][google.cloud.kms.v1.CryptoKey] 1288 * * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1289 * * [ImportJob][google.cloud.kms.v1.ImportJob] 1290 * If you are using manual gRPC libraries, see 1291 * [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc). 1292 * </pre> 1293 */ 1294 public interface AsyncService { 1295 1296 /** 1297 * 1298 * 1299 * <pre> 1300 * Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 1301 * </pre> 1302 */ listKeyRings( com.google.cloud.kms.v1.ListKeyRingsRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListKeyRingsResponse> responseObserver)1303 default void listKeyRings( 1304 com.google.cloud.kms.v1.ListKeyRingsRequest request, 1305 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListKeyRingsResponse> 1306 responseObserver) { 1307 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1308 getListKeyRingsMethod(), responseObserver); 1309 } 1310 1311 /** 1312 * 1313 * 1314 * <pre> 1315 * Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 1316 * </pre> 1317 */ listCryptoKeys( com.google.cloud.kms.v1.ListCryptoKeysRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeysResponse> responseObserver)1318 default void listCryptoKeys( 1319 com.google.cloud.kms.v1.ListCryptoKeysRequest request, 1320 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeysResponse> 1321 responseObserver) { 1322 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1323 getListCryptoKeysMethod(), responseObserver); 1324 } 1325 1326 /** 1327 * 1328 * 1329 * <pre> 1330 * Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 1331 * </pre> 1332 */ listCryptoKeyVersions( com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> responseObserver)1333 default void listCryptoKeyVersions( 1334 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request, 1335 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> 1336 responseObserver) { 1337 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1338 getListCryptoKeyVersionsMethod(), responseObserver); 1339 } 1340 1341 /** 1342 * 1343 * 1344 * <pre> 1345 * Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 1346 * </pre> 1347 */ listImportJobs( com.google.cloud.kms.v1.ListImportJobsRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListImportJobsResponse> responseObserver)1348 default void listImportJobs( 1349 com.google.cloud.kms.v1.ListImportJobsRequest request, 1350 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListImportJobsResponse> 1351 responseObserver) { 1352 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1353 getListImportJobsMethod(), responseObserver); 1354 } 1355 1356 /** 1357 * 1358 * 1359 * <pre> 1360 * Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 1361 * </pre> 1362 */ getKeyRing( com.google.cloud.kms.v1.GetKeyRingRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver)1363 default void getKeyRing( 1364 com.google.cloud.kms.v1.GetKeyRingRequest request, 1365 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver) { 1366 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getGetKeyRingMethod(), responseObserver); 1367 } 1368 1369 /** 1370 * 1371 * 1372 * <pre> 1373 * Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as 1374 * well as its [primary][google.cloud.kms.v1.CryptoKey.primary] 1375 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1376 * </pre> 1377 */ getCryptoKey( com.google.cloud.kms.v1.GetCryptoKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)1378 default void getCryptoKey( 1379 com.google.cloud.kms.v1.GetCryptoKeyRequest request, 1380 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 1381 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1382 getGetCryptoKeyMethod(), responseObserver); 1383 } 1384 1385 /** 1386 * 1387 * 1388 * <pre> 1389 * Returns metadata for a given 1390 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1391 * </pre> 1392 */ getCryptoKeyVersion( com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1393 default void getCryptoKeyVersion( 1394 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request, 1395 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1396 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1397 getGetCryptoKeyVersionMethod(), responseObserver); 1398 } 1399 1400 /** 1401 * 1402 * 1403 * <pre> 1404 * Returns the public key for the given 1405 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 1406 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1407 * [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] 1408 * or 1409 * [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 1410 * </pre> 1411 */ getPublicKey( com.google.cloud.kms.v1.GetPublicKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.PublicKey> responseObserver)1412 default void getPublicKey( 1413 com.google.cloud.kms.v1.GetPublicKeyRequest request, 1414 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.PublicKey> responseObserver) { 1415 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1416 getGetPublicKeyMethod(), responseObserver); 1417 } 1418 1419 /** 1420 * 1421 * 1422 * <pre> 1423 * Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 1424 * </pre> 1425 */ getImportJob( com.google.cloud.kms.v1.GetImportJobRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver)1426 default void getImportJob( 1427 com.google.cloud.kms.v1.GetImportJobRequest request, 1428 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver) { 1429 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1430 getGetImportJobMethod(), responseObserver); 1431 } 1432 1433 /** 1434 * 1435 * 1436 * <pre> 1437 * Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and 1438 * Location. 1439 * </pre> 1440 */ createKeyRing( com.google.cloud.kms.v1.CreateKeyRingRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver)1441 default void createKeyRing( 1442 com.google.cloud.kms.v1.CreateKeyRingRequest request, 1443 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver) { 1444 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1445 getCreateKeyRingMethod(), responseObserver); 1446 } 1447 1448 /** 1449 * 1450 * 1451 * <pre> 1452 * Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a 1453 * [KeyRing][google.cloud.kms.v1.KeyRing]. 1454 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 1455 * [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 1456 * are required. 1457 * </pre> 1458 */ createCryptoKey( com.google.cloud.kms.v1.CreateCryptoKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)1459 default void createCryptoKey( 1460 com.google.cloud.kms.v1.CreateCryptoKeyRequest request, 1461 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 1462 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1463 getCreateCryptoKeyMethod(), responseObserver); 1464 } 1465 1466 /** 1467 * 1468 * 1469 * <pre> 1470 * Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a 1471 * [CryptoKey][google.cloud.kms.v1.CryptoKey]. 1472 * The server will assign the next sequential id. If unset, 1473 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 1474 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 1475 * </pre> 1476 */ createCryptoKeyVersion( com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1477 default void createCryptoKeyVersion( 1478 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request, 1479 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1480 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1481 getCreateCryptoKeyVersionMethod(), responseObserver); 1482 } 1483 1484 /** 1485 * 1486 * 1487 * <pre> 1488 * Import wrapped key material into a 1489 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1490 * All requests must specify a [CryptoKey][google.cloud.kms.v1.CryptoKey]. If 1491 * a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] is additionally 1492 * specified in the request, key material will be reimported into that 1493 * version. Otherwise, a new version will be created, and will be assigned the 1494 * next sequential id within the [CryptoKey][google.cloud.kms.v1.CryptoKey]. 1495 * </pre> 1496 */ importCryptoKeyVersion( com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1497 default void importCryptoKeyVersion( 1498 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request, 1499 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1500 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1501 getImportCryptoKeyVersionMethod(), responseObserver); 1502 } 1503 1504 /** 1505 * 1506 * 1507 * <pre> 1508 * Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a 1509 * [KeyRing][google.cloud.kms.v1.KeyRing]. 1510 * [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is 1511 * required. 1512 * </pre> 1513 */ createImportJob( com.google.cloud.kms.v1.CreateImportJobRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver)1514 default void createImportJob( 1515 com.google.cloud.kms.v1.CreateImportJobRequest request, 1516 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver) { 1517 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1518 getCreateImportJobMethod(), responseObserver); 1519 } 1520 1521 /** 1522 * 1523 * 1524 * <pre> 1525 * Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 1526 * </pre> 1527 */ updateCryptoKey( com.google.cloud.kms.v1.UpdateCryptoKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)1528 default void updateCryptoKey( 1529 com.google.cloud.kms.v1.UpdateCryptoKeyRequest request, 1530 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 1531 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1532 getUpdateCryptoKeyMethod(), responseObserver); 1533 } 1534 1535 /** 1536 * 1537 * 1538 * <pre> 1539 * Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s 1540 * metadata. 1541 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 1542 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] 1543 * and 1544 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] 1545 * using this method. See 1546 * [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] 1547 * and 1548 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 1549 * to move between other states. 1550 * </pre> 1551 */ updateCryptoKeyVersion( com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1552 default void updateCryptoKeyVersion( 1553 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request, 1554 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1555 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1556 getUpdateCryptoKeyVersionMethod(), responseObserver); 1557 } 1558 1559 /** 1560 * 1561 * 1562 * <pre> 1563 * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that 1564 * will be used in 1565 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 1566 * Returns an error if called on a key whose purpose is not 1567 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 1568 * </pre> 1569 */ updateCryptoKeyPrimaryVersion( com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)1570 default void updateCryptoKeyPrimaryVersion( 1571 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request, 1572 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 1573 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1574 getUpdateCryptoKeyPrimaryVersionMethod(), responseObserver); 1575 } 1576 1577 /** 1578 * 1579 * 1580 * <pre> 1581 * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for 1582 * destruction. 1583 * Upon calling this method, 1584 * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will 1585 * be set to 1586 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED], 1587 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 1588 * be set to the time 1589 * [destroy_scheduled_duration][google.cloud.kms.v1.CryptoKey.destroy_scheduled_duration] 1590 * in the future. At that time, the 1591 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will automatically 1592 * change to 1593 * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], 1594 * and the key material will be irrevocably destroyed. 1595 * Before the 1596 * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is 1597 * reached, 1598 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 1599 * may be called to reverse the process. 1600 * </pre> 1601 */ destroyCryptoKeyVersion( com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1602 default void destroyCryptoKeyVersion( 1603 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request, 1604 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1605 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1606 getDestroyCryptoKeyVersionMethod(), responseObserver); 1607 } 1608 1609 /** 1610 * 1611 * 1612 * <pre> 1613 * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 1614 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 1615 * state. 1616 * Upon restoration of the CryptoKeyVersion, 1617 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 1618 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 1619 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 1620 * be cleared. 1621 * </pre> 1622 */ restoreCryptoKeyVersion( com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1623 default void restoreCryptoKeyVersion( 1624 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request, 1625 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1626 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1627 getRestoreCryptoKeyVersionMethod(), responseObserver); 1628 } 1629 1630 /** 1631 * 1632 * 1633 * <pre> 1634 * Encrypts data, so that it can only be recovered by a call to 1635 * [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The 1636 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1637 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 1638 * </pre> 1639 */ encrypt( com.google.cloud.kms.v1.EncryptRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.EncryptResponse> responseObserver)1640 default void encrypt( 1641 com.google.cloud.kms.v1.EncryptRequest request, 1642 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.EncryptResponse> responseObserver) { 1643 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getEncryptMethod(), responseObserver); 1644 } 1645 1646 /** 1647 * 1648 * 1649 * <pre> 1650 * Decrypts data that was protected by 1651 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The 1652 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1653 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 1654 * </pre> 1655 */ decrypt( com.google.cloud.kms.v1.DecryptRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.DecryptResponse> responseObserver)1656 default void decrypt( 1657 com.google.cloud.kms.v1.DecryptRequest request, 1658 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.DecryptResponse> responseObserver) { 1659 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getDecryptMethod(), responseObserver); 1660 } 1661 1662 /** 1663 * 1664 * 1665 * <pre> 1666 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1667 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 1668 * ASYMMETRIC_SIGN, producing a signature that can be verified with the public 1669 * key retrieved from 1670 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 1671 * </pre> 1672 */ asymmetricSign( com.google.cloud.kms.v1.AsymmetricSignRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricSignResponse> responseObserver)1673 default void asymmetricSign( 1674 com.google.cloud.kms.v1.AsymmetricSignRequest request, 1675 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricSignResponse> 1676 responseObserver) { 1677 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1678 getAsymmetricSignMethod(), responseObserver); 1679 } 1680 1681 /** 1682 * 1683 * 1684 * <pre> 1685 * Decrypts data that was encrypted with a public key retrieved from 1686 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] 1687 * corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1688 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 1689 * ASYMMETRIC_DECRYPT. 1690 * </pre> 1691 */ asymmetricDecrypt( com.google.cloud.kms.v1.AsymmetricDecryptRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricDecryptResponse> responseObserver)1692 default void asymmetricDecrypt( 1693 com.google.cloud.kms.v1.AsymmetricDecryptRequest request, 1694 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricDecryptResponse> 1695 responseObserver) { 1696 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1697 getAsymmetricDecryptMethod(), responseObserver); 1698 } 1699 1700 /** 1701 * 1702 * 1703 * <pre> 1704 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1705 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, 1706 * producing a tag that can be verified by another source with the same key. 1707 * </pre> 1708 */ macSign( com.google.cloud.kms.v1.MacSignRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacSignResponse> responseObserver)1709 default void macSign( 1710 com.google.cloud.kms.v1.MacSignRequest request, 1711 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacSignResponse> responseObserver) { 1712 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getMacSignMethod(), responseObserver); 1713 } 1714 1715 /** 1716 * 1717 * 1718 * <pre> 1719 * Verifies MAC tag using a 1720 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 1721 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns 1722 * a response that indicates whether or not the verification was successful. 1723 * </pre> 1724 */ macVerify( com.google.cloud.kms.v1.MacVerifyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacVerifyResponse> responseObserver)1725 default void macVerify( 1726 com.google.cloud.kms.v1.MacVerifyRequest request, 1727 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacVerifyResponse> responseObserver) { 1728 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall(getMacVerifyMethod(), responseObserver); 1729 } 1730 1731 /** 1732 * 1733 * 1734 * <pre> 1735 * Generate random bytes using the Cloud KMS randomness source in the provided 1736 * location. 1737 * </pre> 1738 */ generateRandomBytes( com.google.cloud.kms.v1.GenerateRandomBytesRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.GenerateRandomBytesResponse> responseObserver)1739 default void generateRandomBytes( 1740 com.google.cloud.kms.v1.GenerateRandomBytesRequest request, 1741 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.GenerateRandomBytesResponse> 1742 responseObserver) { 1743 io.grpc.stub.ServerCalls.asyncUnimplementedUnaryCall( 1744 getGenerateRandomBytesMethod(), responseObserver); 1745 } 1746 } 1747 1748 /** 1749 * Base class for the server implementation of the service KeyManagementService. 1750 * 1751 * <pre> 1752 * Google Cloud Key Management Service 1753 * Manages cryptographic keys and operations using those keys. Implements a REST 1754 * model with the following objects: 1755 * * [KeyRing][google.cloud.kms.v1.KeyRing] 1756 * * [CryptoKey][google.cloud.kms.v1.CryptoKey] 1757 * * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1758 * * [ImportJob][google.cloud.kms.v1.ImportJob] 1759 * If you are using manual gRPC libraries, see 1760 * [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc). 1761 * </pre> 1762 */ 1763 public abstract static class KeyManagementServiceImplBase 1764 implements io.grpc.BindableService, AsyncService { 1765 1766 @java.lang.Override bindService()1767 public final io.grpc.ServerServiceDefinition bindService() { 1768 return KeyManagementServiceGrpc.bindService(this); 1769 } 1770 } 1771 1772 /** 1773 * A stub to allow clients to do asynchronous rpc calls to service KeyManagementService. 1774 * 1775 * <pre> 1776 * Google Cloud Key Management Service 1777 * Manages cryptographic keys and operations using those keys. Implements a REST 1778 * model with the following objects: 1779 * * [KeyRing][google.cloud.kms.v1.KeyRing] 1780 * * [CryptoKey][google.cloud.kms.v1.CryptoKey] 1781 * * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 1782 * * [ImportJob][google.cloud.kms.v1.ImportJob] 1783 * If you are using manual gRPC libraries, see 1784 * [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc). 1785 * </pre> 1786 */ 1787 public static final class KeyManagementServiceStub 1788 extends io.grpc.stub.AbstractAsyncStub<KeyManagementServiceStub> { KeyManagementServiceStub(io.grpc.Channel channel, io.grpc.CallOptions callOptions)1789 private KeyManagementServiceStub(io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 1790 super(channel, callOptions); 1791 } 1792 1793 @java.lang.Override build( io.grpc.Channel channel, io.grpc.CallOptions callOptions)1794 protected KeyManagementServiceStub build( 1795 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 1796 return new KeyManagementServiceStub(channel, callOptions); 1797 } 1798 1799 /** 1800 * 1801 * 1802 * <pre> 1803 * Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 1804 * </pre> 1805 */ listKeyRings( com.google.cloud.kms.v1.ListKeyRingsRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListKeyRingsResponse> responseObserver)1806 public void listKeyRings( 1807 com.google.cloud.kms.v1.ListKeyRingsRequest request, 1808 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListKeyRingsResponse> 1809 responseObserver) { 1810 io.grpc.stub.ClientCalls.asyncUnaryCall( 1811 getChannel().newCall(getListKeyRingsMethod(), getCallOptions()), 1812 request, 1813 responseObserver); 1814 } 1815 1816 /** 1817 * 1818 * 1819 * <pre> 1820 * Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 1821 * </pre> 1822 */ listCryptoKeys( com.google.cloud.kms.v1.ListCryptoKeysRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeysResponse> responseObserver)1823 public void listCryptoKeys( 1824 com.google.cloud.kms.v1.ListCryptoKeysRequest request, 1825 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeysResponse> 1826 responseObserver) { 1827 io.grpc.stub.ClientCalls.asyncUnaryCall( 1828 getChannel().newCall(getListCryptoKeysMethod(), getCallOptions()), 1829 request, 1830 responseObserver); 1831 } 1832 1833 /** 1834 * 1835 * 1836 * <pre> 1837 * Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 1838 * </pre> 1839 */ listCryptoKeyVersions( com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> responseObserver)1840 public void listCryptoKeyVersions( 1841 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request, 1842 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> 1843 responseObserver) { 1844 io.grpc.stub.ClientCalls.asyncUnaryCall( 1845 getChannel().newCall(getListCryptoKeyVersionsMethod(), getCallOptions()), 1846 request, 1847 responseObserver); 1848 } 1849 1850 /** 1851 * 1852 * 1853 * <pre> 1854 * Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 1855 * </pre> 1856 */ listImportJobs( com.google.cloud.kms.v1.ListImportJobsRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListImportJobsResponse> responseObserver)1857 public void listImportJobs( 1858 com.google.cloud.kms.v1.ListImportJobsRequest request, 1859 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListImportJobsResponse> 1860 responseObserver) { 1861 io.grpc.stub.ClientCalls.asyncUnaryCall( 1862 getChannel().newCall(getListImportJobsMethod(), getCallOptions()), 1863 request, 1864 responseObserver); 1865 } 1866 1867 /** 1868 * 1869 * 1870 * <pre> 1871 * Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 1872 * </pre> 1873 */ getKeyRing( com.google.cloud.kms.v1.GetKeyRingRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver)1874 public void getKeyRing( 1875 com.google.cloud.kms.v1.GetKeyRingRequest request, 1876 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver) { 1877 io.grpc.stub.ClientCalls.asyncUnaryCall( 1878 getChannel().newCall(getGetKeyRingMethod(), getCallOptions()), request, responseObserver); 1879 } 1880 1881 /** 1882 * 1883 * 1884 * <pre> 1885 * Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as 1886 * well as its [primary][google.cloud.kms.v1.CryptoKey.primary] 1887 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1888 * </pre> 1889 */ getCryptoKey( com.google.cloud.kms.v1.GetCryptoKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)1890 public void getCryptoKey( 1891 com.google.cloud.kms.v1.GetCryptoKeyRequest request, 1892 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 1893 io.grpc.stub.ClientCalls.asyncUnaryCall( 1894 getChannel().newCall(getGetCryptoKeyMethod(), getCallOptions()), 1895 request, 1896 responseObserver); 1897 } 1898 1899 /** 1900 * 1901 * 1902 * <pre> 1903 * Returns metadata for a given 1904 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 1905 * </pre> 1906 */ getCryptoKeyVersion( com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)1907 public void getCryptoKeyVersion( 1908 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request, 1909 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 1910 io.grpc.stub.ClientCalls.asyncUnaryCall( 1911 getChannel().newCall(getGetCryptoKeyVersionMethod(), getCallOptions()), 1912 request, 1913 responseObserver); 1914 } 1915 1916 /** 1917 * 1918 * 1919 * <pre> 1920 * Returns the public key for the given 1921 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 1922 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 1923 * [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] 1924 * or 1925 * [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 1926 * </pre> 1927 */ getPublicKey( com.google.cloud.kms.v1.GetPublicKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.PublicKey> responseObserver)1928 public void getPublicKey( 1929 com.google.cloud.kms.v1.GetPublicKeyRequest request, 1930 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.PublicKey> responseObserver) { 1931 io.grpc.stub.ClientCalls.asyncUnaryCall( 1932 getChannel().newCall(getGetPublicKeyMethod(), getCallOptions()), 1933 request, 1934 responseObserver); 1935 } 1936 1937 /** 1938 * 1939 * 1940 * <pre> 1941 * Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 1942 * </pre> 1943 */ getImportJob( com.google.cloud.kms.v1.GetImportJobRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver)1944 public void getImportJob( 1945 com.google.cloud.kms.v1.GetImportJobRequest request, 1946 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver) { 1947 io.grpc.stub.ClientCalls.asyncUnaryCall( 1948 getChannel().newCall(getGetImportJobMethod(), getCallOptions()), 1949 request, 1950 responseObserver); 1951 } 1952 1953 /** 1954 * 1955 * 1956 * <pre> 1957 * Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and 1958 * Location. 1959 * </pre> 1960 */ createKeyRing( com.google.cloud.kms.v1.CreateKeyRingRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver)1961 public void createKeyRing( 1962 com.google.cloud.kms.v1.CreateKeyRingRequest request, 1963 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing> responseObserver) { 1964 io.grpc.stub.ClientCalls.asyncUnaryCall( 1965 getChannel().newCall(getCreateKeyRingMethod(), getCallOptions()), 1966 request, 1967 responseObserver); 1968 } 1969 1970 /** 1971 * 1972 * 1973 * <pre> 1974 * Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a 1975 * [KeyRing][google.cloud.kms.v1.KeyRing]. 1976 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 1977 * [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 1978 * are required. 1979 * </pre> 1980 */ createCryptoKey( com.google.cloud.kms.v1.CreateCryptoKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)1981 public void createCryptoKey( 1982 com.google.cloud.kms.v1.CreateCryptoKeyRequest request, 1983 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 1984 io.grpc.stub.ClientCalls.asyncUnaryCall( 1985 getChannel().newCall(getCreateCryptoKeyMethod(), getCallOptions()), 1986 request, 1987 responseObserver); 1988 } 1989 1990 /** 1991 * 1992 * 1993 * <pre> 1994 * Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a 1995 * [CryptoKey][google.cloud.kms.v1.CryptoKey]. 1996 * The server will assign the next sequential id. If unset, 1997 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 1998 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 1999 * </pre> 2000 */ createCryptoKeyVersion( com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)2001 public void createCryptoKeyVersion( 2002 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request, 2003 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 2004 io.grpc.stub.ClientCalls.asyncUnaryCall( 2005 getChannel().newCall(getCreateCryptoKeyVersionMethod(), getCallOptions()), 2006 request, 2007 responseObserver); 2008 } 2009 2010 /** 2011 * 2012 * 2013 * <pre> 2014 * Import wrapped key material into a 2015 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2016 * All requests must specify a [CryptoKey][google.cloud.kms.v1.CryptoKey]. If 2017 * a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] is additionally 2018 * specified in the request, key material will be reimported into that 2019 * version. Otherwise, a new version will be created, and will be assigned the 2020 * next sequential id within the [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2021 * </pre> 2022 */ importCryptoKeyVersion( com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)2023 public void importCryptoKeyVersion( 2024 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request, 2025 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 2026 io.grpc.stub.ClientCalls.asyncUnaryCall( 2027 getChannel().newCall(getImportCryptoKeyVersionMethod(), getCallOptions()), 2028 request, 2029 responseObserver); 2030 } 2031 2032 /** 2033 * 2034 * 2035 * <pre> 2036 * Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a 2037 * [KeyRing][google.cloud.kms.v1.KeyRing]. 2038 * [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is 2039 * required. 2040 * </pre> 2041 */ createImportJob( com.google.cloud.kms.v1.CreateImportJobRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver)2042 public void createImportJob( 2043 com.google.cloud.kms.v1.CreateImportJobRequest request, 2044 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob> responseObserver) { 2045 io.grpc.stub.ClientCalls.asyncUnaryCall( 2046 getChannel().newCall(getCreateImportJobMethod(), getCallOptions()), 2047 request, 2048 responseObserver); 2049 } 2050 2051 /** 2052 * 2053 * 2054 * <pre> 2055 * Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2056 * </pre> 2057 */ updateCryptoKey( com.google.cloud.kms.v1.UpdateCryptoKeyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)2058 public void updateCryptoKey( 2059 com.google.cloud.kms.v1.UpdateCryptoKeyRequest request, 2060 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 2061 io.grpc.stub.ClientCalls.asyncUnaryCall( 2062 getChannel().newCall(getUpdateCryptoKeyMethod(), getCallOptions()), 2063 request, 2064 responseObserver); 2065 } 2066 2067 /** 2068 * 2069 * 2070 * <pre> 2071 * Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s 2072 * metadata. 2073 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2074 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] 2075 * and 2076 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] 2077 * using this method. See 2078 * [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] 2079 * and 2080 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 2081 * to move between other states. 2082 * </pre> 2083 */ updateCryptoKeyVersion( com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)2084 public void updateCryptoKeyVersion( 2085 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request, 2086 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 2087 io.grpc.stub.ClientCalls.asyncUnaryCall( 2088 getChannel().newCall(getUpdateCryptoKeyVersionMethod(), getCallOptions()), 2089 request, 2090 responseObserver); 2091 } 2092 2093 /** 2094 * 2095 * 2096 * <pre> 2097 * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that 2098 * will be used in 2099 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2100 * Returns an error if called on a key whose purpose is not 2101 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2102 * </pre> 2103 */ updateCryptoKeyPrimaryVersion( com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver)2104 public void updateCryptoKeyPrimaryVersion( 2105 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request, 2106 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey> responseObserver) { 2107 io.grpc.stub.ClientCalls.asyncUnaryCall( 2108 getChannel().newCall(getUpdateCryptoKeyPrimaryVersionMethod(), getCallOptions()), 2109 request, 2110 responseObserver); 2111 } 2112 2113 /** 2114 * 2115 * 2116 * <pre> 2117 * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for 2118 * destruction. 2119 * Upon calling this method, 2120 * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will 2121 * be set to 2122 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED], 2123 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 2124 * be set to the time 2125 * [destroy_scheduled_duration][google.cloud.kms.v1.CryptoKey.destroy_scheduled_duration] 2126 * in the future. At that time, the 2127 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will automatically 2128 * change to 2129 * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], 2130 * and the key material will be irrevocably destroyed. 2131 * Before the 2132 * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is 2133 * reached, 2134 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 2135 * may be called to reverse the process. 2136 * </pre> 2137 */ destroyCryptoKeyVersion( com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)2138 public void destroyCryptoKeyVersion( 2139 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request, 2140 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 2141 io.grpc.stub.ClientCalls.asyncUnaryCall( 2142 getChannel().newCall(getDestroyCryptoKeyVersionMethod(), getCallOptions()), 2143 request, 2144 responseObserver); 2145 } 2146 2147 /** 2148 * 2149 * 2150 * <pre> 2151 * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2152 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2153 * state. 2154 * Upon restoration of the CryptoKeyVersion, 2155 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2156 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2157 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 2158 * be cleared. 2159 * </pre> 2160 */ restoreCryptoKeyVersion( com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver)2161 public void restoreCryptoKeyVersion( 2162 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request, 2163 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion> responseObserver) { 2164 io.grpc.stub.ClientCalls.asyncUnaryCall( 2165 getChannel().newCall(getRestoreCryptoKeyVersionMethod(), getCallOptions()), 2166 request, 2167 responseObserver); 2168 } 2169 2170 /** 2171 * 2172 * 2173 * <pre> 2174 * Encrypts data, so that it can only be recovered by a call to 2175 * [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The 2176 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2177 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2178 * </pre> 2179 */ encrypt( com.google.cloud.kms.v1.EncryptRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.EncryptResponse> responseObserver)2180 public void encrypt( 2181 com.google.cloud.kms.v1.EncryptRequest request, 2182 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.EncryptResponse> responseObserver) { 2183 io.grpc.stub.ClientCalls.asyncUnaryCall( 2184 getChannel().newCall(getEncryptMethod(), getCallOptions()), request, responseObserver); 2185 } 2186 2187 /** 2188 * 2189 * 2190 * <pre> 2191 * Decrypts data that was protected by 2192 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The 2193 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2194 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2195 * </pre> 2196 */ decrypt( com.google.cloud.kms.v1.DecryptRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.DecryptResponse> responseObserver)2197 public void decrypt( 2198 com.google.cloud.kms.v1.DecryptRequest request, 2199 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.DecryptResponse> responseObserver) { 2200 io.grpc.stub.ClientCalls.asyncUnaryCall( 2201 getChannel().newCall(getDecryptMethod(), getCallOptions()), request, responseObserver); 2202 } 2203 2204 /** 2205 * 2206 * 2207 * <pre> 2208 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2209 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2210 * ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2211 * key retrieved from 2212 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2213 * </pre> 2214 */ asymmetricSign( com.google.cloud.kms.v1.AsymmetricSignRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricSignResponse> responseObserver)2215 public void asymmetricSign( 2216 com.google.cloud.kms.v1.AsymmetricSignRequest request, 2217 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricSignResponse> 2218 responseObserver) { 2219 io.grpc.stub.ClientCalls.asyncUnaryCall( 2220 getChannel().newCall(getAsymmetricSignMethod(), getCallOptions()), 2221 request, 2222 responseObserver); 2223 } 2224 2225 /** 2226 * 2227 * 2228 * <pre> 2229 * Decrypts data that was encrypted with a public key retrieved from 2230 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] 2231 * corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2232 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2233 * ASYMMETRIC_DECRYPT. 2234 * </pre> 2235 */ asymmetricDecrypt( com.google.cloud.kms.v1.AsymmetricDecryptRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricDecryptResponse> responseObserver)2236 public void asymmetricDecrypt( 2237 com.google.cloud.kms.v1.AsymmetricDecryptRequest request, 2238 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricDecryptResponse> 2239 responseObserver) { 2240 io.grpc.stub.ClientCalls.asyncUnaryCall( 2241 getChannel().newCall(getAsymmetricDecryptMethod(), getCallOptions()), 2242 request, 2243 responseObserver); 2244 } 2245 2246 /** 2247 * 2248 * 2249 * <pre> 2250 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2251 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, 2252 * producing a tag that can be verified by another source with the same key. 2253 * </pre> 2254 */ macSign( com.google.cloud.kms.v1.MacSignRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacSignResponse> responseObserver)2255 public void macSign( 2256 com.google.cloud.kms.v1.MacSignRequest request, 2257 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacSignResponse> responseObserver) { 2258 io.grpc.stub.ClientCalls.asyncUnaryCall( 2259 getChannel().newCall(getMacSignMethod(), getCallOptions()), request, responseObserver); 2260 } 2261 2262 /** 2263 * 2264 * 2265 * <pre> 2266 * Verifies MAC tag using a 2267 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2268 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns 2269 * a response that indicates whether or not the verification was successful. 2270 * </pre> 2271 */ macVerify( com.google.cloud.kms.v1.MacVerifyRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacVerifyResponse> responseObserver)2272 public void macVerify( 2273 com.google.cloud.kms.v1.MacVerifyRequest request, 2274 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacVerifyResponse> responseObserver) { 2275 io.grpc.stub.ClientCalls.asyncUnaryCall( 2276 getChannel().newCall(getMacVerifyMethod(), getCallOptions()), request, responseObserver); 2277 } 2278 2279 /** 2280 * 2281 * 2282 * <pre> 2283 * Generate random bytes using the Cloud KMS randomness source in the provided 2284 * location. 2285 * </pre> 2286 */ generateRandomBytes( com.google.cloud.kms.v1.GenerateRandomBytesRequest request, io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.GenerateRandomBytesResponse> responseObserver)2287 public void generateRandomBytes( 2288 com.google.cloud.kms.v1.GenerateRandomBytesRequest request, 2289 io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.GenerateRandomBytesResponse> 2290 responseObserver) { 2291 io.grpc.stub.ClientCalls.asyncUnaryCall( 2292 getChannel().newCall(getGenerateRandomBytesMethod(), getCallOptions()), 2293 request, 2294 responseObserver); 2295 } 2296 } 2297 2298 /** 2299 * A stub to allow clients to do synchronous rpc calls to service KeyManagementService. 2300 * 2301 * <pre> 2302 * Google Cloud Key Management Service 2303 * Manages cryptographic keys and operations using those keys. Implements a REST 2304 * model with the following objects: 2305 * * [KeyRing][google.cloud.kms.v1.KeyRing] 2306 * * [CryptoKey][google.cloud.kms.v1.CryptoKey] 2307 * * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2308 * * [ImportJob][google.cloud.kms.v1.ImportJob] 2309 * If you are using manual gRPC libraries, see 2310 * [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc). 2311 * </pre> 2312 */ 2313 public static final class KeyManagementServiceBlockingStub 2314 extends io.grpc.stub.AbstractBlockingStub<KeyManagementServiceBlockingStub> { KeyManagementServiceBlockingStub( io.grpc.Channel channel, io.grpc.CallOptions callOptions)2315 private KeyManagementServiceBlockingStub( 2316 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 2317 super(channel, callOptions); 2318 } 2319 2320 @java.lang.Override build( io.grpc.Channel channel, io.grpc.CallOptions callOptions)2321 protected KeyManagementServiceBlockingStub build( 2322 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 2323 return new KeyManagementServiceBlockingStub(channel, callOptions); 2324 } 2325 2326 /** 2327 * 2328 * 2329 * <pre> 2330 * Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2331 * </pre> 2332 */ listKeyRings( com.google.cloud.kms.v1.ListKeyRingsRequest request)2333 public com.google.cloud.kms.v1.ListKeyRingsResponse listKeyRings( 2334 com.google.cloud.kms.v1.ListKeyRingsRequest request) { 2335 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2336 getChannel(), getListKeyRingsMethod(), getCallOptions(), request); 2337 } 2338 2339 /** 2340 * 2341 * 2342 * <pre> 2343 * Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2344 * </pre> 2345 */ listCryptoKeys( com.google.cloud.kms.v1.ListCryptoKeysRequest request)2346 public com.google.cloud.kms.v1.ListCryptoKeysResponse listCryptoKeys( 2347 com.google.cloud.kms.v1.ListCryptoKeysRequest request) { 2348 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2349 getChannel(), getListCryptoKeysMethod(), getCallOptions(), request); 2350 } 2351 2352 /** 2353 * 2354 * 2355 * <pre> 2356 * Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2357 * </pre> 2358 */ listCryptoKeyVersions( com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request)2359 public com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse listCryptoKeyVersions( 2360 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request) { 2361 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2362 getChannel(), getListCryptoKeyVersionsMethod(), getCallOptions(), request); 2363 } 2364 2365 /** 2366 * 2367 * 2368 * <pre> 2369 * Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2370 * </pre> 2371 */ listImportJobs( com.google.cloud.kms.v1.ListImportJobsRequest request)2372 public com.google.cloud.kms.v1.ListImportJobsResponse listImportJobs( 2373 com.google.cloud.kms.v1.ListImportJobsRequest request) { 2374 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2375 getChannel(), getListImportJobsMethod(), getCallOptions(), request); 2376 } 2377 2378 /** 2379 * 2380 * 2381 * <pre> 2382 * Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2383 * </pre> 2384 */ getKeyRing( com.google.cloud.kms.v1.GetKeyRingRequest request)2385 public com.google.cloud.kms.v1.KeyRing getKeyRing( 2386 com.google.cloud.kms.v1.GetKeyRingRequest request) { 2387 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2388 getChannel(), getGetKeyRingMethod(), getCallOptions(), request); 2389 } 2390 2391 /** 2392 * 2393 * 2394 * <pre> 2395 * Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as 2396 * well as its [primary][google.cloud.kms.v1.CryptoKey.primary] 2397 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2398 * </pre> 2399 */ getCryptoKey( com.google.cloud.kms.v1.GetCryptoKeyRequest request)2400 public com.google.cloud.kms.v1.CryptoKey getCryptoKey( 2401 com.google.cloud.kms.v1.GetCryptoKeyRequest request) { 2402 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2403 getChannel(), getGetCryptoKeyMethod(), getCallOptions(), request); 2404 } 2405 2406 /** 2407 * 2408 * 2409 * <pre> 2410 * Returns metadata for a given 2411 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2412 * </pre> 2413 */ getCryptoKeyVersion( com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request)2414 public com.google.cloud.kms.v1.CryptoKeyVersion getCryptoKeyVersion( 2415 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request) { 2416 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2417 getChannel(), getGetCryptoKeyVersionMethod(), getCallOptions(), request); 2418 } 2419 2420 /** 2421 * 2422 * 2423 * <pre> 2424 * Returns the public key for the given 2425 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2426 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2427 * [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] 2428 * or 2429 * [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2430 * </pre> 2431 */ getPublicKey( com.google.cloud.kms.v1.GetPublicKeyRequest request)2432 public com.google.cloud.kms.v1.PublicKey getPublicKey( 2433 com.google.cloud.kms.v1.GetPublicKeyRequest request) { 2434 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2435 getChannel(), getGetPublicKeyMethod(), getCallOptions(), request); 2436 } 2437 2438 /** 2439 * 2440 * 2441 * <pre> 2442 * Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2443 * </pre> 2444 */ getImportJob( com.google.cloud.kms.v1.GetImportJobRequest request)2445 public com.google.cloud.kms.v1.ImportJob getImportJob( 2446 com.google.cloud.kms.v1.GetImportJobRequest request) { 2447 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2448 getChannel(), getGetImportJobMethod(), getCallOptions(), request); 2449 } 2450 2451 /** 2452 * 2453 * 2454 * <pre> 2455 * Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and 2456 * Location. 2457 * </pre> 2458 */ createKeyRing( com.google.cloud.kms.v1.CreateKeyRingRequest request)2459 public com.google.cloud.kms.v1.KeyRing createKeyRing( 2460 com.google.cloud.kms.v1.CreateKeyRingRequest request) { 2461 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2462 getChannel(), getCreateKeyRingMethod(), getCallOptions(), request); 2463 } 2464 2465 /** 2466 * 2467 * 2468 * <pre> 2469 * Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a 2470 * [KeyRing][google.cloud.kms.v1.KeyRing]. 2471 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2472 * [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2473 * are required. 2474 * </pre> 2475 */ createCryptoKey( com.google.cloud.kms.v1.CreateCryptoKeyRequest request)2476 public com.google.cloud.kms.v1.CryptoKey createCryptoKey( 2477 com.google.cloud.kms.v1.CreateCryptoKeyRequest request) { 2478 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2479 getChannel(), getCreateCryptoKeyMethod(), getCallOptions(), request); 2480 } 2481 2482 /** 2483 * 2484 * 2485 * <pre> 2486 * Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a 2487 * [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2488 * The server will assign the next sequential id. If unset, 2489 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2490 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2491 * </pre> 2492 */ createCryptoKeyVersion( com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request)2493 public com.google.cloud.kms.v1.CryptoKeyVersion createCryptoKeyVersion( 2494 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request) { 2495 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2496 getChannel(), getCreateCryptoKeyVersionMethod(), getCallOptions(), request); 2497 } 2498 2499 /** 2500 * 2501 * 2502 * <pre> 2503 * Import wrapped key material into a 2504 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2505 * All requests must specify a [CryptoKey][google.cloud.kms.v1.CryptoKey]. If 2506 * a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] is additionally 2507 * specified in the request, key material will be reimported into that 2508 * version. Otherwise, a new version will be created, and will be assigned the 2509 * next sequential id within the [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2510 * </pre> 2511 */ importCryptoKeyVersion( com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request)2512 public com.google.cloud.kms.v1.CryptoKeyVersion importCryptoKeyVersion( 2513 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request) { 2514 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2515 getChannel(), getImportCryptoKeyVersionMethod(), getCallOptions(), request); 2516 } 2517 2518 /** 2519 * 2520 * 2521 * <pre> 2522 * Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a 2523 * [KeyRing][google.cloud.kms.v1.KeyRing]. 2524 * [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is 2525 * required. 2526 * </pre> 2527 */ createImportJob( com.google.cloud.kms.v1.CreateImportJobRequest request)2528 public com.google.cloud.kms.v1.ImportJob createImportJob( 2529 com.google.cloud.kms.v1.CreateImportJobRequest request) { 2530 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2531 getChannel(), getCreateImportJobMethod(), getCallOptions(), request); 2532 } 2533 2534 /** 2535 * 2536 * 2537 * <pre> 2538 * Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2539 * </pre> 2540 */ updateCryptoKey( com.google.cloud.kms.v1.UpdateCryptoKeyRequest request)2541 public com.google.cloud.kms.v1.CryptoKey updateCryptoKey( 2542 com.google.cloud.kms.v1.UpdateCryptoKeyRequest request) { 2543 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2544 getChannel(), getUpdateCryptoKeyMethod(), getCallOptions(), request); 2545 } 2546 2547 /** 2548 * 2549 * 2550 * <pre> 2551 * Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s 2552 * metadata. 2553 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 2554 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] 2555 * and 2556 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] 2557 * using this method. See 2558 * [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] 2559 * and 2560 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 2561 * to move between other states. 2562 * </pre> 2563 */ updateCryptoKeyVersion( com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request)2564 public com.google.cloud.kms.v1.CryptoKeyVersion updateCryptoKeyVersion( 2565 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request) { 2566 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2567 getChannel(), getUpdateCryptoKeyVersionMethod(), getCallOptions(), request); 2568 } 2569 2570 /** 2571 * 2572 * 2573 * <pre> 2574 * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that 2575 * will be used in 2576 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 2577 * Returns an error if called on a key whose purpose is not 2578 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2579 * </pre> 2580 */ updateCryptoKeyPrimaryVersion( com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request)2581 public com.google.cloud.kms.v1.CryptoKey updateCryptoKeyPrimaryVersion( 2582 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request) { 2583 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2584 getChannel(), getUpdateCryptoKeyPrimaryVersionMethod(), getCallOptions(), request); 2585 } 2586 2587 /** 2588 * 2589 * 2590 * <pre> 2591 * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for 2592 * destruction. 2593 * Upon calling this method, 2594 * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will 2595 * be set to 2596 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED], 2597 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 2598 * be set to the time 2599 * [destroy_scheduled_duration][google.cloud.kms.v1.CryptoKey.destroy_scheduled_duration] 2600 * in the future. At that time, the 2601 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will automatically 2602 * change to 2603 * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], 2604 * and the key material will be irrevocably destroyed. 2605 * Before the 2606 * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is 2607 * reached, 2608 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 2609 * may be called to reverse the process. 2610 * </pre> 2611 */ destroyCryptoKeyVersion( com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request)2612 public com.google.cloud.kms.v1.CryptoKeyVersion destroyCryptoKeyVersion( 2613 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request) { 2614 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2615 getChannel(), getDestroyCryptoKeyVersionMethod(), getCallOptions(), request); 2616 } 2617 2618 /** 2619 * 2620 * 2621 * <pre> 2622 * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 2623 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 2624 * state. 2625 * Upon restoration of the CryptoKeyVersion, 2626 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2627 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 2628 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 2629 * be cleared. 2630 * </pre> 2631 */ restoreCryptoKeyVersion( com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request)2632 public com.google.cloud.kms.v1.CryptoKeyVersion restoreCryptoKeyVersion( 2633 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request) { 2634 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2635 getChannel(), getRestoreCryptoKeyVersionMethod(), getCallOptions(), request); 2636 } 2637 2638 /** 2639 * 2640 * 2641 * <pre> 2642 * Encrypts data, so that it can only be recovered by a call to 2643 * [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The 2644 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2645 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2646 * </pre> 2647 */ encrypt( com.google.cloud.kms.v1.EncryptRequest request)2648 public com.google.cloud.kms.v1.EncryptResponse encrypt( 2649 com.google.cloud.kms.v1.EncryptRequest request) { 2650 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2651 getChannel(), getEncryptMethod(), getCallOptions(), request); 2652 } 2653 2654 /** 2655 * 2656 * 2657 * <pre> 2658 * Decrypts data that was protected by 2659 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The 2660 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2661 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 2662 * </pre> 2663 */ decrypt( com.google.cloud.kms.v1.DecryptRequest request)2664 public com.google.cloud.kms.v1.DecryptResponse decrypt( 2665 com.google.cloud.kms.v1.DecryptRequest request) { 2666 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2667 getChannel(), getDecryptMethod(), getCallOptions(), request); 2668 } 2669 2670 /** 2671 * 2672 * 2673 * <pre> 2674 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2675 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2676 * ASYMMETRIC_SIGN, producing a signature that can be verified with the public 2677 * key retrieved from 2678 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 2679 * </pre> 2680 */ asymmetricSign( com.google.cloud.kms.v1.AsymmetricSignRequest request)2681 public com.google.cloud.kms.v1.AsymmetricSignResponse asymmetricSign( 2682 com.google.cloud.kms.v1.AsymmetricSignRequest request) { 2683 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2684 getChannel(), getAsymmetricSignMethod(), getCallOptions(), request); 2685 } 2686 2687 /** 2688 * 2689 * 2690 * <pre> 2691 * Decrypts data that was encrypted with a public key retrieved from 2692 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] 2693 * corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2694 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 2695 * ASYMMETRIC_DECRYPT. 2696 * </pre> 2697 */ asymmetricDecrypt( com.google.cloud.kms.v1.AsymmetricDecryptRequest request)2698 public com.google.cloud.kms.v1.AsymmetricDecryptResponse asymmetricDecrypt( 2699 com.google.cloud.kms.v1.AsymmetricDecryptRequest request) { 2700 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2701 getChannel(), getAsymmetricDecryptMethod(), getCallOptions(), request); 2702 } 2703 2704 /** 2705 * 2706 * 2707 * <pre> 2708 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2709 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, 2710 * producing a tag that can be verified by another source with the same key. 2711 * </pre> 2712 */ macSign( com.google.cloud.kms.v1.MacSignRequest request)2713 public com.google.cloud.kms.v1.MacSignResponse macSign( 2714 com.google.cloud.kms.v1.MacSignRequest request) { 2715 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2716 getChannel(), getMacSignMethod(), getCallOptions(), request); 2717 } 2718 2719 /** 2720 * 2721 * 2722 * <pre> 2723 * Verifies MAC tag using a 2724 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 2725 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns 2726 * a response that indicates whether or not the verification was successful. 2727 * </pre> 2728 */ macVerify( com.google.cloud.kms.v1.MacVerifyRequest request)2729 public com.google.cloud.kms.v1.MacVerifyResponse macVerify( 2730 com.google.cloud.kms.v1.MacVerifyRequest request) { 2731 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2732 getChannel(), getMacVerifyMethod(), getCallOptions(), request); 2733 } 2734 2735 /** 2736 * 2737 * 2738 * <pre> 2739 * Generate random bytes using the Cloud KMS randomness source in the provided 2740 * location. 2741 * </pre> 2742 */ generateRandomBytes( com.google.cloud.kms.v1.GenerateRandomBytesRequest request)2743 public com.google.cloud.kms.v1.GenerateRandomBytesResponse generateRandomBytes( 2744 com.google.cloud.kms.v1.GenerateRandomBytesRequest request) { 2745 return io.grpc.stub.ClientCalls.blockingUnaryCall( 2746 getChannel(), getGenerateRandomBytesMethod(), getCallOptions(), request); 2747 } 2748 } 2749 2750 /** 2751 * A stub to allow clients to do ListenableFuture-style rpc calls to service KeyManagementService. 2752 * 2753 * <pre> 2754 * Google Cloud Key Management Service 2755 * Manages cryptographic keys and operations using those keys. Implements a REST 2756 * model with the following objects: 2757 * * [KeyRing][google.cloud.kms.v1.KeyRing] 2758 * * [CryptoKey][google.cloud.kms.v1.CryptoKey] 2759 * * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 2760 * * [ImportJob][google.cloud.kms.v1.ImportJob] 2761 * If you are using manual gRPC libraries, see 2762 * [Using gRPC with Cloud KMS](https://cloud.google.com/kms/docs/grpc). 2763 * </pre> 2764 */ 2765 public static final class KeyManagementServiceFutureStub 2766 extends io.grpc.stub.AbstractFutureStub<KeyManagementServiceFutureStub> { KeyManagementServiceFutureStub( io.grpc.Channel channel, io.grpc.CallOptions callOptions)2767 private KeyManagementServiceFutureStub( 2768 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 2769 super(channel, callOptions); 2770 } 2771 2772 @java.lang.Override build( io.grpc.Channel channel, io.grpc.CallOptions callOptions)2773 protected KeyManagementServiceFutureStub build( 2774 io.grpc.Channel channel, io.grpc.CallOptions callOptions) { 2775 return new KeyManagementServiceFutureStub(channel, callOptions); 2776 } 2777 2778 /** 2779 * 2780 * 2781 * <pre> 2782 * Lists [KeyRings][google.cloud.kms.v1.KeyRing]. 2783 * </pre> 2784 */ 2785 public com.google.common.util.concurrent.ListenableFuture< 2786 com.google.cloud.kms.v1.ListKeyRingsResponse> listKeyRings(com.google.cloud.kms.v1.ListKeyRingsRequest request)2787 listKeyRings(com.google.cloud.kms.v1.ListKeyRingsRequest request) { 2788 return io.grpc.stub.ClientCalls.futureUnaryCall( 2789 getChannel().newCall(getListKeyRingsMethod(), getCallOptions()), request); 2790 } 2791 2792 /** 2793 * 2794 * 2795 * <pre> 2796 * Lists [CryptoKeys][google.cloud.kms.v1.CryptoKey]. 2797 * </pre> 2798 */ 2799 public com.google.common.util.concurrent.ListenableFuture< 2800 com.google.cloud.kms.v1.ListCryptoKeysResponse> listCryptoKeys(com.google.cloud.kms.v1.ListCryptoKeysRequest request)2801 listCryptoKeys(com.google.cloud.kms.v1.ListCryptoKeysRequest request) { 2802 return io.grpc.stub.ClientCalls.futureUnaryCall( 2803 getChannel().newCall(getListCryptoKeysMethod(), getCallOptions()), request); 2804 } 2805 2806 /** 2807 * 2808 * 2809 * <pre> 2810 * Lists [CryptoKeyVersions][google.cloud.kms.v1.CryptoKeyVersion]. 2811 * </pre> 2812 */ 2813 public com.google.common.util.concurrent.ListenableFuture< 2814 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse> listCryptoKeyVersions(com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request)2815 listCryptoKeyVersions(com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest request) { 2816 return io.grpc.stub.ClientCalls.futureUnaryCall( 2817 getChannel().newCall(getListCryptoKeyVersionsMethod(), getCallOptions()), request); 2818 } 2819 2820 /** 2821 * 2822 * 2823 * <pre> 2824 * Lists [ImportJobs][google.cloud.kms.v1.ImportJob]. 2825 * </pre> 2826 */ 2827 public com.google.common.util.concurrent.ListenableFuture< 2828 com.google.cloud.kms.v1.ListImportJobsResponse> listImportJobs(com.google.cloud.kms.v1.ListImportJobsRequest request)2829 listImportJobs(com.google.cloud.kms.v1.ListImportJobsRequest request) { 2830 return io.grpc.stub.ClientCalls.futureUnaryCall( 2831 getChannel().newCall(getListImportJobsMethod(), getCallOptions()), request); 2832 } 2833 2834 /** 2835 * 2836 * 2837 * <pre> 2838 * Returns metadata for a given [KeyRing][google.cloud.kms.v1.KeyRing]. 2839 * </pre> 2840 */ 2841 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.KeyRing> getKeyRing(com.google.cloud.kms.v1.GetKeyRingRequest request)2842 getKeyRing(com.google.cloud.kms.v1.GetKeyRingRequest request) { 2843 return io.grpc.stub.ClientCalls.futureUnaryCall( 2844 getChannel().newCall(getGetKeyRingMethod(), getCallOptions()), request); 2845 } 2846 2847 /** 2848 * 2849 * 2850 * <pre> 2851 * Returns metadata for a given [CryptoKey][google.cloud.kms.v1.CryptoKey], as 2852 * well as its [primary][google.cloud.kms.v1.CryptoKey.primary] 2853 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2854 * </pre> 2855 */ 2856 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.CryptoKey> getCryptoKey(com.google.cloud.kms.v1.GetCryptoKeyRequest request)2857 getCryptoKey(com.google.cloud.kms.v1.GetCryptoKeyRequest request) { 2858 return io.grpc.stub.ClientCalls.futureUnaryCall( 2859 getChannel().newCall(getGetCryptoKeyMethod(), getCallOptions()), request); 2860 } 2861 2862 /** 2863 * 2864 * 2865 * <pre> 2866 * Returns metadata for a given 2867 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2868 * </pre> 2869 */ 2870 public com.google.common.util.concurrent.ListenableFuture< 2871 com.google.cloud.kms.v1.CryptoKeyVersion> getCryptoKeyVersion(com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request)2872 getCryptoKeyVersion(com.google.cloud.kms.v1.GetCryptoKeyVersionRequest request) { 2873 return io.grpc.stub.ClientCalls.futureUnaryCall( 2874 getChannel().newCall(getGetCryptoKeyVersionMethod(), getCallOptions()), request); 2875 } 2876 2877 /** 2878 * 2879 * 2880 * <pre> 2881 * Returns the public key for the given 2882 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. The 2883 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 2884 * [ASYMMETRIC_SIGN][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_SIGN] 2885 * or 2886 * [ASYMMETRIC_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ASYMMETRIC_DECRYPT]. 2887 * </pre> 2888 */ 2889 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.PublicKey> getPublicKey(com.google.cloud.kms.v1.GetPublicKeyRequest request)2890 getPublicKey(com.google.cloud.kms.v1.GetPublicKeyRequest request) { 2891 return io.grpc.stub.ClientCalls.futureUnaryCall( 2892 getChannel().newCall(getGetPublicKeyMethod(), getCallOptions()), request); 2893 } 2894 2895 /** 2896 * 2897 * 2898 * <pre> 2899 * Returns metadata for a given [ImportJob][google.cloud.kms.v1.ImportJob]. 2900 * </pre> 2901 */ 2902 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.ImportJob> getImportJob(com.google.cloud.kms.v1.GetImportJobRequest request)2903 getImportJob(com.google.cloud.kms.v1.GetImportJobRequest request) { 2904 return io.grpc.stub.ClientCalls.futureUnaryCall( 2905 getChannel().newCall(getGetImportJobMethod(), getCallOptions()), request); 2906 } 2907 2908 /** 2909 * 2910 * 2911 * <pre> 2912 * Create a new [KeyRing][google.cloud.kms.v1.KeyRing] in a given Project and 2913 * Location. 2914 * </pre> 2915 */ 2916 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.KeyRing> createKeyRing(com.google.cloud.kms.v1.CreateKeyRingRequest request)2917 createKeyRing(com.google.cloud.kms.v1.CreateKeyRingRequest request) { 2918 return io.grpc.stub.ClientCalls.futureUnaryCall( 2919 getChannel().newCall(getCreateKeyRingMethod(), getCallOptions()), request); 2920 } 2921 2922 /** 2923 * 2924 * 2925 * <pre> 2926 * Create a new [CryptoKey][google.cloud.kms.v1.CryptoKey] within a 2927 * [KeyRing][google.cloud.kms.v1.KeyRing]. 2928 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] and 2929 * [CryptoKey.version_template.algorithm][google.cloud.kms.v1.CryptoKeyVersionTemplate.algorithm] 2930 * are required. 2931 * </pre> 2932 */ 2933 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.CryptoKey> createCryptoKey(com.google.cloud.kms.v1.CreateCryptoKeyRequest request)2934 createCryptoKey(com.google.cloud.kms.v1.CreateCryptoKeyRequest request) { 2935 return io.grpc.stub.ClientCalls.futureUnaryCall( 2936 getChannel().newCall(getCreateCryptoKeyMethod(), getCallOptions()), request); 2937 } 2938 2939 /** 2940 * 2941 * 2942 * <pre> 2943 * Create a new [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in a 2944 * [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2945 * The server will assign the next sequential id. If unset, 2946 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 2947 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED]. 2948 * </pre> 2949 */ 2950 public com.google.common.util.concurrent.ListenableFuture< 2951 com.google.cloud.kms.v1.CryptoKeyVersion> createCryptoKeyVersion(com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request)2952 createCryptoKeyVersion(com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest request) { 2953 return io.grpc.stub.ClientCalls.futureUnaryCall( 2954 getChannel().newCall(getCreateCryptoKeyVersionMethod(), getCallOptions()), request); 2955 } 2956 2957 /** 2958 * 2959 * 2960 * <pre> 2961 * Import wrapped key material into a 2962 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]. 2963 * All requests must specify a [CryptoKey][google.cloud.kms.v1.CryptoKey]. If 2964 * a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] is additionally 2965 * specified in the request, key material will be reimported into that 2966 * version. Otherwise, a new version will be created, and will be assigned the 2967 * next sequential id within the [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2968 * </pre> 2969 */ 2970 public com.google.common.util.concurrent.ListenableFuture< 2971 com.google.cloud.kms.v1.CryptoKeyVersion> importCryptoKeyVersion(com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request)2972 importCryptoKeyVersion(com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest request) { 2973 return io.grpc.stub.ClientCalls.futureUnaryCall( 2974 getChannel().newCall(getImportCryptoKeyVersionMethod(), getCallOptions()), request); 2975 } 2976 2977 /** 2978 * 2979 * 2980 * <pre> 2981 * Create a new [ImportJob][google.cloud.kms.v1.ImportJob] within a 2982 * [KeyRing][google.cloud.kms.v1.KeyRing]. 2983 * [ImportJob.import_method][google.cloud.kms.v1.ImportJob.import_method] is 2984 * required. 2985 * </pre> 2986 */ 2987 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.ImportJob> createImportJob(com.google.cloud.kms.v1.CreateImportJobRequest request)2988 createImportJob(com.google.cloud.kms.v1.CreateImportJobRequest request) { 2989 return io.grpc.stub.ClientCalls.futureUnaryCall( 2990 getChannel().newCall(getCreateImportJobMethod(), getCallOptions()), request); 2991 } 2992 2993 /** 2994 * 2995 * 2996 * <pre> 2997 * Update a [CryptoKey][google.cloud.kms.v1.CryptoKey]. 2998 * </pre> 2999 */ 3000 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.CryptoKey> updateCryptoKey(com.google.cloud.kms.v1.UpdateCryptoKeyRequest request)3001 updateCryptoKey(com.google.cloud.kms.v1.UpdateCryptoKeyRequest request) { 3002 return io.grpc.stub.ClientCalls.futureUnaryCall( 3003 getChannel().newCall(getUpdateCryptoKeyMethod(), getCallOptions()), request); 3004 } 3005 3006 /** 3007 * 3008 * 3009 * <pre> 3010 * Update a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]'s 3011 * metadata. 3012 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] may be changed between 3013 * [ENABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.ENABLED] 3014 * and 3015 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED] 3016 * using this method. See 3017 * [DestroyCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.DestroyCryptoKeyVersion] 3018 * and 3019 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 3020 * to move between other states. 3021 * </pre> 3022 */ 3023 public com.google.common.util.concurrent.ListenableFuture< 3024 com.google.cloud.kms.v1.CryptoKeyVersion> updateCryptoKeyVersion(com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request)3025 updateCryptoKeyVersion(com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest request) { 3026 return io.grpc.stub.ClientCalls.futureUnaryCall( 3027 getChannel().newCall(getUpdateCryptoKeyVersionMethod(), getCallOptions()), request); 3028 } 3029 3030 /** 3031 * 3032 * 3033 * <pre> 3034 * Update the version of a [CryptoKey][google.cloud.kms.v1.CryptoKey] that 3035 * will be used in 3036 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. 3037 * Returns an error if called on a key whose purpose is not 3038 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 3039 * </pre> 3040 */ 3041 public com.google.common.util.concurrent.ListenableFuture<com.google.cloud.kms.v1.CryptoKey> updateCryptoKeyPrimaryVersion( com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request)3042 updateCryptoKeyPrimaryVersion( 3043 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest request) { 3044 return io.grpc.stub.ClientCalls.futureUnaryCall( 3045 getChannel().newCall(getUpdateCryptoKeyPrimaryVersionMethod(), getCallOptions()), 3046 request); 3047 } 3048 3049 /** 3050 * 3051 * 3052 * <pre> 3053 * Schedule a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] for 3054 * destruction. 3055 * Upon calling this method, 3056 * [CryptoKeyVersion.state][google.cloud.kms.v1.CryptoKeyVersion.state] will 3057 * be set to 3058 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED], 3059 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 3060 * be set to the time 3061 * [destroy_scheduled_duration][google.cloud.kms.v1.CryptoKey.destroy_scheduled_duration] 3062 * in the future. At that time, the 3063 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will automatically 3064 * change to 3065 * [DESTROYED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROYED], 3066 * and the key material will be irrevocably destroyed. 3067 * Before the 3068 * [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] is 3069 * reached, 3070 * [RestoreCryptoKeyVersion][google.cloud.kms.v1.KeyManagementService.RestoreCryptoKeyVersion] 3071 * may be called to reverse the process. 3072 * </pre> 3073 */ 3074 public com.google.common.util.concurrent.ListenableFuture< 3075 com.google.cloud.kms.v1.CryptoKeyVersion> destroyCryptoKeyVersion(com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request)3076 destroyCryptoKeyVersion(com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest request) { 3077 return io.grpc.stub.ClientCalls.futureUnaryCall( 3078 getChannel().newCall(getDestroyCryptoKeyVersionMethod(), getCallOptions()), request); 3079 } 3080 3081 /** 3082 * 3083 * 3084 * <pre> 3085 * Restore a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] in the 3086 * [DESTROY_SCHEDULED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DESTROY_SCHEDULED] 3087 * state. 3088 * Upon restoration of the CryptoKeyVersion, 3089 * [state][google.cloud.kms.v1.CryptoKeyVersion.state] will be set to 3090 * [DISABLED][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionState.DISABLED], 3091 * and [destroy_time][google.cloud.kms.v1.CryptoKeyVersion.destroy_time] will 3092 * be cleared. 3093 * </pre> 3094 */ 3095 public com.google.common.util.concurrent.ListenableFuture< 3096 com.google.cloud.kms.v1.CryptoKeyVersion> restoreCryptoKeyVersion(com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request)3097 restoreCryptoKeyVersion(com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest request) { 3098 return io.grpc.stub.ClientCalls.futureUnaryCall( 3099 getChannel().newCall(getRestoreCryptoKeyVersionMethod(), getCallOptions()), request); 3100 } 3101 3102 /** 3103 * 3104 * 3105 * <pre> 3106 * Encrypts data, so that it can only be recovered by a call to 3107 * [Decrypt][google.cloud.kms.v1.KeyManagementService.Decrypt]. The 3108 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 3109 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 3110 * </pre> 3111 */ 3112 public com.google.common.util.concurrent.ListenableFuture< 3113 com.google.cloud.kms.v1.EncryptResponse> encrypt(com.google.cloud.kms.v1.EncryptRequest request)3114 encrypt(com.google.cloud.kms.v1.EncryptRequest request) { 3115 return io.grpc.stub.ClientCalls.futureUnaryCall( 3116 getChannel().newCall(getEncryptMethod(), getCallOptions()), request); 3117 } 3118 3119 /** 3120 * 3121 * 3122 * <pre> 3123 * Decrypts data that was protected by 3124 * [Encrypt][google.cloud.kms.v1.KeyManagementService.Encrypt]. The 3125 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] must be 3126 * [ENCRYPT_DECRYPT][google.cloud.kms.v1.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT]. 3127 * </pre> 3128 */ 3129 public com.google.common.util.concurrent.ListenableFuture< 3130 com.google.cloud.kms.v1.DecryptResponse> decrypt(com.google.cloud.kms.v1.DecryptRequest request)3131 decrypt(com.google.cloud.kms.v1.DecryptRequest request) { 3132 return io.grpc.stub.ClientCalls.futureUnaryCall( 3133 getChannel().newCall(getDecryptMethod(), getCallOptions()), request); 3134 } 3135 3136 /** 3137 * 3138 * 3139 * <pre> 3140 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 3141 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 3142 * ASYMMETRIC_SIGN, producing a signature that can be verified with the public 3143 * key retrieved from 3144 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey]. 3145 * </pre> 3146 */ 3147 public com.google.common.util.concurrent.ListenableFuture< 3148 com.google.cloud.kms.v1.AsymmetricSignResponse> asymmetricSign(com.google.cloud.kms.v1.AsymmetricSignRequest request)3149 asymmetricSign(com.google.cloud.kms.v1.AsymmetricSignRequest request) { 3150 return io.grpc.stub.ClientCalls.futureUnaryCall( 3151 getChannel().newCall(getAsymmetricSignMethod(), getCallOptions()), request); 3152 } 3153 3154 /** 3155 * 3156 * 3157 * <pre> 3158 * Decrypts data that was encrypted with a public key retrieved from 3159 * [GetPublicKey][google.cloud.kms.v1.KeyManagementService.GetPublicKey] 3160 * corresponding to a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 3161 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] 3162 * ASYMMETRIC_DECRYPT. 3163 * </pre> 3164 */ 3165 public com.google.common.util.concurrent.ListenableFuture< 3166 com.google.cloud.kms.v1.AsymmetricDecryptResponse> asymmetricDecrypt(com.google.cloud.kms.v1.AsymmetricDecryptRequest request)3167 asymmetricDecrypt(com.google.cloud.kms.v1.AsymmetricDecryptRequest request) { 3168 return io.grpc.stub.ClientCalls.futureUnaryCall( 3169 getChannel().newCall(getAsymmetricDecryptMethod(), getCallOptions()), request); 3170 } 3171 3172 /** 3173 * 3174 * 3175 * <pre> 3176 * Signs data using a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] 3177 * with [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, 3178 * producing a tag that can be verified by another source with the same key. 3179 * </pre> 3180 */ 3181 public com.google.common.util.concurrent.ListenableFuture< 3182 com.google.cloud.kms.v1.MacSignResponse> macSign(com.google.cloud.kms.v1.MacSignRequest request)3183 macSign(com.google.cloud.kms.v1.MacSignRequest request) { 3184 return io.grpc.stub.ClientCalls.futureUnaryCall( 3185 getChannel().newCall(getMacSignMethod(), getCallOptions()), request); 3186 } 3187 3188 /** 3189 * 3190 * 3191 * <pre> 3192 * Verifies MAC tag using a 3193 * [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] with 3194 * [CryptoKey.purpose][google.cloud.kms.v1.CryptoKey.purpose] MAC, and returns 3195 * a response that indicates whether or not the verification was successful. 3196 * </pre> 3197 */ 3198 public com.google.common.util.concurrent.ListenableFuture< 3199 com.google.cloud.kms.v1.MacVerifyResponse> macVerify(com.google.cloud.kms.v1.MacVerifyRequest request)3200 macVerify(com.google.cloud.kms.v1.MacVerifyRequest request) { 3201 return io.grpc.stub.ClientCalls.futureUnaryCall( 3202 getChannel().newCall(getMacVerifyMethod(), getCallOptions()), request); 3203 } 3204 3205 /** 3206 * 3207 * 3208 * <pre> 3209 * Generate random bytes using the Cloud KMS randomness source in the provided 3210 * location. 3211 * </pre> 3212 */ 3213 public com.google.common.util.concurrent.ListenableFuture< 3214 com.google.cloud.kms.v1.GenerateRandomBytesResponse> generateRandomBytes(com.google.cloud.kms.v1.GenerateRandomBytesRequest request)3215 generateRandomBytes(com.google.cloud.kms.v1.GenerateRandomBytesRequest request) { 3216 return io.grpc.stub.ClientCalls.futureUnaryCall( 3217 getChannel().newCall(getGenerateRandomBytesMethod(), getCallOptions()), request); 3218 } 3219 } 3220 3221 private static final int METHODID_LIST_KEY_RINGS = 0; 3222 private static final int METHODID_LIST_CRYPTO_KEYS = 1; 3223 private static final int METHODID_LIST_CRYPTO_KEY_VERSIONS = 2; 3224 private static final int METHODID_LIST_IMPORT_JOBS = 3; 3225 private static final int METHODID_GET_KEY_RING = 4; 3226 private static final int METHODID_GET_CRYPTO_KEY = 5; 3227 private static final int METHODID_GET_CRYPTO_KEY_VERSION = 6; 3228 private static final int METHODID_GET_PUBLIC_KEY = 7; 3229 private static final int METHODID_GET_IMPORT_JOB = 8; 3230 private static final int METHODID_CREATE_KEY_RING = 9; 3231 private static final int METHODID_CREATE_CRYPTO_KEY = 10; 3232 private static final int METHODID_CREATE_CRYPTO_KEY_VERSION = 11; 3233 private static final int METHODID_IMPORT_CRYPTO_KEY_VERSION = 12; 3234 private static final int METHODID_CREATE_IMPORT_JOB = 13; 3235 private static final int METHODID_UPDATE_CRYPTO_KEY = 14; 3236 private static final int METHODID_UPDATE_CRYPTO_KEY_VERSION = 15; 3237 private static final int METHODID_UPDATE_CRYPTO_KEY_PRIMARY_VERSION = 16; 3238 private static final int METHODID_DESTROY_CRYPTO_KEY_VERSION = 17; 3239 private static final int METHODID_RESTORE_CRYPTO_KEY_VERSION = 18; 3240 private static final int METHODID_ENCRYPT = 19; 3241 private static final int METHODID_DECRYPT = 20; 3242 private static final int METHODID_ASYMMETRIC_SIGN = 21; 3243 private static final int METHODID_ASYMMETRIC_DECRYPT = 22; 3244 private static final int METHODID_MAC_SIGN = 23; 3245 private static final int METHODID_MAC_VERIFY = 24; 3246 private static final int METHODID_GENERATE_RANDOM_BYTES = 25; 3247 3248 private static final class MethodHandlers<Req, Resp> 3249 implements io.grpc.stub.ServerCalls.UnaryMethod<Req, Resp>, 3250 io.grpc.stub.ServerCalls.ServerStreamingMethod<Req, Resp>, 3251 io.grpc.stub.ServerCalls.ClientStreamingMethod<Req, Resp>, 3252 io.grpc.stub.ServerCalls.BidiStreamingMethod<Req, Resp> { 3253 private final AsyncService serviceImpl; 3254 private final int methodId; 3255 MethodHandlers(AsyncService serviceImpl, int methodId)3256 MethodHandlers(AsyncService serviceImpl, int methodId) { 3257 this.serviceImpl = serviceImpl; 3258 this.methodId = methodId; 3259 } 3260 3261 @java.lang.Override 3262 @java.lang.SuppressWarnings("unchecked") invoke(Req request, io.grpc.stub.StreamObserver<Resp> responseObserver)3263 public void invoke(Req request, io.grpc.stub.StreamObserver<Resp> responseObserver) { 3264 switch (methodId) { 3265 case METHODID_LIST_KEY_RINGS: 3266 serviceImpl.listKeyRings( 3267 (com.google.cloud.kms.v1.ListKeyRingsRequest) request, 3268 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListKeyRingsResponse>) 3269 responseObserver); 3270 break; 3271 case METHODID_LIST_CRYPTO_KEYS: 3272 serviceImpl.listCryptoKeys( 3273 (com.google.cloud.kms.v1.ListCryptoKeysRequest) request, 3274 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeysResponse>) 3275 responseObserver); 3276 break; 3277 case METHODID_LIST_CRYPTO_KEY_VERSIONS: 3278 serviceImpl.listCryptoKeyVersions( 3279 (com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest) request, 3280 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse>) 3281 responseObserver); 3282 break; 3283 case METHODID_LIST_IMPORT_JOBS: 3284 serviceImpl.listImportJobs( 3285 (com.google.cloud.kms.v1.ListImportJobsRequest) request, 3286 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ListImportJobsResponse>) 3287 responseObserver); 3288 break; 3289 case METHODID_GET_KEY_RING: 3290 serviceImpl.getKeyRing( 3291 (com.google.cloud.kms.v1.GetKeyRingRequest) request, 3292 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing>) responseObserver); 3293 break; 3294 case METHODID_GET_CRYPTO_KEY: 3295 serviceImpl.getCryptoKey( 3296 (com.google.cloud.kms.v1.GetCryptoKeyRequest) request, 3297 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey>) responseObserver); 3298 break; 3299 case METHODID_GET_CRYPTO_KEY_VERSION: 3300 serviceImpl.getCryptoKeyVersion( 3301 (com.google.cloud.kms.v1.GetCryptoKeyVersionRequest) request, 3302 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion>) 3303 responseObserver); 3304 break; 3305 case METHODID_GET_PUBLIC_KEY: 3306 serviceImpl.getPublicKey( 3307 (com.google.cloud.kms.v1.GetPublicKeyRequest) request, 3308 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.PublicKey>) responseObserver); 3309 break; 3310 case METHODID_GET_IMPORT_JOB: 3311 serviceImpl.getImportJob( 3312 (com.google.cloud.kms.v1.GetImportJobRequest) request, 3313 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob>) responseObserver); 3314 break; 3315 case METHODID_CREATE_KEY_RING: 3316 serviceImpl.createKeyRing( 3317 (com.google.cloud.kms.v1.CreateKeyRingRequest) request, 3318 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.KeyRing>) responseObserver); 3319 break; 3320 case METHODID_CREATE_CRYPTO_KEY: 3321 serviceImpl.createCryptoKey( 3322 (com.google.cloud.kms.v1.CreateCryptoKeyRequest) request, 3323 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey>) responseObserver); 3324 break; 3325 case METHODID_CREATE_CRYPTO_KEY_VERSION: 3326 serviceImpl.createCryptoKeyVersion( 3327 (com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest) request, 3328 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion>) 3329 responseObserver); 3330 break; 3331 case METHODID_IMPORT_CRYPTO_KEY_VERSION: 3332 serviceImpl.importCryptoKeyVersion( 3333 (com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest) request, 3334 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion>) 3335 responseObserver); 3336 break; 3337 case METHODID_CREATE_IMPORT_JOB: 3338 serviceImpl.createImportJob( 3339 (com.google.cloud.kms.v1.CreateImportJobRequest) request, 3340 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.ImportJob>) responseObserver); 3341 break; 3342 case METHODID_UPDATE_CRYPTO_KEY: 3343 serviceImpl.updateCryptoKey( 3344 (com.google.cloud.kms.v1.UpdateCryptoKeyRequest) request, 3345 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey>) responseObserver); 3346 break; 3347 case METHODID_UPDATE_CRYPTO_KEY_VERSION: 3348 serviceImpl.updateCryptoKeyVersion( 3349 (com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest) request, 3350 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion>) 3351 responseObserver); 3352 break; 3353 case METHODID_UPDATE_CRYPTO_KEY_PRIMARY_VERSION: 3354 serviceImpl.updateCryptoKeyPrimaryVersion( 3355 (com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest) request, 3356 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKey>) responseObserver); 3357 break; 3358 case METHODID_DESTROY_CRYPTO_KEY_VERSION: 3359 serviceImpl.destroyCryptoKeyVersion( 3360 (com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest) request, 3361 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion>) 3362 responseObserver); 3363 break; 3364 case METHODID_RESTORE_CRYPTO_KEY_VERSION: 3365 serviceImpl.restoreCryptoKeyVersion( 3366 (com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest) request, 3367 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.CryptoKeyVersion>) 3368 responseObserver); 3369 break; 3370 case METHODID_ENCRYPT: 3371 serviceImpl.encrypt( 3372 (com.google.cloud.kms.v1.EncryptRequest) request, 3373 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.EncryptResponse>) 3374 responseObserver); 3375 break; 3376 case METHODID_DECRYPT: 3377 serviceImpl.decrypt( 3378 (com.google.cloud.kms.v1.DecryptRequest) request, 3379 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.DecryptResponse>) 3380 responseObserver); 3381 break; 3382 case METHODID_ASYMMETRIC_SIGN: 3383 serviceImpl.asymmetricSign( 3384 (com.google.cloud.kms.v1.AsymmetricSignRequest) request, 3385 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricSignResponse>) 3386 responseObserver); 3387 break; 3388 case METHODID_ASYMMETRIC_DECRYPT: 3389 serviceImpl.asymmetricDecrypt( 3390 (com.google.cloud.kms.v1.AsymmetricDecryptRequest) request, 3391 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.AsymmetricDecryptResponse>) 3392 responseObserver); 3393 break; 3394 case METHODID_MAC_SIGN: 3395 serviceImpl.macSign( 3396 (com.google.cloud.kms.v1.MacSignRequest) request, 3397 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacSignResponse>) 3398 responseObserver); 3399 break; 3400 case METHODID_MAC_VERIFY: 3401 serviceImpl.macVerify( 3402 (com.google.cloud.kms.v1.MacVerifyRequest) request, 3403 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.MacVerifyResponse>) 3404 responseObserver); 3405 break; 3406 case METHODID_GENERATE_RANDOM_BYTES: 3407 serviceImpl.generateRandomBytes( 3408 (com.google.cloud.kms.v1.GenerateRandomBytesRequest) request, 3409 (io.grpc.stub.StreamObserver<com.google.cloud.kms.v1.GenerateRandomBytesResponse>) 3410 responseObserver); 3411 break; 3412 default: 3413 throw new AssertionError(); 3414 } 3415 } 3416 3417 @java.lang.Override 3418 @java.lang.SuppressWarnings("unchecked") invoke( io.grpc.stub.StreamObserver<Resp> responseObserver)3419 public io.grpc.stub.StreamObserver<Req> invoke( 3420 io.grpc.stub.StreamObserver<Resp> responseObserver) { 3421 switch (methodId) { 3422 default: 3423 throw new AssertionError(); 3424 } 3425 } 3426 } 3427 bindService(AsyncService service)3428 public static final io.grpc.ServerServiceDefinition bindService(AsyncService service) { 3429 return io.grpc.ServerServiceDefinition.builder(getServiceDescriptor()) 3430 .addMethod( 3431 getListKeyRingsMethod(), 3432 io.grpc.stub.ServerCalls.asyncUnaryCall( 3433 new MethodHandlers< 3434 com.google.cloud.kms.v1.ListKeyRingsRequest, 3435 com.google.cloud.kms.v1.ListKeyRingsResponse>( 3436 service, METHODID_LIST_KEY_RINGS))) 3437 .addMethod( 3438 getListCryptoKeysMethod(), 3439 io.grpc.stub.ServerCalls.asyncUnaryCall( 3440 new MethodHandlers< 3441 com.google.cloud.kms.v1.ListCryptoKeysRequest, 3442 com.google.cloud.kms.v1.ListCryptoKeysResponse>( 3443 service, METHODID_LIST_CRYPTO_KEYS))) 3444 .addMethod( 3445 getListCryptoKeyVersionsMethod(), 3446 io.grpc.stub.ServerCalls.asyncUnaryCall( 3447 new MethodHandlers< 3448 com.google.cloud.kms.v1.ListCryptoKeyVersionsRequest, 3449 com.google.cloud.kms.v1.ListCryptoKeyVersionsResponse>( 3450 service, METHODID_LIST_CRYPTO_KEY_VERSIONS))) 3451 .addMethod( 3452 getListImportJobsMethod(), 3453 io.grpc.stub.ServerCalls.asyncUnaryCall( 3454 new MethodHandlers< 3455 com.google.cloud.kms.v1.ListImportJobsRequest, 3456 com.google.cloud.kms.v1.ListImportJobsResponse>( 3457 service, METHODID_LIST_IMPORT_JOBS))) 3458 .addMethod( 3459 getGetKeyRingMethod(), 3460 io.grpc.stub.ServerCalls.asyncUnaryCall( 3461 new MethodHandlers< 3462 com.google.cloud.kms.v1.GetKeyRingRequest, com.google.cloud.kms.v1.KeyRing>( 3463 service, METHODID_GET_KEY_RING))) 3464 .addMethod( 3465 getGetCryptoKeyMethod(), 3466 io.grpc.stub.ServerCalls.asyncUnaryCall( 3467 new MethodHandlers< 3468 com.google.cloud.kms.v1.GetCryptoKeyRequest, com.google.cloud.kms.v1.CryptoKey>( 3469 service, METHODID_GET_CRYPTO_KEY))) 3470 .addMethod( 3471 getGetCryptoKeyVersionMethod(), 3472 io.grpc.stub.ServerCalls.asyncUnaryCall( 3473 new MethodHandlers< 3474 com.google.cloud.kms.v1.GetCryptoKeyVersionRequest, 3475 com.google.cloud.kms.v1.CryptoKeyVersion>( 3476 service, METHODID_GET_CRYPTO_KEY_VERSION))) 3477 .addMethod( 3478 getGetPublicKeyMethod(), 3479 io.grpc.stub.ServerCalls.asyncUnaryCall( 3480 new MethodHandlers< 3481 com.google.cloud.kms.v1.GetPublicKeyRequest, com.google.cloud.kms.v1.PublicKey>( 3482 service, METHODID_GET_PUBLIC_KEY))) 3483 .addMethod( 3484 getGetImportJobMethod(), 3485 io.grpc.stub.ServerCalls.asyncUnaryCall( 3486 new MethodHandlers< 3487 com.google.cloud.kms.v1.GetImportJobRequest, com.google.cloud.kms.v1.ImportJob>( 3488 service, METHODID_GET_IMPORT_JOB))) 3489 .addMethod( 3490 getCreateKeyRingMethod(), 3491 io.grpc.stub.ServerCalls.asyncUnaryCall( 3492 new MethodHandlers< 3493 com.google.cloud.kms.v1.CreateKeyRingRequest, com.google.cloud.kms.v1.KeyRing>( 3494 service, METHODID_CREATE_KEY_RING))) 3495 .addMethod( 3496 getCreateCryptoKeyMethod(), 3497 io.grpc.stub.ServerCalls.asyncUnaryCall( 3498 new MethodHandlers< 3499 com.google.cloud.kms.v1.CreateCryptoKeyRequest, 3500 com.google.cloud.kms.v1.CryptoKey>(service, METHODID_CREATE_CRYPTO_KEY))) 3501 .addMethod( 3502 getCreateCryptoKeyVersionMethod(), 3503 io.grpc.stub.ServerCalls.asyncUnaryCall( 3504 new MethodHandlers< 3505 com.google.cloud.kms.v1.CreateCryptoKeyVersionRequest, 3506 com.google.cloud.kms.v1.CryptoKeyVersion>( 3507 service, METHODID_CREATE_CRYPTO_KEY_VERSION))) 3508 .addMethod( 3509 getImportCryptoKeyVersionMethod(), 3510 io.grpc.stub.ServerCalls.asyncUnaryCall( 3511 new MethodHandlers< 3512 com.google.cloud.kms.v1.ImportCryptoKeyVersionRequest, 3513 com.google.cloud.kms.v1.CryptoKeyVersion>( 3514 service, METHODID_IMPORT_CRYPTO_KEY_VERSION))) 3515 .addMethod( 3516 getCreateImportJobMethod(), 3517 io.grpc.stub.ServerCalls.asyncUnaryCall( 3518 new MethodHandlers< 3519 com.google.cloud.kms.v1.CreateImportJobRequest, 3520 com.google.cloud.kms.v1.ImportJob>(service, METHODID_CREATE_IMPORT_JOB))) 3521 .addMethod( 3522 getUpdateCryptoKeyMethod(), 3523 io.grpc.stub.ServerCalls.asyncUnaryCall( 3524 new MethodHandlers< 3525 com.google.cloud.kms.v1.UpdateCryptoKeyRequest, 3526 com.google.cloud.kms.v1.CryptoKey>(service, METHODID_UPDATE_CRYPTO_KEY))) 3527 .addMethod( 3528 getUpdateCryptoKeyVersionMethod(), 3529 io.grpc.stub.ServerCalls.asyncUnaryCall( 3530 new MethodHandlers< 3531 com.google.cloud.kms.v1.UpdateCryptoKeyVersionRequest, 3532 com.google.cloud.kms.v1.CryptoKeyVersion>( 3533 service, METHODID_UPDATE_CRYPTO_KEY_VERSION))) 3534 .addMethod( 3535 getUpdateCryptoKeyPrimaryVersionMethod(), 3536 io.grpc.stub.ServerCalls.asyncUnaryCall( 3537 new MethodHandlers< 3538 com.google.cloud.kms.v1.UpdateCryptoKeyPrimaryVersionRequest, 3539 com.google.cloud.kms.v1.CryptoKey>( 3540 service, METHODID_UPDATE_CRYPTO_KEY_PRIMARY_VERSION))) 3541 .addMethod( 3542 getDestroyCryptoKeyVersionMethod(), 3543 io.grpc.stub.ServerCalls.asyncUnaryCall( 3544 new MethodHandlers< 3545 com.google.cloud.kms.v1.DestroyCryptoKeyVersionRequest, 3546 com.google.cloud.kms.v1.CryptoKeyVersion>( 3547 service, METHODID_DESTROY_CRYPTO_KEY_VERSION))) 3548 .addMethod( 3549 getRestoreCryptoKeyVersionMethod(), 3550 io.grpc.stub.ServerCalls.asyncUnaryCall( 3551 new MethodHandlers< 3552 com.google.cloud.kms.v1.RestoreCryptoKeyVersionRequest, 3553 com.google.cloud.kms.v1.CryptoKeyVersion>( 3554 service, METHODID_RESTORE_CRYPTO_KEY_VERSION))) 3555 .addMethod( 3556 getEncryptMethod(), 3557 io.grpc.stub.ServerCalls.asyncUnaryCall( 3558 new MethodHandlers< 3559 com.google.cloud.kms.v1.EncryptRequest, 3560 com.google.cloud.kms.v1.EncryptResponse>(service, METHODID_ENCRYPT))) 3561 .addMethod( 3562 getDecryptMethod(), 3563 io.grpc.stub.ServerCalls.asyncUnaryCall( 3564 new MethodHandlers< 3565 com.google.cloud.kms.v1.DecryptRequest, 3566 com.google.cloud.kms.v1.DecryptResponse>(service, METHODID_DECRYPT))) 3567 .addMethod( 3568 getAsymmetricSignMethod(), 3569 io.grpc.stub.ServerCalls.asyncUnaryCall( 3570 new MethodHandlers< 3571 com.google.cloud.kms.v1.AsymmetricSignRequest, 3572 com.google.cloud.kms.v1.AsymmetricSignResponse>( 3573 service, METHODID_ASYMMETRIC_SIGN))) 3574 .addMethod( 3575 getAsymmetricDecryptMethod(), 3576 io.grpc.stub.ServerCalls.asyncUnaryCall( 3577 new MethodHandlers< 3578 com.google.cloud.kms.v1.AsymmetricDecryptRequest, 3579 com.google.cloud.kms.v1.AsymmetricDecryptResponse>( 3580 service, METHODID_ASYMMETRIC_DECRYPT))) 3581 .addMethod( 3582 getMacSignMethod(), 3583 io.grpc.stub.ServerCalls.asyncUnaryCall( 3584 new MethodHandlers< 3585 com.google.cloud.kms.v1.MacSignRequest, 3586 com.google.cloud.kms.v1.MacSignResponse>(service, METHODID_MAC_SIGN))) 3587 .addMethod( 3588 getMacVerifyMethod(), 3589 io.grpc.stub.ServerCalls.asyncUnaryCall( 3590 new MethodHandlers< 3591 com.google.cloud.kms.v1.MacVerifyRequest, 3592 com.google.cloud.kms.v1.MacVerifyResponse>(service, METHODID_MAC_VERIFY))) 3593 .addMethod( 3594 getGenerateRandomBytesMethod(), 3595 io.grpc.stub.ServerCalls.asyncUnaryCall( 3596 new MethodHandlers< 3597 com.google.cloud.kms.v1.GenerateRandomBytesRequest, 3598 com.google.cloud.kms.v1.GenerateRandomBytesResponse>( 3599 service, METHODID_GENERATE_RANDOM_BYTES))) 3600 .build(); 3601 } 3602 3603 private abstract static class KeyManagementServiceBaseDescriptorSupplier 3604 implements io.grpc.protobuf.ProtoFileDescriptorSupplier, 3605 io.grpc.protobuf.ProtoServiceDescriptorSupplier { KeyManagementServiceBaseDescriptorSupplier()3606 KeyManagementServiceBaseDescriptorSupplier() {} 3607 3608 @java.lang.Override getFileDescriptor()3609 public com.google.protobuf.Descriptors.FileDescriptor getFileDescriptor() { 3610 return com.google.cloud.kms.v1.KmsProto.getDescriptor(); 3611 } 3612 3613 @java.lang.Override getServiceDescriptor()3614 public com.google.protobuf.Descriptors.ServiceDescriptor getServiceDescriptor() { 3615 return getFileDescriptor().findServiceByName("KeyManagementService"); 3616 } 3617 } 3618 3619 private static final class KeyManagementServiceFileDescriptorSupplier 3620 extends KeyManagementServiceBaseDescriptorSupplier { KeyManagementServiceFileDescriptorSupplier()3621 KeyManagementServiceFileDescriptorSupplier() {} 3622 } 3623 3624 private static final class KeyManagementServiceMethodDescriptorSupplier 3625 extends KeyManagementServiceBaseDescriptorSupplier 3626 implements io.grpc.protobuf.ProtoMethodDescriptorSupplier { 3627 private final String methodName; 3628 KeyManagementServiceMethodDescriptorSupplier(String methodName)3629 KeyManagementServiceMethodDescriptorSupplier(String methodName) { 3630 this.methodName = methodName; 3631 } 3632 3633 @java.lang.Override getMethodDescriptor()3634 public com.google.protobuf.Descriptors.MethodDescriptor getMethodDescriptor() { 3635 return getServiceDescriptor().findMethodByName(methodName); 3636 } 3637 } 3638 3639 private static volatile io.grpc.ServiceDescriptor serviceDescriptor; 3640 getServiceDescriptor()3641 public static io.grpc.ServiceDescriptor getServiceDescriptor() { 3642 io.grpc.ServiceDescriptor result = serviceDescriptor; 3643 if (result == null) { 3644 synchronized (KeyManagementServiceGrpc.class) { 3645 result = serviceDescriptor; 3646 if (result == null) { 3647 serviceDescriptor = 3648 result = 3649 io.grpc.ServiceDescriptor.newBuilder(SERVICE_NAME) 3650 .setSchemaDescriptor(new KeyManagementServiceFileDescriptorSupplier()) 3651 .addMethod(getListKeyRingsMethod()) 3652 .addMethod(getListCryptoKeysMethod()) 3653 .addMethod(getListCryptoKeyVersionsMethod()) 3654 .addMethod(getListImportJobsMethod()) 3655 .addMethod(getGetKeyRingMethod()) 3656 .addMethod(getGetCryptoKeyMethod()) 3657 .addMethod(getGetCryptoKeyVersionMethod()) 3658 .addMethod(getGetPublicKeyMethod()) 3659 .addMethod(getGetImportJobMethod()) 3660 .addMethod(getCreateKeyRingMethod()) 3661 .addMethod(getCreateCryptoKeyMethod()) 3662 .addMethod(getCreateCryptoKeyVersionMethod()) 3663 .addMethod(getImportCryptoKeyVersionMethod()) 3664 .addMethod(getCreateImportJobMethod()) 3665 .addMethod(getUpdateCryptoKeyMethod()) 3666 .addMethod(getUpdateCryptoKeyVersionMethod()) 3667 .addMethod(getUpdateCryptoKeyPrimaryVersionMethod()) 3668 .addMethod(getDestroyCryptoKeyVersionMethod()) 3669 .addMethod(getRestoreCryptoKeyVersionMethod()) 3670 .addMethod(getEncryptMethod()) 3671 .addMethod(getDecryptMethod()) 3672 .addMethod(getAsymmetricSignMethod()) 3673 .addMethod(getAsymmetricDecryptMethod()) 3674 .addMethod(getMacSignMethod()) 3675 .addMethod(getMacVerifyMethod()) 3676 .addMethod(getGenerateRandomBytesMethod()) 3677 .build(); 3678 } 3679 } 3680 } 3681 return result; 3682 } 3683 } 3684