def Args(parser): flags.AddKeyResourceFlags(parser) flags.AddExternalKeyUriFlag(parser) parser.add_argument( '--primary', action='store_true', help='If specified, immediately make the new version primary.')
def Args(parser): flags.AddKeyResourceFlags(parser, 'The containing key to import into.') flags.AddRsaAesWrappedKeyFileFlag(parser, 'to import') flags.AddImportedVersionAlgorithmFlag(parser) flags.AddRequiredImportJobArgument(parser, 'to import from') flags.AddOptionalPublicKeyFileArgument(parser) flags.AddOptionalTargetKeyFileArgument(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'to use for signing.') flags.AddCryptoKeyVersionFlag(parser, 'to use for signing') flags.AddDigestAlgorithmFlag(parser, 'The algorithm to digest the input.') flags.AddInputFileFlag(parser, 'to sign') flags.AddSignatureFileFlag(parser, 'to output')
def Args(parser): flags.AddKeyResourceFlags(parser, 'to use for asymmetric-decryption.') flags.AddCryptoKeyVersionFlag(parser, 'to use for asymmetric-decryption') flags.AddCiphertextFileFlag(parser, 'to decrypt') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddSkipIntegrityVerification(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'The key to use for encryption.') flags.AddCryptoKeyVersionFlag(parser, 'to use for encryption') flags.AddPlaintextFileFlag(parser, 'to encrypt') flags.AddCiphertextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser) flags.AddSkipIntegrityVerification(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'The containing key to import into.') flags.AddCryptoKeyVersionFlag( parser, 'to re-import into. Omit this field for first-time import') flags.AddRsaAesWrappedKeyFileFlag(parser, 'to import') flags.AddImportedVersionAlgorithmFlag(parser) flags.AddRequiredImportJobArgument(parser, 'to import from') flags.AddOptionalPublicKeyFileArgument(parser) flags.AddOptionalTargetKeyFileArgument(parser)
def Args(parser): flags.AddKeyResourceFlags( parser, 'Cloud KMS key to use for decryption.\n' '* For symmetric keys, Cloud KMS detects the decryption key version ' 'from the ciphertext. If you specify a key version as part of a ' 'symmetric decryption request, an error is logged and decryption ' 'fails.\n' '* For asymmetric keys, the encryption key version can\'t be detected ' 'automatically. You must keep track of this information and provide ' 'the key version in the decryption request. The key version itself ' 'is not sensitive data and does not need to be encrypted.') flags.AddCiphertextFileFlag( parser, 'to decrypt. This file should contain the result of encrypting ' 'a file with `gcloud kms encrypt`') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser)
def Args(parser): flags.AddKeyResourceFlags(parser)
def Args(parser): flags.AddKeyResourceFlags(parser) parser.display_info.AddFormat('table(name, state)')
def Args(parser): flags.AddKeyResourceFlags(parser, 'to use for signing.') flags.AddCryptoKeyVersionFlag(parser, 'to use for signing') flags.AddInputFileFlag(parser, 'to sign') flags.AddSignatureFileFlag(parser, 'to output') flags.AddSkipIntegrityVerification(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'Cloud KMS key to use for decryption.') flags.AddCiphertextFileFlag(parser, 'to decrypt') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser)