def Args(parser): flags.AddLocationFlag(parser) flags.AddKeyRingFlag(parser) flags.AddCryptoKeyFlag(parser, 'The key to use for decryption.') flags.AddCiphertextFileFlag(parser, 'to decrypt') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'to use for asymmetric-decryption.') flags.AddCryptoKeyVersionFlag(parser, 'to use for asymmetric-decryption') flags.AddCiphertextFileFlag(parser, 'to decrypt') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddSkipIntegrityVerification(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'The key to use for encryption.') flags.AddCryptoKeyVersionFlag(parser, 'to use for encryption') flags.AddPlaintextFileFlag(parser, 'to encrypt') flags.AddCiphertextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser) flags.AddSkipIntegrityVerification(parser)
def Args(parser): flags.AddKeyResourceFlags( parser, 'Cloud KMS key to use for decryption.\n' '* For symmetric keys, Cloud KMS detects the decryption key version ' 'from the ciphertext. If you specify a key version as part of a ' 'symmetric decryption request, an error is logged and decryption ' 'fails.\n' '* For asymmetric keys, the encryption key version can\'t be detected ' 'automatically. You must keep track of this information and provide ' 'the key version in the decryption request. The key version itself ' 'is not sensitive data and does not need to be encrypted.') flags.AddCiphertextFileFlag( parser, 'to decrypt. This file should contain the result of encrypting ' 'a file with `gcloud kms encrypt`') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser)
def Args(parser): flags.AddKeyResourceFlags(parser, 'Cloud KMS key to use for decryption.') flags.AddCiphertextFileFlag(parser, 'to decrypt') flags.AddPlaintextFileFlag(parser, 'to output') flags.AddAadFileFlag(parser)