#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricSignRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(bytes = "vec", tag = "2")]
pub message: ::prost::alloc::vec::Vec<u8>,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricSignResponse {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(bytes = "vec", tag = "2")]
pub signature: ::prost::alloc::vec::Vec<u8>,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricSignHashRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(bytes = "vec", tag = "2")]
pub hash: ::prost::alloc::vec::Vec<u8>,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricSignHashResponse {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(bytes = "vec", tag = "2")]
pub signature: ::prost::alloc::vec::Vec<u8>,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricGetPublicKeyRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricGetPublicKeyResponse {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(string, tag = "2")]
pub public_key: ::prost::alloc::string::String,
}
pub mod asymmetric_signature_crypto_service_client {
#![allow(unused_variables, dead_code, missing_docs, clippy::let_unit_value)]
use tonic::codegen::*;
use tonic::codegen::http::Uri;
#[derive(Debug, Clone)]
pub struct AsymmetricSignatureCryptoServiceClient<T> {
inner: tonic::client::Grpc<T>,
}
impl AsymmetricSignatureCryptoServiceClient<tonic::transport::Channel> {
pub async fn connect<D>(dst: D) -> Result<Self, tonic::transport::Error>
where
D: TryInto<tonic::transport::Endpoint>,
D::Error: Into<StdError>,
{
let conn = tonic::transport::Endpoint::new(dst)?.connect().await?;
Ok(Self::new(conn))
}
}
impl<T> AsymmetricSignatureCryptoServiceClient<T>
where
T: tonic::client::GrpcService<tonic::body::BoxBody>,
T::Error: Into<StdError>,
T::ResponseBody: Body<Data = Bytes> + Send + 'static,
<T::ResponseBody as Body>::Error: Into<StdError> + Send,
{
pub fn new(inner: T) -> Self {
let inner = tonic::client::Grpc::new(inner);
Self { inner }
}
pub fn with_origin(inner: T, origin: Uri) -> Self {
let inner = tonic::client::Grpc::with_origin(inner, origin);
Self { inner }
}
pub fn with_interceptor<F>(
inner: T,
interceptor: F,
) -> AsymmetricSignatureCryptoServiceClient<InterceptedService<T, F>>
where
F: tonic::service::Interceptor,
T::ResponseBody: Default,
T: tonic::codegen::Service<
http::Request<tonic::body::BoxBody>,
Response = http::Response<
<T as tonic::client::GrpcService<tonic::body::BoxBody>>::ResponseBody,
>,
>,
<T as tonic::codegen::Service<
http::Request<tonic::body::BoxBody>,
>>::Error: Into<StdError> + Send + Sync,
{
AsymmetricSignatureCryptoServiceClient::new(
InterceptedService::new(inner, interceptor),
)
}
#[must_use]
pub fn send_compressed(mut self, encoding: CompressionEncoding) -> Self {
self.inner = self.inner.send_compressed(encoding);
self
}
#[must_use]
pub fn accept_compressed(mut self, encoding: CompressionEncoding) -> Self {
self.inner = self.inner.accept_compressed(encoding);
self
}
#[must_use]
pub fn max_decoding_message_size(mut self, limit: usize) -> Self {
self.inner = self.inner.max_decoding_message_size(limit);
self
}
#[must_use]
pub fn max_encoding_message_size(mut self, limit: usize) -> Self {
self.inner = self.inner.max_encoding_message_size(limit);
self
}
pub async fn sign(
&mut self,
request: impl tonic::IntoRequest<super::AsymmetricSignRequest>,
) -> std::result::Result<
tonic::Response<super::AsymmetricSignResponse>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureCryptoService/Sign",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureCryptoService",
"Sign",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn sign_hash(
&mut self,
request: impl tonic::IntoRequest<super::AsymmetricSignHashRequest>,
) -> std::result::Result<
tonic::Response<super::AsymmetricSignHashResponse>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureCryptoService/SignHash",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureCryptoService",
"SignHash",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn get_public_key(
&mut self,
request: impl tonic::IntoRequest<super::AsymmetricGetPublicKeyRequest>,
) -> std::result::Result<
tonic::Response<super::AsymmetricGetPublicKeyResponse>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureCryptoService/GetPublicKey",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureCryptoService",
"GetPublicKey",
),
);
self.inner.unary(req, path, codec).await
}
}
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct AsymmetricSignatureKey {
#[prost(string, tag = "1")]
pub id: ::prost::alloc::string::String,
#[prost(string, tag = "2")]
pub folder_id: ::prost::alloc::string::String,
#[prost(message, optional, tag = "3")]
pub created_at: ::core::option::Option<::prost_types::Timestamp>,
#[prost(string, tag = "4")]
pub name: ::prost::alloc::string::String,
#[prost(string, tag = "5")]
pub description: ::prost::alloc::string::String,
#[prost(map = "string, string", tag = "6")]
pub labels: ::std::collections::HashMap<
::prost::alloc::string::String,
::prost::alloc::string::String,
>,
#[prost(enumeration = "asymmetric_signature_key::Status", tag = "7")]
pub status: i32,
#[prost(enumeration = "AsymmetricSignatureAlgorithm", tag = "8")]
pub signature_algorithm: i32,
#[prost(bool, tag = "9")]
pub deletion_protection: bool,
}
pub mod asymmetric_signature_key {
#[derive(
Clone,
Copy,
Debug,
PartialEq,
Eq,
Hash,
PartialOrd,
Ord,
::prost::Enumeration
)]
#[repr(i32)]
pub enum Status {
Unspecified = 0,
Creating = 1,
Active = 2,
Inactive = 3,
}
impl Status {
pub fn as_str_name(&self) -> &'static str {
match self {
Status::Unspecified => "STATUS_UNSPECIFIED",
Status::Creating => "CREATING",
Status::Active => "ACTIVE",
Status::Inactive => "INACTIVE",
}
}
pub fn from_str_name(value: &str) -> ::core::option::Option<Self> {
match value {
"STATUS_UNSPECIFIED" => Some(Self::Unspecified),
"CREATING" => Some(Self::Creating),
"ACTIVE" => Some(Self::Active),
"INACTIVE" => Some(Self::Inactive),
_ => None,
}
}
}
}
#[derive(Clone, Copy, Debug, PartialEq, Eq, Hash, PartialOrd, Ord, ::prost::Enumeration)]
#[repr(i32)]
pub enum AsymmetricSignatureAlgorithm {
Unspecified = 0,
Rsa2048SignPssSha256 = 1,
Rsa2048SignPssSha384 = 2,
Rsa2048SignPssSha512 = 3,
Rsa3072SignPssSha256 = 4,
Rsa3072SignPssSha384 = 5,
Rsa3072SignPssSha512 = 6,
Rsa4096SignPssSha256 = 7,
Rsa4096SignPssSha384 = 8,
Rsa4096SignPssSha512 = 9,
EcdsaNistP256Sha256 = 10,
EcdsaNistP384Sha384 = 11,
EcdsaNistP521Sha512 = 12,
EcdsaSecp256K1Sha256 = 13,
}
impl AsymmetricSignatureAlgorithm {
pub fn as_str_name(&self) -> &'static str {
match self {
AsymmetricSignatureAlgorithm::Unspecified => {
"ASYMMETRIC_SIGNATURE_ALGORITHM_UNSPECIFIED"
}
AsymmetricSignatureAlgorithm::Rsa2048SignPssSha256 => {
"RSA_2048_SIGN_PSS_SHA_256"
}
AsymmetricSignatureAlgorithm::Rsa2048SignPssSha384 => {
"RSA_2048_SIGN_PSS_SHA_384"
}
AsymmetricSignatureAlgorithm::Rsa2048SignPssSha512 => {
"RSA_2048_SIGN_PSS_SHA_512"
}
AsymmetricSignatureAlgorithm::Rsa3072SignPssSha256 => {
"RSA_3072_SIGN_PSS_SHA_256"
}
AsymmetricSignatureAlgorithm::Rsa3072SignPssSha384 => {
"RSA_3072_SIGN_PSS_SHA_384"
}
AsymmetricSignatureAlgorithm::Rsa3072SignPssSha512 => {
"RSA_3072_SIGN_PSS_SHA_512"
}
AsymmetricSignatureAlgorithm::Rsa4096SignPssSha256 => {
"RSA_4096_SIGN_PSS_SHA_256"
}
AsymmetricSignatureAlgorithm::Rsa4096SignPssSha384 => {
"RSA_4096_SIGN_PSS_SHA_384"
}
AsymmetricSignatureAlgorithm::Rsa4096SignPssSha512 => {
"RSA_4096_SIGN_PSS_SHA_512"
}
AsymmetricSignatureAlgorithm::EcdsaNistP256Sha256 => {
"ECDSA_NIST_P256_SHA_256"
}
AsymmetricSignatureAlgorithm::EcdsaNistP384Sha384 => {
"ECDSA_NIST_P384_SHA_384"
}
AsymmetricSignatureAlgorithm::EcdsaNistP521Sha512 => {
"ECDSA_NIST_P521_SHA_512"
}
AsymmetricSignatureAlgorithm::EcdsaSecp256K1Sha256 => {
"ECDSA_SECP256_K1_SHA_256"
}
}
}
pub fn from_str_name(value: &str) -> ::core::option::Option<Self> {
match value {
"ASYMMETRIC_SIGNATURE_ALGORITHM_UNSPECIFIED" => Some(Self::Unspecified),
"RSA_2048_SIGN_PSS_SHA_256" => Some(Self::Rsa2048SignPssSha256),
"RSA_2048_SIGN_PSS_SHA_384" => Some(Self::Rsa2048SignPssSha384),
"RSA_2048_SIGN_PSS_SHA_512" => Some(Self::Rsa2048SignPssSha512),
"RSA_3072_SIGN_PSS_SHA_256" => Some(Self::Rsa3072SignPssSha256),
"RSA_3072_SIGN_PSS_SHA_384" => Some(Self::Rsa3072SignPssSha384),
"RSA_3072_SIGN_PSS_SHA_512" => Some(Self::Rsa3072SignPssSha512),
"RSA_4096_SIGN_PSS_SHA_256" => Some(Self::Rsa4096SignPssSha256),
"RSA_4096_SIGN_PSS_SHA_384" => Some(Self::Rsa4096SignPssSha384),
"RSA_4096_SIGN_PSS_SHA_512" => Some(Self::Rsa4096SignPssSha512),
"ECDSA_NIST_P256_SHA_256" => Some(Self::EcdsaNistP256Sha256),
"ECDSA_NIST_P384_SHA_384" => Some(Self::EcdsaNistP384Sha384),
"ECDSA_NIST_P521_SHA_512" => Some(Self::EcdsaNistP521Sha512),
"ECDSA_SECP256_K1_SHA_256" => Some(Self::EcdsaSecp256K1Sha256),
_ => None,
}
}
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct CreateAsymmetricSignatureKeyRequest {
#[prost(string, tag = "1")]
pub folder_id: ::prost::alloc::string::String,
#[prost(string, tag = "2")]
pub name: ::prost::alloc::string::String,
#[prost(string, tag = "3")]
pub description: ::prost::alloc::string::String,
#[prost(map = "string, string", tag = "4")]
pub labels: ::std::collections::HashMap<
::prost::alloc::string::String,
::prost::alloc::string::String,
>,
#[prost(enumeration = "AsymmetricSignatureAlgorithm", tag = "5")]
pub signature_algorithm: i32,
#[prost(bool, tag = "6")]
pub deletion_protection: bool,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct CreateAsymmetricSignatureKeyMetadata {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct GetAsymmetricSignatureKeyRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct ListAsymmetricSignatureKeysRequest {
#[prost(string, tag = "1")]
pub folder_id: ::prost::alloc::string::String,
#[prost(int64, tag = "2")]
pub page_size: i64,
#[prost(string, tag = "3")]
pub page_token: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct ListAsymmetricSignatureKeysResponse {
#[prost(message, repeated, tag = "1")]
pub keys: ::prost::alloc::vec::Vec<AsymmetricSignatureKey>,
#[prost(string, tag = "2")]
pub next_page_token: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct UpdateAsymmetricSignatureKeyRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(message, optional, tag = "2")]
pub update_mask: ::core::option::Option<::prost_types::FieldMask>,
#[prost(string, tag = "3")]
pub name: ::prost::alloc::string::String,
#[prost(string, tag = "4")]
pub description: ::prost::alloc::string::String,
#[prost(enumeration = "asymmetric_signature_key::Status", tag = "5")]
pub status: i32,
#[prost(map = "string, string", tag = "6")]
pub labels: ::std::collections::HashMap<
::prost::alloc::string::String,
::prost::alloc::string::String,
>,
#[prost(bool, tag = "7")]
pub deletion_protection: bool,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct UpdateAsymmetricSignatureKeyMetadata {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct DeleteAsymmetricSignatureKeyRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct DeleteAsymmetricSignatureKeyMetadata {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct ListAsymmetricSignatureKeyOperationsRequest {
#[prost(string, tag = "1")]
pub key_id: ::prost::alloc::string::String,
#[prost(int64, tag = "2")]
pub page_size: i64,
#[prost(string, tag = "3")]
pub page_token: ::prost::alloc::string::String,
}
#[allow(clippy::derive_partial_eq_without_eq)]
#[derive(Clone, PartialEq, ::prost::Message)]
pub struct ListAsymmetricSignatureKeyOperationsResponse {
#[prost(message, repeated, tag = "1")]
pub operations: ::prost::alloc::vec::Vec<super::super::super::operation::Operation>,
#[prost(string, tag = "2")]
pub next_page_token: ::prost::alloc::string::String,
}
pub mod asymmetric_signature_key_service_client {
#![allow(unused_variables, dead_code, missing_docs, clippy::let_unit_value)]
use tonic::codegen::*;
use tonic::codegen::http::Uri;
#[derive(Debug, Clone)]
pub struct AsymmetricSignatureKeyServiceClient<T> {
inner: tonic::client::Grpc<T>,
}
impl AsymmetricSignatureKeyServiceClient<tonic::transport::Channel> {
pub async fn connect<D>(dst: D) -> Result<Self, tonic::transport::Error>
where
D: TryInto<tonic::transport::Endpoint>,
D::Error: Into<StdError>,
{
let conn = tonic::transport::Endpoint::new(dst)?.connect().await?;
Ok(Self::new(conn))
}
}
impl<T> AsymmetricSignatureKeyServiceClient<T>
where
T: tonic::client::GrpcService<tonic::body::BoxBody>,
T::Error: Into<StdError>,
T::ResponseBody: Body<Data = Bytes> + Send + 'static,
<T::ResponseBody as Body>::Error: Into<StdError> + Send,
{
pub fn new(inner: T) -> Self {
let inner = tonic::client::Grpc::new(inner);
Self { inner }
}
pub fn with_origin(inner: T, origin: Uri) -> Self {
let inner = tonic::client::Grpc::with_origin(inner, origin);
Self { inner }
}
pub fn with_interceptor<F>(
inner: T,
interceptor: F,
) -> AsymmetricSignatureKeyServiceClient<InterceptedService<T, F>>
where
F: tonic::service::Interceptor,
T::ResponseBody: Default,
T: tonic::codegen::Service<
http::Request<tonic::body::BoxBody>,
Response = http::Response<
<T as tonic::client::GrpcService<tonic::body::BoxBody>>::ResponseBody,
>,
>,
<T as tonic::codegen::Service<
http::Request<tonic::body::BoxBody>,
>>::Error: Into<StdError> + Send + Sync,
{
AsymmetricSignatureKeyServiceClient::new(
InterceptedService::new(inner, interceptor),
)
}
#[must_use]
pub fn send_compressed(mut self, encoding: CompressionEncoding) -> Self {
self.inner = self.inner.send_compressed(encoding);
self
}
#[must_use]
pub fn accept_compressed(mut self, encoding: CompressionEncoding) -> Self {
self.inner = self.inner.accept_compressed(encoding);
self
}
#[must_use]
pub fn max_decoding_message_size(mut self, limit: usize) -> Self {
self.inner = self.inner.max_decoding_message_size(limit);
self
}
#[must_use]
pub fn max_encoding_message_size(mut self, limit: usize) -> Self {
self.inner = self.inner.max_encoding_message_size(limit);
self
}
pub async fn create(
&mut self,
request: impl tonic::IntoRequest<super::CreateAsymmetricSignatureKeyRequest>,
) -> std::result::Result<
tonic::Response<super::super::super::super::operation::Operation>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/Create",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"Create",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn get(
&mut self,
request: impl tonic::IntoRequest<super::GetAsymmetricSignatureKeyRequest>,
) -> std::result::Result<
tonic::Response<super::AsymmetricSignatureKey>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/Get",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"Get",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn list(
&mut self,
request: impl tonic::IntoRequest<super::ListAsymmetricSignatureKeysRequest>,
) -> std::result::Result<
tonic::Response<super::ListAsymmetricSignatureKeysResponse>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/List",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"List",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn update(
&mut self,
request: impl tonic::IntoRequest<super::UpdateAsymmetricSignatureKeyRequest>,
) -> std::result::Result<
tonic::Response<super::super::super::super::operation::Operation>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/Update",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"Update",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn delete(
&mut self,
request: impl tonic::IntoRequest<super::DeleteAsymmetricSignatureKeyRequest>,
) -> std::result::Result<
tonic::Response<super::super::super::super::operation::Operation>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/Delete",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"Delete",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn list_operations(
&mut self,
request: impl tonic::IntoRequest<
super::ListAsymmetricSignatureKeyOperationsRequest,
>,
) -> std::result::Result<
tonic::Response<super::ListAsymmetricSignatureKeyOperationsResponse>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/ListOperations",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"ListOperations",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn list_access_bindings(
&mut self,
request: impl tonic::IntoRequest<
super::super::super::super::access::ListAccessBindingsRequest,
>,
) -> std::result::Result<
tonic::Response<
super::super::super::super::access::ListAccessBindingsResponse,
>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/ListAccessBindings",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"ListAccessBindings",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn set_access_bindings(
&mut self,
request: impl tonic::IntoRequest<
super::super::super::super::access::SetAccessBindingsRequest,
>,
) -> std::result::Result<
tonic::Response<super::super::super::super::operation::Operation>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/SetAccessBindings",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"SetAccessBindings",
),
);
self.inner.unary(req, path, codec).await
}
pub async fn update_access_bindings(
&mut self,
request: impl tonic::IntoRequest<
super::super::super::super::access::UpdateAccessBindingsRequest,
>,
) -> std::result::Result<
tonic::Response<super::super::super::super::operation::Operation>,
tonic::Status,
> {
self.inner
.ready()
.await
.map_err(|e| {
tonic::Status::new(
tonic::Code::Unknown,
format!("Service was not ready: {}", e.into()),
)
})?;
let codec = tonic::codec::ProstCodec::default();
let path = http::uri::PathAndQuery::from_static(
"/yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService/UpdateAccessBindings",
);
let mut req = request.into_request();
req.extensions_mut()
.insert(
GrpcMethod::new(
"yandex.cloud.kms.v1.asymmetricsignature.AsymmetricSignatureKeyService",
"UpdateAccessBindings",
),
);
self.inner.unary(req, path, codec).await
}
}
}