📂 File Browser

AgentAI/vendor/google/apiclient-services/src/Kmsinventory
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 GoogleCloudKmsInventoryV1ListCryptoKeysResponse.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsInventoryV1ProtectedResource.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsInventoryV1ProtectedResourcesSummary.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsInventoryV1SearchProtectedResourcesResponse.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsInventoryV1Warning.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1CryptoKey.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1CryptoKeyVersion.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1CryptoKeyVersionTemplate.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1ExternalProtectionLevelOptions.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1KeyAccessJustificationsPolicy.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1KeyOperationAttestation.php
▶ Open 📄 View Source
🐘 GoogleCloudKmsV1KeyOperationAttestationCertificateChains.php
▶ Open 📄 View Source

📄 Source: GoogleCloudKmsV1CryptoKeyVersion.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\Kmsinventory;

class GoogleCloudKmsV1CryptoKeyVersion extends \Google\Model
{
  /**
   * Not specified.
   */
  public const ALGORITHM_CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED = 'CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED';
  /**
   * Creates symmetric encryption keys.
   */
  public const ALGORITHM_GOOGLE_SYMMETRIC_ENCRYPTION = 'GOOGLE_SYMMETRIC_ENCRYPTION';
  /**
   * AES-GCM (Galois Counter Mode) using 128-bit keys.
   */
  public const ALGORITHM_AES_128_GCM = 'AES_128_GCM';
  /**
   * AES-GCM (Galois Counter Mode) using 256-bit keys.
   */
  public const ALGORITHM_AES_256_GCM = 'AES_256_GCM';
  /**
   * AES-CBC (Cipher Block Chaining Mode) using 128-bit keys.
   */
  public const ALGORITHM_AES_128_CBC = 'AES_128_CBC';
  /**
   * AES-CBC (Cipher Block Chaining Mode) using 256-bit keys.
   */
  public const ALGORITHM_AES_256_CBC = 'AES_256_CBC';
  /**
   * AES-CTR (Counter Mode) using 128-bit keys.
   */
  public const ALGORITHM_AES_128_CTR = 'AES_128_CTR';
  /**
   * AES-CTR (Counter Mode) using 256-bit keys.
   */
  public const ALGORITHM_AES_256_CTR = 'AES_256_CTR';
  /**
   * RSASSA-PSS 2048 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_2048_SHA256 = 'RSA_SIGN_PSS_2048_SHA256';
  /**
   * RSASSA-PSS 3072 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_3072_SHA256 = 'RSA_SIGN_PSS_3072_SHA256';
  /**
   * RSASSA-PSS 4096 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_4096_SHA256 = 'RSA_SIGN_PSS_4096_SHA256';
  /**
   * RSASSA-PSS 4096 bit key with a SHA512 digest.
   */
  public const ALGORITHM_RSA_SIGN_PSS_4096_SHA512 = 'RSA_SIGN_PSS_4096_SHA512';
  /**
   * RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_2048_SHA256 = 'RSA_SIGN_PKCS1_2048_SHA256';
  /**
   * RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_3072_SHA256 = 'RSA_SIGN_PKCS1_3072_SHA256';
  /**
   * RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_4096_SHA256 = 'RSA_SIGN_PKCS1_4096_SHA256';
  /**
   * RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
   */
  public const ALGORITHM_RSA_SIGN_PKCS1_4096_SHA512 = 'RSA_SIGN_PKCS1_4096_SHA512';
  /**
   * RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key.
   */
  public const ALGORITHM_RSA_SIGN_RAW_PKCS1_2048 = 'RSA_SIGN_RAW_PKCS1_2048';
  /**
   * RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key.
   */
  public const ALGORITHM_RSA_SIGN_RAW_PKCS1_3072 = 'RSA_SIGN_RAW_PKCS1_3072';
  /**
   * RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key.
   */
  public const ALGORITHM_RSA_SIGN_RAW_PKCS1_4096 = 'RSA_SIGN_RAW_PKCS1_4096';
  /**
   * RSAES-OAEP 2048 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_2048_SHA256 = 'RSA_DECRYPT_OAEP_2048_SHA256';
  /**
   * RSAES-OAEP 3072 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_3072_SHA256 = 'RSA_DECRYPT_OAEP_3072_SHA256';
  /**
   * RSAES-OAEP 4096 bit key with a SHA256 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_4096_SHA256 = 'RSA_DECRYPT_OAEP_4096_SHA256';
  /**
   * RSAES-OAEP 4096 bit key with a SHA512 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_4096_SHA512 = 'RSA_DECRYPT_OAEP_4096_SHA512';
  /**
   * RSAES-OAEP 2048 bit key with a SHA1 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_2048_SHA1 = 'RSA_DECRYPT_OAEP_2048_SHA1';
  /**
   * RSAES-OAEP 3072 bit key with a SHA1 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_3072_SHA1 = 'RSA_DECRYPT_OAEP_3072_SHA1';
  /**
   * RSAES-OAEP 4096 bit key with a SHA1 digest.
   */
  public const ALGORITHM_RSA_DECRYPT_OAEP_4096_SHA1 = 'RSA_DECRYPT_OAEP_4096_SHA1';
  /**
   * ECDSA on the NIST P-256 curve with a SHA256 digest. Other hash functions
   * can also be used: https://cloud.google.com/kms/docs/create-validate-
   * signatures#ecdsa_support_for_other_hash_algorithms
   */
  public const ALGORITHM_EC_SIGN_P256_SHA256 = 'EC_SIGN_P256_SHA256';
  /**
   * ECDSA on the NIST P-384 curve with a SHA384 digest. Other hash functions
   * can also be used: https://cloud.google.com/kms/docs/create-validate-
   * signatures#ecdsa_support_for_other_hash_algorithms
   */
  public const ALGORITHM_EC_SIGN_P384_SHA384 = 'EC_SIGN_P384_SHA384';
  /**
   * ECDSA on the non-NIST secp256k1 curve. This curve is only supported for HSM
   * protection level. Other hash functions can also be used:
   * https://cloud.google.com/kms/docs/create-validate-
   * signatures#ecdsa_support_for_other_hash_algorithms
   */
  public const ALGORITHM_EC_SIGN_SECP256K1_SHA256 = 'EC_SIGN_SECP256K1_SHA256';
  /**
   * EdDSA on the Curve25519 in pure mode (taking data as input).
   */
  public const ALGORITHM_EC_SIGN_ED25519 = 'EC_SIGN_ED25519';
  /**
   * HMAC-SHA256 signing with a 256 bit key.
   */
  public const ALGORITHM_HMAC_SHA256 = 'HMAC_SHA256';
  /**
   * HMAC-SHA1 signing with a 160 bit key.
   */
  public const ALGORITHM_HMAC_SHA1 = 'HMAC_SHA1';
  /**
   * HMAC-SHA384 signing with a 384 bit key.
   */
  public const ALGORITHM_HMAC_SHA384 = 'HMAC_SHA384';
  /**
   * HMAC-SHA512 signing with a 512 bit key.
   */
  public const ALGORITHM_HMAC_SHA512 = 'HMAC_SHA512';
  /**
   * HMAC-SHA224 signing with a 224 bit key.
   */
  public const ALGORITHM_HMAC_SHA224 = 'HMAC_SHA224';
  /**
   * Algorithm representing symmetric encryption by an external key manager.
   */
  public const ALGORITHM_EXTERNAL_SYMMETRIC_ENCRYPTION = 'EXTERNAL_SYMMETRIC_ENCRYPTION';
  /**
   * ML-KEM-768 (FIPS 203)
   */
  public const ALGORITHM_ML_KEM_768 = 'ML_KEM_768';
  /**
   * ML-KEM-1024 (FIPS 203)
   */
  public const ALGORITHM_ML_KEM_1024 = 'ML_KEM_1024';
  /**
   * X-Wing hybrid KEM combining ML-KEM-768 with X25519 following
   * datatracker.ietf.org/doc/draft-connolly-cfrg-xwing-kem/.
   */
  public const ALGORITHM_KEM_XWING = 'KEM_XWING';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 1. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_44 = 'PQ_SIGN_ML_DSA_44';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 3. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_65 = 'PQ_SIGN_ML_DSA_65';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 5. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_87 = 'PQ_SIGN_ML_DSA_87';
  /**
   * The post-quantum stateless hash-based digital signature algorithm, at
   * security level 1. Randomized version.
   */
  public const ALGORITHM_PQ_SIGN_SLH_DSA_SHA2_128S = 'PQ_SIGN_SLH_DSA_SHA2_128S';
  /**
   * The post-quantum stateless hash-based digital signature algorithm, at
   * security level 1. Randomized pre-hash version supporting SHA256 digests.
   */
  public const ALGORITHM_PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256 = 'PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 1. Randomized version supporting externally-computed message
   * representatives.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_44_EXTERNAL_MU = 'PQ_SIGN_ML_DSA_44_EXTERNAL_MU';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 3. Randomized version supporting externally-computed message
   * representatives.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_65_EXTERNAL_MU = 'PQ_SIGN_ML_DSA_65_EXTERNAL_MU';
  /**
   * The post-quantum Module-Lattice-Based Digital Signature Algorithm, at
   * security level 5. Randomized version supporting externally-computed message
   * representatives.
   */
  public const ALGORITHM_PQ_SIGN_ML_DSA_87_EXTERNAL_MU = 'PQ_SIGN_ML_DSA_87_EXTERNAL_MU';
  /**
   * Not specified.
   */
  public const PROTECTION_LEVEL_PROTECTION_LEVEL_UNSPECIFIED = 'PROTECTION_LEVEL_UNSPECIFIED';
  /**
   * Crypto operations are performed in software.
   */
  public const PROTECTION_LEVEL_SOFTWARE = 'SOFTWARE';
  /**
   * Crypto operations are performed in a Hardware Security Module.
   */
  public const PROTECTION_LEVEL_HSM = 'HSM';
  /**
   * Crypto operations are performed by an external key manager.
   */
  public const PROTECTION_LEVEL_EXTERNAL = 'EXTERNAL';
  /**
   * Crypto operations are performed in an EKM-over-VPC backend.
   */
  public const PROTECTION_LEVEL_EXTERNAL_VPC = 'EXTERNAL_VPC';
  /**
   * Crypto operations are performed in a single-tenant HSM.
   */
  public const PROTECTION_LEVEL_HSM_SINGLE_TENANT = 'HSM_SINGLE_TENANT';
  /**
   * Not specified.
   */
  public const STATE_CRYPTO_KEY_VERSION_STATE_UNSPECIFIED = 'CRYPTO_KEY_VERSION_STATE_UNSPECIFIED';
  /**
   * This version is still being generated. It may not be used, enabled,
   * disabled, or destroyed yet. Cloud KMS will automatically mark this version
   * ENABLED as soon as the version is ready.
   */
  public const STATE_PENDING_GENERATION = 'PENDING_GENERATION';
  /**
   * This version may be used for cryptographic operations.
   */
  public const STATE_ENABLED = 'ENABLED';
  /**
   * This version may not be used, but the key material is still available, and
   * the version can be placed back into the ENABLED state.
   */
  public const STATE_DISABLED = 'DISABLED';
  /**
   * The key material of this version is destroyed and no longer stored. This
   * version may only become ENABLED again if this version is reimport_eligible
   * and the original key material is reimported with a call to
   * KeyManagementService.ImportCryptoKeyVersion.
   */
  public const STATE_DESTROYED = 'DESTROYED';
  /**
   * This version is scheduled for destruction, and will be destroyed soon. Call
   * RestoreCryptoKeyVersion to put it back into the DISABLED state.
   */
  public const STATE_DESTROY_SCHEDULED = 'DESTROY_SCHEDULED';
  /**
   * This version is still being imported. It may not be used, enabled,
   * disabled, or destroyed yet. Cloud KMS will automatically mark this version
   * ENABLED as soon as the version is ready.
   */
  public const STATE_PENDING_IMPORT = 'PENDING_IMPORT';
  /**
   * This version was not imported successfully. It may not be used, enabled,
   * disabled, or destroyed. The submitted key material has been discarded.
   * Additional details can be found in CryptoKeyVersion.import_failure_reason.
   */
  public const STATE_IMPORT_FAILED = 'IMPORT_FAILED';
  /**
   * This version was not generated successfully. It may not be used, enabled,
   * disabled, or destroyed. Additional details can be found in
   * CryptoKeyVersion.generation_failure_reason.
   */
  public const STATE_GENERATION_FAILED = 'GENERATION_FAILED';
  /**
   * This version was destroyed, and it may not be used or enabled again. Cloud
   * KMS is waiting for the corresponding key material residing in an external
   * key manager to be destroyed.
   */
  public const STATE_PENDING_EXTERNAL_DESTRUCTION = 'PENDING_EXTERNAL_DESTRUCTION';
  /**
   * This version was destroyed, and it may not be used or enabled again.
   * However, Cloud KMS could not confirm that the corresponding key material
   * residing in an external key manager was destroyed. Additional details can
   * be found in CryptoKeyVersion.external_destruction_failure_reason.
   */
  public const STATE_EXTERNAL_DESTRUCTION_FAILED = 'EXTERNAL_DESTRUCTION_FAILED';
  /**
   * Output only. The CryptoKeyVersionAlgorithm that this CryptoKeyVersion
   * supports.
   *
   * @var string
   */
  public $algorithm;
  protected $attestationType = GoogleCloudKmsV1KeyOperationAttestation::class;
  protected $attestationDataType = '';
  /**
   * Output only. The time at which this CryptoKeyVersion was created.
   *
   * @var string
   */
  public $createTime;
  /**
   * Output only. The time this CryptoKeyVersion's key material was destroyed.
   * Only present if state is DESTROYED.
   *
   * @var string
   */
  public $destroyEventTime;
  /**
   * Output only. The time this CryptoKeyVersion's key material is scheduled for
   * destruction. Only present if state is DESTROY_SCHEDULED.
   *
   * @var string
   */
  public $destroyTime;
  /**
   * Output only. The root cause of the most recent external destruction
   * failure. Only present if state is EXTERNAL_DESTRUCTION_FAILED.
   *
   * @var string
   */
  public $externalDestructionFailureReason;
  protected $externalProtectionLevelOptionsType = GoogleCloudKmsV1ExternalProtectionLevelOptions::class;
  protected $externalProtectionLevelOptionsDataType = '';
  /**
   * Output only. The time this CryptoKeyVersion's key material was generated.
   *
   * @var string
   */
  public $generateTime;
  /**
   * Output only. The root cause of the most recent generation failure. Only
   * present if state is GENERATION_FAILED.
   *
   * @var string
   */
  public $generationFailureReason;
  /**
   * Output only. The root cause of the most recent import failure. Only present
   * if state is IMPORT_FAILED.
   *
   * @var string
   */
  public $importFailureReason;
  /**
   * Output only. The name of the ImportJob used in the most recent import of
   * this CryptoKeyVersion. Only present if the underlying key material was
   * imported.
   *
   * @var string
   */
  public $importJob;
  /**
   * Output only. The time at which this CryptoKeyVersion's key material was
   * most recently imported.
   *
   * @var string
   */
  public $importTime;
  /**
   * Output only. The resource name for this CryptoKeyVersion in the format
   * `projects/locations/keyRings/cryptoKeys/cryptoKeyVersions`.
   *
   * @var string
   */
  public $name;
  /**
   * Output only. The ProtectionLevel describing how crypto operations are
   * performed with this CryptoKeyVersion.
   *
   * @var string
   */
  public $protectionLevel;
  /**
   * Output only. Whether or not this key version is eligible for reimport, by
   * being specified as a target in
   * ImportCryptoKeyVersionRequest.crypto_key_version.
   *
   * @var bool
   */
  public $reimportEligible;
  /**
   * The current state of the CryptoKeyVersion.
   *
   * @var string
   */
  public $state;

  /**
   * Output only. The CryptoKeyVersionAlgorithm that this CryptoKeyVersion
   * supports.
   *
   * Accepted values: CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED,
   * GOOGLE_SYMMETRIC_ENCRYPTION, AES_128_GCM, AES_256_GCM, AES_128_CBC,
   * AES_256_CBC, AES_128_CTR, AES_256_CTR, RSA_SIGN_PSS_2048_SHA256,
   * RSA_SIGN_PSS_3072_SHA256, RSA_SIGN_PSS_4096_SHA256,
   * RSA_SIGN_PSS_4096_SHA512, RSA_SIGN_PKCS1_2048_SHA256,
   * RSA_SIGN_PKCS1_3072_SHA256, RSA_SIGN_PKCS1_4096_SHA256,
   * RSA_SIGN_PKCS1_4096_SHA512, RSA_SIGN_RAW_PKCS1_2048,
   * RSA_SIGN_RAW_PKCS1_3072, RSA_SIGN_RAW_PKCS1_4096,
   * RSA_DECRYPT_OAEP_2048_SHA256, RSA_DECRYPT_OAEP_3072_SHA256,
   * RSA_DECRYPT_OAEP_4096_SHA256, RSA_DECRYPT_OAEP_4096_SHA512,
   * RSA_DECRYPT_OAEP_2048_SHA1, RSA_DECRYPT_OAEP_3072_SHA1,
   * RSA_DECRYPT_OAEP_4096_SHA1, EC_SIGN_P256_SHA256, EC_SIGN_P384_SHA384,
   * EC_SIGN_SECP256K1_SHA256, EC_SIGN_ED25519, HMAC_SHA256, HMAC_SHA1,
   * HMAC_SHA384, HMAC_SHA512, HMAC_SHA224, EXTERNAL_SYMMETRIC_ENCRYPTION,
   * ML_KEM_768, ML_KEM_1024, KEM_XWING, PQ_SIGN_ML_DSA_44, PQ_SIGN_ML_DSA_65,
   * PQ_SIGN_ML_DSA_87, PQ_SIGN_SLH_DSA_SHA2_128S,
   * PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256, PQ_SIGN_ML_DSA_44_EXTERNAL_MU,
   * PQ_SIGN_ML_DSA_65_EXTERNAL_MU, PQ_SIGN_ML_DSA_87_EXTERNAL_MU
   *
   * @param self::ALGORITHM_* $algorithm
   */
  public function setAlgorithm($algorithm)
  {
    $this->algorithm = $algorithm;
  }
  /**
   * @return self::ALGORITHM_*
   */
  public function getAlgorithm()
  {
    return $this->algorithm;
  }
  /**
   * Output only. Statement that was generated and signed by the HSM at key
   * creation time. Use this statement to verify attributes of the key as stored
   * on the HSM, independently of Google. Only provided for key versions with
   * protection_level HSM.
   *
   * @param GoogleCloudKmsV1KeyOperationAttestation $attestation
   */
  public function setAttestation(GoogleCloudKmsV1KeyOperationAttestation $attestation)
  {
    $this->attestation = $attestation;
  }
  /**
   * @return GoogleCloudKmsV1KeyOperationAttestation
   */
  public function getAttestation()
  {
    return $this->attestation;
  }
  /**
   * Output only. The time at which this CryptoKeyVersion was created.
   *
   * @param string $createTime
   */
  public function setCreateTime($createTime)
  {
    $this->createTime = $createTime;
  }
  /**
   * @return string
   */
  public function getCreateTime()
  {
    return $this->createTime;
  }
  /**
   * Output only. The time this CryptoKeyVersion's key material was destroyed.
   * Only present if state is DESTROYED.
   *
   * @param string $destroyEventTime
   */
  public function setDestroyEventTime($destroyEventTime)
  {
    $this->destroyEventTime = $destroyEventTime;
  }
  /**
   * @return string
   */
  public function getDestroyEventTime()
  {
    return $this->destroyEventTime;
  }
  /**
   * Output only. The time this CryptoKeyVersion's key material is scheduled for
   * destruction. Only present if state is DESTROY_SCHEDULED.
   *
   * @param string $destroyTime
   */
  public function setDestroyTime($destroyTime)
  {
    $this->destroyTime = $destroyTime;
  }
  /**
   * @return string
   */
  public function getDestroyTime()
  {
    return $this->destroyTime;
  }
  /**
   * Output only. The root cause of the most recent external destruction
   * failure. Only present if state is EXTERNAL_DESTRUCTION_FAILED.
   *
   * @param string $externalDestructionFailureReason
   */
  public function setExternalDestructionFailureReason($externalDestructionFailureReason)
  {
    $this->externalDestructionFailureReason = $externalDestructionFailureReason;
  }
  /**
   * @return string
   */
  public function getExternalDestructionFailureReason()
  {
    return $this->externalDestructionFailureReason;
  }
  /**
   * ExternalProtectionLevelOptions stores a group of additional fields for
   * configuring a CryptoKeyVersion that are specific to the EXTERNAL protection
   * level and EXTERNAL_VPC protection levels.
   *
   * @param GoogleCloudKmsV1ExternalProtectionLevelOptions $externalProtectionLevelOptions
   */
  public function setExternalProtectionLevelOptions(GoogleCloudKmsV1ExternalProtectionLevelOptions $externalProtectionLevelOptions)
  {
    $this->externalProtectionLevelOptions = $externalProtectionLevelOptions;
  }
  /**
   * @return GoogleCloudKmsV1ExternalProtectionLevelOptions
   */
  public function getExternalProtectionLevelOptions()
  {
    return $this->externalProtectionLevelOptions;
  }
  /**
   * Output only. The time this CryptoKeyVersion's key material was generated.
   *
   * @param string $generateTime
   */
  public function setGenerateTime($generateTime)
  {
    $this->generateTime = $generateTime;
  }
  /**
   * @return string
   */
  public function getGenerateTime()
  {
    return $this->generateTime;
  }
  /**
   * Output only. The root cause of the most recent generation failure. Only
   * present if state is GENERATION_FAILED.
   *
   * @param string $generationFailureReason
   */
  public function setGenerationFailureReason($generationFailureReason)
  {
    $this->generationFailureReason = $generationFailureReason;
  }
  /**
   * @return string
   */
  public function getGenerationFailureReason()
  {
    return $this->generationFailureReason;
  }
  /**
   * Output only. The root cause of the most recent import failure. Only present
   * if state is IMPORT_FAILED.
   *
   * @param string $importFailureReason
   */
  public function setImportFailureReason($importFailureReason)
  {
    $this->importFailureReason = $importFailureReason;
  }
  /**
   * @return string
   */
  public function getImportFailureReason()
  {
    return $this->importFailureReason;
  }
  /**
   * Output only. The name of the ImportJob used in the most recent import of
   * this CryptoKeyVersion. Only present if the underlying key material was
   * imported.
   *
   * @param string $importJob
   */
  public function setImportJob($importJob)
  {
    $this->importJob = $importJob;
  }
  /**
   * @return string
   */
  public function getImportJob()
  {
    return $this->importJob;
  }
  /**
   * Output only. The time at which this CryptoKeyVersion's key material was
   * most recently imported.
   *
   * @param string $importTime
   */
  public function setImportTime($importTime)
  {
    $this->importTime = $importTime;
  }
  /**
   * @return string
   */
  public function getImportTime()
  {
    return $this->importTime;
  }
  /**
   * Output only. The resource name for this CryptoKeyVersion in the format
   * `projects/locations/keyRings/cryptoKeys/cryptoKeyVersions`.
   *
   * @param string $name
   */
  public function setName($name)
  {
    $this->name = $name;
  }
  /**
   * @return string
   */
  public function getName()
  {
    return $this->name;
  }
  /**
   * Output only. The ProtectionLevel describing how crypto operations are
   * performed with this CryptoKeyVersion.
   *
   * Accepted values: PROTECTION_LEVEL_UNSPECIFIED, SOFTWARE, HSM, EXTERNAL,
   * EXTERNAL_VPC, HSM_SINGLE_TENANT
   *
   * @param self::PROTECTION_LEVEL_* $protectionLevel
   */
  public function setProtectionLevel($protectionLevel)
  {
    $this->protectionLevel = $protectionLevel;
  }
  /**
   * @return self::PROTECTION_LEVEL_*
   */
  public function getProtectionLevel()
  {
    return $this->protectionLevel;
  }
  /**
   * Output only. Whether or not this key version is eligible for reimport, by
   * being specified as a target in
   * ImportCryptoKeyVersionRequest.crypto_key_version.
   *
   * @param bool $reimportEligible
   */
  public function setReimportEligible($reimportEligible)
  {
    $this->reimportEligible = $reimportEligible;
  }
  /**
   * @return bool
   */
  public function getReimportEligible()
  {
    return $this->reimportEligible;
  }
  /**
   * The current state of the CryptoKeyVersion.
   *
   * Accepted values: CRYPTO_KEY_VERSION_STATE_UNSPECIFIED, PENDING_GENERATION,
   * ENABLED, DISABLED, DESTROYED, DESTROY_SCHEDULED, PENDING_IMPORT,
   * IMPORT_FAILED, GENERATION_FAILED, PENDING_EXTERNAL_DESTRUCTION,
   * EXTERNAL_DESTRUCTION_FAILED
   *
   * @param self::STATE_* $state
   */
  public function setState($state)
  {
    $this->state = $state;
  }
  /**
   * @return self::STATE_*
   */
  public function getState()
  {
    return $this->state;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(GoogleCloudKmsV1CryptoKeyVersion::class, 'Google_Service_Kmsinventory_GoogleCloudKmsV1CryptoKeyVersion');
← Back