google-cloud-secret_manager-v1 0.20.0 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/secret_manager/v1/bindings_override.rb +102 -0
- data/lib/google/cloud/secret_manager/v1/rest.rb +1 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/client.rb +139 -68
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/paths.rb +83 -16
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/rest/client.rb +149 -70
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/rest/service_stub.rb +113 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/rest.rb +1 -0
- data/lib/google/cloud/secret_manager/v1/version.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/resources_pb.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/service_pb.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/service_services_pb.rb +25 -15
- data/proto_docs/google/api/client.rb +4 -0
- data/proto_docs/google/cloud/secretmanager/v1/resources.rb +38 -4
- data/proto_docs/google/cloud/secretmanager/v1/service.rb +117 -63
- metadata +23 -2
@@ -649,6 +649,13 @@ module Google
|
|
649
649
|
["parent", %r{^projects/[^/]+/?$}, false]
|
650
650
|
]
|
651
651
|
)
|
652
|
+
.with_bindings(
|
653
|
+
uri_method: :get,
|
654
|
+
uri_template: "/v1/{parent}/secrets",
|
655
|
+
matches: [
|
656
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/?$}, false]
|
657
|
+
]
|
658
|
+
)
|
652
659
|
transcoder.transcode request_pb
|
653
660
|
end
|
654
661
|
|
@@ -671,6 +678,14 @@ module Google
|
|
671
678
|
["parent", %r{^projects/[^/]+/?$}, false]
|
672
679
|
]
|
673
680
|
)
|
681
|
+
.with_bindings(
|
682
|
+
uri_method: :post,
|
683
|
+
uri_template: "/v1/{parent}/secrets",
|
684
|
+
body: "secret",
|
685
|
+
matches: [
|
686
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/?$}, false]
|
687
|
+
]
|
688
|
+
)
|
674
689
|
transcoder.transcode request_pb
|
675
690
|
end
|
676
691
|
|
@@ -693,6 +708,14 @@ module Google
|
|
693
708
|
["parent", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
694
709
|
]
|
695
710
|
)
|
711
|
+
.with_bindings(
|
712
|
+
uri_method: :post,
|
713
|
+
uri_template: "/v1/{parent}:addVersion",
|
714
|
+
body: "*",
|
715
|
+
matches: [
|
716
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
717
|
+
]
|
718
|
+
)
|
696
719
|
transcoder.transcode request_pb
|
697
720
|
end
|
698
721
|
|
@@ -714,6 +737,13 @@ module Google
|
|
714
737
|
["name", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
715
738
|
]
|
716
739
|
)
|
740
|
+
.with_bindings(
|
741
|
+
uri_method: :get,
|
742
|
+
uri_template: "/v1/{name}",
|
743
|
+
matches: [
|
744
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
745
|
+
]
|
746
|
+
)
|
717
747
|
transcoder.transcode request_pb
|
718
748
|
end
|
719
749
|
|
@@ -736,6 +766,14 @@ module Google
|
|
736
766
|
["secret.name", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
737
767
|
]
|
738
768
|
)
|
769
|
+
.with_bindings(
|
770
|
+
uri_method: :patch,
|
771
|
+
uri_template: "/v1/{secret.name}",
|
772
|
+
body: "secret",
|
773
|
+
matches: [
|
774
|
+
["secret.name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
775
|
+
]
|
776
|
+
)
|
739
777
|
transcoder.transcode request_pb
|
740
778
|
end
|
741
779
|
|
@@ -757,6 +795,13 @@ module Google
|
|
757
795
|
["name", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
758
796
|
]
|
759
797
|
)
|
798
|
+
.with_bindings(
|
799
|
+
uri_method: :delete,
|
800
|
+
uri_template: "/v1/{name}",
|
801
|
+
matches: [
|
802
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
803
|
+
]
|
804
|
+
)
|
760
805
|
transcoder.transcode request_pb
|
761
806
|
end
|
762
807
|
|
@@ -778,6 +823,13 @@ module Google
|
|
778
823
|
["parent", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
779
824
|
]
|
780
825
|
)
|
826
|
+
.with_bindings(
|
827
|
+
uri_method: :get,
|
828
|
+
uri_template: "/v1/{parent}/versions",
|
829
|
+
matches: [
|
830
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
831
|
+
]
|
832
|
+
)
|
781
833
|
transcoder.transcode request_pb
|
782
834
|
end
|
783
835
|
|
@@ -799,6 +851,13 @@ module Google
|
|
799
851
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
800
852
|
]
|
801
853
|
)
|
854
|
+
.with_bindings(
|
855
|
+
uri_method: :get,
|
856
|
+
uri_template: "/v1/{name}",
|
857
|
+
matches: [
|
858
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
859
|
+
]
|
860
|
+
)
|
802
861
|
transcoder.transcode request_pb
|
803
862
|
end
|
804
863
|
|
@@ -820,6 +879,13 @@ module Google
|
|
820
879
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
821
880
|
]
|
822
881
|
)
|
882
|
+
.with_bindings(
|
883
|
+
uri_method: :get,
|
884
|
+
uri_template: "/v1/{name}:access",
|
885
|
+
matches: [
|
886
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
887
|
+
]
|
888
|
+
)
|
823
889
|
transcoder.transcode request_pb
|
824
890
|
end
|
825
891
|
|
@@ -842,6 +908,14 @@ module Google
|
|
842
908
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
843
909
|
]
|
844
910
|
)
|
911
|
+
.with_bindings(
|
912
|
+
uri_method: :post,
|
913
|
+
uri_template: "/v1/{name}:disable",
|
914
|
+
body: "*",
|
915
|
+
matches: [
|
916
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
917
|
+
]
|
918
|
+
)
|
845
919
|
transcoder.transcode request_pb
|
846
920
|
end
|
847
921
|
|
@@ -864,6 +938,14 @@ module Google
|
|
864
938
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
865
939
|
]
|
866
940
|
)
|
941
|
+
.with_bindings(
|
942
|
+
uri_method: :post,
|
943
|
+
uri_template: "/v1/{name}:enable",
|
944
|
+
body: "*",
|
945
|
+
matches: [
|
946
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
947
|
+
]
|
948
|
+
)
|
867
949
|
transcoder.transcode request_pb
|
868
950
|
end
|
869
951
|
|
@@ -886,6 +968,14 @@ module Google
|
|
886
968
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
887
969
|
]
|
888
970
|
)
|
971
|
+
.with_bindings(
|
972
|
+
uri_method: :post,
|
973
|
+
uri_template: "/v1/{name}:destroy",
|
974
|
+
body: "*",
|
975
|
+
matches: [
|
976
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
977
|
+
]
|
978
|
+
)
|
889
979
|
transcoder.transcode request_pb
|
890
980
|
end
|
891
981
|
|
@@ -908,6 +998,14 @@ module Google
|
|
908
998
|
["resource", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
909
999
|
]
|
910
1000
|
)
|
1001
|
+
.with_bindings(
|
1002
|
+
uri_method: :post,
|
1003
|
+
uri_template: "/v1/{resource}:setIamPolicy",
|
1004
|
+
body: "*",
|
1005
|
+
matches: [
|
1006
|
+
["resource", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
1007
|
+
]
|
1008
|
+
)
|
911
1009
|
transcoder.transcode request_pb
|
912
1010
|
end
|
913
1011
|
|
@@ -929,6 +1027,13 @@ module Google
|
|
929
1027
|
["resource", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
930
1028
|
]
|
931
1029
|
)
|
1030
|
+
.with_bindings(
|
1031
|
+
uri_method: :get,
|
1032
|
+
uri_template: "/v1/{resource}:getIamPolicy",
|
1033
|
+
matches: [
|
1034
|
+
["resource", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
1035
|
+
]
|
1036
|
+
)
|
932
1037
|
transcoder.transcode request_pb
|
933
1038
|
end
|
934
1039
|
|
@@ -951,6 +1056,14 @@ module Google
|
|
951
1056
|
["resource", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
952
1057
|
]
|
953
1058
|
)
|
1059
|
+
.with_bindings(
|
1060
|
+
uri_method: :post,
|
1061
|
+
uri_template: "/v1/{resource}:testIamPermissions",
|
1062
|
+
body: "*",
|
1063
|
+
matches: [
|
1064
|
+
["resource", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
1065
|
+
]
|
1066
|
+
)
|
954
1067
|
transcoder.transcode request_pb
|
955
1068
|
end
|
956
1069
|
end
|
@@ -21,6 +21,7 @@ require "gapic/config"
|
|
21
21
|
require "gapic/config/method"
|
22
22
|
|
23
23
|
require "google/cloud/secret_manager/v1/version"
|
24
|
+
require "google/cloud/secret_manager/v1/bindings_override"
|
24
25
|
|
25
26
|
require "google/cloud/secret_manager/v1/secret_manager_service/credentials"
|
26
27
|
require "google/cloud/secret_manager/v1/secret_manager_service/paths"
|
@@ -10,7 +10,7 @@ require 'google/protobuf/duration_pb'
|
|
10
10
|
require 'google/protobuf/timestamp_pb'
|
11
11
|
|
12
12
|
|
13
|
-
descriptor_data = "\n-google/cloud/secretmanager/v1/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\
|
13
|
+
descriptor_data = "\n-google/cloud/secretmanager/v1/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xe2\x08\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12G\n\x0breplication\x18\x02 \x01(\x0b\x32*.google.cloud.secretmanager.v1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x01\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x06labels\x18\x04 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1.Secret.LabelsEntry\x12\x39\n\x06topics\x18\x05 \x03(\x0b\x32$.google.cloud.secretmanager.v1.TopicB\x03\xe0\x41\x01\x12\x36\n\x0b\x65xpire_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01H\x00\x12-\n\x03ttl\x18\x07 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04H\x00\x12\x11\n\x04\x65tag\x18\x08 \x01(\tB\x03\xe0\x41\x01\x12>\n\x08rotation\x18\t \x01(\x0b\x32\'.google.cloud.secretmanager.v1.RotationB\x03\xe0\x41\x01\x12W\n\x0fversion_aliases\x18\x0b \x03(\x0b\x32\x39.google.cloud.secretmanager.v1.Secret.VersionAliasesEntryB\x03\xe0\x41\x01\x12P\n\x0b\x61nnotations\x18\r \x03(\x0b\x32\x36.google.cloud.secretmanager.v1.Secret.AnnotationsEntryB\x03\xe0\x41\x01\x12;\n\x13version_destroy_ttl\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x01\x12\x62\n\x1b\x63ustomer_managed_encryption\x18\x0f \x01(\x0b\x32\x38.google.cloud.secretmanager.v1.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x35\n\x13VersionAliasesEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x03:\x02\x38\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:\x99\x01\xea\x41\x95\x01\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\x12\x38projects/{project}/locations/{location}/secrets/{secret}*\x07secrets2\x06secretB\x0c\n\nexpiration\"\xc2\x06\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x05state\x18\x04 \x01(\x0e\x32\x32.google.cloud.secretmanager.v1.SecretVersion.StateB\x03\xe0\x41\x03\x12L\n\x12replication_status\x18\x05 \x01(\x0b\x32\x30.google.cloud.secretmanager.v1.ReplicationStatus\x12\x11\n\x04\x65tag\x18\x06 \x01(\tB\x03\xe0\x41\x03\x12.\n!client_specified_payload_checksum\x18\x07 \x01(\x08\x42\x03\xe0\x41\x03\x12?\n\x16scheduled_destroy_time\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12h\n\x1b\x63ustomer_managed_encryption\x18\t \x01(\x0b\x32>.google.cloud.secretmanager.v1.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:\xe2\x01\xea\x41\xde\x01\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\x12Rprojects/{project}/locations/{location}/secrets/{secret}/versions/{secret_version}*\x0esecretVersions2\rsecretVersion\"\x90\x04\n\x0bReplication\x12I\n\tautomatic\x18\x01 \x01(\x0b\x32\x34.google.cloud.secretmanager.v1.Replication.AutomaticH\x00\x12N\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x36.google.cloud.secretmanager.v1.Replication.UserManagedH\x00\x1ao\n\tAutomatic\x12\x62\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32\x38.google.cloud.secretmanager.v1.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a\xe5\x01\n\x0bUserManaged\x12U\n\x08replicas\x18\x01 \x03(\x0b\x32>.google.cloud.secretmanager.v1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x7f\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\t\x12\x62\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32\x38.google.cloud.secretmanager.v1.CustomerManagedEncryptionB\x03\xe0\x41\x01\x42\r\n\x0breplication\"6\n\x19\x43ustomerManagedEncryption\x12\x19\n\x0ckms_key_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\xeb\x04\n\x11ReplicationStatus\x12U\n\tautomatic\x18\x01 \x01(\x0b\x32@.google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatusH\x00\x12Z\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x42.google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatusH\x00\x1a{\n\x0f\x41utomaticStatus\x12h\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32>.google.cloud.secretmanager.v1.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x1a\x8f\x02\n\x11UserManagedStatus\x12g\n\x08replicas\x18\x01 \x03(\x0b\x32P.google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatusB\x03\xe0\x41\x03\x1a\x90\x01\n\rReplicaStatus\x12\x15\n\x08location\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12h\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32>.google.cloud.secretmanager.v1.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x42\x14\n\x12replication_status\"D\n\x1f\x43ustomerManagedEncryptionStatus\x12!\n\x14kms_key_version_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"_\n\x05Topic\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x02:C\xea\x41@\n\x1bpubsub.googleapis.com/Topic\x12!projects/{project}/topics/{topic}\"\x80\x01\n\x08Rotation\x12;\n\x12next_rotation_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01\x12\x37\n\x0frotation_period\x18\x02 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04\"L\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x12\x1d\n\x0b\x64\x61ta_crc32c\x18\x02 \x01(\x03\x42\x03\xe0\x41\x01H\x00\x88\x01\x01\x42\x0e\n\x0c_data_crc32cB\xea\x01\n!com.google.cloud.secretmanager.v1B\x0eResourcesProtoP\x01ZGcloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3"
|
14
14
|
|
15
15
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
16
16
|
|
@@ -15,7 +15,7 @@ require 'google/protobuf/empty_pb'
|
|
15
15
|
require 'google/protobuf/field_mask_pb'
|
16
16
|
|
17
17
|
|
18
|
-
descriptor_data = "\n+google/cloud/secretmanager/v1/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a-google/cloud/secretmanager/v1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\
|
18
|
+
descriptor_data = "\n+google/cloud/secretmanager/v1/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a-google/cloud/secretmanager/v1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x97\x01\n\x12ListSecretsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"z\n\x13ListSecretsResponse\x12\x36\n\x07secrets\x18\x01 \x03(\x0b\x32%.google.cloud.secretmanager.v1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xa6\x01\n\x13\x43reateSecretRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12:\n\x06secret\x18\x03 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\"\x9a\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x9e\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"\x89\x01\n\x1aListSecretVersionsResponse\x12>\n\x08versions\x18\x01 \x03(\x0b\x32,.google.cloud.secretmanager.v1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x87\x01\n\x13UpdateSecretRequest\x12:\n\x06secret\x18\x01 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x9b\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12=\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayload\"c\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"q\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\x32\xe8\x1c\n\x14SecretManagerService\x12\xd5\x01\n\x0bListSecrets\x12\x31.google.cloud.secretmanager.v1.ListSecretsRequest\x1a\x32.google.cloud.secretmanager.v1.ListSecretsResponse\"_\xda\x41\x06parent\x82\xd3\xe4\x93\x02P\x12\x1f/v1/{parent=projects/*}/secretsZ-\x12+/v1/{parent=projects/*/locations/*}/secrets\x12\xec\x01\n\x0c\x43reateSecret\x12\x32.google.cloud.secretmanager.v1.CreateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret\"\x80\x01\xda\x41\x17parent,secret_id,secret\x82\xd3\xe4\x93\x02`\"\x1f/v1/{parent=projects/*}/secrets:\x06secretZ5\"+/v1/{parent=projects/*/locations/*}/secrets:\x06secret\x12\x82\x02\n\x10\x41\x64\x64SecretVersion\x12\x36.google.cloud.secretmanager.v1.AddSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x87\x01\xda\x41\x0eparent,payload\x82\xd3\xe4\x93\x02p\",/v1/{parent=projects/*/secrets/*}:addVersion:\x01*Z=\"8/v1/{parent=projects/*/locations/*/secrets/*}:addVersion:\x01*\x12\xc2\x01\n\tGetSecret\x12/.google.cloud.secretmanager.v1.GetSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret\"]\xda\x41\x04name\x82\xd3\xe4\x93\x02P\x12\x1f/v1/{name=projects/*/secrets/*}Z-\x12+/v1/{name=projects/*/locations/*/secrets/*}\x12\xf5\x01\n\x0cUpdateSecret\x12\x32.google.cloud.secretmanager.v1.UpdateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret\"\x89\x01\xda\x41\x12secret,update_mask\x82\xd3\xe4\x93\x02n2&/v1/{secret.name=projects/*/secrets/*}:\x06secretZ<22/v1/{secret.name=projects/*/locations/*/secrets/*}:\x06secret\x12\xb9\x01\n\x0c\x44\x65leteSecret\x12\x32.google.cloud.secretmanager.v1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"]\xda\x41\x04name\x82\xd3\xe4\x93\x02P*\x1f/v1/{name=projects/*/secrets/*}Z-*+/v1/{name=projects/*/locations/*/secrets/*}\x12\x80\x02\n\x12ListSecretVersions\x12\x38.google.cloud.secretmanager.v1.ListSecretVersionsRequest\x1a\x39.google.cloud.secretmanager.v1.ListSecretVersionsResponse\"u\xda\x41\x06parent\x82\xd3\xe4\x93\x02\x66\x12*/v1/{parent=projects/*/secrets/*}/versionsZ8\x12\x36/v1/{parent=projects/*/locations/*/secrets/*}/versions\x12\xed\x01\n\x10GetSecretVersion\x12\x36.google.cloud.secretmanager.v1.GetSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"s\xda\x41\x04name\x82\xd3\xe4\x93\x02\x66\x12*/v1/{name=projects/*/secrets/*/versions/*}Z8\x12\x36/v1/{name=projects/*/locations/*/secrets/*/versions/*}\x12\x90\x02\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x39.google.cloud.secretmanager.v1.AccessSecretVersionRequest\x1a:.google.cloud.secretmanager.v1.AccessSecretVersionResponse\"\x81\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02t\x12\x31/v1/{name=projects/*/secrets/*/versions/*}:accessZ?\x12=/v1/{name=projects/*/locations/*/secrets/*/versions/*}:access\x12\x8c\x02\n\x14\x44isableSecretVersion\x12:.google.cloud.secretmanager.v1.DisableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x89\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02|\"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\x01*ZC\">/v1/{name=projects/*/locations/*/secrets/*/versions/*}:disable:\x01*\x12\x88\x02\n\x13\x45nableSecretVersion\x12\x39.google.cloud.secretmanager.v1.EnableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x87\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02z\"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\x01*ZB\"=/v1/{name=projects/*/locations/*/secrets/*/versions/*}:enable:\x01*\x12\x8c\x02\n\x14\x44\x65stroySecretVersion\x12:.google.cloud.secretmanager.v1.DestroySecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x89\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02|\"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*ZC\">/v1/{name=projects/*/locations/*/secrets/*/versions/*}:destroy:\x01*\x12\xc9\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"~\x82\xd3\xe4\x93\x02x\"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*ZA\"</v1/{resource=projects/*/locations/*/secrets/*}:setIamPolicy:\x01*\x12\xc3\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"x\x82\xd3\xe4\x93\x02r\x12\x30/v1/{resource=projects/*/secrets/*}:getIamPolicyZ>\x12</v1/{resource=projects/*/locations/*/secrets/*}:getIamPolicy\x12\xf7\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x8b\x01\x82\xd3\xe4\x93\x02\x84\x01\"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*ZG\"B/v1/{resource=projects/*/locations/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xe8\x01\n!com.google.cloud.secretmanager.v1B\x0cServiceProtoP\x01ZGcloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3"
|
19
19
|
|
20
20
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
21
21
|
|
@@ -41,51 +41,61 @@ module Google
|
|
41
41
|
|
42
42
|
# Lists [Secrets][google.cloud.secretmanager.v1.Secret].
|
43
43
|
rpc :ListSecrets, ::Google::Cloud::SecretManager::V1::ListSecretsRequest, ::Google::Cloud::SecretManager::V1::ListSecretsResponse
|
44
|
-
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no
|
44
|
+
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no
|
45
|
+
# [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
|
45
46
|
rpc :CreateSecret, ::Google::Cloud::SecretManager::V1::CreateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
46
|
-
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
|
47
|
-
# it to an existing
|
47
|
+
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
|
48
|
+
# containing secret data and attaches it to an existing
|
49
|
+
# [Secret][google.cloud.secretmanager.v1.Secret].
|
48
50
|
rpc :AddSecretVersion, ::Google::Cloud::SecretManager::V1::AddSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
49
51
|
# Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
|
50
52
|
rpc :GetSecret, ::Google::Cloud::SecretManager::V1::GetSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
51
|
-
# Updates metadata of an existing
|
53
|
+
# Updates metadata of an existing
|
54
|
+
# [Secret][google.cloud.secretmanager.v1.Secret].
|
52
55
|
rpc :UpdateSecret, ::Google::Cloud::SecretManager::V1::UpdateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
53
56
|
# Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
|
54
57
|
rpc :DeleteSecret, ::Google::Cloud::SecretManager::V1::DeleteSecretRequest, ::Google::Protobuf::Empty
|
55
|
-
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This
|
56
|
-
# data.
|
58
|
+
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This
|
59
|
+
# call does not return secret data.
|
57
60
|
rpc :ListSecretVersions, ::Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, ::Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
|
58
|
-
# Gets metadata for a
|
61
|
+
# Gets metadata for a
|
62
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
59
63
|
#
|
60
64
|
# `projects/*/secrets/*/versions/latest` is an alias to the most recently
|
61
65
|
# created [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
62
66
|
rpc :GetSecretVersion, ::Google::Cloud::SecretManager::V1::GetSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
63
|
-
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
67
|
+
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
68
|
+
# This call returns the secret data.
|
64
69
|
#
|
65
70
|
# `projects/*/secrets/*/versions/latest` is an alias to the most recently
|
66
71
|
# created [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
67
72
|
rpc :AccessSecretVersion, ::Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, ::Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
|
68
73
|
# Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
69
74
|
#
|
70
|
-
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
75
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
76
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
71
77
|
# [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
|
72
78
|
rpc :DisableSecretVersion, ::Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
73
79
|
# Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
74
80
|
#
|
75
|
-
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
81
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
82
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
76
83
|
# [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
|
77
84
|
rpc :EnableSecretVersion, ::Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
78
85
|
# Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
79
86
|
#
|
80
|
-
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
81
|
-
# [
|
82
|
-
#
|
87
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
88
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
89
|
+
# [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED]
|
90
|
+
# and irrevocably destroys the secret data.
|
83
91
|
rpc :DestroySecretVersion, ::Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
84
92
|
# Sets the access control policy on the specified secret. Replaces any
|
85
93
|
# existing policy.
|
86
94
|
#
|
87
|
-
# Permissions on
|
88
|
-
#
|
95
|
+
# Permissions on
|
96
|
+
# [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced
|
97
|
+
# according to the policy set on the associated
|
98
|
+
# [Secret][google.cloud.secretmanager.v1.Secret].
|
89
99
|
rpc :SetIamPolicy, ::Google::Iam::V1::SetIamPolicyRequest, ::Google::Iam::V1::Policy
|
90
100
|
# Gets the access control policy for a secret.
|
91
101
|
# Returns empty policy if the secret exists and does not have a policy set.
|
@@ -118,6 +118,10 @@ module Google
|
|
118
118
|
# @return [::String]
|
119
119
|
# Optional link to proto reference documentation. Example:
|
120
120
|
# https://cloud.google.com/pubsub/lite/docs/reference/rpc
|
121
|
+
# @!attribute [rw] rest_reference_documentation_uri
|
122
|
+
# @return [::String]
|
123
|
+
# Optional link to REST reference documentation. Example:
|
124
|
+
# https://cloud.google.com/pubsub/lite/docs/reference/rest
|
121
125
|
class Publishing
|
122
126
|
include ::Google::Protobuf::MessageExts
|
123
127
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -34,7 +34,7 @@ module Google
|
|
34
34
|
# `projects/*/secrets/*`.
|
35
35
|
# @!attribute [rw] replication
|
36
36
|
# @return [::Google::Cloud::SecretManager::V1::Replication]
|
37
|
-
#
|
37
|
+
# Optional. Immutable. The replication policy of the secret data attached to
|
38
38
|
# the {::Google::Cloud::SecretManager::V1::Secret Secret}.
|
39
39
|
#
|
40
40
|
# The replication policy cannot be changed after the Secret has been created.
|
@@ -88,7 +88,7 @@ module Google
|
|
88
88
|
# No more than 50 aliases can be assigned to a given secret.
|
89
89
|
#
|
90
90
|
# Version-Alias pairs will be viewable via GetSecret and modifiable via
|
91
|
-
# UpdateSecret.
|
91
|
+
# UpdateSecret. Access by alias is only be supported on
|
92
92
|
# GetSecretVersion and AccessSecretVersion.
|
93
93
|
# @!attribute [rw] annotations
|
94
94
|
# @return [::Google::Protobuf::Map{::String => ::String}]
|
@@ -104,6 +104,25 @@ module Google
|
|
104
104
|
# alphanumerics in between these symbols.
|
105
105
|
#
|
106
106
|
# The total size of annotation keys and values must be less than 16KiB.
|
107
|
+
# @!attribute [rw] version_destroy_ttl
|
108
|
+
# @return [::Google::Protobuf::Duration]
|
109
|
+
# Optional. Secret Version TTL after destruction request
|
110
|
+
#
|
111
|
+
# This is a part of the Delayed secret version destroy feature.
|
112
|
+
# For secret with TTL>0, version destruction doesn't happen immediately
|
113
|
+
# on calling destroy instead the version goes to a disabled state and
|
114
|
+
# destruction happens after the TTL expires.
|
115
|
+
# @!attribute [rw] customer_managed_encryption
|
116
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
|
117
|
+
# Optional. The customer-managed encryption configuration of the Regionalised
|
118
|
+
# Secrets. If no configuration is provided, Google-managed default encryption
|
119
|
+
# is used.
|
120
|
+
#
|
121
|
+
# Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption
|
122
|
+
# configuration only apply to
|
123
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added
|
124
|
+
# afterwards. They do not apply retroactively to existing
|
125
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
|
107
126
|
class Secret
|
108
127
|
include ::Google::Protobuf::MessageExts
|
109
128
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -177,6 +196,20 @@ module Google
|
|
177
196
|
# {::Google::Cloud::SecretManager::V1::SecretManagerService::Client SecretManagerService}
|
178
197
|
# on
|
179
198
|
# {::Google::Cloud::SecretManager::V1::SecretManagerService::Client#add_secret_version SecretManagerService.AddSecretVersion}.
|
199
|
+
# @!attribute [r] scheduled_destroy_time
|
200
|
+
# @return [::Google::Protobuf::Timestamp]
|
201
|
+
# Optional. Output only. Scheduled destroy time for secret version.
|
202
|
+
# This is a part of the Delayed secret version destroy feature. For a
|
203
|
+
# Secret with a valid version destroy TTL, when a secert version is
|
204
|
+
# destroyed, the version is moved to disabled state and it is scheduled for
|
205
|
+
# destruction. The version is destroyed only after the
|
206
|
+
# `scheduled_destroy_time`.
|
207
|
+
# @!attribute [r] customer_managed_encryption
|
208
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
|
209
|
+
# Output only. The customer-managed encryption status of the
|
210
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
|
211
|
+
# populated if customer-managed encryption is used and
|
212
|
+
# {::Google::Cloud::SecretManager::V1::Secret Secret} is a Regionalised Secret.
|
180
213
|
class SecretVersion
|
181
214
|
include ::Google::Protobuf::MessageExts
|
182
215
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -386,8 +419,9 @@ module Google
|
|
386
419
|
# @return [::String]
|
387
420
|
# Required. The resource name of the Pub/Sub topic that will be published to,
|
388
421
|
# in the following format: `projects/*/topics/*`. For publication to succeed,
|
389
|
-
# the Secret Manager
|
390
|
-
# topic.
|
422
|
+
# the Secret Manager service agent must have the `pubsub.topic.publish`
|
423
|
+
# permission on the topic. The Pub/Sub Publisher role
|
424
|
+
# (`roles/pubsub.publisher`) includes this permission.
|
391
425
|
class Topic
|
392
426
|
include ::Google::Protobuf::MessageExts
|
393
427
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|