google-cloud-secret_manager-v1 0.20.0 → 1.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/secret_manager/v1/bindings_override.rb +102 -0
- data/lib/google/cloud/secret_manager/v1/rest.rb +1 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/client.rb +139 -68
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/paths.rb +83 -16
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/rest/client.rb +149 -70
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/rest/service_stub.rb +113 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/rest.rb +1 -0
- data/lib/google/cloud/secret_manager/v1/version.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/resources_pb.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/service_pb.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/service_services_pb.rb +25 -15
- data/proto_docs/google/api/client.rb +4 -0
- data/proto_docs/google/cloud/secretmanager/v1/resources.rb +38 -4
- data/proto_docs/google/cloud/secretmanager/v1/service.rb +117 -63
- metadata +23 -2
@@ -649,6 +649,13 @@ module Google
|
|
649
649
|
["parent", %r{^projects/[^/]+/?$}, false]
|
650
650
|
]
|
651
651
|
)
|
652
|
+
.with_bindings(
|
653
|
+
uri_method: :get,
|
654
|
+
uri_template: "/v1/{parent}/secrets",
|
655
|
+
matches: [
|
656
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/?$}, false]
|
657
|
+
]
|
658
|
+
)
|
652
659
|
transcoder.transcode request_pb
|
653
660
|
end
|
654
661
|
|
@@ -671,6 +678,14 @@ module Google
|
|
671
678
|
["parent", %r{^projects/[^/]+/?$}, false]
|
672
679
|
]
|
673
680
|
)
|
681
|
+
.with_bindings(
|
682
|
+
uri_method: :post,
|
683
|
+
uri_template: "/v1/{parent}/secrets",
|
684
|
+
body: "secret",
|
685
|
+
matches: [
|
686
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/?$}, false]
|
687
|
+
]
|
688
|
+
)
|
674
689
|
transcoder.transcode request_pb
|
675
690
|
end
|
676
691
|
|
@@ -693,6 +708,14 @@ module Google
|
|
693
708
|
["parent", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
694
709
|
]
|
695
710
|
)
|
711
|
+
.with_bindings(
|
712
|
+
uri_method: :post,
|
713
|
+
uri_template: "/v1/{parent}:addVersion",
|
714
|
+
body: "*",
|
715
|
+
matches: [
|
716
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
717
|
+
]
|
718
|
+
)
|
696
719
|
transcoder.transcode request_pb
|
697
720
|
end
|
698
721
|
|
@@ -714,6 +737,13 @@ module Google
|
|
714
737
|
["name", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
715
738
|
]
|
716
739
|
)
|
740
|
+
.with_bindings(
|
741
|
+
uri_method: :get,
|
742
|
+
uri_template: "/v1/{name}",
|
743
|
+
matches: [
|
744
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
745
|
+
]
|
746
|
+
)
|
717
747
|
transcoder.transcode request_pb
|
718
748
|
end
|
719
749
|
|
@@ -736,6 +766,14 @@ module Google
|
|
736
766
|
["secret.name", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
737
767
|
]
|
738
768
|
)
|
769
|
+
.with_bindings(
|
770
|
+
uri_method: :patch,
|
771
|
+
uri_template: "/v1/{secret.name}",
|
772
|
+
body: "secret",
|
773
|
+
matches: [
|
774
|
+
["secret.name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
775
|
+
]
|
776
|
+
)
|
739
777
|
transcoder.transcode request_pb
|
740
778
|
end
|
741
779
|
|
@@ -757,6 +795,13 @@ module Google
|
|
757
795
|
["name", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
758
796
|
]
|
759
797
|
)
|
798
|
+
.with_bindings(
|
799
|
+
uri_method: :delete,
|
800
|
+
uri_template: "/v1/{name}",
|
801
|
+
matches: [
|
802
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
803
|
+
]
|
804
|
+
)
|
760
805
|
transcoder.transcode request_pb
|
761
806
|
end
|
762
807
|
|
@@ -778,6 +823,13 @@ module Google
|
|
778
823
|
["parent", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
779
824
|
]
|
780
825
|
)
|
826
|
+
.with_bindings(
|
827
|
+
uri_method: :get,
|
828
|
+
uri_template: "/v1/{parent}/versions",
|
829
|
+
matches: [
|
830
|
+
["parent", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
831
|
+
]
|
832
|
+
)
|
781
833
|
transcoder.transcode request_pb
|
782
834
|
end
|
783
835
|
|
@@ -799,6 +851,13 @@ module Google
|
|
799
851
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
800
852
|
]
|
801
853
|
)
|
854
|
+
.with_bindings(
|
855
|
+
uri_method: :get,
|
856
|
+
uri_template: "/v1/{name}",
|
857
|
+
matches: [
|
858
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
859
|
+
]
|
860
|
+
)
|
802
861
|
transcoder.transcode request_pb
|
803
862
|
end
|
804
863
|
|
@@ -820,6 +879,13 @@ module Google
|
|
820
879
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
821
880
|
]
|
822
881
|
)
|
882
|
+
.with_bindings(
|
883
|
+
uri_method: :get,
|
884
|
+
uri_template: "/v1/{name}:access",
|
885
|
+
matches: [
|
886
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
887
|
+
]
|
888
|
+
)
|
823
889
|
transcoder.transcode request_pb
|
824
890
|
end
|
825
891
|
|
@@ -842,6 +908,14 @@ module Google
|
|
842
908
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
843
909
|
]
|
844
910
|
)
|
911
|
+
.with_bindings(
|
912
|
+
uri_method: :post,
|
913
|
+
uri_template: "/v1/{name}:disable",
|
914
|
+
body: "*",
|
915
|
+
matches: [
|
916
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
917
|
+
]
|
918
|
+
)
|
845
919
|
transcoder.transcode request_pb
|
846
920
|
end
|
847
921
|
|
@@ -864,6 +938,14 @@ module Google
|
|
864
938
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
865
939
|
]
|
866
940
|
)
|
941
|
+
.with_bindings(
|
942
|
+
uri_method: :post,
|
943
|
+
uri_template: "/v1/{name}:enable",
|
944
|
+
body: "*",
|
945
|
+
matches: [
|
946
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
947
|
+
]
|
948
|
+
)
|
867
949
|
transcoder.transcode request_pb
|
868
950
|
end
|
869
951
|
|
@@ -886,6 +968,14 @@ module Google
|
|
886
968
|
["name", %r{^projects/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
887
969
|
]
|
888
970
|
)
|
971
|
+
.with_bindings(
|
972
|
+
uri_method: :post,
|
973
|
+
uri_template: "/v1/{name}:destroy",
|
974
|
+
body: "*",
|
975
|
+
matches: [
|
976
|
+
["name", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/versions/[^/]+/?$}, false]
|
977
|
+
]
|
978
|
+
)
|
889
979
|
transcoder.transcode request_pb
|
890
980
|
end
|
891
981
|
|
@@ -908,6 +998,14 @@ module Google
|
|
908
998
|
["resource", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
909
999
|
]
|
910
1000
|
)
|
1001
|
+
.with_bindings(
|
1002
|
+
uri_method: :post,
|
1003
|
+
uri_template: "/v1/{resource}:setIamPolicy",
|
1004
|
+
body: "*",
|
1005
|
+
matches: [
|
1006
|
+
["resource", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
1007
|
+
]
|
1008
|
+
)
|
911
1009
|
transcoder.transcode request_pb
|
912
1010
|
end
|
913
1011
|
|
@@ -929,6 +1027,13 @@ module Google
|
|
929
1027
|
["resource", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
930
1028
|
]
|
931
1029
|
)
|
1030
|
+
.with_bindings(
|
1031
|
+
uri_method: :get,
|
1032
|
+
uri_template: "/v1/{resource}:getIamPolicy",
|
1033
|
+
matches: [
|
1034
|
+
["resource", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
1035
|
+
]
|
1036
|
+
)
|
932
1037
|
transcoder.transcode request_pb
|
933
1038
|
end
|
934
1039
|
|
@@ -951,6 +1056,14 @@ module Google
|
|
951
1056
|
["resource", %r{^projects/[^/]+/secrets/[^/]+/?$}, false]
|
952
1057
|
]
|
953
1058
|
)
|
1059
|
+
.with_bindings(
|
1060
|
+
uri_method: :post,
|
1061
|
+
uri_template: "/v1/{resource}:testIamPermissions",
|
1062
|
+
body: "*",
|
1063
|
+
matches: [
|
1064
|
+
["resource", %r{^projects/[^/]+/locations/[^/]+/secrets/[^/]+/?$}, false]
|
1065
|
+
]
|
1066
|
+
)
|
954
1067
|
transcoder.transcode request_pb
|
955
1068
|
end
|
956
1069
|
end
|
@@ -21,6 +21,7 @@ require "gapic/config"
|
|
21
21
|
require "gapic/config/method"
|
22
22
|
|
23
23
|
require "google/cloud/secret_manager/v1/version"
|
24
|
+
require "google/cloud/secret_manager/v1/bindings_override"
|
24
25
|
|
25
26
|
require "google/cloud/secret_manager/v1/secret_manager_service/credentials"
|
26
27
|
require "google/cloud/secret_manager/v1/secret_manager_service/paths"
|
@@ -10,7 +10,7 @@ require 'google/protobuf/duration_pb'
|
|
10
10
|
require 'google/protobuf/timestamp_pb'
|
11
11
|
|
12
12
|
|
13
|
-
descriptor_data = "\n-google/cloud/secretmanager/v1/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\
|
13
|
+
descriptor_data = "\n-google/cloud/secretmanager/v1/resources.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xe2\x08\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12G\n\x0breplication\x18\x02 \x01(\x0b\x32*.google.cloud.secretmanager.v1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x01\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x41\n\x06labels\x18\x04 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1.Secret.LabelsEntry\x12\x39\n\x06topics\x18\x05 \x03(\x0b\x32$.google.cloud.secretmanager.v1.TopicB\x03\xe0\x41\x01\x12\x36\n\x0b\x65xpire_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01H\x00\x12-\n\x03ttl\x18\x07 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04H\x00\x12\x11\n\x04\x65tag\x18\x08 \x01(\tB\x03\xe0\x41\x01\x12>\n\x08rotation\x18\t \x01(\x0b\x32\'.google.cloud.secretmanager.v1.RotationB\x03\xe0\x41\x01\x12W\n\x0fversion_aliases\x18\x0b \x03(\x0b\x32\x39.google.cloud.secretmanager.v1.Secret.VersionAliasesEntryB\x03\xe0\x41\x01\x12P\n\x0b\x61nnotations\x18\r \x03(\x0b\x32\x36.google.cloud.secretmanager.v1.Secret.AnnotationsEntryB\x03\xe0\x41\x01\x12;\n\x13version_destroy_ttl\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x01\x12\x62\n\x1b\x63ustomer_managed_encryption\x18\x0f \x01(\x0b\x32\x38.google.cloud.secretmanager.v1.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x35\n\x13VersionAliasesEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x03:\x02\x38\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:\x99\x01\xea\x41\x95\x01\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\x12\x38projects/{project}/locations/{location}/secrets/{secret}*\x07secrets2\x06secretB\x0c\n\nexpiration\"\xc2\x06\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x05state\x18\x04 \x01(\x0e\x32\x32.google.cloud.secretmanager.v1.SecretVersion.StateB\x03\xe0\x41\x03\x12L\n\x12replication_status\x18\x05 \x01(\x0b\x32\x30.google.cloud.secretmanager.v1.ReplicationStatus\x12\x11\n\x04\x65tag\x18\x06 \x01(\tB\x03\xe0\x41\x03\x12.\n!client_specified_payload_checksum\x18\x07 \x01(\x08\x42\x03\xe0\x41\x03\x12?\n\x16scheduled_destroy_time\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12h\n\x1b\x63ustomer_managed_encryption\x18\t \x01(\x0b\x32>.google.cloud.secretmanager.v1.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:\xe2\x01\xea\x41\xde\x01\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\x12Rprojects/{project}/locations/{location}/secrets/{secret}/versions/{secret_version}*\x0esecretVersions2\rsecretVersion\"\x90\x04\n\x0bReplication\x12I\n\tautomatic\x18\x01 \x01(\x0b\x32\x34.google.cloud.secretmanager.v1.Replication.AutomaticH\x00\x12N\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x36.google.cloud.secretmanager.v1.Replication.UserManagedH\x00\x1ao\n\tAutomatic\x12\x62\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32\x38.google.cloud.secretmanager.v1.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a\xe5\x01\n\x0bUserManaged\x12U\n\x08replicas\x18\x01 \x03(\x0b\x32>.google.cloud.secretmanager.v1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x7f\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\t\x12\x62\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32\x38.google.cloud.secretmanager.v1.CustomerManagedEncryptionB\x03\xe0\x41\x01\x42\r\n\x0breplication\"6\n\x19\x43ustomerManagedEncryption\x12\x19\n\x0ckms_key_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\xeb\x04\n\x11ReplicationStatus\x12U\n\tautomatic\x18\x01 \x01(\x0b\x32@.google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatusH\x00\x12Z\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x42.google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatusH\x00\x1a{\n\x0f\x41utomaticStatus\x12h\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32>.google.cloud.secretmanager.v1.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x1a\x8f\x02\n\x11UserManagedStatus\x12g\n\x08replicas\x18\x01 \x03(\x0b\x32P.google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatusB\x03\xe0\x41\x03\x1a\x90\x01\n\rReplicaStatus\x12\x15\n\x08location\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12h\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32>.google.cloud.secretmanager.v1.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x42\x14\n\x12replication_status\"D\n\x1f\x43ustomerManagedEncryptionStatus\x12!\n\x14kms_key_version_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"_\n\x05Topic\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x02:C\xea\x41@\n\x1bpubsub.googleapis.com/Topic\x12!projects/{project}/topics/{topic}\"\x80\x01\n\x08Rotation\x12;\n\x12next_rotation_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01\x12\x37\n\x0frotation_period\x18\x02 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04\"L\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x12\x1d\n\x0b\x64\x61ta_crc32c\x18\x02 \x01(\x03\x42\x03\xe0\x41\x01H\x00\x88\x01\x01\x42\x0e\n\x0c_data_crc32cB\xea\x01\n!com.google.cloud.secretmanager.v1B\x0eResourcesProtoP\x01ZGcloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3"
|
14
14
|
|
15
15
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
16
16
|
|
@@ -15,7 +15,7 @@ require 'google/protobuf/empty_pb'
|
|
15
15
|
require 'google/protobuf/field_mask_pb'
|
16
16
|
|
17
17
|
|
18
|
-
descriptor_data = "\n+google/cloud/secretmanager/v1/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a-google/cloud/secretmanager/v1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\
|
18
|
+
descriptor_data = "\n+google/cloud/secretmanager/v1/service.proto\x12\x1dgoogle.cloud.secretmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a-google/cloud/secretmanager/v1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x97\x01\n\x12ListSecretsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"z\n\x13ListSecretsResponse\x12\x36\n\x07secrets\x18\x01 \x03(\x0b\x32%.google.cloud.secretmanager.v1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xa6\x01\n\x13\x43reateSecretRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12:\n\x06secret\x18\x03 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\"\x9a\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x9e\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"\x89\x01\n\x1aListSecretVersionsResponse\x12>\n\x08versions\x18\x01 \x03(\x0b\x32,.google.cloud.secretmanager.v1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x87\x01\n\x13UpdateSecretRequest\x12:\n\x06secret\x18\x01 \x01(\x0b\x32%.google.cloud.secretmanager.v1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x9b\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12=\n\x07payload\x18\x02 \x01(\x0b\x32,.google.cloud.secretmanager.v1.SecretPayload\"c\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"q\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\x32\xe8\x1c\n\x14SecretManagerService\x12\xd5\x01\n\x0bListSecrets\x12\x31.google.cloud.secretmanager.v1.ListSecretsRequest\x1a\x32.google.cloud.secretmanager.v1.ListSecretsResponse\"_\xda\x41\x06parent\x82\xd3\xe4\x93\x02P\x12\x1f/v1/{parent=projects/*}/secretsZ-\x12+/v1/{parent=projects/*/locations/*}/secrets\x12\xec\x01\n\x0c\x43reateSecret\x12\x32.google.cloud.secretmanager.v1.CreateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret\"\x80\x01\xda\x41\x17parent,secret_id,secret\x82\xd3\xe4\x93\x02`\"\x1f/v1/{parent=projects/*}/secrets:\x06secretZ5\"+/v1/{parent=projects/*/locations/*}/secrets:\x06secret\x12\x82\x02\n\x10\x41\x64\x64SecretVersion\x12\x36.google.cloud.secretmanager.v1.AddSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x87\x01\xda\x41\x0eparent,payload\x82\xd3\xe4\x93\x02p\",/v1/{parent=projects/*/secrets/*}:addVersion:\x01*Z=\"8/v1/{parent=projects/*/locations/*/secrets/*}:addVersion:\x01*\x12\xc2\x01\n\tGetSecret\x12/.google.cloud.secretmanager.v1.GetSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret\"]\xda\x41\x04name\x82\xd3\xe4\x93\x02P\x12\x1f/v1/{name=projects/*/secrets/*}Z-\x12+/v1/{name=projects/*/locations/*/secrets/*}\x12\xf5\x01\n\x0cUpdateSecret\x12\x32.google.cloud.secretmanager.v1.UpdateSecretRequest\x1a%.google.cloud.secretmanager.v1.Secret\"\x89\x01\xda\x41\x12secret,update_mask\x82\xd3\xe4\x93\x02n2&/v1/{secret.name=projects/*/secrets/*}:\x06secretZ<22/v1/{secret.name=projects/*/locations/*/secrets/*}:\x06secret\x12\xb9\x01\n\x0c\x44\x65leteSecret\x12\x32.google.cloud.secretmanager.v1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"]\xda\x41\x04name\x82\xd3\xe4\x93\x02P*\x1f/v1/{name=projects/*/secrets/*}Z-*+/v1/{name=projects/*/locations/*/secrets/*}\x12\x80\x02\n\x12ListSecretVersions\x12\x38.google.cloud.secretmanager.v1.ListSecretVersionsRequest\x1a\x39.google.cloud.secretmanager.v1.ListSecretVersionsResponse\"u\xda\x41\x06parent\x82\xd3\xe4\x93\x02\x66\x12*/v1/{parent=projects/*/secrets/*}/versionsZ8\x12\x36/v1/{parent=projects/*/locations/*/secrets/*}/versions\x12\xed\x01\n\x10GetSecretVersion\x12\x36.google.cloud.secretmanager.v1.GetSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"s\xda\x41\x04name\x82\xd3\xe4\x93\x02\x66\x12*/v1/{name=projects/*/secrets/*/versions/*}Z8\x12\x36/v1/{name=projects/*/locations/*/secrets/*/versions/*}\x12\x90\x02\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x39.google.cloud.secretmanager.v1.AccessSecretVersionRequest\x1a:.google.cloud.secretmanager.v1.AccessSecretVersionResponse\"\x81\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02t\x12\x31/v1/{name=projects/*/secrets/*/versions/*}:accessZ?\x12=/v1/{name=projects/*/locations/*/secrets/*/versions/*}:access\x12\x8c\x02\n\x14\x44isableSecretVersion\x12:.google.cloud.secretmanager.v1.DisableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x89\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02|\"2/v1/{name=projects/*/secrets/*/versions/*}:disable:\x01*ZC\">/v1/{name=projects/*/locations/*/secrets/*/versions/*}:disable:\x01*\x12\x88\x02\n\x13\x45nableSecretVersion\x12\x39.google.cloud.secretmanager.v1.EnableSecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x87\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02z\"1/v1/{name=projects/*/secrets/*/versions/*}:enable:\x01*ZB\"=/v1/{name=projects/*/locations/*/secrets/*/versions/*}:enable:\x01*\x12\x8c\x02\n\x14\x44\x65stroySecretVersion\x12:.google.cloud.secretmanager.v1.DestroySecretVersionRequest\x1a,.google.cloud.secretmanager.v1.SecretVersion\"\x89\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02|\"2/v1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*ZC\">/v1/{name=projects/*/locations/*/secrets/*/versions/*}:destroy:\x01*\x12\xc9\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"~\x82\xd3\xe4\x93\x02x\"0/v1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*ZA\"</v1/{resource=projects/*/locations/*/secrets/*}:setIamPolicy:\x01*\x12\xc3\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"x\x82\xd3\xe4\x93\x02r\x12\x30/v1/{resource=projects/*/secrets/*}:getIamPolicyZ>\x12</v1/{resource=projects/*/locations/*/secrets/*}:getIamPolicy\x12\xf7\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x8b\x01\x82\xd3\xe4\x93\x02\x84\x01\"6/v1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*ZG\"B/v1/{resource=projects/*/locations/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xe8\x01\n!com.google.cloud.secretmanager.v1B\x0cServiceProtoP\x01ZGcloud.google.com/go/secretmanager/apiv1/secretmanagerpb;secretmanagerpb\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\x1dGoogle.Cloud.SecretManager.V1\xca\x02\x1dGoogle\\Cloud\\SecretManager\\V1\xea\x02 Google::Cloud::SecretManager::V1b\x06proto3"
|
19
19
|
|
20
20
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
21
21
|
|
@@ -41,51 +41,61 @@ module Google
|
|
41
41
|
|
42
42
|
# Lists [Secrets][google.cloud.secretmanager.v1.Secret].
|
43
43
|
rpc :ListSecrets, ::Google::Cloud::SecretManager::V1::ListSecretsRequest, ::Google::Cloud::SecretManager::V1::ListSecretsResponse
|
44
|
-
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no
|
44
|
+
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no
|
45
|
+
# [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
|
45
46
|
rpc :CreateSecret, ::Google::Cloud::SecretManager::V1::CreateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
46
|
-
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
|
47
|
-
# it to an existing
|
47
|
+
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]
|
48
|
+
# containing secret data and attaches it to an existing
|
49
|
+
# [Secret][google.cloud.secretmanager.v1.Secret].
|
48
50
|
rpc :AddSecretVersion, ::Google::Cloud::SecretManager::V1::AddSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
49
51
|
# Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
|
50
52
|
rpc :GetSecret, ::Google::Cloud::SecretManager::V1::GetSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
51
|
-
# Updates metadata of an existing
|
53
|
+
# Updates metadata of an existing
|
54
|
+
# [Secret][google.cloud.secretmanager.v1.Secret].
|
52
55
|
rpc :UpdateSecret, ::Google::Cloud::SecretManager::V1::UpdateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
53
56
|
# Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
|
54
57
|
rpc :DeleteSecret, ::Google::Cloud::SecretManager::V1::DeleteSecretRequest, ::Google::Protobuf::Empty
|
55
|
-
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This
|
56
|
-
# data.
|
58
|
+
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This
|
59
|
+
# call does not return secret data.
|
57
60
|
rpc :ListSecretVersions, ::Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, ::Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
|
58
|
-
# Gets metadata for a
|
61
|
+
# Gets metadata for a
|
62
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
59
63
|
#
|
60
64
|
# `projects/*/secrets/*/versions/latest` is an alias to the most recently
|
61
65
|
# created [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
62
66
|
rpc :GetSecretVersion, ::Google::Cloud::SecretManager::V1::GetSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
63
|
-
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
67
|
+
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
68
|
+
# This call returns the secret data.
|
64
69
|
#
|
65
70
|
# `projects/*/secrets/*/versions/latest` is an alias to the most recently
|
66
71
|
# created [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
67
72
|
rpc :AccessSecretVersion, ::Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, ::Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
|
68
73
|
# Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
69
74
|
#
|
70
|
-
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
75
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
76
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
71
77
|
# [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
|
72
78
|
rpc :DisableSecretVersion, ::Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
73
79
|
# Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
74
80
|
#
|
75
|
-
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
81
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
82
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
76
83
|
# [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
|
77
84
|
rpc :EnableSecretVersion, ::Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
78
85
|
# Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
79
86
|
#
|
80
|
-
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
81
|
-
# [
|
82
|
-
#
|
87
|
+
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the
|
88
|
+
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
89
|
+
# [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED]
|
90
|
+
# and irrevocably destroys the secret data.
|
83
91
|
rpc :DestroySecretVersion, ::Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
84
92
|
# Sets the access control policy on the specified secret. Replaces any
|
85
93
|
# existing policy.
|
86
94
|
#
|
87
|
-
# Permissions on
|
88
|
-
#
|
95
|
+
# Permissions on
|
96
|
+
# [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced
|
97
|
+
# according to the policy set on the associated
|
98
|
+
# [Secret][google.cloud.secretmanager.v1.Secret].
|
89
99
|
rpc :SetIamPolicy, ::Google::Iam::V1::SetIamPolicyRequest, ::Google::Iam::V1::Policy
|
90
100
|
# Gets the access control policy for a secret.
|
91
101
|
# Returns empty policy if the secret exists and does not have a policy set.
|
@@ -118,6 +118,10 @@ module Google
|
|
118
118
|
# @return [::String]
|
119
119
|
# Optional link to proto reference documentation. Example:
|
120
120
|
# https://cloud.google.com/pubsub/lite/docs/reference/rpc
|
121
|
+
# @!attribute [rw] rest_reference_documentation_uri
|
122
|
+
# @return [::String]
|
123
|
+
# Optional link to REST reference documentation. Example:
|
124
|
+
# https://cloud.google.com/pubsub/lite/docs/reference/rest
|
121
125
|
class Publishing
|
122
126
|
include ::Google::Protobuf::MessageExts
|
123
127
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -34,7 +34,7 @@ module Google
|
|
34
34
|
# `projects/*/secrets/*`.
|
35
35
|
# @!attribute [rw] replication
|
36
36
|
# @return [::Google::Cloud::SecretManager::V1::Replication]
|
37
|
-
#
|
37
|
+
# Optional. Immutable. The replication policy of the secret data attached to
|
38
38
|
# the {::Google::Cloud::SecretManager::V1::Secret Secret}.
|
39
39
|
#
|
40
40
|
# The replication policy cannot be changed after the Secret has been created.
|
@@ -88,7 +88,7 @@ module Google
|
|
88
88
|
# No more than 50 aliases can be assigned to a given secret.
|
89
89
|
#
|
90
90
|
# Version-Alias pairs will be viewable via GetSecret and modifiable via
|
91
|
-
# UpdateSecret.
|
91
|
+
# UpdateSecret. Access by alias is only be supported on
|
92
92
|
# GetSecretVersion and AccessSecretVersion.
|
93
93
|
# @!attribute [rw] annotations
|
94
94
|
# @return [::Google::Protobuf::Map{::String => ::String}]
|
@@ -104,6 +104,25 @@ module Google
|
|
104
104
|
# alphanumerics in between these symbols.
|
105
105
|
#
|
106
106
|
# The total size of annotation keys and values must be less than 16KiB.
|
107
|
+
# @!attribute [rw] version_destroy_ttl
|
108
|
+
# @return [::Google::Protobuf::Duration]
|
109
|
+
# Optional. Secret Version TTL after destruction request
|
110
|
+
#
|
111
|
+
# This is a part of the Delayed secret version destroy feature.
|
112
|
+
# For secret with TTL>0, version destruction doesn't happen immediately
|
113
|
+
# on calling destroy instead the version goes to a disabled state and
|
114
|
+
# destruction happens after the TTL expires.
|
115
|
+
# @!attribute [rw] customer_managed_encryption
|
116
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
|
117
|
+
# Optional. The customer-managed encryption configuration of the Regionalised
|
118
|
+
# Secrets. If no configuration is provided, Google-managed default encryption
|
119
|
+
# is used.
|
120
|
+
#
|
121
|
+
# Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption
|
122
|
+
# configuration only apply to
|
123
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added
|
124
|
+
# afterwards. They do not apply retroactively to existing
|
125
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
|
107
126
|
class Secret
|
108
127
|
include ::Google::Protobuf::MessageExts
|
109
128
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -177,6 +196,20 @@ module Google
|
|
177
196
|
# {::Google::Cloud::SecretManager::V1::SecretManagerService::Client SecretManagerService}
|
178
197
|
# on
|
179
198
|
# {::Google::Cloud::SecretManager::V1::SecretManagerService::Client#add_secret_version SecretManagerService.AddSecretVersion}.
|
199
|
+
# @!attribute [r] scheduled_destroy_time
|
200
|
+
# @return [::Google::Protobuf::Timestamp]
|
201
|
+
# Optional. Output only. Scheduled destroy time for secret version.
|
202
|
+
# This is a part of the Delayed secret version destroy feature. For a
|
203
|
+
# Secret with a valid version destroy TTL, when a secert version is
|
204
|
+
# destroyed, the version is moved to disabled state and it is scheduled for
|
205
|
+
# destruction. The version is destroyed only after the
|
206
|
+
# `scheduled_destroy_time`.
|
207
|
+
# @!attribute [r] customer_managed_encryption
|
208
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
|
209
|
+
# Output only. The customer-managed encryption status of the
|
210
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
|
211
|
+
# populated if customer-managed encryption is used and
|
212
|
+
# {::Google::Cloud::SecretManager::V1::Secret Secret} is a Regionalised Secret.
|
180
213
|
class SecretVersion
|
181
214
|
include ::Google::Protobuf::MessageExts
|
182
215
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -386,8 +419,9 @@ module Google
|
|
386
419
|
# @return [::String]
|
387
420
|
# Required. The resource name of the Pub/Sub topic that will be published to,
|
388
421
|
# in the following format: `projects/*/topics/*`. For publication to succeed,
|
389
|
-
# the Secret Manager
|
390
|
-
# topic.
|
422
|
+
# the Secret Manager service agent must have the `pubsub.topic.publish`
|
423
|
+
# permission on the topic. The Pub/Sub Publisher role
|
424
|
+
# (`roles/pubsub.publisher`) includes this permission.
|
391
425
|
class Topic
|
392
426
|
include ::Google::Protobuf::MessageExts
|
393
427
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|