google-cloud-secret_manager-v1 0.4.2 → 0.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4bb51798c84c86d7ef19644cdf0462bbc65cd85ad9d139a9a2f267bd29b7cbaf
4
- data.tar.gz: 79b59c3905d686cfdda416f793fce81bde1a998af9b43bc547ea9dd196b9167e
3
+ metadata.gz: bf03cd5041b88a10cdc8648e70d6286e77a5eb6255873b22233d232d749d9d04
4
+ data.tar.gz: 0b7d87e1e5fc9e93130d2acad124dc6f2023879c993b503e03fb43b654325fb1
5
5
  SHA512:
6
- metadata.gz: d8aa4cacc6d510414937a8d8b8a7e90bc78f592115f0d33d2c6f998d0ea553ba944d1c004327b54308d8f52b899c3e68b566e1dc13bc1a375971322f1a560fb1
7
- data.tar.gz: 2d0819cb3b0377de4738c0bee0359617721cc258c716e8e37020e47f93dae868fda864223cebf9f6fb75d26c9965988aa8e4f5c876ecdd8b59392b8a16057c6f
6
+ metadata.gz: db62de628ee454c81f5b7b46cb96fbc1d304ae3b2ffd8a700be85b77876cbca05aa15a6df8c7cdaf357e05f7ee043552f37f7f8fbcdff72d11896ad5a6b3509a
7
+ data.tar.gz: d3a282e5589d7d86c1ec1235239670769e8e21f90d40dbbfeabbef1b28b937415dfdb65c377a2cd1ead9ad810de3636c182844884c284f4c5fc4c7794d882e55
data/README.md CHANGED
@@ -18,6 +18,7 @@ In order to use this library, you first need to go through the following steps:
18
18
 
19
19
  1. [Select or create a Cloud Platform project.](https://console.cloud.google.com/project)
20
20
  1. [Enable billing for your project.](https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project)
21
+ 1. [Enable the API.](https://console.cloud.google.com/apis/library/secretmanager.googleapis.com)
21
22
  1. {file:AUTHENTICATION.md Set up authentication.}
22
23
 
23
24
  ## Quick Start
@@ -33,6 +34,9 @@ response = client.list_secrets request
33
34
  View the [Client Library Documentation](https://googleapis.dev/ruby/google-cloud-secret_manager-v1/latest)
34
35
  for class and method documentation.
35
36
 
37
+ See also the [Product Documentation](https://cloud.google.com/secret-manager)
38
+ for general usage information.
39
+
36
40
  ## Enabling Logging
37
41
 
38
42
  To enable logging for this library, set the logger for the underlying [gRPC](https://github.com/grpc/grpc/tree/master/src/ruby) library.
@@ -33,3 +33,6 @@ module Google
33
33
  end
34
34
  end
35
35
  end
36
+
37
+ helper_path = ::File.join __dir__, "v1", "_helpers.rb"
38
+ require "google/cloud/secret_manager/v1/_helpers" if ::File.file? helper_path
@@ -92,7 +92,7 @@ module Google
92
92
  initial_delay: 1.0,
93
93
  max_delay: 60.0,
94
94
  multiplier: 1.3,
95
- retry_codes: ["UNAVAILABLE", "UNKNOWN"]
95
+ retry_codes: [14, 2]
96
96
  }
97
97
 
98
98
  default_config.rpcs.disable_secret_version.timeout = 60.0
@@ -1347,7 +1347,7 @@ module Google
1347
1347
 
1348
1348
  config_attr :endpoint, "secretmanager.googleapis.com", ::String
1349
1349
  config_attr :credentials, nil do |value|
1350
- allowed = [::String, ::Hash, ::Proc, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
1350
+ allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
1351
1351
  allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
1352
1352
  allowed.any? { |klass| klass === value }
1353
1353
  end
@@ -1387,7 +1387,7 @@ module Google
1387
1387
  # Each configuration object is of type `Gapic::Config::Method` and includes
1388
1388
  # the following configuration fields:
1389
1389
  #
1390
- # * `timeout` (*type:* `Numeric`) - The call timeout in milliseconds
1390
+ # * `timeout` (*type:* `Numeric`) - The call timeout in seconds
1391
1391
  # * `metadata` (*type:* `Hash{Symbol=>String}`) - Additional gRPC headers
1392
1392
  # * `retry_policy (*type:* `Hash`) - The retry policy. The policy fields
1393
1393
  # include the following keys:
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecretManager
23
23
  module V1
24
- VERSION = "0.4.2"
24
+ VERSION = "0.5.1"
25
25
  end
26
26
  end
27
27
  end
@@ -20,6 +20,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
20
20
  optional :create_time, :message, 2, "google.protobuf.Timestamp"
21
21
  optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
22
22
  optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
23
+ optional :replication_status, :message, 5, "google.cloud.secretmanager.v1.ReplicationStatus"
23
24
  end
24
25
  add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
25
26
  value :STATE_UNSPECIFIED, 0
@@ -34,12 +35,36 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
34
35
  end
35
36
  end
36
37
  add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
38
+ optional :customer_managed_encryption, :message, 1, "google.cloud.secretmanager.v1.CustomerManagedEncryption"
37
39
  end
38
40
  add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
39
41
  repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
40
42
  end
41
43
  add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
42
44
  optional :location, :string, 1
45
+ optional :customer_managed_encryption, :message, 2, "google.cloud.secretmanager.v1.CustomerManagedEncryption"
46
+ end
47
+ add_message "google.cloud.secretmanager.v1.CustomerManagedEncryption" do
48
+ optional :kms_key_name, :string, 1
49
+ end
50
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus" do
51
+ oneof :replication_status do
52
+ optional :automatic, :message, 1, "google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus"
53
+ optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus"
54
+ end
55
+ end
56
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus" do
57
+ optional :customer_managed_encryption, :message, 1, "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus"
58
+ end
59
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus" do
60
+ repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus"
61
+ end
62
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus" do
63
+ optional :location, :string, 1
64
+ optional :customer_managed_encryption, :message, 2, "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus"
65
+ end
66
+ add_message "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus" do
67
+ optional :kms_key_version_name, :string, 1
43
68
  end
44
69
  add_message "google.cloud.secretmanager.v1.SecretPayload" do
45
70
  optional :data, :bytes, 1
@@ -58,6 +83,12 @@ module Google
58
83
  Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
59
84
  Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
60
85
  Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
86
+ CustomerManagedEncryption = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CustomerManagedEncryption").msgclass
87
+ ReplicationStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus").msgclass
88
+ ReplicationStatus::AutomaticStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus").msgclass
89
+ ReplicationStatus::UserManagedStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus").msgclass
90
+ ReplicationStatus::UserManagedStatus::ReplicaStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus").msgclass
91
+ CustomerManagedEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus").msgclass
61
92
  SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
62
93
  end
63
94
  end
@@ -24,9 +24,6 @@ module Google
24
24
  module SecretManager
25
25
  module V1
26
26
  module SecretManagerService
27
- # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
28
- # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
29
- #
30
27
  # Secret Manager Service
31
28
  #
32
29
  # Manages secrets and operations using those secrets. Implements a REST
@@ -43,56 +40,56 @@ module Google
43
40
  self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
44
41
 
45
42
  # Lists [Secrets][google.cloud.secretmanager.v1.Secret].
46
- rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
43
+ rpc :ListSecrets, ::Google::Cloud::SecretManager::V1::ListSecretsRequest, ::Google::Cloud::SecretManager::V1::ListSecretsResponse
47
44
  # Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
48
- rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
45
+ rpc :CreateSecret, ::Google::Cloud::SecretManager::V1::CreateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
49
46
  # Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
50
47
  # it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
51
- rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
48
+ rpc :AddSecretVersion, ::Google::Cloud::SecretManager::V1::AddSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
52
49
  # Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
53
- rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
50
+ rpc :GetSecret, ::Google::Cloud::SecretManager::V1::GetSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
54
51
  # Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
55
- rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
52
+ rpc :UpdateSecret, ::Google::Cloud::SecretManager::V1::UpdateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
56
53
  # Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
57
- rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
54
+ rpc :DeleteSecret, ::Google::Cloud::SecretManager::V1::DeleteSecretRequest, ::Google::Protobuf::Empty
58
55
  # Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
59
56
  # data.
60
- rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
57
+ rpc :ListSecretVersions, ::Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, ::Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
61
58
  # Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
62
59
  #
63
60
  # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
64
61
  # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
65
- rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
62
+ rpc :GetSecretVersion, ::Google::Cloud::SecretManager::V1::GetSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
66
63
  # Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
67
64
  #
68
65
  # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
69
66
  # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
70
- rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
67
+ rpc :AccessSecretVersion, ::Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, ::Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
71
68
  # Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
72
69
  #
73
70
  # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
74
71
  # [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
75
- rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
72
+ rpc :DisableSecretVersion, ::Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
76
73
  # Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
77
74
  #
78
75
  # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
79
76
  # [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
80
- rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
77
+ rpc :EnableSecretVersion, ::Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
81
78
  # Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
82
79
  #
83
80
  # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
84
81
  # [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
85
82
  # secret data.
86
- rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
83
+ rpc :DestroySecretVersion, ::Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
87
84
  # Sets the access control policy on the specified secret. Replaces any
88
85
  # existing policy.
89
86
  #
90
87
  # Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
91
88
  # to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
92
- rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
89
+ rpc :SetIamPolicy, ::Google::Iam::V1::SetIamPolicyRequest, ::Google::Iam::V1::Policy
93
90
  # Gets the access control policy for a secret.
94
91
  # Returns empty policy if the secret exists and does not have a policy set.
95
- rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
92
+ rpc :GetIamPolicy, ::Google::Iam::V1::GetIamPolicyRequest, ::Google::Iam::V1::Policy
96
93
  # Returns permissions that a caller has for the specified secret.
97
94
  # If the secret does not exist, this call returns an empty set of
98
95
  # permissions, not a NOT_FOUND error.
@@ -100,7 +97,7 @@ module Google
100
97
  # Note: This operation is designed to be used for building permission-aware
101
98
  # UIs and command-line tools, not for authorization checking. This operation
102
99
  # may "fail open" without warning.
103
- rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
100
+ rpc :TestIamPermissions, ::Google::Iam::V1::TestIamPermissionsRequest, ::Google::Iam::V1::TestIamPermissionsResponse
104
101
  end
105
102
 
106
103
  Stub = Service.rpc_stub_class
@@ -43,12 +43,12 @@ module Google
43
43
  #
44
44
  # The ResourceDescriptor Yaml config will look like:
45
45
  #
46
- # resources:
47
- # - type: "pubsub.googleapis.com/Topic"
48
- # name_descriptor:
49
- # - pattern: "projects/\\{project}/topics/\\{topic}"
50
- # parent_type: "cloudresourcemanager.googleapis.com/Project"
51
- # parent_name_extractor: "projects/\\{project}"
46
+ # resources:
47
+ # - type: "pubsub.googleapis.com/Topic"
48
+ # name_descriptor:
49
+ # - pattern: "projects/{project}/topics/{topic}"
50
+ # parent_type: "cloudresourcemanager.googleapis.com/Project"
51
+ # parent_name_extractor: "projects/{project}"
52
52
  #
53
53
  # Sometimes, resources have multiple patterns, typically because they can
54
54
  # live under multiple parents.
@@ -183,15 +183,24 @@ module Google
183
183
  # }
184
184
  # @!attribute [rw] plural
185
185
  # @return [::String]
186
- # The plural name used in the resource name, such as 'projects' for
187
- # the name of 'projects/\\{project}'. It is the same concept of the `plural`
188
- # field in k8s CRD spec
186
+ # The plural name used in the resource name and permission names, such as
187
+ # 'projects' for the resource name of 'projects/\\{project}' and the permission
188
+ # name of 'cloudresourcemanager.googleapis.com/projects.get'. It is the same
189
+ # concept of the `plural` field in k8s CRD spec
189
190
  # https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
191
+ #
192
+ # Note: The plural form is required even for singleton resources. See
193
+ # https://aip.dev/156
190
194
  # @!attribute [rw] singular
191
195
  # @return [::String]
192
196
  # The same concept of the `singular` field in k8s CRD spec
193
197
  # https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
194
198
  # Such as "project" for the `resourcemanager.googleapis.com/Project` type.
199
+ # @!attribute [rw] style
200
+ # @return [::Array<::Google::Api::ResourceDescriptor::Style>]
201
+ # Style flag(s) for this resource.
202
+ # These indicate that a resource is expected to conform to a given
203
+ # style. See the specific style flags for additional information.
195
204
  class ResourceDescriptor
196
205
  include ::Google::Protobuf::MessageExts
197
206
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -211,6 +220,22 @@ module Google
211
220
  # that from being necessary once there are multiple patterns.)
212
221
  FUTURE_MULTI_PATTERN = 2
213
222
  end
223
+
224
+ # A flag representing a specific style that a resource claims to conform to.
225
+ module Style
226
+ # The unspecified value. Do not use.
227
+ STYLE_UNSPECIFIED = 0
228
+
229
+ # This resource is intended to be "declarative-friendly".
230
+ #
231
+ # Declarative-friendly resources must be more strictly consistent, and
232
+ # setting this to true communicates to tools that this resource should
233
+ # adhere to declarative-friendly expectations.
234
+ #
235
+ # Note: This is used by the API linter (linter.aip.dev) to enable
236
+ # additional checks.
237
+ DECLARATIVE_FRIENDLY = 1
238
+ end
214
239
  end
215
240
 
216
241
  # Defines a proto annotation that describes a string field that refers to
@@ -226,6 +251,17 @@ module Google
226
251
  # type: "pubsub.googleapis.com/Topic"
227
252
  # }];
228
253
  # }
254
+ #
255
+ # Occasionally, a field may reference an arbitrary resource. In this case,
256
+ # APIs use the special value * in their resource reference.
257
+ #
258
+ # Example:
259
+ #
260
+ # message GetIamPolicyRequest {
261
+ # string resource = 2 [(google.api.resource_reference) = {
262
+ # type: "*"
263
+ # }];
264
+ # }
229
265
  # @!attribute [rw] child_type
230
266
  # @return [::String]
231
267
  # The resource type of a child collection that the annotated field
@@ -234,11 +270,11 @@ module Google
234
270
  #
235
271
  # Example:
236
272
  #
237
- # message ListLogEntriesRequest {
238
- # string parent = 1 [(google.api.resource_reference) = {
239
- # child_type: "logging.googleapis.com/LogEntry"
240
- # };
241
- # }
273
+ # message ListLogEntriesRequest {
274
+ # string parent = 1 [(google.api.resource_reference) = {
275
+ # child_type: "logging.googleapis.com/LogEntry"
276
+ # };
277
+ # }
242
278
  class ResourceReference
243
279
  include ::Google::Protobuf::MessageExts
244
280
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -83,6 +83,9 @@ module Google
83
83
  # @!attribute [r] state
84
84
  # @return [::Google::Cloud::SecretManager::V1::SecretVersion::State]
85
85
  # Output only. The current state of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
86
+ # @!attribute [rw] replication_status
87
+ # @return [::Google::Cloud::SecretManager::V1::ReplicationStatus]
88
+ # The replication status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
86
89
  class SecretVersion
87
90
  include ::Google::Protobuf::MessageExts
88
91
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -106,7 +109,7 @@ module Google
106
109
  end
107
110
  end
108
111
 
109
- # A policy that defines the replication configuration of data.
112
+ # A policy that defines the replication and encryption configuration of data.
110
113
  # @!attribute [rw] automatic
111
114
  # @return [::Google::Cloud::SecretManager::V1::Replication::Automatic]
112
115
  # The {::Google::Cloud::SecretManager::V1::Secret Secret} will automatically be replicated without any restrictions.
@@ -119,6 +122,14 @@ module Google
119
122
 
120
123
  # A replication policy that replicates the {::Google::Cloud::SecretManager::V1::Secret Secret} payload without any
121
124
  # restrictions.
125
+ # @!attribute [rw] customer_managed_encryption
126
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
127
+ # Optional. The customer-managed encryption configuration of the {::Google::Cloud::SecretManager::V1::Secret Secret}. If no
128
+ # configuration is provided, Google-managed default encryption is used.
129
+ #
130
+ # Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption configuration only apply to
131
+ # {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added afterwards. They do not apply
132
+ # retroactively to existing {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
122
133
  class Automatic
123
134
  include ::Google::Protobuf::MessageExts
124
135
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -140,6 +151,15 @@ module Google
140
151
  # @return [::String]
141
152
  # The canonical IDs of the location to replicate data.
142
153
  # For example: `"us-east1"`.
154
+ # @!attribute [rw] customer_managed_encryption
155
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
156
+ # Optional. The customer-managed encryption configuration of the [User-Managed
157
+ # Replica][Replication.UserManaged.Replica]. If no configuration is
158
+ # provided, Google-managed default encryption is used.
159
+ #
160
+ # Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption configuration only apply to
161
+ # {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added afterwards. They do not apply
162
+ # retroactively to existing {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
143
163
  class Replica
144
164
  include ::Google::Protobuf::MessageExts
145
165
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -147,6 +167,97 @@ module Google
147
167
  end
148
168
  end
149
169
 
170
+ # Configuration for encrypting secret payloads using customer-managed
171
+ # encryption keys (CMEK).
172
+ # @!attribute [rw] kms_key_name
173
+ # @return [::String]
174
+ # Required. The resource name of the Cloud KMS CryptoKey used to encrypt secret
175
+ # payloads.
176
+ #
177
+ # For secrets using the {::Google::Cloud::SecretManager::V1::Replication::UserManaged UserManaged} replication
178
+ # policy type, Cloud KMS CryptoKeys must reside in the same location as the
179
+ # [replica location][Secret.UserManaged.Replica.location].
180
+ #
181
+ # For secrets using the {::Google::Cloud::SecretManager::V1::Replication::Automatic Automatic} replication policy
182
+ # type, Cloud KMS CryptoKeys must reside in `global`.
183
+ #
184
+ # The expected format is `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
185
+ class CustomerManagedEncryption
186
+ include ::Google::Protobuf::MessageExts
187
+ extend ::Google::Protobuf::MessageExts::ClassMethods
188
+ end
189
+
190
+ # The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
191
+ # @!attribute [rw] automatic
192
+ # @return [::Google::Cloud::SecretManager::V1::ReplicationStatus::AutomaticStatus]
193
+ # Describes the replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} with
194
+ # automatic replication.
195
+ #
196
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has an automatic replication
197
+ # policy.
198
+ # @!attribute [rw] user_managed
199
+ # @return [::Google::Cloud::SecretManager::V1::ReplicationStatus::UserManagedStatus]
200
+ # Describes the replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} with
201
+ # user-managed replication.
202
+ #
203
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has a user-managed replication
204
+ # policy.
205
+ class ReplicationStatus
206
+ include ::Google::Protobuf::MessageExts
207
+ extend ::Google::Protobuf::MessageExts::ClassMethods
208
+
209
+ # The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} using automatic replication.
210
+ #
211
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has an automatic replication
212
+ # policy.
213
+ # @!attribute [r] customer_managed_encryption
214
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
215
+ # Output only. The customer-managed encryption status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
216
+ # populated if customer-managed encryption is used.
217
+ class AutomaticStatus
218
+ include ::Google::Protobuf::MessageExts
219
+ extend ::Google::Protobuf::MessageExts::ClassMethods
220
+ end
221
+
222
+ # The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} using user-managed
223
+ # replication.
224
+ #
225
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has a user-managed replication
226
+ # policy.
227
+ # @!attribute [r] replicas
228
+ # @return [::Array<::Google::Cloud::SecretManager::V1::ReplicationStatus::UserManagedStatus::ReplicaStatus>]
229
+ # Output only. The list of replica statuses for the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
230
+ class UserManagedStatus
231
+ include ::Google::Protobuf::MessageExts
232
+ extend ::Google::Protobuf::MessageExts::ClassMethods
233
+
234
+ # Describes the status of a user-managed replica for the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
235
+ # @!attribute [r] location
236
+ # @return [::String]
237
+ # Output only. The canonical ID of the replica location.
238
+ # For example: `"us-east1"`.
239
+ # @!attribute [r] customer_managed_encryption
240
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
241
+ # Output only. The customer-managed encryption status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
242
+ # populated if customer-managed encryption is used.
243
+ class ReplicaStatus
244
+ include ::Google::Protobuf::MessageExts
245
+ extend ::Google::Protobuf::MessageExts::ClassMethods
246
+ end
247
+ end
248
+ end
249
+
250
+ # Describes the status of customer-managed encryption.
251
+ # @!attribute [rw] kms_key_version_name
252
+ # @return [::String]
253
+ # Required. The resource name of the Cloud KMS CryptoKeyVersion used to encrypt the
254
+ # secret payload, in the following format:
255
+ # `projects/*/locations/*/keyRings/*/cryptoKeys/*/versions/*`.
256
+ class CustomerManagedEncryptionStatus
257
+ include ::Google::Protobuf::MessageExts
258
+ extend ::Google::Protobuf::MessageExts::ClassMethods
259
+ end
260
+
150
261
  # A secret payload resource in the Secret Manager API. This contains the
151
262
  # sensitive secret payload that is associated with a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
152
263
  # @!attribute [rw] data
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-secret_manager-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.2
4
+ version: 0.5.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-06-05 00:00:00.000000000 Z
11
+ date: 2021-01-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -16,14 +16,14 @@ dependencies:
16
16
  requirements:
17
17
  - - "~>"
18
18
  - !ruby/object:Gem::Version
19
- version: '0.2'
19
+ version: '0.3'
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
24
  - - "~>"
25
25
  - !ruby/object:Gem::Version
26
- version: '0.2'
26
+ version: '0.3'
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: google-cloud-errors
29
29
  requirement: !ruby/object:Gem::Requirement
@@ -224,7 +224,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
224
224
  - !ruby/object:Gem::Version
225
225
  version: '0'
226
226
  requirements: []
227
- rubygems_version: 3.1.3
227
+ rubygems_version: 3.2.6
228
228
  signing_key:
229
229
  specification_version: 4
230
230
  summary: API Client library for the Secret Manager V1 API