google-cloud-secret_manager-v1 0.4.2 → 0.5.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +4 -0
- data/lib/google/cloud/secret_manager/v1.rb +3 -0
- data/lib/google/cloud/secret_manager/v1/secret_manager_service/client.rb +3 -3
- data/lib/google/cloud/secret_manager/v1/version.rb +1 -1
- data/lib/google/cloud/secretmanager/v1/resources_pb.rb +31 -0
- data/lib/google/cloud/secretmanager/v1/service_services_pb.rb +15 -18
- data/proto_docs/google/api/resource.rb +50 -14
- data/proto_docs/google/cloud/secretmanager/v1/resources.rb +112 -1
- metadata +5 -5
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bf03cd5041b88a10cdc8648e70d6286e77a5eb6255873b22233d232d749d9d04
|
4
|
+
data.tar.gz: 0b7d87e1e5fc9e93130d2acad124dc6f2023879c993b503e03fb43b654325fb1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: db62de628ee454c81f5b7b46cb96fbc1d304ae3b2ffd8a700be85b77876cbca05aa15a6df8c7cdaf357e05f7ee043552f37f7f8fbcdff72d11896ad5a6b3509a
|
7
|
+
data.tar.gz: d3a282e5589d7d86c1ec1235239670769e8e21f90d40dbbfeabbef1b28b937415dfdb65c377a2cd1ead9ad810de3636c182844884c284f4c5fc4c7794d882e55
|
data/README.md
CHANGED
@@ -18,6 +18,7 @@ In order to use this library, you first need to go through the following steps:
|
|
18
18
|
|
19
19
|
1. [Select or create a Cloud Platform project.](https://console.cloud.google.com/project)
|
20
20
|
1. [Enable billing for your project.](https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project)
|
21
|
+
1. [Enable the API.](https://console.cloud.google.com/apis/library/secretmanager.googleapis.com)
|
21
22
|
1. {file:AUTHENTICATION.md Set up authentication.}
|
22
23
|
|
23
24
|
## Quick Start
|
@@ -33,6 +34,9 @@ response = client.list_secrets request
|
|
33
34
|
View the [Client Library Documentation](https://googleapis.dev/ruby/google-cloud-secret_manager-v1/latest)
|
34
35
|
for class and method documentation.
|
35
36
|
|
37
|
+
See also the [Product Documentation](https://cloud.google.com/secret-manager)
|
38
|
+
for general usage information.
|
39
|
+
|
36
40
|
## Enabling Logging
|
37
41
|
|
38
42
|
To enable logging for this library, set the logger for the underlying [gRPC](https://github.com/grpc/grpc/tree/master/src/ruby) library.
|
@@ -92,7 +92,7 @@ module Google
|
|
92
92
|
initial_delay: 1.0,
|
93
93
|
max_delay: 60.0,
|
94
94
|
multiplier: 1.3,
|
95
|
-
retry_codes: [
|
95
|
+
retry_codes: [14, 2]
|
96
96
|
}
|
97
97
|
|
98
98
|
default_config.rpcs.disable_secret_version.timeout = 60.0
|
@@ -1347,7 +1347,7 @@ module Google
|
|
1347
1347
|
|
1348
1348
|
config_attr :endpoint, "secretmanager.googleapis.com", ::String
|
1349
1349
|
config_attr :credentials, nil do |value|
|
1350
|
-
allowed = [::String, ::Hash, ::Proc, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
|
1350
|
+
allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
|
1351
1351
|
allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
|
1352
1352
|
allowed.any? { |klass| klass === value }
|
1353
1353
|
end
|
@@ -1387,7 +1387,7 @@ module Google
|
|
1387
1387
|
# Each configuration object is of type `Gapic::Config::Method` and includes
|
1388
1388
|
# the following configuration fields:
|
1389
1389
|
#
|
1390
|
-
# * `timeout` (*type:* `Numeric`) - The call timeout in
|
1390
|
+
# * `timeout` (*type:* `Numeric`) - The call timeout in seconds
|
1391
1391
|
# * `metadata` (*type:* `Hash{Symbol=>String}`) - Additional gRPC headers
|
1392
1392
|
# * `retry_policy (*type:* `Hash`) - The retry policy. The policy fields
|
1393
1393
|
# include the following keys:
|
@@ -20,6 +20,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
20
20
|
optional :create_time, :message, 2, "google.protobuf.Timestamp"
|
21
21
|
optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
|
22
22
|
optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
|
23
|
+
optional :replication_status, :message, 5, "google.cloud.secretmanager.v1.ReplicationStatus"
|
23
24
|
end
|
24
25
|
add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
|
25
26
|
value :STATE_UNSPECIFIED, 0
|
@@ -34,12 +35,36 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
|
|
34
35
|
end
|
35
36
|
end
|
36
37
|
add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
|
38
|
+
optional :customer_managed_encryption, :message, 1, "google.cloud.secretmanager.v1.CustomerManagedEncryption"
|
37
39
|
end
|
38
40
|
add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
|
39
41
|
repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
|
40
42
|
end
|
41
43
|
add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
|
42
44
|
optional :location, :string, 1
|
45
|
+
optional :customer_managed_encryption, :message, 2, "google.cloud.secretmanager.v1.CustomerManagedEncryption"
|
46
|
+
end
|
47
|
+
add_message "google.cloud.secretmanager.v1.CustomerManagedEncryption" do
|
48
|
+
optional :kms_key_name, :string, 1
|
49
|
+
end
|
50
|
+
add_message "google.cloud.secretmanager.v1.ReplicationStatus" do
|
51
|
+
oneof :replication_status do
|
52
|
+
optional :automatic, :message, 1, "google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus"
|
53
|
+
optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus"
|
54
|
+
end
|
55
|
+
end
|
56
|
+
add_message "google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus" do
|
57
|
+
optional :customer_managed_encryption, :message, 1, "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus"
|
58
|
+
end
|
59
|
+
add_message "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus" do
|
60
|
+
repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus"
|
61
|
+
end
|
62
|
+
add_message "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus" do
|
63
|
+
optional :location, :string, 1
|
64
|
+
optional :customer_managed_encryption, :message, 2, "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus"
|
65
|
+
end
|
66
|
+
add_message "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus" do
|
67
|
+
optional :kms_key_version_name, :string, 1
|
43
68
|
end
|
44
69
|
add_message "google.cloud.secretmanager.v1.SecretPayload" do
|
45
70
|
optional :data, :bytes, 1
|
@@ -58,6 +83,12 @@ module Google
|
|
58
83
|
Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
|
59
84
|
Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
|
60
85
|
Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
|
86
|
+
CustomerManagedEncryption = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CustomerManagedEncryption").msgclass
|
87
|
+
ReplicationStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus").msgclass
|
88
|
+
ReplicationStatus::AutomaticStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus").msgclass
|
89
|
+
ReplicationStatus::UserManagedStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus").msgclass
|
90
|
+
ReplicationStatus::UserManagedStatus::ReplicaStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus").msgclass
|
91
|
+
CustomerManagedEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus").msgclass
|
61
92
|
SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
|
62
93
|
end
|
63
94
|
end
|
@@ -24,9 +24,6 @@ module Google
|
|
24
24
|
module SecretManager
|
25
25
|
module V1
|
26
26
|
module SecretManagerService
|
27
|
-
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
28
|
-
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
29
|
-
#
|
30
27
|
# Secret Manager Service
|
31
28
|
#
|
32
29
|
# Manages secrets and operations using those secrets. Implements a REST
|
@@ -43,56 +40,56 @@ module Google
|
|
43
40
|
self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
|
44
41
|
|
45
42
|
# Lists [Secrets][google.cloud.secretmanager.v1.Secret].
|
46
|
-
rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
|
43
|
+
rpc :ListSecrets, ::Google::Cloud::SecretManager::V1::ListSecretsRequest, ::Google::Cloud::SecretManager::V1::ListSecretsResponse
|
47
44
|
# Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
|
48
|
-
rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
45
|
+
rpc :CreateSecret, ::Google::Cloud::SecretManager::V1::CreateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
49
46
|
# Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
|
50
47
|
# it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
|
51
|
-
rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
48
|
+
rpc :AddSecretVersion, ::Google::Cloud::SecretManager::V1::AddSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
52
49
|
# Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
|
53
|
-
rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
50
|
+
rpc :GetSecret, ::Google::Cloud::SecretManager::V1::GetSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
54
51
|
# Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
|
55
|
-
rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
|
52
|
+
rpc :UpdateSecret, ::Google::Cloud::SecretManager::V1::UpdateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
|
56
53
|
# Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
|
57
|
-
rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
|
54
|
+
rpc :DeleteSecret, ::Google::Cloud::SecretManager::V1::DeleteSecretRequest, ::Google::Protobuf::Empty
|
58
55
|
# Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
|
59
56
|
# data.
|
60
|
-
rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
|
57
|
+
rpc :ListSecretVersions, ::Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, ::Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
|
61
58
|
# Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
62
59
|
#
|
63
60
|
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
64
61
|
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
65
|
-
rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
62
|
+
rpc :GetSecretVersion, ::Google::Cloud::SecretManager::V1::GetSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
66
63
|
# Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
|
67
64
|
#
|
68
65
|
# `projects/*/secrets/*/versions/latest` is an alias to the `latest`
|
69
66
|
# [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
70
|
-
rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
|
67
|
+
rpc :AccessSecretVersion, ::Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, ::Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
|
71
68
|
# Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
72
69
|
#
|
73
70
|
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
74
71
|
# [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
|
75
|
-
rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
72
|
+
rpc :DisableSecretVersion, ::Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
76
73
|
# Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
77
74
|
#
|
78
75
|
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
79
76
|
# [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
|
80
|
-
rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
77
|
+
rpc :EnableSecretVersion, ::Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
81
78
|
# Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
|
82
79
|
#
|
83
80
|
# Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
|
84
81
|
# [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
|
85
82
|
# secret data.
|
86
|
-
rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
|
83
|
+
rpc :DestroySecretVersion, ::Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
|
87
84
|
# Sets the access control policy on the specified secret. Replaces any
|
88
85
|
# existing policy.
|
89
86
|
#
|
90
87
|
# Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
|
91
88
|
# to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
|
92
|
-
rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
|
89
|
+
rpc :SetIamPolicy, ::Google::Iam::V1::SetIamPolicyRequest, ::Google::Iam::V1::Policy
|
93
90
|
# Gets the access control policy for a secret.
|
94
91
|
# Returns empty policy if the secret exists and does not have a policy set.
|
95
|
-
rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
|
92
|
+
rpc :GetIamPolicy, ::Google::Iam::V1::GetIamPolicyRequest, ::Google::Iam::V1::Policy
|
96
93
|
# Returns permissions that a caller has for the specified secret.
|
97
94
|
# If the secret does not exist, this call returns an empty set of
|
98
95
|
# permissions, not a NOT_FOUND error.
|
@@ -100,7 +97,7 @@ module Google
|
|
100
97
|
# Note: This operation is designed to be used for building permission-aware
|
101
98
|
# UIs and command-line tools, not for authorization checking. This operation
|
102
99
|
# may "fail open" without warning.
|
103
|
-
rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
|
100
|
+
rpc :TestIamPermissions, ::Google::Iam::V1::TestIamPermissionsRequest, ::Google::Iam::V1::TestIamPermissionsResponse
|
104
101
|
end
|
105
102
|
|
106
103
|
Stub = Service.rpc_stub_class
|
@@ -43,12 +43,12 @@ module Google
|
|
43
43
|
#
|
44
44
|
# The ResourceDescriptor Yaml config will look like:
|
45
45
|
#
|
46
|
-
#
|
47
|
-
#
|
48
|
-
#
|
49
|
-
#
|
50
|
-
#
|
51
|
-
#
|
46
|
+
# resources:
|
47
|
+
# - type: "pubsub.googleapis.com/Topic"
|
48
|
+
# name_descriptor:
|
49
|
+
# - pattern: "projects/{project}/topics/{topic}"
|
50
|
+
# parent_type: "cloudresourcemanager.googleapis.com/Project"
|
51
|
+
# parent_name_extractor: "projects/{project}"
|
52
52
|
#
|
53
53
|
# Sometimes, resources have multiple patterns, typically because they can
|
54
54
|
# live under multiple parents.
|
@@ -183,15 +183,24 @@ module Google
|
|
183
183
|
# }
|
184
184
|
# @!attribute [rw] plural
|
185
185
|
# @return [::String]
|
186
|
-
# The plural name used in the resource name, such as
|
187
|
-
# the name of 'projects/\\{project}'
|
188
|
-
#
|
186
|
+
# The plural name used in the resource name and permission names, such as
|
187
|
+
# 'projects' for the resource name of 'projects/\\{project}' and the permission
|
188
|
+
# name of 'cloudresourcemanager.googleapis.com/projects.get'. It is the same
|
189
|
+
# concept of the `plural` field in k8s CRD spec
|
189
190
|
# https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
|
191
|
+
#
|
192
|
+
# Note: The plural form is required even for singleton resources. See
|
193
|
+
# https://aip.dev/156
|
190
194
|
# @!attribute [rw] singular
|
191
195
|
# @return [::String]
|
192
196
|
# The same concept of the `singular` field in k8s CRD spec
|
193
197
|
# https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
|
194
198
|
# Such as "project" for the `resourcemanager.googleapis.com/Project` type.
|
199
|
+
# @!attribute [rw] style
|
200
|
+
# @return [::Array<::Google::Api::ResourceDescriptor::Style>]
|
201
|
+
# Style flag(s) for this resource.
|
202
|
+
# These indicate that a resource is expected to conform to a given
|
203
|
+
# style. See the specific style flags for additional information.
|
195
204
|
class ResourceDescriptor
|
196
205
|
include ::Google::Protobuf::MessageExts
|
197
206
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -211,6 +220,22 @@ module Google
|
|
211
220
|
# that from being necessary once there are multiple patterns.)
|
212
221
|
FUTURE_MULTI_PATTERN = 2
|
213
222
|
end
|
223
|
+
|
224
|
+
# A flag representing a specific style that a resource claims to conform to.
|
225
|
+
module Style
|
226
|
+
# The unspecified value. Do not use.
|
227
|
+
STYLE_UNSPECIFIED = 0
|
228
|
+
|
229
|
+
# This resource is intended to be "declarative-friendly".
|
230
|
+
#
|
231
|
+
# Declarative-friendly resources must be more strictly consistent, and
|
232
|
+
# setting this to true communicates to tools that this resource should
|
233
|
+
# adhere to declarative-friendly expectations.
|
234
|
+
#
|
235
|
+
# Note: This is used by the API linter (linter.aip.dev) to enable
|
236
|
+
# additional checks.
|
237
|
+
DECLARATIVE_FRIENDLY = 1
|
238
|
+
end
|
214
239
|
end
|
215
240
|
|
216
241
|
# Defines a proto annotation that describes a string field that refers to
|
@@ -226,6 +251,17 @@ module Google
|
|
226
251
|
# type: "pubsub.googleapis.com/Topic"
|
227
252
|
# }];
|
228
253
|
# }
|
254
|
+
#
|
255
|
+
# Occasionally, a field may reference an arbitrary resource. In this case,
|
256
|
+
# APIs use the special value * in their resource reference.
|
257
|
+
#
|
258
|
+
# Example:
|
259
|
+
#
|
260
|
+
# message GetIamPolicyRequest {
|
261
|
+
# string resource = 2 [(google.api.resource_reference) = {
|
262
|
+
# type: "*"
|
263
|
+
# }];
|
264
|
+
# }
|
229
265
|
# @!attribute [rw] child_type
|
230
266
|
# @return [::String]
|
231
267
|
# The resource type of a child collection that the annotated field
|
@@ -234,11 +270,11 @@ module Google
|
|
234
270
|
#
|
235
271
|
# Example:
|
236
272
|
#
|
237
|
-
#
|
238
|
-
#
|
239
|
-
#
|
240
|
-
#
|
241
|
-
#
|
273
|
+
# message ListLogEntriesRequest {
|
274
|
+
# string parent = 1 [(google.api.resource_reference) = {
|
275
|
+
# child_type: "logging.googleapis.com/LogEntry"
|
276
|
+
# };
|
277
|
+
# }
|
242
278
|
class ResourceReference
|
243
279
|
include ::Google::Protobuf::MessageExts
|
244
280
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -83,6 +83,9 @@ module Google
|
|
83
83
|
# @!attribute [r] state
|
84
84
|
# @return [::Google::Cloud::SecretManager::V1::SecretVersion::State]
|
85
85
|
# Output only. The current state of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
|
86
|
+
# @!attribute [rw] replication_status
|
87
|
+
# @return [::Google::Cloud::SecretManager::V1::ReplicationStatus]
|
88
|
+
# The replication status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
|
86
89
|
class SecretVersion
|
87
90
|
include ::Google::Protobuf::MessageExts
|
88
91
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -106,7 +109,7 @@ module Google
|
|
106
109
|
end
|
107
110
|
end
|
108
111
|
|
109
|
-
# A policy that defines the replication configuration of data.
|
112
|
+
# A policy that defines the replication and encryption configuration of data.
|
110
113
|
# @!attribute [rw] automatic
|
111
114
|
# @return [::Google::Cloud::SecretManager::V1::Replication::Automatic]
|
112
115
|
# The {::Google::Cloud::SecretManager::V1::Secret Secret} will automatically be replicated without any restrictions.
|
@@ -119,6 +122,14 @@ module Google
|
|
119
122
|
|
120
123
|
# A replication policy that replicates the {::Google::Cloud::SecretManager::V1::Secret Secret} payload without any
|
121
124
|
# restrictions.
|
125
|
+
# @!attribute [rw] customer_managed_encryption
|
126
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
|
127
|
+
# Optional. The customer-managed encryption configuration of the {::Google::Cloud::SecretManager::V1::Secret Secret}. If no
|
128
|
+
# configuration is provided, Google-managed default encryption is used.
|
129
|
+
#
|
130
|
+
# Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption configuration only apply to
|
131
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added afterwards. They do not apply
|
132
|
+
# retroactively to existing {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
|
122
133
|
class Automatic
|
123
134
|
include ::Google::Protobuf::MessageExts
|
124
135
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -140,6 +151,15 @@ module Google
|
|
140
151
|
# @return [::String]
|
141
152
|
# The canonical IDs of the location to replicate data.
|
142
153
|
# For example: `"us-east1"`.
|
154
|
+
# @!attribute [rw] customer_managed_encryption
|
155
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
|
156
|
+
# Optional. The customer-managed encryption configuration of the [User-Managed
|
157
|
+
# Replica][Replication.UserManaged.Replica]. If no configuration is
|
158
|
+
# provided, Google-managed default encryption is used.
|
159
|
+
#
|
160
|
+
# Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption configuration only apply to
|
161
|
+
# {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added afterwards. They do not apply
|
162
|
+
# retroactively to existing {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
|
143
163
|
class Replica
|
144
164
|
include ::Google::Protobuf::MessageExts
|
145
165
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -147,6 +167,97 @@ module Google
|
|
147
167
|
end
|
148
168
|
end
|
149
169
|
|
170
|
+
# Configuration for encrypting secret payloads using customer-managed
|
171
|
+
# encryption keys (CMEK).
|
172
|
+
# @!attribute [rw] kms_key_name
|
173
|
+
# @return [::String]
|
174
|
+
# Required. The resource name of the Cloud KMS CryptoKey used to encrypt secret
|
175
|
+
# payloads.
|
176
|
+
#
|
177
|
+
# For secrets using the {::Google::Cloud::SecretManager::V1::Replication::UserManaged UserManaged} replication
|
178
|
+
# policy type, Cloud KMS CryptoKeys must reside in the same location as the
|
179
|
+
# [replica location][Secret.UserManaged.Replica.location].
|
180
|
+
#
|
181
|
+
# For secrets using the {::Google::Cloud::SecretManager::V1::Replication::Automatic Automatic} replication policy
|
182
|
+
# type, Cloud KMS CryptoKeys must reside in `global`.
|
183
|
+
#
|
184
|
+
# The expected format is `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
|
185
|
+
class CustomerManagedEncryption
|
186
|
+
include ::Google::Protobuf::MessageExts
|
187
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
188
|
+
end
|
189
|
+
|
190
|
+
# The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
|
191
|
+
# @!attribute [rw] automatic
|
192
|
+
# @return [::Google::Cloud::SecretManager::V1::ReplicationStatus::AutomaticStatus]
|
193
|
+
# Describes the replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} with
|
194
|
+
# automatic replication.
|
195
|
+
#
|
196
|
+
# Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has an automatic replication
|
197
|
+
# policy.
|
198
|
+
# @!attribute [rw] user_managed
|
199
|
+
# @return [::Google::Cloud::SecretManager::V1::ReplicationStatus::UserManagedStatus]
|
200
|
+
# Describes the replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} with
|
201
|
+
# user-managed replication.
|
202
|
+
#
|
203
|
+
# Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has a user-managed replication
|
204
|
+
# policy.
|
205
|
+
class ReplicationStatus
|
206
|
+
include ::Google::Protobuf::MessageExts
|
207
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
208
|
+
|
209
|
+
# The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} using automatic replication.
|
210
|
+
#
|
211
|
+
# Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has an automatic replication
|
212
|
+
# policy.
|
213
|
+
# @!attribute [r] customer_managed_encryption
|
214
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
|
215
|
+
# Output only. The customer-managed encryption status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
|
216
|
+
# populated if customer-managed encryption is used.
|
217
|
+
class AutomaticStatus
|
218
|
+
include ::Google::Protobuf::MessageExts
|
219
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
220
|
+
end
|
221
|
+
|
222
|
+
# The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} using user-managed
|
223
|
+
# replication.
|
224
|
+
#
|
225
|
+
# Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has a user-managed replication
|
226
|
+
# policy.
|
227
|
+
# @!attribute [r] replicas
|
228
|
+
# @return [::Array<::Google::Cloud::SecretManager::V1::ReplicationStatus::UserManagedStatus::ReplicaStatus>]
|
229
|
+
# Output only. The list of replica statuses for the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
|
230
|
+
class UserManagedStatus
|
231
|
+
include ::Google::Protobuf::MessageExts
|
232
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
233
|
+
|
234
|
+
# Describes the status of a user-managed replica for the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
|
235
|
+
# @!attribute [r] location
|
236
|
+
# @return [::String]
|
237
|
+
# Output only. The canonical ID of the replica location.
|
238
|
+
# For example: `"us-east1"`.
|
239
|
+
# @!attribute [r] customer_managed_encryption
|
240
|
+
# @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
|
241
|
+
# Output only. The customer-managed encryption status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
|
242
|
+
# populated if customer-managed encryption is used.
|
243
|
+
class ReplicaStatus
|
244
|
+
include ::Google::Protobuf::MessageExts
|
245
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
246
|
+
end
|
247
|
+
end
|
248
|
+
end
|
249
|
+
|
250
|
+
# Describes the status of customer-managed encryption.
|
251
|
+
# @!attribute [rw] kms_key_version_name
|
252
|
+
# @return [::String]
|
253
|
+
# Required. The resource name of the Cloud KMS CryptoKeyVersion used to encrypt the
|
254
|
+
# secret payload, in the following format:
|
255
|
+
# `projects/*/locations/*/keyRings/*/cryptoKeys/*/versions/*`.
|
256
|
+
class CustomerManagedEncryptionStatus
|
257
|
+
include ::Google::Protobuf::MessageExts
|
258
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
259
|
+
end
|
260
|
+
|
150
261
|
# A secret payload resource in the Secret Manager API. This contains the
|
151
262
|
# sensitive secret payload that is associated with a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
|
152
263
|
# @!attribute [rw] data
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-secret_manager-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.5.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2021-01-19 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: gapic-common
|
@@ -16,14 +16,14 @@ dependencies:
|
|
16
16
|
requirements:
|
17
17
|
- - "~>"
|
18
18
|
- !ruby/object:Gem::Version
|
19
|
-
version: '0.
|
19
|
+
version: '0.3'
|
20
20
|
type: :runtime
|
21
21
|
prerelease: false
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
23
23
|
requirements:
|
24
24
|
- - "~>"
|
25
25
|
- !ruby/object:Gem::Version
|
26
|
-
version: '0.
|
26
|
+
version: '0.3'
|
27
27
|
- !ruby/object:Gem::Dependency
|
28
28
|
name: google-cloud-errors
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
@@ -224,7 +224,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
224
224
|
- !ruby/object:Gem::Version
|
225
225
|
version: '0'
|
226
226
|
requirements: []
|
227
|
-
rubygems_version: 3.
|
227
|
+
rubygems_version: 3.2.6
|
228
228
|
signing_key:
|
229
229
|
specification_version: 4
|
230
230
|
summary: API Client library for the Secret Manager V1 API
|