google-cloud-secret_manager-v1 0.4.2 → 0.5.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4bb51798c84c86d7ef19644cdf0462bbc65cd85ad9d139a9a2f267bd29b7cbaf
4
- data.tar.gz: 79b59c3905d686cfdda416f793fce81bde1a998af9b43bc547ea9dd196b9167e
3
+ metadata.gz: bf03cd5041b88a10cdc8648e70d6286e77a5eb6255873b22233d232d749d9d04
4
+ data.tar.gz: 0b7d87e1e5fc9e93130d2acad124dc6f2023879c993b503e03fb43b654325fb1
5
5
  SHA512:
6
- metadata.gz: d8aa4cacc6d510414937a8d8b8a7e90bc78f592115f0d33d2c6f998d0ea553ba944d1c004327b54308d8f52b899c3e68b566e1dc13bc1a375971322f1a560fb1
7
- data.tar.gz: 2d0819cb3b0377de4738c0bee0359617721cc258c716e8e37020e47f93dae868fda864223cebf9f6fb75d26c9965988aa8e4f5c876ecdd8b59392b8a16057c6f
6
+ metadata.gz: db62de628ee454c81f5b7b46cb96fbc1d304ae3b2ffd8a700be85b77876cbca05aa15a6df8c7cdaf357e05f7ee043552f37f7f8fbcdff72d11896ad5a6b3509a
7
+ data.tar.gz: d3a282e5589d7d86c1ec1235239670769e8e21f90d40dbbfeabbef1b28b937415dfdb65c377a2cd1ead9ad810de3636c182844884c284f4c5fc4c7794d882e55
data/README.md CHANGED
@@ -18,6 +18,7 @@ In order to use this library, you first need to go through the following steps:
18
18
 
19
19
  1. [Select or create a Cloud Platform project.](https://console.cloud.google.com/project)
20
20
  1. [Enable billing for your project.](https://cloud.google.com/billing/docs/how-to/modify-project#enable_billing_for_a_project)
21
+ 1. [Enable the API.](https://console.cloud.google.com/apis/library/secretmanager.googleapis.com)
21
22
  1. {file:AUTHENTICATION.md Set up authentication.}
22
23
 
23
24
  ## Quick Start
@@ -33,6 +34,9 @@ response = client.list_secrets request
33
34
  View the [Client Library Documentation](https://googleapis.dev/ruby/google-cloud-secret_manager-v1/latest)
34
35
  for class and method documentation.
35
36
 
37
+ See also the [Product Documentation](https://cloud.google.com/secret-manager)
38
+ for general usage information.
39
+
36
40
  ## Enabling Logging
37
41
 
38
42
  To enable logging for this library, set the logger for the underlying [gRPC](https://github.com/grpc/grpc/tree/master/src/ruby) library.
@@ -33,3 +33,6 @@ module Google
33
33
  end
34
34
  end
35
35
  end
36
+
37
+ helper_path = ::File.join __dir__, "v1", "_helpers.rb"
38
+ require "google/cloud/secret_manager/v1/_helpers" if ::File.file? helper_path
@@ -92,7 +92,7 @@ module Google
92
92
  initial_delay: 1.0,
93
93
  max_delay: 60.0,
94
94
  multiplier: 1.3,
95
- retry_codes: ["UNAVAILABLE", "UNKNOWN"]
95
+ retry_codes: [14, 2]
96
96
  }
97
97
 
98
98
  default_config.rpcs.disable_secret_version.timeout = 60.0
@@ -1347,7 +1347,7 @@ module Google
1347
1347
 
1348
1348
  config_attr :endpoint, "secretmanager.googleapis.com", ::String
1349
1349
  config_attr :credentials, nil do |value|
1350
- allowed = [::String, ::Hash, ::Proc, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
1350
+ allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
1351
1351
  allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
1352
1352
  allowed.any? { |klass| klass === value }
1353
1353
  end
@@ -1387,7 +1387,7 @@ module Google
1387
1387
  # Each configuration object is of type `Gapic::Config::Method` and includes
1388
1388
  # the following configuration fields:
1389
1389
  #
1390
- # * `timeout` (*type:* `Numeric`) - The call timeout in milliseconds
1390
+ # * `timeout` (*type:* `Numeric`) - The call timeout in seconds
1391
1391
  # * `metadata` (*type:* `Hash{Symbol=>String}`) - Additional gRPC headers
1392
1392
  # * `retry_policy (*type:* `Hash`) - The retry policy. The policy fields
1393
1393
  # include the following keys:
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecretManager
23
23
  module V1
24
- VERSION = "0.4.2"
24
+ VERSION = "0.5.1"
25
25
  end
26
26
  end
27
27
  end
@@ -20,6 +20,7 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
20
20
  optional :create_time, :message, 2, "google.protobuf.Timestamp"
21
21
  optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
22
22
  optional :state, :enum, 4, "google.cloud.secretmanager.v1.SecretVersion.State"
23
+ optional :replication_status, :message, 5, "google.cloud.secretmanager.v1.ReplicationStatus"
23
24
  end
24
25
  add_enum "google.cloud.secretmanager.v1.SecretVersion.State" do
25
26
  value :STATE_UNSPECIFIED, 0
@@ -34,12 +35,36 @@ Google::Protobuf::DescriptorPool.generated_pool.build do
34
35
  end
35
36
  end
36
37
  add_message "google.cloud.secretmanager.v1.Replication.Automatic" do
38
+ optional :customer_managed_encryption, :message, 1, "google.cloud.secretmanager.v1.CustomerManagedEncryption"
37
39
  end
38
40
  add_message "google.cloud.secretmanager.v1.Replication.UserManaged" do
39
41
  repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.Replication.UserManaged.Replica"
40
42
  end
41
43
  add_message "google.cloud.secretmanager.v1.Replication.UserManaged.Replica" do
42
44
  optional :location, :string, 1
45
+ optional :customer_managed_encryption, :message, 2, "google.cloud.secretmanager.v1.CustomerManagedEncryption"
46
+ end
47
+ add_message "google.cloud.secretmanager.v1.CustomerManagedEncryption" do
48
+ optional :kms_key_name, :string, 1
49
+ end
50
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus" do
51
+ oneof :replication_status do
52
+ optional :automatic, :message, 1, "google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus"
53
+ optional :user_managed, :message, 2, "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus"
54
+ end
55
+ end
56
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus" do
57
+ optional :customer_managed_encryption, :message, 1, "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus"
58
+ end
59
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus" do
60
+ repeated :replicas, :message, 1, "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus"
61
+ end
62
+ add_message "google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus" do
63
+ optional :location, :string, 1
64
+ optional :customer_managed_encryption, :message, 2, "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus"
65
+ end
66
+ add_message "google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus" do
67
+ optional :kms_key_version_name, :string, 1
43
68
  end
44
69
  add_message "google.cloud.secretmanager.v1.SecretPayload" do
45
70
  optional :data, :bytes, 1
@@ -58,6 +83,12 @@ module Google
58
83
  Replication::Automatic = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.Automatic").msgclass
59
84
  Replication::UserManaged = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged").msgclass
60
85
  Replication::UserManaged::Replica = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.Replication.UserManaged.Replica").msgclass
86
+ CustomerManagedEncryption = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CustomerManagedEncryption").msgclass
87
+ ReplicationStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus").msgclass
88
+ ReplicationStatus::AutomaticStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.AutomaticStatus").msgclass
89
+ ReplicationStatus::UserManagedStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus").msgclass
90
+ ReplicationStatus::UserManagedStatus::ReplicaStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.ReplicationStatus.UserManagedStatus.ReplicaStatus").msgclass
91
+ CustomerManagedEncryptionStatus = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.CustomerManagedEncryptionStatus").msgclass
61
92
  SecretPayload = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.secretmanager.v1.SecretPayload").msgclass
62
93
  end
63
94
  end
@@ -24,9 +24,6 @@ module Google
24
24
  module SecretManager
25
25
  module V1
26
26
  module SecretManagerService
27
- # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
28
- # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
29
- #
30
27
  # Secret Manager Service
31
28
  #
32
29
  # Manages secrets and operations using those secrets. Implements a REST
@@ -43,56 +40,56 @@ module Google
43
40
  self.service_name = 'google.cloud.secretmanager.v1.SecretManagerService'
44
41
 
45
42
  # Lists [Secrets][google.cloud.secretmanager.v1.Secret].
46
- rpc :ListSecrets, Google::Cloud::SecretManager::V1::ListSecretsRequest, Google::Cloud::SecretManager::V1::ListSecretsResponse
43
+ rpc :ListSecrets, ::Google::Cloud::SecretManager::V1::ListSecretsRequest, ::Google::Cloud::SecretManager::V1::ListSecretsResponse
47
44
  # Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][google.cloud.secretmanager.v1.SecretVersion].
48
- rpc :CreateSecret, Google::Cloud::SecretManager::V1::CreateSecretRequest, Google::Cloud::SecretManager::V1::Secret
45
+ rpc :CreateSecret, ::Google::Cloud::SecretManager::V1::CreateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
49
46
  # Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret data and attaches
50
47
  # it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
51
- rpc :AddSecretVersion, Google::Cloud::SecretManager::V1::AddSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
48
+ rpc :AddSecretVersion, ::Google::Cloud::SecretManager::V1::AddSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
52
49
  # Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
53
- rpc :GetSecret, Google::Cloud::SecretManager::V1::GetSecretRequest, Google::Cloud::SecretManager::V1::Secret
50
+ rpc :GetSecret, ::Google::Cloud::SecretManager::V1::GetSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
54
51
  # Updates metadata of an existing [Secret][google.cloud.secretmanager.v1.Secret].
55
- rpc :UpdateSecret, Google::Cloud::SecretManager::V1::UpdateSecretRequest, Google::Cloud::SecretManager::V1::Secret
52
+ rpc :UpdateSecret, ::Google::Cloud::SecretManager::V1::UpdateSecretRequest, ::Google::Cloud::SecretManager::V1::Secret
56
53
  # Deletes a [Secret][google.cloud.secretmanager.v1.Secret].
57
- rpc :DeleteSecret, Google::Cloud::SecretManager::V1::DeleteSecretRequest, Google::Protobuf::Empty
54
+ rpc :DeleteSecret, ::Google::Cloud::SecretManager::V1::DeleteSecretRequest, ::Google::Protobuf::Empty
58
55
  # Lists [SecretVersions][google.cloud.secretmanager.v1.SecretVersion]. This call does not return secret
59
56
  # data.
60
- rpc :ListSecretVersions, Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
57
+ rpc :ListSecretVersions, ::Google::Cloud::SecretManager::V1::ListSecretVersionsRequest, ::Google::Cloud::SecretManager::V1::ListSecretVersionsResponse
61
58
  # Gets metadata for a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
62
59
  #
63
60
  # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
64
61
  # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
65
- rpc :GetSecretVersion, Google::Cloud::SecretManager::V1::GetSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
62
+ rpc :GetSecretVersion, ::Google::Cloud::SecretManager::V1::GetSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
66
63
  # Accesses a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion]. This call returns the secret data.
67
64
  #
68
65
  # `projects/*/secrets/*/versions/latest` is an alias to the `latest`
69
66
  # [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
70
- rpc :AccessSecretVersion, Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
67
+ rpc :AccessSecretVersion, ::Google::Cloud::SecretManager::V1::AccessSecretVersionRequest, ::Google::Cloud::SecretManager::V1::AccessSecretVersionResponse
71
68
  # Disables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
72
69
  #
73
70
  # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
74
71
  # [DISABLED][google.cloud.secretmanager.v1.SecretVersion.State.DISABLED].
75
- rpc :DisableSecretVersion, Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
72
+ rpc :DisableSecretVersion, ::Google::Cloud::SecretManager::V1::DisableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
76
73
  # Enables a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
77
74
  #
78
75
  # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
79
76
  # [ENABLED][google.cloud.secretmanager.v1.SecretVersion.State.ENABLED].
80
- rpc :EnableSecretVersion, Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
77
+ rpc :EnableSecretVersion, ::Google::Cloud::SecretManager::V1::EnableSecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
81
78
  # Destroys a [SecretVersion][google.cloud.secretmanager.v1.SecretVersion].
82
79
  #
83
80
  # Sets the [state][google.cloud.secretmanager.v1.SecretVersion.state] of the [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] to
84
81
  # [DESTROYED][google.cloud.secretmanager.v1.SecretVersion.State.DESTROYED] and irrevocably destroys the
85
82
  # secret data.
86
- rpc :DestroySecretVersion, Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, Google::Cloud::SecretManager::V1::SecretVersion
83
+ rpc :DestroySecretVersion, ::Google::Cloud::SecretManager::V1::DestroySecretVersionRequest, ::Google::Cloud::SecretManager::V1::SecretVersion
87
84
  # Sets the access control policy on the specified secret. Replaces any
88
85
  # existing policy.
89
86
  #
90
87
  # Permissions on [SecretVersions][google.cloud.secretmanager.v1.SecretVersion] are enforced according
91
88
  # to the policy set on the associated [Secret][google.cloud.secretmanager.v1.Secret].
92
- rpc :SetIamPolicy, Google::Iam::V1::SetIamPolicyRequest, Google::Iam::V1::Policy
89
+ rpc :SetIamPolicy, ::Google::Iam::V1::SetIamPolicyRequest, ::Google::Iam::V1::Policy
93
90
  # Gets the access control policy for a secret.
94
91
  # Returns empty policy if the secret exists and does not have a policy set.
95
- rpc :GetIamPolicy, Google::Iam::V1::GetIamPolicyRequest, Google::Iam::V1::Policy
92
+ rpc :GetIamPolicy, ::Google::Iam::V1::GetIamPolicyRequest, ::Google::Iam::V1::Policy
96
93
  # Returns permissions that a caller has for the specified secret.
97
94
  # If the secret does not exist, this call returns an empty set of
98
95
  # permissions, not a NOT_FOUND error.
@@ -100,7 +97,7 @@ module Google
100
97
  # Note: This operation is designed to be used for building permission-aware
101
98
  # UIs and command-line tools, not for authorization checking. This operation
102
99
  # may "fail open" without warning.
103
- rpc :TestIamPermissions, Google::Iam::V1::TestIamPermissionsRequest, Google::Iam::V1::TestIamPermissionsResponse
100
+ rpc :TestIamPermissions, ::Google::Iam::V1::TestIamPermissionsRequest, ::Google::Iam::V1::TestIamPermissionsResponse
104
101
  end
105
102
 
106
103
  Stub = Service.rpc_stub_class
@@ -43,12 +43,12 @@ module Google
43
43
  #
44
44
  # The ResourceDescriptor Yaml config will look like:
45
45
  #
46
- # resources:
47
- # - type: "pubsub.googleapis.com/Topic"
48
- # name_descriptor:
49
- # - pattern: "projects/\\{project}/topics/\\{topic}"
50
- # parent_type: "cloudresourcemanager.googleapis.com/Project"
51
- # parent_name_extractor: "projects/\\{project}"
46
+ # resources:
47
+ # - type: "pubsub.googleapis.com/Topic"
48
+ # name_descriptor:
49
+ # - pattern: "projects/{project}/topics/{topic}"
50
+ # parent_type: "cloudresourcemanager.googleapis.com/Project"
51
+ # parent_name_extractor: "projects/{project}"
52
52
  #
53
53
  # Sometimes, resources have multiple patterns, typically because they can
54
54
  # live under multiple parents.
@@ -183,15 +183,24 @@ module Google
183
183
  # }
184
184
  # @!attribute [rw] plural
185
185
  # @return [::String]
186
- # The plural name used in the resource name, such as 'projects' for
187
- # the name of 'projects/\\{project}'. It is the same concept of the `plural`
188
- # field in k8s CRD spec
186
+ # The plural name used in the resource name and permission names, such as
187
+ # 'projects' for the resource name of 'projects/\\{project}' and the permission
188
+ # name of 'cloudresourcemanager.googleapis.com/projects.get'. It is the same
189
+ # concept of the `plural` field in k8s CRD spec
189
190
  # https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
191
+ #
192
+ # Note: The plural form is required even for singleton resources. See
193
+ # https://aip.dev/156
190
194
  # @!attribute [rw] singular
191
195
  # @return [::String]
192
196
  # The same concept of the `singular` field in k8s CRD spec
193
197
  # https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
194
198
  # Such as "project" for the `resourcemanager.googleapis.com/Project` type.
199
+ # @!attribute [rw] style
200
+ # @return [::Array<::Google::Api::ResourceDescriptor::Style>]
201
+ # Style flag(s) for this resource.
202
+ # These indicate that a resource is expected to conform to a given
203
+ # style. See the specific style flags for additional information.
195
204
  class ResourceDescriptor
196
205
  include ::Google::Protobuf::MessageExts
197
206
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -211,6 +220,22 @@ module Google
211
220
  # that from being necessary once there are multiple patterns.)
212
221
  FUTURE_MULTI_PATTERN = 2
213
222
  end
223
+
224
+ # A flag representing a specific style that a resource claims to conform to.
225
+ module Style
226
+ # The unspecified value. Do not use.
227
+ STYLE_UNSPECIFIED = 0
228
+
229
+ # This resource is intended to be "declarative-friendly".
230
+ #
231
+ # Declarative-friendly resources must be more strictly consistent, and
232
+ # setting this to true communicates to tools that this resource should
233
+ # adhere to declarative-friendly expectations.
234
+ #
235
+ # Note: This is used by the API linter (linter.aip.dev) to enable
236
+ # additional checks.
237
+ DECLARATIVE_FRIENDLY = 1
238
+ end
214
239
  end
215
240
 
216
241
  # Defines a proto annotation that describes a string field that refers to
@@ -226,6 +251,17 @@ module Google
226
251
  # type: "pubsub.googleapis.com/Topic"
227
252
  # }];
228
253
  # }
254
+ #
255
+ # Occasionally, a field may reference an arbitrary resource. In this case,
256
+ # APIs use the special value * in their resource reference.
257
+ #
258
+ # Example:
259
+ #
260
+ # message GetIamPolicyRequest {
261
+ # string resource = 2 [(google.api.resource_reference) = {
262
+ # type: "*"
263
+ # }];
264
+ # }
229
265
  # @!attribute [rw] child_type
230
266
  # @return [::String]
231
267
  # The resource type of a child collection that the annotated field
@@ -234,11 +270,11 @@ module Google
234
270
  #
235
271
  # Example:
236
272
  #
237
- # message ListLogEntriesRequest {
238
- # string parent = 1 [(google.api.resource_reference) = {
239
- # child_type: "logging.googleapis.com/LogEntry"
240
- # };
241
- # }
273
+ # message ListLogEntriesRequest {
274
+ # string parent = 1 [(google.api.resource_reference) = {
275
+ # child_type: "logging.googleapis.com/LogEntry"
276
+ # };
277
+ # }
242
278
  class ResourceReference
243
279
  include ::Google::Protobuf::MessageExts
244
280
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -83,6 +83,9 @@ module Google
83
83
  # @!attribute [r] state
84
84
  # @return [::Google::Cloud::SecretManager::V1::SecretVersion::State]
85
85
  # Output only. The current state of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
86
+ # @!attribute [rw] replication_status
87
+ # @return [::Google::Cloud::SecretManager::V1::ReplicationStatus]
88
+ # The replication status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
86
89
  class SecretVersion
87
90
  include ::Google::Protobuf::MessageExts
88
91
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -106,7 +109,7 @@ module Google
106
109
  end
107
110
  end
108
111
 
109
- # A policy that defines the replication configuration of data.
112
+ # A policy that defines the replication and encryption configuration of data.
110
113
  # @!attribute [rw] automatic
111
114
  # @return [::Google::Cloud::SecretManager::V1::Replication::Automatic]
112
115
  # The {::Google::Cloud::SecretManager::V1::Secret Secret} will automatically be replicated without any restrictions.
@@ -119,6 +122,14 @@ module Google
119
122
 
120
123
  # A replication policy that replicates the {::Google::Cloud::SecretManager::V1::Secret Secret} payload without any
121
124
  # restrictions.
125
+ # @!attribute [rw] customer_managed_encryption
126
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
127
+ # Optional. The customer-managed encryption configuration of the {::Google::Cloud::SecretManager::V1::Secret Secret}. If no
128
+ # configuration is provided, Google-managed default encryption is used.
129
+ #
130
+ # Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption configuration only apply to
131
+ # {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added afterwards. They do not apply
132
+ # retroactively to existing {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
122
133
  class Automatic
123
134
  include ::Google::Protobuf::MessageExts
124
135
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -140,6 +151,15 @@ module Google
140
151
  # @return [::String]
141
152
  # The canonical IDs of the location to replicate data.
142
153
  # For example: `"us-east1"`.
154
+ # @!attribute [rw] customer_managed_encryption
155
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryption]
156
+ # Optional. The customer-managed encryption configuration of the [User-Managed
157
+ # Replica][Replication.UserManaged.Replica]. If no configuration is
158
+ # provided, Google-managed default encryption is used.
159
+ #
160
+ # Updates to the {::Google::Cloud::SecretManager::V1::Secret Secret} encryption configuration only apply to
161
+ # {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions} added afterwards. They do not apply
162
+ # retroactively to existing {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersions}.
143
163
  class Replica
144
164
  include ::Google::Protobuf::MessageExts
145
165
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -147,6 +167,97 @@ module Google
147
167
  end
148
168
  end
149
169
 
170
+ # Configuration for encrypting secret payloads using customer-managed
171
+ # encryption keys (CMEK).
172
+ # @!attribute [rw] kms_key_name
173
+ # @return [::String]
174
+ # Required. The resource name of the Cloud KMS CryptoKey used to encrypt secret
175
+ # payloads.
176
+ #
177
+ # For secrets using the {::Google::Cloud::SecretManager::V1::Replication::UserManaged UserManaged} replication
178
+ # policy type, Cloud KMS CryptoKeys must reside in the same location as the
179
+ # [replica location][Secret.UserManaged.Replica.location].
180
+ #
181
+ # For secrets using the {::Google::Cloud::SecretManager::V1::Replication::Automatic Automatic} replication policy
182
+ # type, Cloud KMS CryptoKeys must reside in `global`.
183
+ #
184
+ # The expected format is `projects/*/locations/*/keyRings/*/cryptoKeys/*`.
185
+ class CustomerManagedEncryption
186
+ include ::Google::Protobuf::MessageExts
187
+ extend ::Google::Protobuf::MessageExts::ClassMethods
188
+ end
189
+
190
+ # The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
191
+ # @!attribute [rw] automatic
192
+ # @return [::Google::Cloud::SecretManager::V1::ReplicationStatus::AutomaticStatus]
193
+ # Describes the replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} with
194
+ # automatic replication.
195
+ #
196
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has an automatic replication
197
+ # policy.
198
+ # @!attribute [rw] user_managed
199
+ # @return [::Google::Cloud::SecretManager::V1::ReplicationStatus::UserManagedStatus]
200
+ # Describes the replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} with
201
+ # user-managed replication.
202
+ #
203
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has a user-managed replication
204
+ # policy.
205
+ class ReplicationStatus
206
+ include ::Google::Protobuf::MessageExts
207
+ extend ::Google::Protobuf::MessageExts::ClassMethods
208
+
209
+ # The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} using automatic replication.
210
+ #
211
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has an automatic replication
212
+ # policy.
213
+ # @!attribute [r] customer_managed_encryption
214
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
215
+ # Output only. The customer-managed encryption status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
216
+ # populated if customer-managed encryption is used.
217
+ class AutomaticStatus
218
+ include ::Google::Protobuf::MessageExts
219
+ extend ::Google::Protobuf::MessageExts::ClassMethods
220
+ end
221
+
222
+ # The replication status of a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion} using user-managed
223
+ # replication.
224
+ #
225
+ # Only populated if the parent {::Google::Cloud::SecretManager::V1::Secret Secret} has a user-managed replication
226
+ # policy.
227
+ # @!attribute [r] replicas
228
+ # @return [::Array<::Google::Cloud::SecretManager::V1::ReplicationStatus::UserManagedStatus::ReplicaStatus>]
229
+ # Output only. The list of replica statuses for the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
230
+ class UserManagedStatus
231
+ include ::Google::Protobuf::MessageExts
232
+ extend ::Google::Protobuf::MessageExts::ClassMethods
233
+
234
+ # Describes the status of a user-managed replica for the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
235
+ # @!attribute [r] location
236
+ # @return [::String]
237
+ # Output only. The canonical ID of the replica location.
238
+ # For example: `"us-east1"`.
239
+ # @!attribute [r] customer_managed_encryption
240
+ # @return [::Google::Cloud::SecretManager::V1::CustomerManagedEncryptionStatus]
241
+ # Output only. The customer-managed encryption status of the {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}. Only
242
+ # populated if customer-managed encryption is used.
243
+ class ReplicaStatus
244
+ include ::Google::Protobuf::MessageExts
245
+ extend ::Google::Protobuf::MessageExts::ClassMethods
246
+ end
247
+ end
248
+ end
249
+
250
+ # Describes the status of customer-managed encryption.
251
+ # @!attribute [rw] kms_key_version_name
252
+ # @return [::String]
253
+ # Required. The resource name of the Cloud KMS CryptoKeyVersion used to encrypt the
254
+ # secret payload, in the following format:
255
+ # `projects/*/locations/*/keyRings/*/cryptoKeys/*/versions/*`.
256
+ class CustomerManagedEncryptionStatus
257
+ include ::Google::Protobuf::MessageExts
258
+ extend ::Google::Protobuf::MessageExts::ClassMethods
259
+ end
260
+
150
261
  # A secret payload resource in the Secret Manager API. This contains the
151
262
  # sensitive secret payload that is associated with a {::Google::Cloud::SecretManager::V1::SecretVersion SecretVersion}.
152
263
  # @!attribute [rw] data
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-secret_manager-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.2
4
+ version: 0.5.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-06-05 00:00:00.000000000 Z
11
+ date: 2021-01-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -16,14 +16,14 @@ dependencies:
16
16
  requirements:
17
17
  - - "~>"
18
18
  - !ruby/object:Gem::Version
19
- version: '0.2'
19
+ version: '0.3'
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
24
  - - "~>"
25
25
  - !ruby/object:Gem::Version
26
- version: '0.2'
26
+ version: '0.3'
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: google-cloud-errors
29
29
  requirement: !ruby/object:Gem::Requirement
@@ -224,7 +224,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
224
224
  - !ruby/object:Gem::Version
225
225
  version: '0'
226
226
  requirements: []
227
- rubygems_version: 3.1.3
227
+ rubygems_version: 3.2.6
228
228
  signing_key:
229
229
  specification_version: 4
230
230
  summary: API Client library for the Secret Manager V1 API