google-cloud-secret_manager-v1beta1 0.10.0 → 0.12.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,58 @@
1
+ # frozen_string_literal: true
2
+
3
+ # Copyright 2023 Google LLC
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # https://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+
17
+ # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
+
19
+ require "gapic/rest"
20
+ require "gapic/config"
21
+ require "gapic/config/method"
22
+
23
+ require "google/cloud/secret_manager/v1beta1/version"
24
+
25
+ require "google/cloud/secret_manager/v1beta1/secret_manager_service/credentials"
26
+ require "google/cloud/secret_manager/v1beta1/secret_manager_service/paths"
27
+ require "google/cloud/secret_manager/v1beta1/secret_manager_service/rest/client"
28
+
29
+ module Google
30
+ module Cloud
31
+ module SecretManager
32
+ module V1beta1
33
+ ##
34
+ # Secret Manager Service
35
+ #
36
+ # Manages secrets and operations using those secrets. Implements a REST
37
+ # model with the following objects:
38
+ #
39
+ # * {::Google::Cloud::SecretManager::V1beta1::Secret Secret}
40
+ # * {::Google::Cloud::SecretManager::V1beta1::SecretVersion SecretVersion}
41
+ #
42
+ # To load this service and instantiate a REST client:
43
+ #
44
+ # require "google/cloud/secret_manager/v1beta1/secret_manager_service/rest"
45
+ # client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Rest::Client.new
46
+ #
47
+ module SecretManagerService
48
+ # Client for the REST transport
49
+ module Rest
50
+ end
51
+ end
52
+ end
53
+ end
54
+ end
55
+ end
56
+
57
+ helper_path = ::File.join __dir__, "rest", "helpers.rb"
58
+ require "google/cloud/secret_manager/v1beta1/secret_manager_service/rest/helpers" if ::File.file? helper_path
@@ -25,6 +25,7 @@ require "google/cloud/secret_manager/v1beta1/version"
25
25
  require "google/cloud/secret_manager/v1beta1/secret_manager_service/credentials"
26
26
  require "google/cloud/secret_manager/v1beta1/secret_manager_service/paths"
27
27
  require "google/cloud/secret_manager/v1beta1/secret_manager_service/client"
28
+ require "google/cloud/secret_manager/v1beta1/secret_manager_service/rest"
28
29
 
29
30
  module Google
30
31
  module Cloud
@@ -39,11 +40,16 @@ module Google
39
40
  # * {::Google::Cloud::SecretManager::V1beta1::Secret Secret}
40
41
  # * {::Google::Cloud::SecretManager::V1beta1::SecretVersion SecretVersion}
41
42
  #
42
- # To load this service and instantiate a client:
43
+ # @example Load this service and instantiate a gRPC client
43
44
  #
44
45
  # require "google/cloud/secret_manager/v1beta1/secret_manager_service"
45
46
  # client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Client.new
46
47
  #
48
+ # @example Load this service and instantiate a REST client
49
+ #
50
+ # require "google/cloud/secret_manager/v1beta1/secret_manager_service/rest"
51
+ # client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Rest::Client.new
52
+ #
47
53
  module SecretManagerService
48
54
  end
49
55
  end
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecretManager
23
23
  module V1beta1
24
- VERSION = "0.10.0"
24
+ VERSION = "0.12.0"
25
25
  end
26
26
  end
27
27
  end
@@ -23,13 +23,18 @@ module Google
23
23
  module Cloud
24
24
  module SecretManager
25
25
  ##
26
- # To load this package, including all its services, and instantiate a client:
26
+ # API client module.
27
27
  #
28
- # @example
28
+ # @example Load this package, including all its services, and instantiate a gRPC client
29
29
  #
30
30
  # require "google/cloud/secret_manager/v1beta1"
31
31
  # client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Client.new
32
32
  #
33
+ # @example Load this package, including all its services, and instantiate a REST client
34
+ #
35
+ # require "google/cloud/secret_manager/v1beta1"
36
+ # client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Rest::Client.new
37
+ #
33
38
  module V1beta1
34
39
  end
35
40
  end
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/cloud/secrets/v1beta1/resources.proto
3
4
 
@@ -6,46 +7,33 @@ require 'google/protobuf'
6
7
  require 'google/api/field_behavior_pb'
7
8
  require 'google/api/resource_pb'
8
9
  require 'google/protobuf/timestamp_pb'
9
- require 'google/api/annotations_pb'
10
10
 
11
- Google::Protobuf::DescriptorPool.generated_pool.build do
12
- add_file("google/cloud/secrets/v1beta1/resources.proto", :syntax => :proto3) do
13
- add_message "google.cloud.secrets.v1beta1.Secret" do
14
- optional :name, :string, 1
15
- optional :replication, :message, 2, "google.cloud.secrets.v1beta1.Replication"
16
- optional :create_time, :message, 3, "google.protobuf.Timestamp"
17
- map :labels, :string, :string, 4
18
- end
19
- add_message "google.cloud.secrets.v1beta1.SecretVersion" do
20
- optional :name, :string, 1
21
- optional :create_time, :message, 2, "google.protobuf.Timestamp"
22
- optional :destroy_time, :message, 3, "google.protobuf.Timestamp"
23
- optional :state, :enum, 4, "google.cloud.secrets.v1beta1.SecretVersion.State"
24
- end
25
- add_enum "google.cloud.secrets.v1beta1.SecretVersion.State" do
26
- value :STATE_UNSPECIFIED, 0
27
- value :ENABLED, 1
28
- value :DISABLED, 2
29
- value :DESTROYED, 3
30
- end
31
- add_message "google.cloud.secrets.v1beta1.Replication" do
32
- oneof :replication do
33
- optional :automatic, :message, 1, "google.cloud.secrets.v1beta1.Replication.Automatic"
34
- optional :user_managed, :message, 2, "google.cloud.secrets.v1beta1.Replication.UserManaged"
35
- end
36
- end
37
- add_message "google.cloud.secrets.v1beta1.Replication.Automatic" do
38
- end
39
- add_message "google.cloud.secrets.v1beta1.Replication.UserManaged" do
40
- repeated :replicas, :message, 1, "google.cloud.secrets.v1beta1.Replication.UserManaged.Replica"
41
- end
42
- add_message "google.cloud.secrets.v1beta1.Replication.UserManaged.Replica" do
43
- optional :location, :string, 1
44
- end
45
- add_message "google.cloud.secrets.v1beta1.SecretPayload" do
46
- optional :data, :bytes, 1
11
+
12
+ descriptor_data = "\n,google/cloud/secrets/v1beta1/resources.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xd9\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x46\n\x0breplication\x18\x02 \x01(\x0b\x32).google.cloud.secrets.v1beta1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12@\n\x06labels\x18\x04 \x03(\x0b\x32\x30.google.cloud.secrets.v1beta1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\"\x90\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x45\n\x05state\x18\x04 \x01(\x0e\x32\x31.google.cloud.secrets.v1beta1.SecretVersion.StateB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\"\xc5\x02\n\x0bReplication\x12H\n\tautomatic\x18\x01 \x01(\x0b\x32\x33.google.cloud.secrets.v1beta1.Replication.AutomaticH\x00\x12M\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x35.google.cloud.secrets.v1beta1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x80\x01\n\x0bUserManaged\x12T\n\x08replicas\x18\x01 \x03(\x0b\x32=.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication\"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\xf1\x01\n&com.google.cloud.secretmanager.v1beta1B\x0eResourcesProtoP\x01Z:cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta1\xca\x02\"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3"
13
+
14
+ pool = Google::Protobuf::DescriptorPool.generated_pool
15
+
16
+ begin
17
+ pool.add_serialized_file(descriptor_data)
18
+ rescue TypeError => e
19
+ # Compatibility code: will be removed in the next major version.
20
+ require 'google/protobuf/descriptor_pb'
21
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
22
+ parsed.clear_dependency
23
+ serialized = parsed.class.encode(parsed)
24
+ file = pool.add_serialized_file(serialized)
25
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
26
+ imports = [
27
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
28
+ ]
29
+ imports.each do |type_name, expected_filename|
30
+ import_file = pool.lookup(type_name).file_descriptor
31
+ if import_file.name != expected_filename
32
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
47
33
  end
48
34
  end
35
+ warn "Each proto file must use a consistent fully-qualified name."
36
+ warn "This will become an error in the next major version."
49
37
  end
50
38
 
51
39
  module Google
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/cloud/secrets/v1beta1/service.proto
3
4
 
@@ -13,67 +14,33 @@ require 'google/iam/v1/policy_pb'
13
14
  require 'google/protobuf/empty_pb'
14
15
  require 'google/protobuf/field_mask_pb'
15
16
 
16
- Google::Protobuf::DescriptorPool.generated_pool.build do
17
- add_file("google/cloud/secrets/v1beta1/service.proto", :syntax => :proto3) do
18
- add_message "google.cloud.secrets.v1beta1.ListSecretsRequest" do
19
- optional :parent, :string, 1
20
- optional :page_size, :int32, 2
21
- optional :page_token, :string, 3
22
- end
23
- add_message "google.cloud.secrets.v1beta1.ListSecretsResponse" do
24
- repeated :secrets, :message, 1, "google.cloud.secrets.v1beta1.Secret"
25
- optional :next_page_token, :string, 2
26
- optional :total_size, :int32, 3
27
- end
28
- add_message "google.cloud.secrets.v1beta1.CreateSecretRequest" do
29
- optional :parent, :string, 1
30
- optional :secret_id, :string, 2
31
- optional :secret, :message, 3, "google.cloud.secrets.v1beta1.Secret"
32
- end
33
- add_message "google.cloud.secrets.v1beta1.AddSecretVersionRequest" do
34
- optional :parent, :string, 1
35
- optional :payload, :message, 2, "google.cloud.secrets.v1beta1.SecretPayload"
36
- end
37
- add_message "google.cloud.secrets.v1beta1.GetSecretRequest" do
38
- optional :name, :string, 1
39
- end
40
- add_message "google.cloud.secrets.v1beta1.ListSecretVersionsRequest" do
41
- optional :parent, :string, 1
42
- optional :page_size, :int32, 2
43
- optional :page_token, :string, 3
44
- end
45
- add_message "google.cloud.secrets.v1beta1.ListSecretVersionsResponse" do
46
- repeated :versions, :message, 1, "google.cloud.secrets.v1beta1.SecretVersion"
47
- optional :next_page_token, :string, 2
48
- optional :total_size, :int32, 3
49
- end
50
- add_message "google.cloud.secrets.v1beta1.GetSecretVersionRequest" do
51
- optional :name, :string, 1
52
- end
53
- add_message "google.cloud.secrets.v1beta1.UpdateSecretRequest" do
54
- optional :secret, :message, 1, "google.cloud.secrets.v1beta1.Secret"
55
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
56
- end
57
- add_message "google.cloud.secrets.v1beta1.AccessSecretVersionRequest" do
58
- optional :name, :string, 1
59
- end
60
- add_message "google.cloud.secrets.v1beta1.AccessSecretVersionResponse" do
61
- optional :name, :string, 1
62
- optional :payload, :message, 2, "google.cloud.secrets.v1beta1.SecretPayload"
63
- end
64
- add_message "google.cloud.secrets.v1beta1.DeleteSecretRequest" do
65
- optional :name, :string, 1
66
- end
67
- add_message "google.cloud.secrets.v1beta1.DisableSecretVersionRequest" do
68
- optional :name, :string, 1
69
- end
70
- add_message "google.cloud.secrets.v1beta1.EnableSecretVersionRequest" do
71
- optional :name, :string, 1
72
- end
73
- add_message "google.cloud.secrets.v1beta1.DestroySecretVersionRequest" do
74
- optional :name, :string, 1
17
+
18
+ descriptor_data = "\n*google/cloud/secrets/v1beta1/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a,google/cloud/secrets/v1beta1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xad\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x39\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload\"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse\"5\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\xda\x41\x06parent\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"N\x82\xd3\xe4\x93\x02.\"$/v1beta1/{parent=projects/*}/secrets:\x06secret\xda\x41\x17parent,secret_id,secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"M\x82\xd3\xe4\x93\x02\x36\"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\xda\x41\x0eparent,payload\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"3\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"P\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\xda\x41\x12secret,update_mask\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"3\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\xda\x41\x04name\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse\"@\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\xda\x41\x06parent\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\">\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\xda\x41\x04name\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse\"E\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\xda\x41\x04name\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"I\x82\xd3\xe4\x93\x02<\"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\xda\x41\x04name\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"H\x82\xd3\xe4\x93\x02;\"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\xda\x41\x04name\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"I\x82\xd3\xe4\x93\x02<\"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\xda\x41\x04name\x12\x8b\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"@\x82\xd3\xe4\x93\x02:\"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"F\x82\xd3\xe4\x93\x02@\";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xef\x01\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01Z:cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb\xf8\x01\x01\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta1\xca\x02\"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3"
19
+
20
+ pool = Google::Protobuf::DescriptorPool.generated_pool
21
+
22
+ begin
23
+ pool.add_serialized_file(descriptor_data)
24
+ rescue TypeError => e
25
+ # Compatibility code: will be removed in the next major version.
26
+ require 'google/protobuf/descriptor_pb'
27
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
28
+ parsed.clear_dependency
29
+ serialized = parsed.class.encode(parsed)
30
+ file = pool.add_serialized_file(serialized)
31
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
32
+ imports = [
33
+ ["google.cloud.secrets.v1beta1.Secret", "google/cloud/secrets/v1beta1/resources.proto"],
34
+ ["google.protobuf.FieldMask", "google/protobuf/field_mask.proto"],
35
+ ]
36
+ imports.each do |type_name, expected_filename|
37
+ import_file = pool.lookup(type_name).file_descriptor
38
+ if import_file.name != expected_filename
39
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
75
40
  end
76
41
  end
42
+ warn "Each proto file must use a consistent fully-qualified name."
43
+ warn "This will become an error in the next major version."
77
44
  end
78
45
 
79
46
  module Google