google-cloud-secret_manager-v1beta1 0.18.0 → 0.20.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/secret_manager/v1beta1/bindings_override.rb +2 -29
- data/lib/google/cloud/secret_manager/v1beta1/secret_manager_service/client.rb +20 -3
- data/lib/google/cloud/secret_manager/v1beta1/version.rb +1 -1
- data/lib/google/cloud/secrets/v1beta1/resources_pb.rb +2 -24
- data/lib/google/cloud/secrets/v1beta1/service_pb.rb +2 -25
- data/proto_docs/google/iam/v1/policy.rb +1 -1
- metadata +5 -5
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 76df628bb8af00d5d5893e31b70e16b9946117308675f133039e94300f813d19
|
|
4
|
+
data.tar.gz: f972781a6127c7af0b5215a193693bce0f0b4c73477700e8ad8c4f9815666ee6
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 8e19f30d860448fb1d3ccffbbae3683eeee638fac2af935a74f90c7f1e2a49b572334ef5ab2df5ba9183f2abae235ebe81b81bd044bb8a1d301929a8f808bd67
|
|
7
|
+
data.tar.gz: 5e576bb45d3cde621b790df2826af0e9626937d63d9ee3ba7cb2cebac745d58e8df5ae3d05aa66341d170333eecb5346522739fd7e92e3e334ae9e78133de5ca
|
|
@@ -16,7 +16,7 @@
|
|
|
16
16
|
|
|
17
17
|
# Auto-generated by gapic-generator-ruby. DO NOT EDIT!
|
|
18
18
|
|
|
19
|
-
require "gapic/
|
|
19
|
+
require "gapic/rest"
|
|
20
20
|
|
|
21
21
|
module Google
|
|
22
22
|
module Cloud
|
|
@@ -42,7 +42,7 @@ module Google
|
|
|
42
42
|
namespace.pop
|
|
43
43
|
end
|
|
44
44
|
|
|
45
|
-
default_config =
|
|
45
|
+
default_config = ::Gapic::Rest::HttpBindingOverrideConfiguration.new parent_config
|
|
46
46
|
default_config.bindings_override["google.cloud.location.Locations.GetLocation"] = [
|
|
47
47
|
Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
|
|
48
48
|
uri_method: :get,
|
|
@@ -69,33 +69,6 @@ module Google
|
|
|
69
69
|
yield @configure if block_given?
|
|
70
70
|
@configure
|
|
71
71
|
end
|
|
72
|
-
|
|
73
|
-
##
|
|
74
|
-
# @private
|
|
75
|
-
# Configuration class for the google.cloud.secrets.v1beta1 package.
|
|
76
|
-
#
|
|
77
|
-
# This class contains common configuration for all services
|
|
78
|
-
# of the google.cloud.secrets.v1beta1 package.
|
|
79
|
-
#
|
|
80
|
-
# This configuration is for internal use of the client library classes,
|
|
81
|
-
# and it is not intended that the end-users will read or change it.
|
|
82
|
-
#
|
|
83
|
-
class Configuration
|
|
84
|
-
extend ::Gapic::Config
|
|
85
|
-
|
|
86
|
-
# @private
|
|
87
|
-
# Overrides for http bindings for the RPC of the mixins for this package.
|
|
88
|
-
# Services in this package should use these when creating clients for the mixin services.
|
|
89
|
-
# @return [::Hash{::Symbol=>::Array<::Gapic::Rest::GrpcTranscoder::HttpBinding>}]
|
|
90
|
-
config_attr :bindings_override, {}, ::Hash, nil
|
|
91
|
-
|
|
92
|
-
# @private
|
|
93
|
-
def initialize parent_config = nil
|
|
94
|
-
@parent_config = parent_config unless parent_config.nil?
|
|
95
|
-
|
|
96
|
-
yield self if block_given?
|
|
97
|
-
end
|
|
98
|
-
end
|
|
99
72
|
end
|
|
100
73
|
end
|
|
101
74
|
end
|
|
@@ -1673,8 +1673,6 @@ module Google
|
|
|
1673
1673
|
# @return [::String,nil]
|
|
1674
1674
|
# @!attribute [rw] credentials
|
|
1675
1675
|
# Credentials to send with calls. You may provide any of the following types:
|
|
1676
|
-
# * (`String`) The path to a service account key file in JSON format
|
|
1677
|
-
# * (`Hash`) A service account key as a Hash
|
|
1678
1676
|
# * (`Google::Auth::Credentials`) A googleauth credentials object
|
|
1679
1677
|
# (see the [googleauth docs](https://rubydoc.info/gems/googleauth/Google/Auth/Credentials))
|
|
1680
1678
|
# * (`Signet::OAuth2::Client`) A signet oauth2 client object
|
|
@@ -1683,7 +1681,26 @@ module Google
|
|
|
1683
1681
|
# * (`GRPC::Core::ChannelCredentials`) a gRPC credentails object
|
|
1684
1682
|
# * (`nil`) indicating no credentials
|
|
1685
1683
|
#
|
|
1686
|
-
# Warning:
|
|
1684
|
+
# @note Warning: Passing a `String` to a keyfile path or a `Hash` of credentials
|
|
1685
|
+
# is deprecated. Providing an unvalidated credential configuration to
|
|
1686
|
+
# Google APIs can compromise the security of your systems and data.
|
|
1687
|
+
#
|
|
1688
|
+
# @example
|
|
1689
|
+
#
|
|
1690
|
+
# # The recommended way to provide credentials is to use the `make_creds` method
|
|
1691
|
+
# # on the appropriate credentials class for your environment.
|
|
1692
|
+
#
|
|
1693
|
+
# require "googleauth"
|
|
1694
|
+
#
|
|
1695
|
+
# credentials = ::Google::Auth::ServiceAccountCredentials.make_creds(
|
|
1696
|
+
# json_key_io: ::File.open("/path/to/keyfile.json")
|
|
1697
|
+
# )
|
|
1698
|
+
#
|
|
1699
|
+
# client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Client.new do |config|
|
|
1700
|
+
# config.credentials = credentials
|
|
1701
|
+
# end
|
|
1702
|
+
#
|
|
1703
|
+
# @note Warning: If you accept a credential configuration (JSON file or Hash) from an
|
|
1687
1704
|
# external source for authentication to Google Cloud, you must validate it before
|
|
1688
1705
|
# providing it to a Google API client library. Providing an unvalidated credential
|
|
1689
1706
|
# configuration to Google APIs can compromise the security of your systems and data.
|
|
@@ -11,30 +11,8 @@ require 'google/protobuf/timestamp_pb'
|
|
|
11
11
|
|
|
12
12
|
descriptor_data = "\n,google/cloud/secrets/v1beta1/resources.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xd9\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x46\n\x0breplication\x18\x02 \x01(\x0b\x32).google.cloud.secrets.v1beta1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12@\n\x06labels\x18\x04 \x03(\x0b\x32\x30.google.cloud.secrets.v1beta1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\"\x90\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x45\n\x05state\x18\x04 \x01(\x0e\x32\x31.google.cloud.secrets.v1beta1.SecretVersion.StateB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\"\xc5\x02\n\x0bReplication\x12H\n\tautomatic\x18\x01 \x01(\x0b\x32\x33.google.cloud.secrets.v1beta1.Replication.AutomaticH\x00\x12M\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x35.google.cloud.secrets.v1beta1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x80\x01\n\x0bUserManaged\x12T\n\x08replicas\x18\x01 \x03(\x0b\x32=.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication\"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\xee\x01\n&com.google.cloud.secretmanager.v1beta1B\x0eResourcesProtoP\x01Z:cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta1\xca\x02\"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3"
|
|
13
13
|
|
|
14
|
-
pool = Google::Protobuf::DescriptorPool.generated_pool
|
|
15
|
-
|
|
16
|
-
begin
|
|
17
|
-
pool.add_serialized_file(descriptor_data)
|
|
18
|
-
rescue TypeError
|
|
19
|
-
# Compatibility code: will be removed in the next major version.
|
|
20
|
-
require 'google/protobuf/descriptor_pb'
|
|
21
|
-
parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
|
|
22
|
-
parsed.clear_dependency
|
|
23
|
-
serialized = parsed.class.encode(parsed)
|
|
24
|
-
file = pool.add_serialized_file(serialized)
|
|
25
|
-
warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
|
|
26
|
-
imports = [
|
|
27
|
-
["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
|
|
28
|
-
]
|
|
29
|
-
imports.each do |type_name, expected_filename|
|
|
30
|
-
import_file = pool.lookup(type_name).file_descriptor
|
|
31
|
-
if import_file.name != expected_filename
|
|
32
|
-
warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
|
|
33
|
-
end
|
|
34
|
-
end
|
|
35
|
-
warn "Each proto file must use a consistent fully-qualified name."
|
|
36
|
-
warn "This will become an error in the next major version."
|
|
37
|
-
end
|
|
14
|
+
pool = ::Google::Protobuf::DescriptorPool.generated_pool
|
|
15
|
+
pool.add_serialized_file(descriptor_data)
|
|
38
16
|
|
|
39
17
|
module Google
|
|
40
18
|
module Cloud
|
|
@@ -17,31 +17,8 @@ require 'google/protobuf/field_mask_pb'
|
|
|
17
17
|
|
|
18
18
|
descriptor_data = "\n*google/cloud/secrets/v1beta1/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a,google/cloud/secrets/v1beta1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xad\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x39\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload\"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse\"5\xda\x41\x06parent\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"N\xda\x41\x17parent,secret_id,secret\x82\xd3\xe4\x93\x02.\"$/v1beta1/{parent=projects/*}/secrets:\x06secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"M\xda\x41\x0eparent,payload\x82\xd3\xe4\x93\x02\x36\"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"3\xda\x41\x04name\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"P\xda\x41\x12secret,update_mask\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"3\xda\x41\x04name\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse\"@\xda\x41\x06parent\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\">\xda\x41\x04name\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse\"E\xda\x41\x04name\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"I\xda\x41\x04name\x82\xd3\xe4\x93\x02<\"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"H\xda\x41\x04name\x82\xd3\xe4\x93\x02;\"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"I\xda\x41\x04name\x82\xd3\xe4\x93\x02<\"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\x12\x8b\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"@\x82\xd3\xe4\x93\x02:\"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"F\x82\xd3\xe4\x93\x02@\";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xec\x01\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01Z:cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta1\xca\x02\"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3"
|
|
19
19
|
|
|
20
|
-
pool = Google::Protobuf::DescriptorPool.generated_pool
|
|
21
|
-
|
|
22
|
-
begin
|
|
23
|
-
pool.add_serialized_file(descriptor_data)
|
|
24
|
-
rescue TypeError
|
|
25
|
-
# Compatibility code: will be removed in the next major version.
|
|
26
|
-
require 'google/protobuf/descriptor_pb'
|
|
27
|
-
parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
|
|
28
|
-
parsed.clear_dependency
|
|
29
|
-
serialized = parsed.class.encode(parsed)
|
|
30
|
-
file = pool.add_serialized_file(serialized)
|
|
31
|
-
warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
|
|
32
|
-
imports = [
|
|
33
|
-
["google.cloud.secrets.v1beta1.Secret", "google/cloud/secrets/v1beta1/resources.proto"],
|
|
34
|
-
["google.protobuf.FieldMask", "google/protobuf/field_mask.proto"],
|
|
35
|
-
]
|
|
36
|
-
imports.each do |type_name, expected_filename|
|
|
37
|
-
import_file = pool.lookup(type_name).file_descriptor
|
|
38
|
-
if import_file.name != expected_filename
|
|
39
|
-
warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
|
|
40
|
-
end
|
|
41
|
-
end
|
|
42
|
-
warn "Each proto file must use a consistent fully-qualified name."
|
|
43
|
-
warn "This will become an error in the next major version."
|
|
44
|
-
end
|
|
20
|
+
pool = ::Google::Protobuf::DescriptorPool.generated_pool
|
|
21
|
+
pool.add_serialized_file(descriptor_data)
|
|
45
22
|
|
|
46
23
|
module Google
|
|
47
24
|
module Cloud
|
|
@@ -313,7 +313,7 @@ module Google
|
|
|
313
313
|
# Specifies the identities that do not cause logging for this type of
|
|
314
314
|
# permission.
|
|
315
315
|
# Follows the same format of
|
|
316
|
-
#
|
|
316
|
+
# [Binding.members][google.iam.v1.Binding.members].
|
|
317
317
|
class AuditLogConfig
|
|
318
318
|
include ::Google::Protobuf::MessageExts
|
|
319
319
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
metadata
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: google-cloud-secret_manager-v1beta1
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.
|
|
4
|
+
version: 0.20.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Google LLC
|
|
@@ -15,14 +15,14 @@ dependencies:
|
|
|
15
15
|
requirements:
|
|
16
16
|
- - "~>"
|
|
17
17
|
- !ruby/object:Gem::Version
|
|
18
|
-
version: '1.
|
|
18
|
+
version: '1.2'
|
|
19
19
|
type: :runtime
|
|
20
20
|
prerelease: false
|
|
21
21
|
version_requirements: !ruby/object:Gem::Requirement
|
|
22
22
|
requirements:
|
|
23
23
|
- - "~>"
|
|
24
24
|
- !ruby/object:Gem::Version
|
|
25
|
-
version: '1.
|
|
25
|
+
version: '1.2'
|
|
26
26
|
- !ruby/object:Gem::Dependency
|
|
27
27
|
name: google-cloud-errors
|
|
28
28
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -122,14 +122,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
|
122
122
|
requirements:
|
|
123
123
|
- - ">="
|
|
124
124
|
- !ruby/object:Gem::Version
|
|
125
|
-
version: '3.
|
|
125
|
+
version: '3.2'
|
|
126
126
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
|
127
127
|
requirements:
|
|
128
128
|
- - ">="
|
|
129
129
|
- !ruby/object:Gem::Version
|
|
130
130
|
version: '0'
|
|
131
131
|
requirements: []
|
|
132
|
-
rubygems_version: 3.6.
|
|
132
|
+
rubygems_version: 3.6.9
|
|
133
133
|
specification_version: 4
|
|
134
134
|
summary: Stores sensitive data such as API keys, passwords, and certificates. Provides
|
|
135
135
|
convenience while improving security.
|