google-cloud-secret_manager-v1beta1 0.18.0 → 0.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 44e7b942bb0f17d9d5245f26584c196cf5be5539cebbd38c900f4c2fb8cdb3f5
4
- data.tar.gz: edbfb2a5f15a5fdefd668da572e4fcfe8bf44ddca7c45fecf992b88abf8e740c
3
+ metadata.gz: 76df628bb8af00d5d5893e31b70e16b9946117308675f133039e94300f813d19
4
+ data.tar.gz: f972781a6127c7af0b5215a193693bce0f0b4c73477700e8ad8c4f9815666ee6
5
5
  SHA512:
6
- metadata.gz: 1b184dc0f6dab8c70d2c4c1105c62c8cc8902e2b446d9a19ba827247d23d4f743de010e924b26260435a975347757cee778503d11c04df42d556f8b8494cb265
7
- data.tar.gz: fd7a426a461889c02b29b6b00301b915823286804e7a3b8a1e19695a7db13709f9b7d598c358b4f4c1fea5dc071d24cb351b43c9c38cfcf7161c95be2b47c7f1
6
+ metadata.gz: 8e19f30d860448fb1d3ccffbbae3683eeee638fac2af935a74f90c7f1e2a49b572334ef5ab2df5ba9183f2abae235ebe81b81bd044bb8a1d301929a8f808bd67
7
+ data.tar.gz: 5e576bb45d3cde621b790df2826af0e9626937d63d9ee3ba7cb2cebac745d58e8df5ae3d05aa66341d170333eecb5346522739fd7e92e3e334ae9e78133de5ca
@@ -16,7 +16,7 @@
16
16
 
17
17
  # Auto-generated by gapic-generator-ruby. DO NOT EDIT!
18
18
 
19
- require "gapic/config"
19
+ require "gapic/rest"
20
20
 
21
21
  module Google
22
22
  module Cloud
@@ -42,7 +42,7 @@ module Google
42
42
  namespace.pop
43
43
  end
44
44
 
45
- default_config = Configuration.new parent_config
45
+ default_config = ::Gapic::Rest::HttpBindingOverrideConfiguration.new parent_config
46
46
  default_config.bindings_override["google.cloud.location.Locations.GetLocation"] = [
47
47
  Gapic::Rest::GrpcTranscoder::HttpBinding.create_with_validation(
48
48
  uri_method: :get,
@@ -69,33 +69,6 @@ module Google
69
69
  yield @configure if block_given?
70
70
  @configure
71
71
  end
72
-
73
- ##
74
- # @private
75
- # Configuration class for the google.cloud.secrets.v1beta1 package.
76
- #
77
- # This class contains common configuration for all services
78
- # of the google.cloud.secrets.v1beta1 package.
79
- #
80
- # This configuration is for internal use of the client library classes,
81
- # and it is not intended that the end-users will read or change it.
82
- #
83
- class Configuration
84
- extend ::Gapic::Config
85
-
86
- # @private
87
- # Overrides for http bindings for the RPC of the mixins for this package.
88
- # Services in this package should use these when creating clients for the mixin services.
89
- # @return [::Hash{::Symbol=>::Array<::Gapic::Rest::GrpcTranscoder::HttpBinding>}]
90
- config_attr :bindings_override, {}, ::Hash, nil
91
-
92
- # @private
93
- def initialize parent_config = nil
94
- @parent_config = parent_config unless parent_config.nil?
95
-
96
- yield self if block_given?
97
- end
98
- end
99
72
  end
100
73
  end
101
74
  end
@@ -1673,8 +1673,6 @@ module Google
1673
1673
  # @return [::String,nil]
1674
1674
  # @!attribute [rw] credentials
1675
1675
  # Credentials to send with calls. You may provide any of the following types:
1676
- # * (`String`) The path to a service account key file in JSON format
1677
- # * (`Hash`) A service account key as a Hash
1678
1676
  # * (`Google::Auth::Credentials`) A googleauth credentials object
1679
1677
  # (see the [googleauth docs](https://rubydoc.info/gems/googleauth/Google/Auth/Credentials))
1680
1678
  # * (`Signet::OAuth2::Client`) A signet oauth2 client object
@@ -1683,7 +1681,26 @@ module Google
1683
1681
  # * (`GRPC::Core::ChannelCredentials`) a gRPC credentails object
1684
1682
  # * (`nil`) indicating no credentials
1685
1683
  #
1686
- # Warning: If you accept a credential configuration (JSON file or Hash) from an
1684
+ # @note Warning: Passing a `String` to a keyfile path or a `Hash` of credentials
1685
+ # is deprecated. Providing an unvalidated credential configuration to
1686
+ # Google APIs can compromise the security of your systems and data.
1687
+ #
1688
+ # @example
1689
+ #
1690
+ # # The recommended way to provide credentials is to use the `make_creds` method
1691
+ # # on the appropriate credentials class for your environment.
1692
+ #
1693
+ # require "googleauth"
1694
+ #
1695
+ # credentials = ::Google::Auth::ServiceAccountCredentials.make_creds(
1696
+ # json_key_io: ::File.open("/path/to/keyfile.json")
1697
+ # )
1698
+ #
1699
+ # client = ::Google::Cloud::SecretManager::V1beta1::SecretManagerService::Client.new do |config|
1700
+ # config.credentials = credentials
1701
+ # end
1702
+ #
1703
+ # @note Warning: If you accept a credential configuration (JSON file or Hash) from an
1687
1704
  # external source for authentication to Google Cloud, you must validate it before
1688
1705
  # providing it to a Google API client library. Providing an unvalidated credential
1689
1706
  # configuration to Google APIs can compromise the security of your systems and data.
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module SecretManager
23
23
  module V1beta1
24
- VERSION = "0.18.0"
24
+ VERSION = "0.20.0"
25
25
  end
26
26
  end
27
27
  end
@@ -11,30 +11,8 @@ require 'google/protobuf/timestamp_pb'
11
11
 
12
12
  descriptor_data = "\n,google/cloud/secrets/v1beta1/resources.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xd9\x02\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x46\n\x0breplication\x18\x02 \x01(\x0b\x32).google.cloud.secrets.v1beta1.ReplicationB\x06\xe0\x41\x05\xe0\x41\x02\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12@\n\x06labels\x18\x04 \x03(\x0b\x32\x30.google.cloud.secrets.v1beta1.Secret.LabelsEntry\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:M\xea\x41J\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\"\x90\x03\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x45\n\x05state\x18\x04 \x01(\x0e\x32\x31.google.cloud.secrets.v1beta1.SecretVersion.StateB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:n\xea\x41k\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\"\xc5\x02\n\x0bReplication\x12H\n\tautomatic\x18\x01 \x01(\x0b\x32\x33.google.cloud.secrets.v1beta1.Replication.AutomaticH\x00\x12M\n\x0cuser_managed\x18\x02 \x01(\x0b\x32\x35.google.cloud.secrets.v1beta1.Replication.UserManagedH\x00\x1a\x0b\n\tAutomatic\x1a\x80\x01\n\x0bUserManaged\x12T\n\x08replicas\x18\x01 \x03(\x0b\x32=.google.cloud.secrets.v1beta1.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x1b\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\tB\r\n\x0breplication\"\x1d\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x42\xee\x01\n&com.google.cloud.secretmanager.v1beta1B\x0eResourcesProtoP\x01Z:cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta1\xca\x02\"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3"
13
13
 
14
- pool = Google::Protobuf::DescriptorPool.generated_pool
15
-
16
- begin
17
- pool.add_serialized_file(descriptor_data)
18
- rescue TypeError
19
- # Compatibility code: will be removed in the next major version.
20
- require 'google/protobuf/descriptor_pb'
21
- parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
22
- parsed.clear_dependency
23
- serialized = parsed.class.encode(parsed)
24
- file = pool.add_serialized_file(serialized)
25
- warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
26
- imports = [
27
- ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
28
- ]
29
- imports.each do |type_name, expected_filename|
30
- import_file = pool.lookup(type_name).file_descriptor
31
- if import_file.name != expected_filename
32
- warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
33
- end
34
- end
35
- warn "Each proto file must use a consistent fully-qualified name."
36
- warn "This will become an error in the next major version."
37
- end
14
+ pool = ::Google::Protobuf::DescriptorPool.generated_pool
15
+ pool.add_serialized_file(descriptor_data)
38
16
 
39
17
  module Google
40
18
  module Cloud
@@ -17,31 +17,8 @@ require 'google/protobuf/field_mask_pb'
17
17
 
18
18
  descriptor_data = "\n*google/cloud/secrets/v1beta1/service.proto\x12\x1cgoogle.cloud.secrets.v1beta1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a,google/cloud/secrets/v1beta1/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x8a\x01\n\x12ListSecretsRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"y\n\x13ListSecretsResponse\x12\x35\n\x07secrets\x18\x01 \x03(\x0b\x32$.google.cloud.secrets.v1beta1.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xad\x01\n\x13\x43reateSecretRequest\x12\x43\n\x06parent\x18\x01 \x01(\tB3\xe0\x41\x02\xfa\x41-\n+cloudresourcemanager.googleapis.com/Project\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x39\n\x06secret\x18\x03 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\"\x99\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x41\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x89\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"\x88\x01\n\x1aListSecretVersionsResponse\x12=\n\x08versions\x18\x01 \x03(\x0b\x32+.google.cloud.secrets.v1beta1.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x86\x01\n\x13UpdateSecretRequest\x12\x39\n\x06secret\x18\x01 \x01(\x0b\x32$.google.cloud.secrets.v1beta1.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x9a\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12<\n\x07payload\x18\x02 \x01(\x0b\x32+.google.cloud.secrets.v1beta1.SecretPayload\"P\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"_\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"^\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"_\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion2\x83\x16\n\x14SecretManagerService\x12\xa9\x01\n\x0bListSecrets\x12\x30.google.cloud.secrets.v1beta1.ListSecretsRequest\x1a\x31.google.cloud.secrets.v1beta1.ListSecretsResponse\"5\xda\x41\x06parent\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{parent=projects/*}/secrets\x12\xb7\x01\n\x0c\x43reateSecret\x12\x31.google.cloud.secrets.v1beta1.CreateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"N\xda\x41\x17parent,secret_id,secret\x82\xd3\xe4\x93\x02.\"$/v1beta1/{parent=projects/*}/secrets:\x06secret\x12\xc5\x01\n\x10\x41\x64\x64SecretVersion\x12\x35.google.cloud.secrets.v1beta1.AddSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"M\xda\x41\x0eparent,payload\x82\xd3\xe4\x93\x02\x36\"1/v1beta1/{parent=projects/*/secrets/*}:addVersion:\x01*\x12\x96\x01\n\tGetSecret\x12..google.cloud.secrets.v1beta1.GetSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"3\xda\x41\x04name\x82\xd3\xe4\x93\x02&\x12$/v1beta1/{name=projects/*/secrets/*}\x12\xb9\x01\n\x0cUpdateSecret\x12\x31.google.cloud.secrets.v1beta1.UpdateSecretRequest\x1a$.google.cloud.secrets.v1beta1.Secret\"P\xda\x41\x12secret,update_mask\x82\xd3\xe4\x93\x02\x35\x32+/v1beta1/{secret.name=projects/*/secrets/*}:\x06secret\x12\x8e\x01\n\x0c\x44\x65leteSecret\x12\x31.google.cloud.secrets.v1beta1.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"3\xda\x41\x04name\x82\xd3\xe4\x93\x02&*$/v1beta1/{name=projects/*/secrets/*}\x12\xc9\x01\n\x12ListSecretVersions\x12\x37.google.cloud.secrets.v1beta1.ListSecretVersionsRequest\x1a\x38.google.cloud.secrets.v1beta1.ListSecretVersionsResponse\"@\xda\x41\x06parent\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{parent=projects/*/secrets/*}/versions\x12\xb6\x01\n\x10GetSecretVersion\x12\x35.google.cloud.secrets.v1beta1.GetSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\">\xda\x41\x04name\x82\xd3\xe4\x93\x02\x31\x12//v1beta1/{name=projects/*/secrets/*/versions/*}\x12\xd1\x01\n\x13\x41\x63\x63\x65ssSecretVersion\x12\x38.google.cloud.secrets.v1beta1.AccessSecretVersionRequest\x1a\x39.google.cloud.secrets.v1beta1.AccessSecretVersionResponse\"E\xda\x41\x04name\x82\xd3\xe4\x93\x02\x38\x12\x36/v1beta1/{name=projects/*/secrets/*/versions/*}:access\x12\xc9\x01\n\x14\x44isableSecretVersion\x12\x39.google.cloud.secrets.v1beta1.DisableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"I\xda\x41\x04name\x82\xd3\xe4\x93\x02<\"7/v1beta1/{name=projects/*/secrets/*/versions/*}:disable:\x01*\x12\xc6\x01\n\x13\x45nableSecretVersion\x12\x38.google.cloud.secrets.v1beta1.EnableSecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"H\xda\x41\x04name\x82\xd3\xe4\x93\x02;\"6/v1beta1/{name=projects/*/secrets/*/versions/*}:enable:\x01*\x12\xc9\x01\n\x14\x44\x65stroySecretVersion\x12\x39.google.cloud.secrets.v1beta1.DestroySecretVersionRequest\x1a+.google.cloud.secrets.v1beta1.SecretVersion\"I\xda\x41\x04name\x82\xd3\xe4\x93\x02<\"7/v1beta1/{name=projects/*/secrets/*/versions/*}:destroy:\x01*\x12\x8b\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"@\x82\xd3\xe4\x93\x02:\"5/v1beta1/{resource=projects/*/secrets/*}:setIamPolicy:\x01*\x12\x88\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"=\x82\xd3\xe4\x93\x02\x37\x12\x35/v1beta1/{resource=projects/*/secrets/*}:getIamPolicy\x12\xb1\x01\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"F\x82\xd3\xe4\x93\x02@\";/v1beta1/{resource=projects/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xec\x01\n&com.google.cloud.secretmanager.v1beta1B\x0cServiceProtoP\x01Z:cloud.google.com/go/secrets/apiv1beta1/secretspb;secretspb\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta1\xca\x02\"Google\\Cloud\\SecretManager\\V1beta1\xea\x02%Google::Cloud::SecretManager::V1beta1b\x06proto3"
19
19
 
20
- pool = Google::Protobuf::DescriptorPool.generated_pool
21
-
22
- begin
23
- pool.add_serialized_file(descriptor_data)
24
- rescue TypeError
25
- # Compatibility code: will be removed in the next major version.
26
- require 'google/protobuf/descriptor_pb'
27
- parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
28
- parsed.clear_dependency
29
- serialized = parsed.class.encode(parsed)
30
- file = pool.add_serialized_file(serialized)
31
- warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
32
- imports = [
33
- ["google.cloud.secrets.v1beta1.Secret", "google/cloud/secrets/v1beta1/resources.proto"],
34
- ["google.protobuf.FieldMask", "google/protobuf/field_mask.proto"],
35
- ]
36
- imports.each do |type_name, expected_filename|
37
- import_file = pool.lookup(type_name).file_descriptor
38
- if import_file.name != expected_filename
39
- warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
40
- end
41
- end
42
- warn "Each proto file must use a consistent fully-qualified name."
43
- warn "This will become an error in the next major version."
44
- end
20
+ pool = ::Google::Protobuf::DescriptorPool.generated_pool
21
+ pool.add_serialized_file(descriptor_data)
45
22
 
46
23
  module Google
47
24
  module Cloud
@@ -313,7 +313,7 @@ module Google
313
313
  # Specifies the identities that do not cause logging for this type of
314
314
  # permission.
315
315
  # Follows the same format of
316
- # {::Google::Iam::V1::Binding#members Binding.members}.
316
+ # [Binding.members][google.iam.v1.Binding.members].
317
317
  class AuditLogConfig
318
318
  include ::Google::Protobuf::MessageExts
319
319
  extend ::Google::Protobuf::MessageExts::ClassMethods
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-secret_manager-v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.18.0
4
+ version: 0.20.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
@@ -15,14 +15,14 @@ dependencies:
15
15
  requirements:
16
16
  - - "~>"
17
17
  - !ruby/object:Gem::Version
18
- version: '1.0'
18
+ version: '1.2'
19
19
  type: :runtime
20
20
  prerelease: false
21
21
  version_requirements: !ruby/object:Gem::Requirement
22
22
  requirements:
23
23
  - - "~>"
24
24
  - !ruby/object:Gem::Version
25
- version: '1.0'
25
+ version: '1.2'
26
26
  - !ruby/object:Gem::Dependency
27
27
  name: google-cloud-errors
28
28
  requirement: !ruby/object:Gem::Requirement
@@ -122,14 +122,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
122
122
  requirements:
123
123
  - - ">="
124
124
  - !ruby/object:Gem::Version
125
- version: '3.1'
125
+ version: '3.2'
126
126
  required_rubygems_version: !ruby/object:Gem::Requirement
127
127
  requirements:
128
128
  - - ">="
129
129
  - !ruby/object:Gem::Version
130
130
  version: '0'
131
131
  requirements: []
132
- rubygems_version: 3.6.8
132
+ rubygems_version: 3.6.9
133
133
  specification_version: 4
134
134
  summary: Stores sensitive data such as API keys, passwords, and certificates. Provides
135
135
  convenience while improving security.