google-cloud-secret_manager-v1beta2 0.2.0 → 0.3.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/lib/google/cloud/secret_manager/v1beta2/secret_manager_service/client.rb +7 -0
- data/lib/google/cloud/secret_manager/v1beta2/secret_manager_service/rest/client.rb +7 -0
- data/lib/google/cloud/secret_manager/v1beta2/version.rb +1 -1
- data/lib/google/cloud/secretmanager/v1beta2/resources_pb.rb +1 -1
- data/lib/google/cloud/secretmanager/v1beta2/service_pb.rb +1 -1
- data/proto_docs/google/cloud/secretmanager/v1beta2/resources.rb +14 -1
- metadata +6 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3f73bd37c892ac91549c75604e13a55c31f44ed44ba48e14617ac999b3cfd6a9
|
4
|
+
data.tar.gz: 841ce11ec1c986cca8a93411cd052864da1afa1b96a4cd84e3be889489f91662
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9b2105f7f72f9c07709ad3c612135bbd71af4ed8ee697110d4ced95f9f85835cfdfa9e948eeadf546d0ca72bd400e86378fa7c5258c2775c717592cc3822275c
|
7
|
+
data.tar.gz: 28b9afd9d44df707a48c829b10e81e8c50afe2796ac7291f30582019c3c54190966f863c3aeec149f35e27ba3c21590bfc6644a782ac6ea886fa3cbd72b1048e
|
data/README.md
CHANGED
@@ -86,7 +86,7 @@ To browse ready to use code samples check [Google Cloud Samples](https://cloud.g
|
|
86
86
|
|
87
87
|
## Supported Ruby Versions
|
88
88
|
|
89
|
-
This library is supported on Ruby
|
89
|
+
This library is supported on Ruby 3.0+.
|
90
90
|
|
91
91
|
Google provides official support for Ruby versions that are actively supported
|
92
92
|
by Ruby Core—that is, Ruby versions that are either in normal maintenance or
|
@@ -1736,6 +1736,13 @@ module Google
|
|
1736
1736
|
# * (`GRPC::Core::Channel`) a gRPC channel with included credentials
|
1737
1737
|
# * (`GRPC::Core::ChannelCredentials`) a gRPC credentails object
|
1738
1738
|
# * (`nil`) indicating no credentials
|
1739
|
+
#
|
1740
|
+
# Warning: If you accept a credential configuration (JSON file or Hash) from an
|
1741
|
+
# external source for authentication to Google Cloud, you must validate it before
|
1742
|
+
# providing it to a Google API client library. Providing an unvalidated credential
|
1743
|
+
# configuration to Google APIs can compromise the security of your systems and data.
|
1744
|
+
# For more information, refer to [Validate credential configurations from external
|
1745
|
+
# sources](https://cloud.google.com/docs/authentication/external/externally-sourced-credentials).
|
1739
1746
|
# @return [::Object]
|
1740
1747
|
# @!attribute [rw] scope
|
1741
1748
|
# The OAuth scopes
|
@@ -1623,6 +1623,13 @@ module Google
|
|
1623
1623
|
# * (`Signet::OAuth2::Client`) A signet oauth2 client object
|
1624
1624
|
# (see the [signet docs](https://rubydoc.info/gems/signet/Signet/OAuth2/Client))
|
1625
1625
|
# * (`nil`) indicating no credentials
|
1626
|
+
#
|
1627
|
+
# Warning: If you accept a credential configuration (JSON file or Hash) from an
|
1628
|
+
# external source for authentication to Google Cloud, you must validate it before
|
1629
|
+
# providing it to a Google API client library. Providing an unvalidated credential
|
1630
|
+
# configuration to Google APIs can compromise the security of your systems and data.
|
1631
|
+
# For more information, refer to [Validate credential configurations from external
|
1632
|
+
# sources](https://cloud.google.com/docs/authentication/external/externally-sourced-credentials).
|
1626
1633
|
# @return [::Object]
|
1627
1634
|
# @!attribute [rw] scope
|
1628
1635
|
# The OAuth scopes
|
@@ -10,7 +10,7 @@ require 'google/protobuf/duration_pb'
|
|
10
10
|
require 'google/protobuf/timestamp_pb'
|
11
11
|
|
12
12
|
|
13
|
-
descriptor_data = "\n2google/cloud/secretmanager/v1beta2/resources.proto\x12\"google.cloud.secretmanager.v1beta2\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\x85\t\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12L\n\x0breplication\x18\x02 \x01(\x0b\x32/.google.cloud.secretmanager.v1beta2.ReplicationB\x06\xe0\x41\x05\xe0\x41\x01\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x06labels\x18\x04 \x03(\x0b\x32\x36.google.cloud.secretmanager.v1beta2.Secret.LabelsEntry\x12>\n\x06topics\x18\x05 \x03(\x0b\x32).google.cloud.secretmanager.v1beta2.TopicB\x03\xe0\x41\x01\x12\x36\n\x0b\x65xpire_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01H\x00\x12-\n\x03ttl\x18\x07 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04H\x00\x12\x11\n\x04\x65tag\x18\x08 \x01(\tB\x03\xe0\x41\x01\x12\x43\n\x08rotation\x18\t \x01(\x0b\x32,.google.cloud.secretmanager.v1beta2.RotationB\x03\xe0\x41\x01\x12\\\n\x0fversion_aliases\x18\x0b \x03(\x0b\x32>.google.cloud.secretmanager.v1beta2.Secret.VersionAliasesEntryB\x03\xe0\x41\x01\x12U\n\x0b\x61nnotations\x18\r \x03(\x0b\x32;.google.cloud.secretmanager.v1beta2.Secret.AnnotationsEntryB\x03\xe0\x41\x01\x12;\n\x13version_destroy_ttl\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x01\x12g\n\x1b\x63ustomer_managed_encryption\x18\x0f \x01(\x0b\x32=.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x35\n\x13VersionAliasesEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x03:\x02\x38\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:\x99\x01\xea\x41\x95\x01\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\x12\x38projects/{project}/locations/{location}/secrets/{secret}*\x07secrets2\x06secretB\x0c\n\nexpiration\"\xd1\x06\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12K\n\x05state\x18\x04 \x01(\x0e\x32\x37.google.cloud.secretmanager.v1beta2.SecretVersion.StateB\x03\xe0\x41\x03\x12Q\n\x12replication_status\x18\x05 \x01(\x0b\x32\x35.google.cloud.secretmanager.v1beta2.ReplicationStatus\x12\x11\n\x04\x65tag\x18\x06 \x01(\tB\x03\xe0\x41\x03\x12.\n!client_specified_payload_checksum\x18\x07 \x01(\x08\x42\x03\xe0\x41\x03\x12?\n\x16scheduled_destroy_time\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12m\n\x1b\x63ustomer_managed_encryption\x18\t \x01(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:\xe2\x01\xea\x41\xde\x01\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\x12Rprojects/{project}/locations/{location}/secrets/{secret}/versions/{secret_version}*\x0esecretVersions2\rsecretVersion\"\xaa\x04\n\x0bReplication\x12N\n\tautomatic\x18\x01 \x01(\x0b\x32\x39.google.cloud.secretmanager.v1beta2.Replication.AutomaticH\x00\x12S\n\x0cuser_managed\x18\x02 \x01(\x0b\x32;.google.cloud.secretmanager.v1beta2.Replication.UserManagedH\x00\x1at\n\tAutomatic\x12g\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32=.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a\xf0\x01\n\x0bUserManaged\x12Z\n\x08replicas\x18\x01 \x03(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x84\x01\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\t\x12g\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32=.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionB\x03\xe0\x41\x01\x42\r\n\x0breplication\"6\n\x19\x43ustomerManagedEncryption\x12\x19\n\x0ckms_key_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\x85\x05\n\x11ReplicationStatus\x12Z\n\tautomatic\x18\x01 \x01(\x0b\x32\x45.google.cloud.secretmanager.v1beta2.ReplicationStatus.AutomaticStatusH\x00\x12_\n\x0cuser_managed\x18\x02 \x01(\x0b\x32G.google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatusH\x00\x1a\x80\x01\n\x0f\x41utomaticStatus\x12m\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x1a\x99\x02\n\x11UserManagedStatus\x12l\n\x08replicas\x18\x01 \x03(\x0b\x32U.google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus.ReplicaStatusB\x03\xe0\x41\x03\x1a\x95\x01\n\rReplicaStatus\x12\x15\n\x08location\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12m\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x42\x14\n\x12replication_status\"D\n\x1f\x43ustomerManagedEncryptionStatus\x12!\n\x14kms_key_version_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"_\n\x05Topic\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x02:C\xea\x41@\n\x1bpubsub.googleapis.com/Topic\x12!projects/{project}/topics/{topic}\"\x80\x01\n\x08Rotation\x12;\n\x12next_rotation_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01\x12\x37\n\x0frotation_period\x18\x02 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04\"L\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x12\x1d\n\x0b\x64\x61ta_crc32c\x18\x02 \x01(\x03\x42\x03\xe0\x41\x01H\x00\x88\x01\x01\x42\x0e\n\x0c_data_crc32cB\
|
13
|
+
descriptor_data = "\n2google/cloud/secretmanager/v1beta2/resources.proto\x12\"google.cloud.secretmanager.v1beta2\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/protobuf/duration.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\x85\t\n\x06Secret\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12L\n\x0breplication\x18\x02 \x01(\x0b\x32/.google.cloud.secretmanager.v1beta2.ReplicationB\x06\xe0\x41\x05\xe0\x41\x01\x12\x34\n\x0b\x63reate_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x46\n\x06labels\x18\x04 \x03(\x0b\x32\x36.google.cloud.secretmanager.v1beta2.Secret.LabelsEntry\x12>\n\x06topics\x18\x05 \x03(\x0b\x32).google.cloud.secretmanager.v1beta2.TopicB\x03\xe0\x41\x01\x12\x36\n\x0b\x65xpire_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01H\x00\x12-\n\x03ttl\x18\x07 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04H\x00\x12\x11\n\x04\x65tag\x18\x08 \x01(\tB\x03\xe0\x41\x01\x12\x43\n\x08rotation\x18\t \x01(\x0b\x32,.google.cloud.secretmanager.v1beta2.RotationB\x03\xe0\x41\x01\x12\\\n\x0fversion_aliases\x18\x0b \x03(\x0b\x32>.google.cloud.secretmanager.v1beta2.Secret.VersionAliasesEntryB\x03\xe0\x41\x01\x12U\n\x0b\x61nnotations\x18\r \x03(\x0b\x32;.google.cloud.secretmanager.v1beta2.Secret.AnnotationsEntryB\x03\xe0\x41\x01\x12;\n\x13version_destroy_ttl\x18\x0e \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x01\x12g\n\x1b\x63ustomer_managed_encryption\x18\x0f \x01(\x0b\x32=.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a\x35\n\x13VersionAliasesEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\x03:\x02\x38\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01:\x99\x01\xea\x41\x95\x01\n#secretmanager.googleapis.com/Secret\x12#projects/{project}/secrets/{secret}\x12\x38projects/{project}/locations/{location}/secrets/{secret}*\x07secrets2\x06secretB\x0c\n\nexpiration\"\xd1\x06\n\rSecretVersion\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x35\n\x0c\x64\x65stroy_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12K\n\x05state\x18\x04 \x01(\x0e\x32\x37.google.cloud.secretmanager.v1beta2.SecretVersion.StateB\x03\xe0\x41\x03\x12Q\n\x12replication_status\x18\x05 \x01(\x0b\x32\x35.google.cloud.secretmanager.v1beta2.ReplicationStatus\x12\x11\n\x04\x65tag\x18\x06 \x01(\tB\x03\xe0\x41\x03\x12.\n!client_specified_payload_checksum\x18\x07 \x01(\x08\x42\x03\xe0\x41\x03\x12?\n\x16scheduled_destroy_time\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12m\n\x1b\x63ustomer_managed_encryption\x18\t \x01(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\"H\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x45NABLED\x10\x01\x12\x0c\n\x08\x44ISABLED\x10\x02\x12\r\n\tDESTROYED\x10\x03:\xe2\x01\xea\x41\xde\x01\n*secretmanager.googleapis.com/SecretVersion\x12=projects/{project}/secrets/{secret}/versions/{secret_version}\x12Rprojects/{project}/locations/{location}/secrets/{secret}/versions/{secret_version}*\x0esecretVersions2\rsecretVersion\"\xaa\x04\n\x0bReplication\x12N\n\tautomatic\x18\x01 \x01(\x0b\x32\x39.google.cloud.secretmanager.v1beta2.Replication.AutomaticH\x00\x12S\n\x0cuser_managed\x18\x02 \x01(\x0b\x32;.google.cloud.secretmanager.v1beta2.Replication.UserManagedH\x00\x1at\n\tAutomatic\x12g\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32=.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionB\x03\xe0\x41\x01\x1a\xf0\x01\n\x0bUserManaged\x12Z\n\x08replicas\x18\x01 \x03(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.Replication.UserManaged.ReplicaB\x03\xe0\x41\x02\x1a\x84\x01\n\x07Replica\x12\x10\n\x08location\x18\x01 \x01(\t\x12g\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32=.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionB\x03\xe0\x41\x01\x42\r\n\x0breplication\"6\n\x19\x43ustomerManagedEncryption\x12\x19\n\x0ckms_key_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\x85\x05\n\x11ReplicationStatus\x12Z\n\tautomatic\x18\x01 \x01(\x0b\x32\x45.google.cloud.secretmanager.v1beta2.ReplicationStatus.AutomaticStatusH\x00\x12_\n\x0cuser_managed\x18\x02 \x01(\x0b\x32G.google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatusH\x00\x1a\x80\x01\n\x0f\x41utomaticStatus\x12m\n\x1b\x63ustomer_managed_encryption\x18\x01 \x01(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x1a\x99\x02\n\x11UserManagedStatus\x12l\n\x08replicas\x18\x01 \x03(\x0b\x32U.google.cloud.secretmanager.v1beta2.ReplicationStatus.UserManagedStatus.ReplicaStatusB\x03\xe0\x41\x03\x1a\x95\x01\n\rReplicaStatus\x12\x15\n\x08location\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12m\n\x1b\x63ustomer_managed_encryption\x18\x02 \x01(\x0b\x32\x43.google.cloud.secretmanager.v1beta2.CustomerManagedEncryptionStatusB\x03\xe0\x41\x03\x42\x14\n\x12replication_status\"D\n\x1f\x43ustomerManagedEncryptionStatus\x12!\n\x14kms_key_version_name\x18\x01 \x01(\tB\x03\xe0\x41\x02\"_\n\x05Topic\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x02:C\xea\x41@\n\x1bpubsub.googleapis.com/Topic\x12!projects/{project}/topics/{topic}\"\x80\x01\n\x08Rotation\x12;\n\x12next_rotation_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x01\x12\x37\n\x0frotation_period\x18\x02 \x01(\x0b\x32\x19.google.protobuf.DurationB\x03\xe0\x41\x04\"L\n\rSecretPayload\x12\x0c\n\x04\x64\x61ta\x18\x01 \x01(\x0c\x12\x1d\n\x0b\x64\x61ta_crc32c\x18\x02 \x01(\x03\x42\x03\xe0\x41\x01H\x00\x88\x01\x01\x42\x0e\n\x0c_data_crc32cB\x80\x02\n&com.google.cloud.secretmanager.v1beta2B\x0eResourcesProtoP\x01ZLcloud.google.com/go/secretmanager/apiv1beta2/secretmanagerpb;secretmanagerpb\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta2\xca\x02\"Google\\Cloud\\SecretManager\\V1beta2\xea\x02%Google::Cloud::SecretManager::V1beta2b\x06proto3"
|
14
14
|
|
15
15
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
16
16
|
|
@@ -15,7 +15,7 @@ require 'google/protobuf/empty_pb'
|
|
15
15
|
require 'google/protobuf/field_mask_pb'
|
16
16
|
|
17
17
|
|
18
|
-
descriptor_data = "\n0google/cloud/secretmanager/v1beta2/service.proto\x12\"google.cloud.secretmanager.v1beta2\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x32google/cloud/secretmanager/v1beta2/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x97\x01\n\x12ListSecretsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"\x7f\n\x13ListSecretsResponse\x12;\n\x07secrets\x18\x01 \x03(\x0b\x32*.google.cloud.secretmanager.v1beta2.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xab\x01\n\x13\x43reateSecretRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12?\n\x06secret\x18\x03 \x01(\x0b\x32*.google.cloud.secretmanager.v1beta2.SecretB\x03\xe0\x41\x02\"\x9f\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12G\n\x07payload\x18\x02 \x01(\x0b\x32\x31.google.cloud.secretmanager.v1beta2.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x9e\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"\x8e\x01\n\x1aListSecretVersionsResponse\x12\x43\n\x08versions\x18\x01 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1beta2.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x8c\x01\n\x13UpdateSecretRequest\x12?\n\x06secret\x18\x01 \x01(\x0b\x32*.google.cloud.secretmanager.v1beta2.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\xa0\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32\x31.google.cloud.secretmanager.v1beta2.SecretPayload\"c\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"q\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\x32\xf7\x1e\n\x14SecretManagerService\x12\xe9\x01\n\x0bListSecrets\x12\x36.google.cloud.secretmanager.v1beta2.ListSecretsRequest\x1a\x37.google.cloud.secretmanager.v1beta2.ListSecretsResponse\"i\xda\x41\x06parent\x82\xd3\xe4\x93\x02Z\x12$/v1beta2/{parent=projects/*}/secretsZ2\x12\x30/v1beta2/{parent=projects/*/locations/*}/secrets\x12\x80\x02\n\x0c\x43reateSecret\x12\x37.google.cloud.secretmanager.v1beta2.CreateSecretRequest\x1a*.google.cloud.secretmanager.v1beta2.Secret\"\x8a\x01\xda\x41\x17parent,secret_id,secret\x82\xd3\xe4\x93\x02j\"$/v1beta2/{parent=projects/*}/secrets:\x06secretZ:\"0/v1beta2/{parent=projects/*/locations/*}/secrets:\x06secret\x12\x96\x02\n\x10\x41\x64\x64SecretVersion\x12;.google.cloud.secretmanager.v1beta2.AddSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x91\x01\xda\x41\x0eparent,payload\x82\xd3\xe4\x93\x02z\"1/v1beta2/{parent=projects/*/secrets/*}:addVersion:\x01*ZB\"=/v1beta2/{parent=projects/*/locations/*/secrets/*}:addVersion:\x01*\x12\xd6\x01\n\tGetSecret\x12\x34.google.cloud.secretmanager.v1beta2.GetSecretRequest\x1a*.google.cloud.secretmanager.v1beta2.Secret\"g\xda\x41\x04name\x82\xd3\xe4\x93\x02Z\x12$/v1beta2/{name=projects/*/secrets/*}Z2\x12\x30/v1beta2/{name=projects/*/locations/*/secrets/*}\x12\x89\x02\n\x0cUpdateSecret\x12\x37.google.cloud.secretmanager.v1beta2.UpdateSecretRequest\x1a*.google.cloud.secretmanager.v1beta2.Secret\"\x93\x01\xda\x41\x12secret,update_mask\x82\xd3\xe4\x93\x02x2+/v1beta2/{secret.name=projects/*/secrets/*}:\x06secretZA27/v1beta2/{secret.name=projects/*/locations/*/secrets/*}:\x06secret\x12\xc8\x01\n\x0c\x44\x65leteSecret\x12\x37.google.cloud.secretmanager.v1beta2.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"g\xda\x41\x04name\x82\xd3\xe4\x93\x02Z*$/v1beta2/{name=projects/*/secrets/*}Z2*0/v1beta2/{name=projects/*/locations/*/secrets/*}\x12\x94\x02\n\x12ListSecretVersions\x12=.google.cloud.secretmanager.v1beta2.ListSecretVersionsRequest\x1a>.google.cloud.secretmanager.v1beta2.ListSecretVersionsResponse\"\x7f\xda\x41\x06parent\x82\xd3\xe4\x93\x02p\x12//v1beta2/{parent=projects/*/secrets/*}/versionsZ=\x12;/v1beta2/{parent=projects/*/locations/*/secrets/*}/versions\x12\x81\x02\n\x10GetSecretVersion\x12;.google.cloud.secretmanager.v1beta2.GetSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"}\xda\x41\x04name\x82\xd3\xe4\x93\x02p\x12//v1beta2/{name=projects/*/secrets/*/versions/*}Z=\x12;/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}\x12\xa4\x02\n\x13\x41\x63\x63\x65ssSecretVersion\x12>.google.cloud.secretmanager.v1beta2.AccessSecretVersionRequest\x1a?.google.cloud.secretmanager.v1beta2.AccessSecretVersionResponse\"\x8b\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02~\x12\x36/v1beta2/{name=projects/*/secrets/*/versions/*}:accessZD\x12\x42/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:access\x12\xa1\x02\n\x14\x44isableSecretVersion\x12?.google.cloud.secretmanager.v1beta2.DisableSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x94\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02\x86\x01\"7/v1beta2/{name=projects/*/secrets/*/versions/*}:disable:\x01*ZH\"C/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:disable:\x01*\x12\x9d\x02\n\x13\x45nableSecretVersion\x12>.google.cloud.secretmanager.v1beta2.EnableSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x92\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02\x84\x01\"6/v1beta2/{name=projects/*/secrets/*/versions/*}:enable:\x01*ZG\"B/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:enable:\x01*\x12\xa1\x02\n\x14\x44\x65stroySecretVersion\x12?.google.cloud.secretmanager.v1beta2.DestroySecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x94\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02\x86\x01\"7/v1beta2/{name=projects/*/secrets/*/versions/*}:destroy:\x01*ZH\"C/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:destroy:\x01*\x12\xd5\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x89\x01\x82\xd3\xe4\x93\x02\x82\x01\"5/v1beta2/{resource=projects/*/secrets/*}:setIamPolicy:\x01*ZF\"A/v1beta2/{resource=projects/*/locations/*/secrets/*}:setIamPolicy:\x01*\x12\xce\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x82\x01\x82\xd3\xe4\x93\x02|\x12\x35/v1beta2/{resource=projects/*/secrets/*}:getIamPolicyZC\x12\x41/v1beta2/{resource=projects/*/locations/*/secrets/*}:getIamPolicy\x12\x81\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x95\x01\x82\xd3\xe4\x93\x02\x8e\x01\";/v1beta2/{resource=projects/*/secrets/*}:testIamPermissions:\x01*ZL\"G/v1beta2/{resource=projects/*/locations/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\
|
18
|
+
descriptor_data = "\n0google/cloud/secretmanager/v1beta2/service.proto\x12\"google.cloud.secretmanager.v1beta2\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x32google/cloud/secretmanager/v1beta2/resources.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a\x1bgoogle/protobuf/empty.proto\x1a google/protobuf/field_mask.proto\"\x97\x01\n\x12ListSecretsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"\x7f\n\x13ListSecretsResponse\x12;\n\x07secrets\x18\x01 \x03(\x0b\x32*.google.cloud.secretmanager.v1beta2.Secret\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"\xab\x01\n\x13\x43reateSecretRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\x12#secretmanager.googleapis.com/Secret\x12\x16\n\tsecret_id\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12?\n\x06secret\x18\x03 \x01(\x0b\x32*.google.cloud.secretmanager.v1beta2.SecretB\x03\xe0\x41\x02\"\x9f\x01\n\x17\x41\x64\x64SecretVersionRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12G\n\x07payload\x18\x02 \x01(\x0b\x32\x31.google.cloud.secretmanager.v1beta2.SecretPayloadB\x03\xe0\x41\x02\"M\n\x10GetSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\"\x9e\x01\n\x19ListSecretVersionsRequest\x12;\n\x06parent\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\x12\x13\n\x06\x66ilter\x18\x04 \x01(\tB\x03\xe0\x41\x01\"\x8e\x01\n\x1aListSecretVersionsResponse\x12\x43\n\x08versions\x18\x01 \x03(\x0b\x32\x31.google.cloud.secretmanager.v1beta2.SecretVersion\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\x12\x12\n\ntotal_size\x18\x03 \x01(\x05\"[\n\x17GetSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\x8c\x01\n\x13UpdateSecretRequest\x12?\n\x06secret\x18\x01 \x01(\x0b\x32*.google.cloud.secretmanager.v1beta2.SecretB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"^\n\x1a\x41\x63\x63\x65ssSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\"\xa0\x01\n\x1b\x41\x63\x63\x65ssSecretVersionResponse\x12=\n\x04name\x18\x01 \x01(\tB/\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x42\n\x07payload\x18\x02 \x01(\x0b\x32\x31.google.cloud.secretmanager.v1beta2.SecretPayload\"c\n\x13\x44\x65leteSecretRequest\x12\x39\n\x04name\x18\x01 \x01(\tB+\xe0\x41\x02\xfa\x41%\n#secretmanager.googleapis.com/Secret\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44isableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"q\n\x1a\x45nableSecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\"r\n\x1b\x44\x65stroySecretVersionRequest\x12@\n\x04name\x18\x01 \x01(\tB2\xe0\x41\x02\xfa\x41,\n*secretmanager.googleapis.com/SecretVersion\x12\x11\n\x04\x65tag\x18\x02 \x01(\tB\x03\xe0\x41\x01\x32\xf7\x1e\n\x14SecretManagerService\x12\xe9\x01\n\x0bListSecrets\x12\x36.google.cloud.secretmanager.v1beta2.ListSecretsRequest\x1a\x37.google.cloud.secretmanager.v1beta2.ListSecretsResponse\"i\xda\x41\x06parent\x82\xd3\xe4\x93\x02Z\x12$/v1beta2/{parent=projects/*}/secretsZ2\x12\x30/v1beta2/{parent=projects/*/locations/*}/secrets\x12\x80\x02\n\x0c\x43reateSecret\x12\x37.google.cloud.secretmanager.v1beta2.CreateSecretRequest\x1a*.google.cloud.secretmanager.v1beta2.Secret\"\x8a\x01\xda\x41\x17parent,secret_id,secret\x82\xd3\xe4\x93\x02j\"$/v1beta2/{parent=projects/*}/secrets:\x06secretZ:\"0/v1beta2/{parent=projects/*/locations/*}/secrets:\x06secret\x12\x96\x02\n\x10\x41\x64\x64SecretVersion\x12;.google.cloud.secretmanager.v1beta2.AddSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x91\x01\xda\x41\x0eparent,payload\x82\xd3\xe4\x93\x02z\"1/v1beta2/{parent=projects/*/secrets/*}:addVersion:\x01*ZB\"=/v1beta2/{parent=projects/*/locations/*/secrets/*}:addVersion:\x01*\x12\xd6\x01\n\tGetSecret\x12\x34.google.cloud.secretmanager.v1beta2.GetSecretRequest\x1a*.google.cloud.secretmanager.v1beta2.Secret\"g\xda\x41\x04name\x82\xd3\xe4\x93\x02Z\x12$/v1beta2/{name=projects/*/secrets/*}Z2\x12\x30/v1beta2/{name=projects/*/locations/*/secrets/*}\x12\x89\x02\n\x0cUpdateSecret\x12\x37.google.cloud.secretmanager.v1beta2.UpdateSecretRequest\x1a*.google.cloud.secretmanager.v1beta2.Secret\"\x93\x01\xda\x41\x12secret,update_mask\x82\xd3\xe4\x93\x02x2+/v1beta2/{secret.name=projects/*/secrets/*}:\x06secretZA27/v1beta2/{secret.name=projects/*/locations/*/secrets/*}:\x06secret\x12\xc8\x01\n\x0c\x44\x65leteSecret\x12\x37.google.cloud.secretmanager.v1beta2.DeleteSecretRequest\x1a\x16.google.protobuf.Empty\"g\xda\x41\x04name\x82\xd3\xe4\x93\x02Z*$/v1beta2/{name=projects/*/secrets/*}Z2*0/v1beta2/{name=projects/*/locations/*/secrets/*}\x12\x94\x02\n\x12ListSecretVersions\x12=.google.cloud.secretmanager.v1beta2.ListSecretVersionsRequest\x1a>.google.cloud.secretmanager.v1beta2.ListSecretVersionsResponse\"\x7f\xda\x41\x06parent\x82\xd3\xe4\x93\x02p\x12//v1beta2/{parent=projects/*/secrets/*}/versionsZ=\x12;/v1beta2/{parent=projects/*/locations/*/secrets/*}/versions\x12\x81\x02\n\x10GetSecretVersion\x12;.google.cloud.secretmanager.v1beta2.GetSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"}\xda\x41\x04name\x82\xd3\xe4\x93\x02p\x12//v1beta2/{name=projects/*/secrets/*/versions/*}Z=\x12;/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}\x12\xa4\x02\n\x13\x41\x63\x63\x65ssSecretVersion\x12>.google.cloud.secretmanager.v1beta2.AccessSecretVersionRequest\x1a?.google.cloud.secretmanager.v1beta2.AccessSecretVersionResponse\"\x8b\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02~\x12\x36/v1beta2/{name=projects/*/secrets/*/versions/*}:accessZD\x12\x42/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:access\x12\xa1\x02\n\x14\x44isableSecretVersion\x12?.google.cloud.secretmanager.v1beta2.DisableSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x94\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02\x86\x01\"7/v1beta2/{name=projects/*/secrets/*/versions/*}:disable:\x01*ZH\"C/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:disable:\x01*\x12\x9d\x02\n\x13\x45nableSecretVersion\x12>.google.cloud.secretmanager.v1beta2.EnableSecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x92\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02\x84\x01\"6/v1beta2/{name=projects/*/secrets/*/versions/*}:enable:\x01*ZG\"B/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:enable:\x01*\x12\xa1\x02\n\x14\x44\x65stroySecretVersion\x12?.google.cloud.secretmanager.v1beta2.DestroySecretVersionRequest\x1a\x31.google.cloud.secretmanager.v1beta2.SecretVersion\"\x94\x01\xda\x41\x04name\x82\xd3\xe4\x93\x02\x86\x01\"7/v1beta2/{name=projects/*/secrets/*/versions/*}:destroy:\x01*ZH\"C/v1beta2/{name=projects/*/locations/*/secrets/*/versions/*}:destroy:\x01*\x12\xd5\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x89\x01\x82\xd3\xe4\x93\x02\x82\x01\"5/v1beta2/{resource=projects/*/secrets/*}:setIamPolicy:\x01*ZF\"A/v1beta2/{resource=projects/*/locations/*/secrets/*}:setIamPolicy:\x01*\x12\xce\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"\x82\x01\x82\xd3\xe4\x93\x02|\x12\x35/v1beta2/{resource=projects/*/secrets/*}:getIamPolicyZC\x12\x41/v1beta2/{resource=projects/*/locations/*/secrets/*}:getIamPolicy\x12\x81\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\x95\x01\x82\xd3\xe4\x93\x02\x8e\x01\";/v1beta2/{resource=projects/*/secrets/*}:testIamPermissions:\x01*ZL\"G/v1beta2/{resource=projects/*/locations/*/secrets/*}:testIamPermissions:\x01*\x1aP\xca\x41\x1csecretmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xfe\x01\n&com.google.cloud.secretmanager.v1beta2B\x0cServiceProtoP\x01ZLcloud.google.com/go/secretmanager/apiv1beta2/secretmanagerpb;secretmanagerpb\xa2\x02\x03GSM\xaa\x02\"Google.Cloud.SecretManager.V1Beta2\xca\x02\"Google\\Cloud\\SecretManager\\V1beta2\xea\x02%Google::Cloud::SecretManager::V1beta2b\x06proto3"
|
19
19
|
|
20
20
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
21
21
|
|
@@ -65,10 +65,14 @@ module Google
|
|
65
65
|
# {::Google::Cloud::SecretManager::V1beta2::Secret Secret} is scheduled to
|
66
66
|
# expire. This is always provided on output, regardless of what was sent on
|
67
67
|
# input.
|
68
|
+
#
|
69
|
+
# Note: The following fields are mutually exclusive: `expire_time`, `ttl`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
68
70
|
# @!attribute [rw] ttl
|
69
71
|
# @return [::Google::Protobuf::Duration]
|
70
72
|
# Input only. The TTL for the
|
71
73
|
# {::Google::Cloud::SecretManager::V1beta2::Secret Secret}.
|
74
|
+
#
|
75
|
+
# Note: The following fields are mutually exclusive: `ttl`, `expire_time`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
72
76
|
# @!attribute [rw] etag
|
73
77
|
# @return [::String]
|
74
78
|
# Optional. Etag of the currently stored
|
@@ -246,10 +250,14 @@ module Google
|
|
246
250
|
# @return [::Google::Cloud::SecretManager::V1beta2::Replication::Automatic]
|
247
251
|
# The {::Google::Cloud::SecretManager::V1beta2::Secret Secret} will
|
248
252
|
# automatically be replicated without any restrictions.
|
253
|
+
#
|
254
|
+
# Note: The following fields are mutually exclusive: `automatic`, `user_managed`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
249
255
|
# @!attribute [rw] user_managed
|
250
256
|
# @return [::Google::Cloud::SecretManager::V1beta2::Replication::UserManaged]
|
251
257
|
# The {::Google::Cloud::SecretManager::V1beta2::Secret Secret} will only be
|
252
258
|
# replicated into the locations specified.
|
259
|
+
#
|
260
|
+
# Note: The following fields are mutually exclusive: `user_managed`, `automatic`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
253
261
|
class Replication
|
254
262
|
include ::Google::Protobuf::MessageExts
|
255
263
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -275,7 +283,8 @@ module Google
|
|
275
283
|
|
276
284
|
# A replication policy that replicates the
|
277
285
|
# {::Google::Cloud::SecretManager::V1beta2::Secret Secret} payload into the
|
278
|
-
# locations specified in
|
286
|
+
# locations specified in
|
287
|
+
# {::Google::Cloud::SecretManager::V1beta2::Replication::UserManaged#replicas Replication.UserManaged.replicas}
|
279
288
|
# @!attribute [rw] replicas
|
280
289
|
# @return [::Array<::Google::Cloud::SecretManager::V1beta2::Replication::UserManaged::Replica>]
|
281
290
|
# Required. The list of Replicas for this
|
@@ -343,6 +352,8 @@ module Google
|
|
343
352
|
# Only populated if the parent
|
344
353
|
# {::Google::Cloud::SecretManager::V1beta2::Secret Secret} has an automatic
|
345
354
|
# replication policy.
|
355
|
+
#
|
356
|
+
# Note: The following fields are mutually exclusive: `automatic`, `user_managed`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
346
357
|
# @!attribute [rw] user_managed
|
347
358
|
# @return [::Google::Cloud::SecretManager::V1beta2::ReplicationStatus::UserManagedStatus]
|
348
359
|
# Describes the replication status of a
|
@@ -352,6 +363,8 @@ module Google
|
|
352
363
|
# Only populated if the parent
|
353
364
|
# {::Google::Cloud::SecretManager::V1beta2::Secret Secret} has a user-managed
|
354
365
|
# replication policy.
|
366
|
+
#
|
367
|
+
# Note: The following fields are mutually exclusive: `user_managed`, `automatic`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
355
368
|
class ReplicationStatus
|
356
369
|
include ::Google::Protobuf::MessageExts
|
357
370
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
metadata
CHANGED
@@ -1,14 +1,13 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-secret_manager-v1beta2
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
|
-
autorequire:
|
9
8
|
bindir: bin
|
10
9
|
cert_chain: []
|
11
|
-
date:
|
10
|
+
date: 2025-01-29 00:00:00.000000000 Z
|
12
11
|
dependencies:
|
13
12
|
- !ruby/object:Gem::Dependency
|
14
13
|
name: gapic-common
|
@@ -16,7 +15,7 @@ dependencies:
|
|
16
15
|
requirements:
|
17
16
|
- - ">="
|
18
17
|
- !ruby/object:Gem::Version
|
19
|
-
version: 0.
|
18
|
+
version: 0.25.0
|
20
19
|
- - "<"
|
21
20
|
- !ruby/object:Gem::Version
|
22
21
|
version: 2.a
|
@@ -26,7 +25,7 @@ dependencies:
|
|
26
25
|
requirements:
|
27
26
|
- - ">="
|
28
27
|
- !ruby/object:Gem::Version
|
29
|
-
version: 0.
|
28
|
+
version: 0.25.0
|
30
29
|
- - "<"
|
31
30
|
- !ruby/object:Gem::Version
|
32
31
|
version: 2.a
|
@@ -126,7 +125,6 @@ homepage: https://github.com/googleapis/google-cloud-ruby
|
|
126
125
|
licenses:
|
127
126
|
- Apache-2.0
|
128
127
|
metadata: {}
|
129
|
-
post_install_message:
|
130
128
|
rdoc_options: []
|
131
129
|
require_paths:
|
132
130
|
- lib
|
@@ -134,15 +132,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
134
132
|
requirements:
|
135
133
|
- - ">="
|
136
134
|
- !ruby/object:Gem::Version
|
137
|
-
version: '
|
135
|
+
version: '3.0'
|
138
136
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
139
137
|
requirements:
|
140
138
|
- - ">="
|
141
139
|
- !ruby/object:Gem::Version
|
142
140
|
version: '0'
|
143
141
|
requirements: []
|
144
|
-
rubygems_version: 3.
|
145
|
-
signing_key:
|
142
|
+
rubygems_version: 3.6.2
|
146
143
|
specification_version: 4
|
147
144
|
summary: Stores sensitive data such as API keys, passwords, and certificates. Provides
|
148
145
|
convenience while improving security.
|