Skip to content
This repository has been archived by the owner on Sep 16, 2023. It is now read-only.

Commit

Permalink
Browse files Browse the repository at this point in the history
feat: added expire_time and ttl fields to Secret (#355)
This PR was generated using Autosynth. 🌈

Synth log will be available here:
https://source.cloud.google.com/results/invocations/1a417553-bc66-460b-9d88-fe487d5b0cb6/targets

- [ ] To automatically regenerate this PR, check this box.

PiperOrigin-RevId: 352563582
Source-Link: googleapis/googleapis@9ecdacc
  • Loading branch information
yoshi-automation committed Feb 3, 2021
1 parent 20c8376 commit 0dc2188
Show file tree
Hide file tree
Showing 5 changed files with 866 additions and 65 deletions.
Expand Up @@ -95,75 +95,80 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
"\n-google/cloud/secretmanager/v1/resource"
+ "s.proto\022\035google.cloud.secretmanager.v1\032\037"
+ "google/api/field_behavior.proto\032\031google/"
+ "api/resource.proto\032\037google/protobuf/time"
+ "stamp.proto\032\034google/api/annotations.prot"
+ "o\"\333\002\n\006Secret\022\021\n\004name\030\001 \001(\tB\003\340A\003\022G\n\013repli"
+ "cation\030\002 \001(\0132*.google.cloud.secretmanage"
+ "r.v1.ReplicationB\006\340A\005\340A\002\0224\n\013create_time\030"
+ "\003 \001(\0132\032.google.protobuf.TimestampB\003\340A\003\022A"
+ "\n\006labels\030\004 \003(\01321.google.cloud.secretmana"
+ "ger.v1.Secret.LabelsEntry\032-\n\013LabelsEntry"
+ "\022\013\n\003key\030\001 \001(\t\022\r\n\005value\030\002 \001(\t:\0028\001:M\352AJ\n#s"
+ "ecretmanager.googleapis.com/Secret\022#proj"
+ "ects/{project}/secrets/{secret}\"\337\003\n\rSecr"
+ "etVersion\022\021\n\004name\030\001 \001(\tB\003\340A\003\0224\n\013create_t"
+ "ime\030\002 \001(\0132\032.google.protobuf.TimestampB\003\340"
+ "A\003\0225\n\014destroy_time\030\003 \001(\0132\032.google.protob"
+ "uf.TimestampB\003\340A\003\022F\n\005state\030\004 \001(\01622.googl"
+ "e.cloud.secretmanager.v1.SecretVersion.S"
+ "tateB\003\340A\003\022L\n\022replication_status\030\005 \001(\01320."
+ "google.cloud.secretmanager.v1.Replicatio"
+ "nStatus\"H\n\005State\022\025\n\021STATE_UNSPECIFIED\020\000\022"
+ "\013\n\007ENABLED\020\001\022\014\n\010DISABLED\020\002\022\r\n\tDESTROYED\020"
+ "\003:n\352Ak\n*secretmanager.googleapis.com/Sec"
+ "retVersion\022=projects/{project}/secrets/{"
+ "secret}/versions/{secret_version}\"\220\004\n\013Re"
+ "plication\022I\n\tautomatic\030\001 \001(\01324.google.cl"
+ "oud.secretmanager.v1.Replication.Automat"
+ "icH\000\022N\n\014user_managed\030\002 \001(\01326.google.clou"
+ "d.secretmanager.v1.Replication.UserManag"
+ "edH\000\032o\n\tAutomatic\022b\n\033customer_managed_en"
+ "cryption\030\001 \001(\01328.google.cloud.secretmana"
+ "ger.v1.CustomerManagedEncryptionB\003\340A\001\032\345\001"
+ "\n\013UserManaged\022U\n\010replicas\030\001 \003(\0132>.google"
+ ".cloud.secretmanager.v1.Replication.User"
+ "Managed.ReplicaB\003\340A\002\032\177\n\007Replica\022\020\n\010locat"
+ "ion\030\001 \001(\t\022b\n\033customer_managed_encryption"
+ "\030\002 \001(\01328.google.cloud.secretmanager.v1.C"
+ "ustomerManagedEncryptionB\003\340A\001B\r\n\013replica"
+ "tion\"6\n\031CustomerManagedEncryption\022\031\n\014kms"
+ "_key_name\030\001 \001(\tB\003\340A\002\"\353\004\n\021ReplicationStat"
+ "us\022U\n\tautomatic\030\001 \001(\0132@.google.cloud.sec"
+ "retmanager.v1.ReplicationStatus.Automati"
+ "cStatusH\000\022Z\n\014user_managed\030\002 \001(\0132B.google"
+ ".cloud.secretmanager.v1.ReplicationStatu"
+ "s.UserManagedStatusH\000\032{\n\017AutomaticStatus"
+ "\022h\n\033customer_managed_encryption\030\001 \001(\0132>."
+ "google.cloud.secretmanager.v1.CustomerMa"
+ "nagedEncryptionStatusB\003\340A\003\032\217\002\n\021UserManag"
+ "edStatus\022g\n\010replicas\030\001 \003(\0132P.google.clou"
+ "d.secretmanager.v1.ReplicationStatus.Use"
+ "rManagedStatus.ReplicaStatusB\003\340A\003\032\220\001\n\rRe"
+ "plicaStatus\022\025\n\010location\030\001 \001(\tB\003\340A\003\022h\n\033cu"
+ "stomer_managed_encryption\030\002 \001(\0132>.google"
+ ".cloud.secretmanager.v1.CustomerManagedE"
+ "ncryptionStatusB\003\340A\003B\024\n\022replication_stat"
+ "us\"D\n\037CustomerManagedEncryptionStatus\022!\n"
+ "\024kms_key_version_name\030\001 \001(\tB\003\340A\002\"\035\n\rSecr"
+ "etPayload\022\014\n\004data\030\001 \001(\014B\355\001\n!com.google.c"
+ "loud.secretmanager.v1B\016ResourcesProtoP\001Z"
+ "Jgoogle.golang.org/genproto/googleapis/c"
+ "loud/secretmanager/v1;secretmanager\370\001\001\242\002"
+ "\003GSM\252\002\035Google.Cloud.SecretManager.V1\312\002\035G"
+ "oogle\\Cloud\\SecretManager\\V1\352\002 Google::C"
+ "loud::SecretManager::V1b\006proto3"
+ "api/resource.proto\032\036google/protobuf/dura"
+ "tion.proto\032\037google/protobuf/timestamp.pr"
+ "oto\032\034google/api/annotations.proto\"\320\003\n\006Se"
+ "cret\022\021\n\004name\030\001 \001(\tB\003\340A\003\022G\n\013replication\030\002"
+ " \001(\0132*.google.cloud.secretmanager.v1.Rep"
+ "licationB\006\340A\005\340A\002\0224\n\013create_time\030\003 \001(\0132\032."
+ "google.protobuf.TimestampB\003\340A\003\022A\n\006labels"
+ "\030\004 \003(\01321.google.cloud.secretmanager.v1.S"
+ "ecret.LabelsEntry\0226\n\013expire_time\030\006 \001(\0132\032"
+ ".google.protobuf.TimestampB\003\340A\001H\000\022-\n\003ttl"
+ "\030\007 \001(\0132\031.google.protobuf.DurationB\003\340A\004H\000"
+ "\032-\n\013LabelsEntry\022\013\n\003key\030\001 \001(\t\022\r\n\005value\030\002 "
+ "\001(\t:\0028\001:M\352AJ\n#secretmanager.googleapis.c"
+ "om/Secret\022#projects/{project}/secrets/{s"
+ "ecret}B\014\n\nexpiration\"\337\003\n\rSecretVersion\022\021"
+ "\n\004name\030\001 \001(\tB\003\340A\003\0224\n\013create_time\030\002 \001(\0132\032"
+ ".google.protobuf.TimestampB\003\340A\003\0225\n\014destr"
+ "oy_time\030\003 \001(\0132\032.google.protobuf.Timestam"
+ "pB\003\340A\003\022F\n\005state\030\004 \001(\01622.google.cloud.sec"
+ "retmanager.v1.SecretVersion.StateB\003\340A\003\022L"
+ "\n\022replication_status\030\005 \001(\01320.google.clou"
+ "d.secretmanager.v1.ReplicationStatus\"H\n\005"
+ "State\022\025\n\021STATE_UNSPECIFIED\020\000\022\013\n\007ENABLED\020"
+ "\001\022\014\n\010DISABLED\020\002\022\r\n\tDESTROYED\020\003:n\352Ak\n*sec"
+ "retmanager.googleapis.com/SecretVersion\022"
+ "=projects/{project}/secrets/{secret}/ver"
+ "sions/{secret_version}\"\220\004\n\013Replication\022I"
+ "\n\tautomatic\030\001 \001(\01324.google.cloud.secretm"
+ "anager.v1.Replication.AutomaticH\000\022N\n\014use"
+ "r_managed\030\002 \001(\01326.google.cloud.secretman"
+ "ager.v1.Replication.UserManagedH\000\032o\n\tAut"
+ "omatic\022b\n\033customer_managed_encryption\030\001 "
+ "\001(\01328.google.cloud.secretmanager.v1.Cust"
+ "omerManagedEncryptionB\003\340A\001\032\345\001\n\013UserManag"
+ "ed\022U\n\010replicas\030\001 \003(\0132>.google.cloud.secr"
+ "etmanager.v1.Replication.UserManaged.Rep"
+ "licaB\003\340A\002\032\177\n\007Replica\022\020\n\010location\030\001 \001(\t\022b"
+ "\n\033customer_managed_encryption\030\002 \001(\01328.go"
+ "ogle.cloud.secretmanager.v1.CustomerMana"
+ "gedEncryptionB\003\340A\001B\r\n\013replication\"6\n\031Cus"
+ "tomerManagedEncryption\022\031\n\014kms_key_name\030\001"
+ " \001(\tB\003\340A\002\"\353\004\n\021ReplicationStatus\022U\n\tautom"
+ "atic\030\001 \001(\0132@.google.cloud.secretmanager."
+ "v1.ReplicationStatus.AutomaticStatusH\000\022Z"
+ "\n\014user_managed\030\002 \001(\0132B.google.cloud.secr"
+ "etmanager.v1.ReplicationStatus.UserManag"
+ "edStatusH\000\032{\n\017AutomaticStatus\022h\n\033custome"
+ "r_managed_encryption\030\001 \001(\0132>.google.clou"
+ "d.secretmanager.v1.CustomerManagedEncryp"
+ "tionStatusB\003\340A\003\032\217\002\n\021UserManagedStatus\022g\n"
+ "\010replicas\030\001 \003(\0132P.google.cloud.secretman"
+ "ager.v1.ReplicationStatus.UserManagedSta"
+ "tus.ReplicaStatusB\003\340A\003\032\220\001\n\rReplicaStatus"
+ "\022\025\n\010location\030\001 \001(\tB\003\340A\003\022h\n\033customer_mana"
+ "ged_encryption\030\002 \001(\0132>.google.cloud.secr"
+ "etmanager.v1.CustomerManagedEncryptionSt"
+ "atusB\003\340A\003B\024\n\022replication_status\"D\n\037Custo"
+ "merManagedEncryptionStatus\022!\n\024kms_key_ve"
+ "rsion_name\030\001 \001(\tB\003\340A\002\"\035\n\rSecretPayload\022\014"
+ "\n\004data\030\001 \001(\014B\355\001\n!com.google.cloud.secret"
+ "manager.v1B\016ResourcesProtoP\001ZJgoogle.gol"
+ "ang.org/genproto/googleapis/cloud/secret"
+ "manager/v1;secretmanager\370\001\001\242\002\003GSM\252\002\035Goog"
+ "le.Cloud.SecretManager.V1\312\002\035Google\\Cloud"
+ "\\SecretManager\\V1\352\002 Google::Cloud::Secre"
+ "tManager::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
descriptorData,
new com.google.protobuf.Descriptors.FileDescriptor[] {
com.google.api.FieldBehaviorProto.getDescriptor(),
com.google.api.ResourceProto.getDescriptor(),
com.google.protobuf.DurationProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
com.google.api.AnnotationsProto.getDescriptor(),
});
Expand All @@ -173,7 +178,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_secretmanager_v1_Secret_descriptor,
new java.lang.String[] {
"Name", "Replication", "CreateTime", "Labels",
"Name", "Replication", "CreateTime", "Labels", "ExpireTime", "Ttl", "Expiration",
});
internal_static_google_cloud_secretmanager_v1_Secret_LabelsEntry_descriptor =
internal_static_google_cloud_secretmanager_v1_Secret_descriptor.getNestedTypes().get(0);
Expand Down Expand Up @@ -299,6 +304,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
descriptor, registry);
com.google.api.FieldBehaviorProto.getDescriptor();
com.google.api.ResourceProto.getDescriptor();
com.google.protobuf.DurationProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
com.google.api.AnnotationsProto.getDescriptor();
}
Expand Down

0 comments on commit 0dc2188

Please sign in to comment.